ITS284 Chapter 9 edit

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?

B) 32 bits

In an IPv6 global unicast address, the interface ID is ________ bits long.

B) 64

Which of the following can route non-IP packets?

B) EIGRP

In SNMP, companies are often reluctant to use ________ commands because of security dangers.

B) Set

Today, it can be problematic to have only a single IPv6 stack because ________.

B) a single IPv6 stack could not communicate with a single IPv4 stack

In SNMP, the manager communicates directly with a(n) ________.

B) agent

IPsec protects ________ layer messages.

B) application

If a host is to be able to communicate via IPv4 and IPv6, it is said to ________.

B) have a dual-stack

The main disadvantage of transport mode protection compared to tunnel mode protection in IP is ________

B) higher cost

The part of an IPv6 global unicast address that designates the host is called the ________.

B) interface ID

In tunnel mode, IPsec provides protection ________.

B) only between the IPsec servers

Most corporations wish to have ________ domain names.

B) second-level

".com" is a ________.

B) top-level domain

".edu" is a ________.

B) top-level domain

is used for supervisory messages at the internet layer.

C) DHCP

SNMPv3 uses ________ for authentication.

C) a different password for each manager-agent pair

A company receives its domain name from ________.

C) a domain registrar

Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have per subnet?

65534

Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet part size be?

8

The IEEE calls 64-bit interface addresses ________.

A) Extended Unique Identifiers

Which of the following standards permits central management?

A) IPsec

is an interior dynamic routing protocol.

A) OSPF

Which is less expensive to implement?

A) SSL/TLS

SNMPv1 uses ________ for authentication.

A) community names

Pinging is to send ICMP ________ messages to the target host.

A) echo request

To see if a target host can be reached, you normally would send it an ICMP ________ message.

A) echo request

A company is free to select whatever ________ dynamic routing protocol it wishes.

A) interior

The routing prefix in IPv6 is like the ________ part in an IPv4 address.

A) network

Which of the following would be an SNMP object?

A) number of rows in routing table

The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is ________.

A) protection over only part of the route

The highest-level DNS servers are called ________.

A) root servers

Dynamic ________ protocols allow routers to transmit routing table information to one another.

A) routing

Client PCs must have digital certificates in ________.

A) transport mode

IPsec provides protection in two modes of operation one of these two modes is ________.

A) transport mode

Which mode of IPsec may be more expensive if a company has a large number of computers?

A) transport mode

Which of the following is a private IP address range?

10.x.x.x

If you have a subnet part of 7 bits, how many subnets can you have?

126

You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?

254

How many DNS root servers are there?

13

In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be?

8

Which has stronger security?

B) IPsec

IPsec is used for ________ VPNs.

C) both A and B

In DNS, a group of resources under the control of an organization is called a

D) domain

IP is reliable because of ________.

D) neither A nor B

The domain name system ________.

both A and B

Which of the following can be used within a firm?

both A and B

Which of the following is true about NAT?

C) both A and B

Which of the following would be an SNMP object?

C) both A and B

A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center.

C) fffe

Which is NOT one of the three parts of a public IPv6 unicast address?

C) host part

If your subnet part is 8 bits long, you can have ________ subnets.

D

In IPsec, agreements about how security will be done are called ________.

D) security associations

is a general naming system for the Internet.

DNS

is the process of presenting external IP addresses that are different from internal IP addresses used within the firm.

NAT

8) In NAT, the ________ creates new external source IP addresses and port numbers.

firewall

NAT enhances security by ________.

preventing sniffers from learning internal IP addresses


Set pelajaran terkait

Volcanoes, Earthquakes, Earth's History/Geologic Time Reduced Unit

View Set

principles of marketing |kotler & armstrong | final

View Set

RE Fundamentals CHAPTER 10: Real Estate License Law/Rules and Regulations

View Set

Engagement Planning (Audit Planning) [Auditing]

View Set

Chapter 11- Geography (Earth Science)

View Set

Unit 8 "Ecology Chemistry": Lesson 4 "Ecology Chemistry Portfolio"

View Set

E-commerce - IT4123 - Kennesaw - Final

View Set

Anatomy 2- Dermatomes, Cutaneous Nn

View Set

Topic 1: The Accounting Environment

View Set

U16LO2: Identify the difference between a put option and a call option and their strategies

View Set