Networking Ch 4, 5, 6

Ace your homework & exams now with Quizwiz!

Which of the following path discovery command-line parameters turns off reverse DNS lookups?

-d

Which of the following command-line parameter for the ping command governs the Time to Live value?

-i

Which of the following ICMP Type numbers identify Echo and Echo Reply messages?

0 and 8

The default TTL in windows server 2008, windows vista, and windows 7 is ________.

128

Which value in bytes is the default MTU for IPv6 packets?

1280

Although RFC ________ dictates that IP routers "must support the router part of the ICMP Router Discovery protocol on all connected networks on which the router supports either IP multicast or IP broadcast addressing," many do not.

1812

Which of the following represents the five states of a neighbor cache entry?

3) Incomplete, reachable, stale, delay, probe

Upon receipt of the Other Configuration flag in a Router Advertisement message, which of the following best represents how the host should respond?

4 ) When set to 1, hosts may use an address configuration protocol such as DHCPv6 to obtain non-address configuration information.

Which of the following RFCs describes ICMP?

792

Which of the following ICMP Type numbers relate to Router Advertisement and Router Solicitation messages?

9 and 10

For which of the following link types must PPP provide addressing as part of its WAN encapsulation services?

ATM connection X.25 connection Frame relay

ND makes use of multicast addresses such as the "_________" address with link-local scope (FF02::1).

All nodes

Which of the following definitions best describes a network that is in a converged state?

All routers know current available networks and their associated costs.

________ can summarize routing information before sending link-state packets to other networks.

Area border routers

In a RIPv2 packet, the ________ field contains a plain text password.

Authentication

What is the first step that an IP host performs when it receives an Ethernet II frame?

Check the validity of the FCS value

ICMP packets contain only three required fields after the IP header: Type, Code, and ____________.

Checksum

A host or router can send the _________ error message to indicate that the protocol defined in the IP header cannot be processed.

Code 2: Protocol Unreachable

A router sends the __________ ICMP reply to indicate that the router cannot use the strict or loose source routing path specified in the original packet.

Code 5: Source Route Failed

Of the following, which routing table types can an IPv6 routing table store?

Directly attached routes Host routes Remote routes Default route

A(n) _____ routing protocol shares information about how far away all networks are to the destination.

Distance Vector

Before an IP datagram is transmitted onto the cable, the data link ___________ puts the leading frame onto the datagram.

Driver

Which of the following ICMP message types relates to reachability analysis?

Echo/Echo Reply

Border gateway protocol is the original point-to-point protocol for encapsulating TCP/IP traffic over a WAN link and is still used for connecting to some ISPs today (mostly for access to older UNIX hosts).

False

Both the IPv4 and IPv6 implementations of the OSPF routing protocol can manage multiple addresses and instances per interface.

False

Data for Echo Request messages may consist of one or more octets of arbitrary data.

False

Path MTU discovery is only available for IPv6.

False

Routed protocols are Layer 1 protocols that are used to get packets through an internetwork.

False

The Code field provides error detection for the ICMP header only.

False

The ICMP Echo Request guarantees packet delivery.

False

The ICMP redirection process serves only IP routers, not IP hosts.

False

The value 0 in the IP header protocol field denotes that an ICMP header follows the IP header.

False

When a packet is fragmented, all fragments are given different TTL values.

False

With router advertising, the default Lifetime value for route entries is 10 minutes.

False

_________ describes the concept of walking a firewall ACL or ruleset to determine what it filters and how.

Firewalking

A ________ is required to get the packet from one IP host to another IP host on a single network.

Hardware address

What type of scan occurs when a series of ping requests for a range of IP addresses is performed?

Host probe (scan)

Hackers can use _________ as part of a reconnaissance process to learn about active network addresses and active processes.

ICMP

__________ messages serve to keep hosts apprised of networking conditions and problems, and equipped to use best paths around the network.

ICMP

The message type __________ documents when routing or delivery errors prevent IP datagrams from reaching their destinations.

ICMP Destination Unreachable

Which of the following statements best defines the intent of the PMTU process?

Instructs the sender on what MTU to use to avoid further fragmentation en route

RIP and OSPF are examples of ________ gateway protocols

Interior

__________ switches are devices that can perform switching based on the MAC address and, when necessary, examine the Network layer header to make routing decisions.

Layer 3

_________ IP is defined by the IETF in RFCs 2003 through 2006 and RFC 3220.

Mobile

An Ipv6 node uses NDP to discover the link-layer address of the next-hop router by sending a Router Solicitation message as what kind of network message?

Multicast

IPv6 network nodes send ________ messages in order to request the link-layer address of a target node.

Neighbor Solicitation

_________ seeks to determine the link-layer address for a node's neighbors.

Neighbor Solicitation

If a router becomes unavailable to a node, that node will invoke the ________ process.

Neighbor unreachability detection

All IPv4 packets have a predefined lifetime indicated in each packet's _________ field.

None of these choices

The ICMP packet field ________ provides error detection for the ICMP header only.

