Networking 2 Chapter 1 - 3 Point Quiz
The _________ manages the way data is presented to the network (on its way down the protocol stack), and to a specific machine/application combination (on its way up the protocol stack). 1) presentation layer 2) session layer 3) physical layer 4) network layer 5) transport layer
1
The __________ is responsible for the more forward-looking activities of the ISOC, and handles research and development work for topics too far-out or impractical for immediate implementation, but which may ( or may not) have a role to play on the Internet some day. 1) Internet Research Task force 2) Internet Society 3) ISO 4) Internet Engineering Task force 5) ICANN
1
The loopback address for a network interface lets the computer user test the interface. What is the loopback address using IPv6? 1) ::1 2) :1: 3) ::1:: 4) 1 5) none of these choices
1
The process of combining multiple outgoing protocol streams at the Transport and Network layers in TCP/IP is called __________. 1) multiplexing 2) forwarding 3) demultiplexing 4) all of these choices 5) routing
1
The simplest form of subnet masking uses a technique called ______, in which each subnet includes the same number of stations and represents a simple division of the address space made available by subnetting into multiple equal segments. 1) constant-lenght subnet masking 2) dot squad 3) firewall 4) anycast 5) multicast
1
The term ____ is used to describe the data frame crossing a router. 1) hop 2) loopback 3) dot quad 4) routing 5) firewall
1
Which of the following TCP/IP protocols operate at the TCP/IP Transport layer? Choose all that apply 1) UDP 2) TCP 3) ICMP 4) PPP 5) ARP
1,2
Which of the following address types are used for local network communications in IPv6? 1. site-local 2. link-local 3. local-use 4. link-layer
1,2
Which of the following components operate at the physical layer? choose all that apply 1. cables 2. network interface cards (NICs) 3. connectors 4. segmentation
1,2,3
Which of the following statements represent benefits of a layered approach to networking? choose all that apply 1. permits hardware issues to be kept separate from software issues 2. permits expertise to be applied from different disciplines for different layers 3. allows individual layers to be insulated from one another 4. takes a big problem and breaks it into series of smaller interrelated problems
1,2,3,4
which of the following items represent design goals that motivated the development of TCP/IP? Choose all that apply 1) support for long-haul connections 2) robust network architecture 3) ability of dissimilar systems to exchange data 4) reliable delivery mechanisms 5) high performance
1,2,3,4
Which of the following tools or techniques helped to alleviate IPv4 address scarcity? choose all that apply 1. increased use of private IP addresses 2. NAT 3. IPv6 4. CIDR
1,2,4
Which of the following TCP/IP network model layer(s) maps most nearly to single layers in the ISO/OSI network reference model? choose all that apply 1) TCP/IP Transport layer 2) TCP/IP Network access layer 3) TCP/IP Internet layer 4) TCP/IP application layer
1,3
Which of the following components operate at the physical layer? choose all that apply 1) cables 2) segmentation and reassembly 3) connectors 4) network interface cards (NICs)
1,3,4
Which of the following milestone events for TCP/IP occurred in 1983? Choose all that apply 1) the Department of defense mandates TCP/IP as the "Official ARPANET protocol" 2) NSF launches the NSFNET 3) initial development of name server technology occurs 4) TCP/IP appears in the 4.2BSD UNIX distribution
1,3,4
Which of the following activities may occur during the protocol analysis process? Choose all that apply 1) gathering statistics 2) re transmitting captured packets for testing 3) capturing packets "off the wire" 4) decoding packets into readable form 5) tapping into network communications
1,3,4,5
A packet filter that's applied to incoming data in a protocol analyzer may be called _____________. 1. capture filter 2. egress filter 3. post-filter 4. data filter 5. pre-filter
1,5
The decimal equivalent of binary 10000000 is _______.
