Net me
Which of the following is an example of a non-routable IP address?
10.0.0.1 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, 192.168.0.0 - 192.168.255.255
is an IPv4 loop back address
127.0.0.1
The maximum number of bytes that can be transmitted in the data payload of an Ethernet frame is
1500
The number of bits in the suffix portion of a class A address is
24
The length of an IP address in IPv4 is _____ binary bits.
32
The minimum length of the data payload that can be transmitted in an Ethernet frame is _____ bytes
46
What is the size of the largest data payload that can be carried by a single UDP datagram?
65527 octets
What is the length of a UDP header?
8 octets
What is the size of the largest header that can be in a TCP segment?
? Not 32 NOT 128
What is the size of the largest header that can be in an IP packet?
? Not 64 NOT 16
At which layer of the OSI model would you find a file transfer service?
Application
Each entry in a DNS database consists of three items: a domain name, a record type, and a value. The record type specifies how the value is to be interpreted. An entry type that provides an alias for another DNS entry is the ___ type.
CNAME
Each entry in a DNS database consists of three items: a domain name, a record type, and a value. The record type specifies how the value is to be interpreted. An entry type that provides an alias for another DNS entry is the ___ type.
CName
Protocol which is an extension of BOOTP
DHCP
Which technology is standardized in the IEEE 802.3 specification?
Ethernet LANs
If we were to pluck an Ethernet frame off of the wire with our magic snooping scope and look at it's contents, if the destination address in the frame header was a broadcast and our magic snooping scope printed it out in hexadecimal the destination address would look like
FFFFFFFFFFFF
A DHCP server is required on every level 2 segment where DHCP will be used.
False
Datagrams carrying ICMP messages have a special priority and will be transmitted ahead of regular IP traffic
False
Flow control is the process of making sure data frames are received in the correct order
False
IGMP includes a capability for determining the identities of the members of the multi-cast group.
False
IGMP includes a method for determining the number of current members of a multi-cast group.
False
IP computes a CRC over the data payload in an IP packet.
False
IP computes a CRC over the header in an IP packet.
False
IP computes a checksum over the data payload in an IP packet.
False
IP is a virtual circuit service.
False
If a datagram carrying an ICMP message causes an error, ICMP is used to send an error message reporting this error.
False
RARP packets are encapsulated in IP packets
False
TCP is a connectionless service
False
The ARP protocol has a scheme built-in to provide a security mechanism so that responses to arp requests are guaranteed to come from trusted hosts.
False
The socket API cannot be used to send messages via UDP
False
The socket interface can only be used with TCP/IP.
False
To send a message to a multi-cast group using IGMP a sender must first join the multi-cast group.
False
When a next hop routing decision is made for a datagram, the address of the next hop is placed in the datagram header.
False
A TCP connection creates a ___ communication channel.
Full Duplex
If a router has received so many datagrams that it has no more buffer space available it will need to start discarding subsequently received datagrams. For each datagram discarded the router may send a source quench message to the host that created the discarded datagram. The source quench message is part of the _____ protocol.
ICMP
Protocol that includes an address mask request
ICMP
If a machine was configured with an incorrect netmask it might send packets to a router when in fact it can directly communicate with the destination machine. In this case the router would send a (n) ____ message to the sender notifying it of the situation.
ICMP redirect message
Routing decisions are made by ___.
IP
The information you are attempting to acquire by sending a RARP request is a node's ___ address
IP
Which standards organization developed the OSI model?
ISO
When a DNS server receives a request from a client for which it is not authoritative it in turn becomes a client and contacts another DNS server to resolve the request. When it contacts the other DNS server it makes a (n) ___ lookup request.
Iterative
An algorithm that allows transport protocols to ignore ambiguous round-trip time samples, and thus improve round-trip estimations.
Karn's algorithm
The ___ is an experimental IP Multi-cast-enabled network that exists as part of the Internet. It consists of groups of multi-cast-enabled subnets, connected by routers which are able to "tunnel" multi-cast data over uni-cast connections to other routers which are then able to take the packets and multi-cast them onto their subnet.
Mbone
Technique that allows a collection of computers with non-routable IP addresses to access the Internet through a service running on a computer that has a routable IP address.
NAT
In the designation 10Base5, the 10 stands for 10 ___.
