Networking with TCP/IP Midterm 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is NAT called on a windows system?

Internet Connection Sharing (ICS)

IPv6 does not support traditional MTU, rather IPv6 uses a trail-an-error mechanism called:

Path MTU Discovery (PMTUD)

What are the two major firewalls commonly used:

Proxy Firewalls Packet-Filtering Firewalls

Which term below refers to a single device transmitting a message to all other devices on the subnet?

Broadcast

Select the major functions that NDP provides (select all that apply)

Duplicate Address Detection (DAD) Router Discovery Address Resolution Neighbor Discovery Stateless Autoconfiguration DNS Server Discovery

What three type of address assignment does DHCP allow? (check all that apply)

Dynamic Static Automatic

Using the ping command, ICMP utilizes the following message types:(check all that apply?)

Echo Reply Echo Request

Which IPv6 Multicast Address Space below is for all nodes on the local network segment.

FF02::1

Which IPv6 Multicast Address below is for all OSPFv3 ALLSPF Routers.

FF02::5

Which IPv6 Multicast Address Space below is for all EIGRP routers

FF02::a

What protocol below is used in mobile IPv6

FMP

Packet filtering firewall acts as internet routers and ________ some traffic.

Filter (drop)

A DHCP server leases an address to a client for a ______ period of time.

Finite

Which IPv4 Multicast Address space below is for all systems on this subnet.

224.0.0.1

NDP defines five ICMPv6 message types

Neighbor Advertisement Router Advertisement Redirect Router Solicitation Neighbor Solicitation

SLAAC utilizes which protocol to learn the IPv6 Prefix (netmask).

Neighbor Discover Protocol

Which IPv6 ICMP protocol and a feature of ND is used to detect when reachability between two systems on the same link has become lost?

Neighbor Unreachability Detection (NUD)

What technology is used to translate an internal private address to a public IP address on the internet.

Network Address Translation (NAT)

____________ technology provides transparent IP-live access to the internet for a host that has a private, non-routable IP Address. ex.... 10.0.0.6

Network Address Translation (NAT)

Although several variants of NAT exist, the __________ form is the most popular because it translates protocol port numbers as well as IP Addresses

Network Address and Port Translation (NAPT)

ICMP, Internet Control Message Protocol provides status information about IP Packets . When an CIMP error message passed through NAT, the addresses in the ________ need to be rewritten by NAT, so that the end client understands the ISMP error message

Offending Datagram

What other method besides DHCP is used; for example connections such as DSL.

PPP over Ethernet (PPPoE)

Routers are prohibited from fragmenting an IPv6 Datagram. The source sending the datagram must perform a path MTU discovery. Which IPv6 ICMP message is used for this?

Packet Too Big

Because internet routers each use local information when forwarding datagams, error can develop which can product routing loops. To prevent these loops, each IP datagram contains a hop limit, when this hop limit is reached, the router discards the datagram and send the following ICMP message:

Time Exceeded

The ____________ field sets an upper limit on the number of routers through which a datagram can pass.

Time-to-Live

___________ is a transport layer protocol that is connectionless and provides no reliability, no windowing, no reordering, and no segmentation

UDP

______________ protocol describes data sent over the network as packets, while _______ protocol describes data sent over the network as datagrams.

TCP, UDP

IP software in each machine along a path from source to destination decrements the TTL or HOP Count. What happens when the field reaches zero?

The datagram is discarded

Moving a host to a new network requires one of two possible changes: (click all that apply)

The host's address must change Datagram forwarding must change

When configuring firewalls on a router, the network administrator configures one or more:

Access Control List (ACL)

Proxy firewalls are not really internet routers, but are essentially hosts running one or more _________ that relay of certain types between one connection/association and another application layer

Application-Layer Gateways (ALGs)

What makes MIPv6 work in a relatively simple way, and with CNs that are not Mobile-IP aware?

Bidirectional Tunneling

Internet Protocol is a fundamental Internet Server consisting of a packet delivery system, which consists of UDP, a service is defined as: (check all that apply)

Connectionless Packet Delivery Unreliable Best Effort

What protocol can be used to automatically assign IP addresses and other parameters to a host or router?

DHCP

If the DHCP server sits on another link (lan) as compared to the client, a router can be configured as a _________ to forward request across networks.

DHCP Relay Agent

NDP operates at Layer 3 by using ICMPv6 messages. Select the major functions that NDP provides (Select-all-that-apply)

DNS Server Discovery Stateless Autoconfiguration Duplicate Address Detection (DAD) Router Discovery Neighbor Discovery Address Resolution

DHCP permits a cpomputer to obtain all the information needed to communicate on a given network including: (check all that apply)

Default Router IPv4 Address Subnet Mask

Whenever an error prevents a router from forwarding or delivering a datagram, the router sends this type of ICMP message back to the source:?

Destination Unreachable

IP supports a number of options that may be selected on a per-datagram basis. Select all of the options below.

Source Routing Traceroute Security and Handling Labels Timestamp

An alternative method of DHCP for IPv6 is:

Stateless Address Auto-Configuration (SLAAC)

Internet Protocol defines two major protocols. What are two major protocols:

TCP UDP

___________ provides for retransmission and helps to avoid congestion, whereas _________ does not.

TCP, UDP

What are the three standard fields that ICMP messages begin with?

Checksum Field Code Field Type Field

DCHP protocol is defined as:

Dynamic Host Configuration Protocol

IPv6 uses Neighbor Solicitation and Neighbor Advertisements messages to determine if an IPv6 address is already in use. What process is this called?