128
The last bit of the entire Type Of Service field is reserved and set at 0, as specified by RFC ___. (4 digits)
1349
For an IPv6 multicast address, how many bits are assigned to the group ID? 1) 64 2) 112 3) 32 4) 96 5) 48
2
In IPv6, the ______ address is all zeroes and can be represented as two colon characters (::) in normal notation 1. loopback 2. unspecified 3. broadcast 4. anycast 5. multicast
2
Many PDUs include a characteristic closing component called a ____ that provides data integrity checks for the data portion of the PDU, known as the payload. 1) well know protocol 2) trailer 3) network service 4) none of these choices 5) host
2
The _________ is where notions of network location are addressed and where the intricacies involved in directing a PDU from sender to receiver are handled 1) data link layer 2) network layer 3) application layer 4) transport layer 5) data link layer and network layer
2
The ___________ manages the way data is presented to the network (on its way down the protocol stack), and to a specific machine/ application combination (on its way up the protocol stack). 1) network layer 2) presentation layer 3) transport layer 4) session layer 5) physical layer
2
The broadcast address for the Class B network 172.16.0.0 is _____. 1) 172.16.0.255 2) 172.16.255.255 3) 172.16.0.1 4) 172.16.255.0 5) None of these choice
2
What version of IP supports 128-bit addresses? 1) IPv4 2) IPv6 3) All of these choices 4) IPv4 and IPv6 5) IPv5
2
Which RFC covers Classless Inter-Domain Routing (CIDR)? 1. 1878 2. 1519 3. 2700 4. 1918 5. 1597
2
_____ is used to translate MAC layer addresses int numeric IP addresses 1. arp and rarp 2. rarp 3. subnet msking 4. arp 5. reverse proxying
2
______________ may be performed by boundary devices that include proxy server capabilities to replace private IP addresses with one or more public IP addresses as outbound traffic exits the server, and to replace such public addresses with their proper private equivalents as incoming traffic passes through the server. 1) supernetting 2) address masquerading 3) supernetting and subnetting 4) subnetting 5) IP renumbering
2
________________ assign a series of numbers to represent a sizable collection of TCP/IP- based network services, such as file transfer (FTP), terminal emulation (Telnet), and e-mail. 1) datagrams 2) well-known protocols 3) daemons 4) data frames and datagrams 5) data frames
2
a __________ is holding area for packets copied off the network 1) cache 2) trace buffer 3) packet 4) layer 5) payload
2
Which kinds of devices require public IP addresses? choose all that apply 1. every server on an internal network 2. any server whose services should be available to the internet 3. any device attached directly to the internet 4. every client on an internal network
2,3
Which terms represent parts of a PDU that are always present in any PDU? Choose all that apply 1) checksum 2) header 3) payload 4) trailer
2,3
select all vaild limitations to which private IP addresses are subject. choose all that apply 1. may not be used without permission from ICANN or an ISP 2. may not work with protocols that require secure end-to-end connections 3. may not be routed on the Internet 4. will not work with NAT software
2,3
Which of the following features are typical for most protocol analyzers? choose all that apply 1) packet filters include built-in trend analysis and capacity-planning tools 2) alarms may be set to flag unusual network events or conditions 3) packet filters display various statistical reports and graphs based on traffic analysis 4) packet filters may be applied to incoming data before capture, or to store data after capture 5)Decodes may be applied to packets in the trace buffer
2,3,4,5
Which of the following steps must a Standard RFC go through to become an official standard? choose all that apply 1) historic Standard 2) standard (sometimes called "Internet Standard") 3) retired standard 4) draft standard 5) proposed standard
2,4,5
What is the decimal value of 11110000 ( a four-bit subnet mask)?
240
A ______ represents a network address that all hosts on a network must read. 1. loopback 2. hop 3. broadcast address 4. dot quad 5. multicast
3
Many analyzers have configurable ____ that indicate unusual network events or errors. 1) anomailes 2) sockets 3) alarms 4) ports 5) sessions
3
What is the common name for PDUs at the Data link layer? 1) packets 2) datagrams 3) frames 4) data link PDUs 5) segments
3
Which of the following terms is a synonym for a dynamically assigned port address, used to service a temporary TCP/IP connection for data exchange? 1) well-known port address 2) dynmaic port ddress 3) socket address 4) protocol number 5) registered port address
3
Which of the following types of IP addresses includes the most network addresses? 1. class D 2. class B 3. class C 4. class A 5. class E
3
_________ allows IPv4 addresses from Class A, B, or C to be combined and treated as larger address space, or subdivided arbitrarily, as needed 1. all of these choices 2. subnet masking 3. classless inter-domain routing 4. supernetting 5. address masquerading
3
What functions does the session layer provide? choose all that apply 1) segmentation and reassembly 2) data format conversions 3) session setup, maintenance, and tear-down 4) checkpoint controls
3,4
IPv6 requires each device on the network to have its own unique address or identifier with one exception: 1) mobile devices may use multiple identifiers because they frequently move from one network zone to the next 2) there are no exceptions 3) network devices in a multicast group all use a single, unique identifier for their interfaces 4) a host with multiple interfaces providing dynamic load balancing can use a single identifier for all interfaces 5) multiple devices on a local network may share the same anycast identifier
4
The TCP/IP application layer also is known as the ____ layer because this is where the protocol stack interfaces with applications or processes on a host machine. 1) session 2) transport 3) none of these choices 4) process 5) network
4
Which of the following organizations manages Internet domain names and network addresses? 1) IETF 2) IAB 3) IRTF 4) ICANN 5) ISOC
4
Which of the following subnet mask is the default for a class B IP address? 1) 255.0.0.0 2) 255.255.255.255 3) VLSM eliminates Class B addressing 4) 255.255.0.0 5) 255.255.255.0
4
_____ is provided by boundary devices that include proxy server capabilities to replace private IP addresses with one or more public IP addresses as outbound traffic exits the server. 1) Address masquerading and address substitution 2) NAT 3) address masquerading 4) All of these choices 5) address substitution
4
the ________ includes the physical transmission medium ( cables or wireless media) that any network must use to send and receive the signals that constitute the physical expression of networked communications 1) network layer 2) data link layer 3) data link layer and network layer 4) physical layer 5) transport layer
4
Multicast addresses in IPv6 use a(n) ____ to define the portion of the Internet to which the multicast group pertains. 1) loopback 2) IPv6 does not employ multicast 3) aggregatable global unicast address 4) interface identifier 5) scope identifier
5
A(n) ___________ is the router or other device that will forward traffic to the host's physical network
IP gateway
The 8-bit ___ field specifies the header type of the header immediately following the IPv6 header.