NOT 10 Megabytes Probably Megabits
Network technology which utilizes two counter-rotating rings
NOT IEEE 802.11 NOT IEEE 802.5
In the socket API which of the following functions is not used by a server application
NOT Socket NOT Accept
NAT can be configured to operate in a number of modes. The most commonly used is
Network Address Port Translation
Computers do not all operate at the same speed. Data overrun occurs when a computer sends data across a network faster than the destination can absorb it. Consequently, data is lost. Several techniques are available to handle data overrun. Collectively, the techniques are known as flow control mechanisms. The simplest form of flow control is a stop-and-go system in which the sender waits after transmitting each packet. When the receiver is ready for another packet, the receiver sends a control message, usually a form of acknowledgment. To achieve higher throughput rates TCP/IP utilizes a flow control mechanism known as a
Not lookaside buffer Not write ahead buffer NOT write through cache sliding window ?
Technology which utilizes an IDL
RPC
What type of device would send an address mask reply message
Router
When implementing a concurrent connection-oriented server using sockets we can create apparent concurrency using _____ rather than actually creating multiple threads or separate processes for each connection.
Select
Layer 5 of the ISO OSI network model is called the ___ layer.
Session
A programming interface originally developed for Berkeley UNIX and TCP/IP that encapsulates the transport layer capabilities is the _____ library.
Sockets
In the TCP/IP protocol suite the protocol that provides a virtual circuit service
TCP
File transfer protocol intended for use in disk-less workstations by having the code burned into PROM chips. Thus, it was made extremely simple so the code could be extremely small.
TFTP
Which TCP/IP utility could be used to log into a UNIX host over a network?
TelNet
When IP fragments are sent to a router
They are forwarded
To guarantee that connections are established and terminated reliably, TCP utilizes a scheme known as a _____ to establish a connection.
Three way handshake
ICMP can be used to implement a trick to create a program that traces the route between two machines. This trick involves manipulating the _____ field in the IP header.
Time to Live
At which layer of the OSI model does TCP/IP handle error checking and retransmission of bad data?
Transport
An ARP message utilizes a different Ethernet frame type designator from an IP packet.
True
DHCP provides a way for a host to receive the address of its default router.
True
ICMP adds its own header in addition to the IP header for the packet. ICMP encapsulates messages in IP for transmission
True
ICMP encapsulates messages in IP for transmission
True
IP computes a checksum over the header in an IP packet.
True
Lost SYN and FIN segments are retransmitted.
True
The IP protocol has a time-stamp option that that can be used to have each router along a path taken by an IP packet to append to a list the router's IP address and a time-stamp indicating when the IP packet was processed by the router.
True
The IP protocol has an option for specifying the exact sequence of addresses that must be taken in a path from source to destination.
True
The IP protocol has an option to cause each router to append its IP to a list inside the IP header that will show the route taken by a packet from source to destination.
True
The first step in the DHCP protocol is for the client to find a DHCP server. This requires a level 2 broadcast capability.
True
When data is sent by TCP the header fields ACKNOWLEDGEMENT NUMBER and WINDOW refer to incoming data stream.
True
DNS does not distinguish between names in upper or lower case.
True, case insensitive
BOOTP uses ____ to carry messages
UDP
In the TCP/IP protocol suite the protocol that provides a datagram service is
UDP
A technique which encrypts IP or other types of level three packets and transmits the encrypted packets as data inside an IP packet.
VPN
The Network Virtual Terminal defined for use by the Telnet application defines the standard line termination to be
a two character sequence CR-LF
The standard network byte ordering defined for TCP/IP is
big Endian
Standard network byte ordering is
big endian
To detect errors, network systems usually send a small amount of additional information with the data. A sender computes the value of the additional information from the data, and a receiver performs the same computation to verify that the packet was transmitted without error. Two schemes commonly used to perform this integrity check are
checksum and CRC
TCP considers packet loss to be indicative of _____ in the network.
congestion
Duplication, delayed or out-of-order delivery, corruption of data and loss of information are characteristics of a ___ service.
datagram ? I think
In order to create a capability for foreign agent discovery to be used by mobile IP the designers of IP
extended the existing ICMP router solicitation messages
To obtain the local address associated with a socket you would call the socket library routine _____
getsocketname
The Socket API call that places a socket into passive mode is
listen
The technique used by IP routers when searching a routing table.
longest-prefix matching
When IGMP memberships are established at an IGMP enabled router they are created on a
per computer basis
When a client application makes a DNS request, for example by calling gethostbyname, it typically requests a(n) ___ lookup.
recursive
To compute an adaptive timeout value for unreceived acknowledgments TCP uses a weighted average computed as a linear combination of the estimated mean and variance of the ____ for each active connection.
round-trip time
In the CIDR style notation that appends a slash and a number such as 140.160.140.0/16, the number after the slash indicates
the number of bits in the prefix ? i think
Guaranteed delivery is a characteristic of a ___ service.
virtual circuit