Duplicate Address Detection (DAD)

Ethernet limits data transfers to how many octets of data?

1500

How many levels of encapsulation are requirement when an ICMP message travels in an IP datagram?

2 Layers

A typical IPv4 header contains ______ bytes (no option).

20

Which IPv4 Multicast Address Space below is restricted to one network

224.0.0.1 - 224.0..255

Which IPv4 Multicast Address Space below is for all OSPFIGP Routers?

224.0.0.5

Which IPv4 Multicast Address Space below is global across the internet.

224.0.1.0 - 238.255.255.255

The IPv6 Fragment header contains a _______ Identification field, similar to IPv4, but twice as large.

32-bit

A typical IPv6 header contains _______ bytes (no options.)

40

The values for the IPv6 Next Header field may indicate extensions or header for other protocols. Select all of the IPv6 extension header mechanisms below.

Fragment Mobility (MIPv6) Encapsulation Security Payload (ESP) ICMPv6

The process of dividing a datagram is known as ________.

Fragmentation

What are two most common forms of proxy firewalls?

HTTP Proxy Firewalls SOCKS Firewalls

The _________ field is calculated over the IPv4 header only, not the payload.

Header Checksum

A method that attempts to allow two or more systems, each behind NAT, to communicate directly using pinholes is called:

Hole Punching

The ping command utilizes the following protocol?

ICMP

Which protocol allows routers to send error or control messages back to the source of a datagram that caused a problem?

ICMP

Which specific protocols below support Multicast traffic for IPv4

IGMP

Which specific protocols below support Multicast traffic?

IGMP MLD

What is NAT called on Linux Systems?

IP Masquerading

IP Multicasting is available for both:

IPv4 IPv6

A typical IP header contains the source and destination for: (check all that apply)

IPv4 Addresses IPv6 Addresses

The _____ field helps identify each datagram sent by an IPv4 host.

Identification

What generic facility has been developed to help UDP-based application hosted behind a NAT establish connectivity?

Interactive Connectivity Establishment (ICE)

A routing or forwarding table contains the following below. (check all that apply)

Interface Next-Hop Mask Destination

What is the Mechanism is considered a required part of IP:

Internet Control Message Protocol

IGMP is considered to be a service that is integrated with the IP Layer and stands for:

Internet Group Management Protocol

IPv6 utilizes Neighbor Discovery Protocol (NDP) operating at the following layers: (select all that apply)

Layer 3 Layer 2

Which specific protocols below supports Multicast traffic for IPv6?

MLD

What do we refer to the size limit on a network ethernet.(check all that apply)

Maximum Transmission Unit Maximum Transfer Unit

___________ is based on the idea that a host has a "home" network but may visit other networks from time to time.

Mobile IP

A host that might move is called a ______, and the host with which it is communication are called _________.

Mobile Node Correspondent Nodes

Some hardware technologies support a second form of multi-point delivery called hardware ____________.

Multicast

Which term below refers to a single device transmitting a message to a specific group of devices on the subnet?

Multicast

A ___________ is a term to denote the set of computers that are listening to a particular multicast address.

Multicast group

A NAT Translation Table stores:(Check all that apply)

NAT Port Internet IP & Port External IP & Port Payload Type

The _________ field in the IPv4 header contains a number indicating the type of data found in the payload portion of the datagram.

Protocol

To be effective, a firewall that uses datagram (packet) filtering should restrict access to all: (check all that apply)

Protocols Protocol Ports IP Sources IP Destinations

NDP defines five ICMPv6 message types:

Redirect Neighbor Advertisement Neighbor Solicitation Router Advertisement Router Solicitation

When a router detects a host using a nonoptimal first hop, the router sends the host the following ICMP message:

Redirect Message

One of the primary workshorses for UNSAF and NAT traversal is called:

STUN

Which protocol below is a relatively simple client/server protocol that is able to ascertain the external IP address and port numbers being used on a NAT in most circumstances?

STUN

Which protocol is a special set of enhancements aimed at providing additional security for IPv6 ICMP ND messages?

Secure Neighbor Discovery (SEND)

In IPv6 fragmentation of a datagram is performed by:

The original source

When a datagram causes an error, ICMP can only report the error condition back to:

The original source of the datagram

What do we mean by unreliable when considering IP Service, UDP as an example:

The packet delivery is not guaranteed

The optimal time for a DHCP lease depends on:

The particular network and the needs of a particular host

If a datagram is fragmented, where is the fragmented reassembled?

The ultimate destination reassembles fragments (the destination host)

What protocol provides a way for two or more systems to communicate even if they are located behind relatively uncooperative NATS?

Traversal Using Relays around NAT (TURN)

Which protocols does STUN Utilize below? (check all that apply)

UDP TCP TCP w/TLS

Which term below refers to sending a frame from host to host.

Unicast

What does UDP mean:

User Datagram Protocol

ICMP messages provide communication between:

an ICMP module on one machine and an ICMP module on another

Secure Neighbor Discovery uses an entirely different UPv6 address called a:

cryptographically generated address (CGA)

One of the popular systems for building firewalls is included with modern versions of Linux and is called:

iptables

IGMP works with multicast and has two phases:

local multicast routers periodically poll hosts on the local network to determine whether any hosts still remain members of each group. when a host joins a multicast group, the host sends an IGMP message to the groups multicast declaring its membership.


Set pelajaran terkait

Econ 212 Chapter Review Question

View Set

The Heart - Lecture Practice Test

View Set

Saunders Musculoskeletal - 64, 65, 43

View Set