None of these choices

The link-local scope all-routers multicast address is which of the following?

None of these choices

Which RFC most completely defines Neighbor Discovery for IPv6?

None of these choices

Which of the following ICMP message types relates to congestion control?

None of these choices

Which of the following routing protocols is a link-state protocol?

None of these choices

The __________ utility is a command-line that uses ICMP Echo packets to test router and link latency, as well as packet loss.

PATHPING

_________ enables a source to learn the currently supported MTU across an entire path, without requiring fragmentation.

PMTU Discovery

_________ is a general-purpose protocol that provides WAN data link encapsulation services similar to those available for LAN encapsulations.

PPP

Two of the most well-known utilities, Ping and Traceroute, rely on ICMP to perform connectivity tests and _________.

Path discovery

Which of the following Windows command-line utilities is the primary tool for performing connectivity or reachability tests?

Ping

_________ is a technique for assigning costs to routes designed to prevent routing loops.

Poison reverse

__________ is a method that allows and IP host to use a simplified subnetting design.

Proxy ARP

________ is used to obtain an IP address for an associated data link address.

RARP

ICMP ________ permits a gateway (router) on a non-optimal route between sender and receiver to redirect traffic to a more optimal path.

Redirect

_______ use ICMPv6 type 137 messages.

Redirect

_______ help keep local routing optimized in the face of change conditions and also reflect status as various destinations come on and off-link.

Redirects

By default, IPv6 nodes will send a _________ multicast request for configuration parameters immediately upon start-up.

Router Solicitation

A(n) ________ is a compilation of information about all the networks that the router can reach.

Routing table

Upon receiving a packet sent by a source node, what is the first task an IPv6 router performs?

Running error checks on the packet header fields

________ simply prevents a router from advertising a network on the same interface from which it learned that network.

Split horizon

What gives BGP the ability to run on IPv6 networks?

The addition of multiprotocol extensions

What allows the IS-IS routing protocol to operate on IPv6 networks?

The addition of two new type-length values(TVLs) as extensions

To ensure that packets cannot loop endlessly through a network, each packet has a(n) _________ value - defined in the Network layer header.

Time To Live

The ___________ command-line utility uses route tracing to identify a path from the sender to the target host.

Traceroute

A network is usually said to be converged when all the routers know a loop-free path to get to all other networks.

True

ARP is used only to find the hardware address of local IP hosts.

True

ARP is used to obtain the hardware address of the destination IP hosts.

True

An IP host probe is performed by sending a ping packet (ICMP Echo Request packet) to each host within a range and noting the responses.

True

Configuring hosts to be weak or strong can be performed on both IPv4 and IPv6 network nodes.

True

ICMP packets contain only three required fields after the IP header: Type, Code, and Checksum.

True

ICMP reports errors only about IP datagrams. Errors about error messages are not reported.

True

ICMP reports errors only about processing of non-ICMP IP datagrams.

True

ICMP's job is to provide a variety of information about IP routing behavior, reachability, routes between specific pairs of hosts, delivery errors, and so forth.

True

IP addresses are used to identify individual IP hosts on a TCP/IP internetwork.

True

If a packet with TTL=1 arrives at a router, the router must discard the packet because it cannot decrement the TTL to 0 and forward the packet

True

It's up to the IP host that receives incoming ICMP messages to act on the content of those messages.

True

Neighbor Discovery has five functional processes.

True

Nodes generally have a single entry in their default router lists, and all packets destined to nodes that are off-link are sent to their default gateway.

True

One of the most difficult types of networks to implement and manage is one in which the users are always moving around.

True

Routers can use ICMP to provide a default gateway setting to a host (if the host requests assistance).

True

Routers send ICMP Redirect messages to hosts to indicate that a preferable route exists.

True

The principal difference between these two versions of ICMP protocol is the integration of different messaging types under the ICMPv6 protocol.

True

Routers use ________ to select a routing path where there are multiple paths available.

Type of Service

What type of packet is a node sending to another node that is on-link?

Unicast

What is an update for the IPv6 routing protocol RIPng that did not exist in the IPv4 RIP implementation?

Use of multicast for sending updates

On a network that is low on available bandwidth, the _________ process causes more traffic on the wire.

fragmentation retransmission

At the Data Link layer, protocol data units are called __________.

frames

At the command prompt on a windows 7 computer, what command is used to show the routing table for the IPv6 interface?

netsh interface ipv6 show route

When used over an asynchronous connection like an analog telephone link, PPP supports which of the following WAN encapsulation services?

protocol identification bit-level integrity check delimitation

What is the name of the concept that indicates that a path exists between two TCP/IP hosts on an internetwork?

reachability

When looking for a destination address for a datagram ultimately bound for a remote network, an IP host must check which structure to obtain the necessary information?

routing tables


Related study sets

Sole Proprietorship Advantages and Disadvantages

View Set

DGP week 6: sara read the novel to kill a mockingbird in her english class

View Set

SIMILARITIES/DIFFERENCES BETWEEN JUDAISM, CHRISTIANITY AND ISLAM

View Set