Next Header
List the seven layers of the ISO/OSI network reference model in ascending order, starting with Layer 1.
Physical -1 Data Link -2 Network -3 Transport -4 Session -5 Presentation -6 Application -7
Currently, the Routing extension header is designed to use only one option.
Routing Type = 0
Though defined in terms of seconds, the TTL value is implemented as a number of hops that a packet can travel before being discarded by a router.
True
Which of the following IPv6 addresses are the same based on the correct use of zero compression? (Choose all that apply.) a) FE80:0:0:0:2D57:C4F8:0:80D7 b) FE80:0000:2D57:C4F8:0000:80D7 c) FE80::2D57:C4F8:0:80D7 d) FE8::2D57:C4F8::8D7
a,c
Switches make their decisions with specialized hardware known as ___.
application-specific integrated
How does the Authentication extension header specify the true origin of an IPv6 packet?
by preventing address spoofing and connection theft
The Session layer includes mechanisms to maintain reliable ongoing conversations, called ___.
checkpoints
The simplest form of subnet masking uses a technique called ______, in which each subnet includes the same number of stations and represents a simple division of the address space made available by subnetting into multiple equal segments.
constant-length subnet masking
Breaking up an incoming data stream so separate portions may be delivered to the correct applications is called ____.
demultiplexing
A best current practice (BCP) RFC is a special form of Standard RFC true or false
false
Class D addresses always take the following binary form: bbbbbbbb.11111111.11111111.11111111 true or false
false
RFC 5000 describes how an RFC is created and what processes it must go through to become an official standard, adopted by the IETF true or false
false
The Session layer is equipped to request retransmission of all erroneous or missing PDUs when reassembly is underway, so that it can guarantee reliable delivery of data from sender to receiver. true or false
false
provide a narrower address space is the primary design goal for IPv6 true or false
false
Data link layer PDUs are called ____________.
frames
The ___ field provides error detection on the contents of the IPv4 header only.
header checksum
Devices that operate on the Internet are generically identified as ________________.
hosts
the _________________ is the parent organization for all the various internet boards and task forces
internet society
The term _____________ refers to a single logical network composed of multiple physical networks, which may be at a single physical location, or spread among multiple physical locations.
internetwork
The term _______________ refers to a single logical network composed of multiple physical networks, which may all be at a single physical location, or spread among multiple physical locations.
internetwork
What is a valid proposed option for the IPv6 Hop-by-Hop Options extension header?
jumbogram large payload options
the primary function of the OSI model's ___________________________ layer is to provide a globally unique address to every host on the Internet and paths to and from host.
network
Registration informs the ______ to pass packets sent to that address to the IP stack so their contents can be read, and tells the IP gateway to forward such traffic onto the physical network, where the listening network interface resides
network interface card
The OSI model's _______________ layer includes the physical transmission medium (cables or wireless media) that any network must use to send and receive the signals that constitute the physical expression of networked communications
physical
Each TCP/IP service has an associated ___ that uses a 16-bit number to identify a specific process or service.
port address
_________________ is the process of tapping into the network communications system, capturing packets that cross the network, gathering network statistics, and decoding the packets into readable form.
protocol analysis
_____________________ proxying permits the proxy server to front for servers inside the boundary by advertising only the proxy server's address to the outside world, and then forwarding only legitimate request for service to internal servers for further processing.
reverse
____________________ combines contiguous network addresses by stealing bits from the network portion and using them to create a single, larger contiguous address space for host addresses.
supernetting
As a frame moves from interface to interface, the IP source and destination address information is preserved. true or false
true
Duplication of numeric IP addresses is not allowed because tat would lead to confusion true or false
true
IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network true or false
true
On any system, only those protocol numbers for protocols that are actually in use must be defined on that system. True Or False?
true
Originally, when IP addresses were assigned for public use, they were assigned on per-network basis. true or false
true
PDUs typically include "envelope information" in the form of specific headers and trailers. true or false
true
RFC 5000 describes how an RFC is created and what processses it must go through to become an official standard, adopted by the IETF true or false
true
The time it takes to route from one network to another is affected by the size of the routing table. true or false
true
When a host uses a service that employs a multicast address, it registers itself to "listen" on that address, as well as on its own unique host address (and the broadcast address). true or false
true
When two or more RFCs cover the same topic, they usually also share the same title true or false
true
Zero compression is a method that allows a word containing contiguous zeros in an IPv6 address to be replaced by double colons. True or False?
true
a card that runs in promiscuous mode can capture broadcast packets true or false
true
a divide and conquer approach permits concerns related to networking hardware to be completely separated from those related to networking software true or false
true
if two network interfaces are on the network, they can communicate directly with one another at the MAC layer true or false
true
multicast addresses come in handy when a class f devices, such as routers, must be updated with the same information on a regular basis. true or false
true
when two or more RFCs cover the same topic, they usually also share the same title. True or false
true