Networking Ch 4, 5, 6
Which of the following path discovery command-line parameters turns off reverse DNS lookups?
-d
Which of the following command-line parameter for the ping command governs the Time to Live value?
-i
Which of the following ICMP Type numbers identify Echo and Echo Reply messages?
0 and 8
The default TTL in windows server 2008, windows vista, and windows 7 is ________.
128
Which value in bytes is the default MTU for IPv6 packets?
1280
Although RFC ________ dictates that IP routers "must support the router part of the ICMP Router Discovery protocol on all connected networks on which the router supports either IP multicast or IP broadcast addressing," many do not.
1812
Which of the following represents the five states of a neighbor cache entry?
3) Incomplete, reachable, stale, delay, probe
Upon receipt of the Other Configuration flag in a Router Advertisement message, which of the following best represents how the host should respond?
4 ) When set to 1, hosts may use an address configuration protocol such as DHCPv6 to obtain non-address configuration information.
Which of the following RFCs describes ICMP?
792
Which of the following ICMP Type numbers relate to Router Advertisement and Router Solicitation messages?
9 and 10
For which of the following link types must PPP provide addressing as part of its WAN encapsulation services?
ATM connection X.25 connection Frame relay
ND makes use of multicast addresses such as the "_________" address with link-local scope (FF02::1).
All nodes
Which of the following definitions best describes a network that is in a converged state?
All routers know current available networks and their associated costs.
________ can summarize routing information before sending link-state packets to other networks.
Area border routers
In a RIPv2 packet, the ________ field contains a plain text password.
Authentication
What is the first step that an IP host performs when it receives an Ethernet II frame?
Check the validity of the FCS value
ICMP packets contain only three required fields after the IP header: Type, Code, and ____________.
Checksum
A host or router can send the _________ error message to indicate that the protocol defined in the IP header cannot be processed.
Code 2: Protocol Unreachable
A router sends the __________ ICMP reply to indicate that the router cannot use the strict or loose source routing path specified in the original packet.
Code 5: Source Route Failed
Of the following, which routing table types can an IPv6 routing table store?
Directly attached routes Host routes Remote routes Default route
A(n) _____ routing protocol shares information about how far away all networks are to the destination.
Distance Vector
Before an IP datagram is transmitted onto the cable, the data link ___________ puts the leading frame onto the datagram.
Driver
Which of the following ICMP message types relates to reachability analysis?
Echo/Echo Reply
Border gateway protocol is the original point-to-point protocol for encapsulating TCP/IP traffic over a WAN link and is still used for connecting to some ISPs today (mostly for access to older UNIX hosts).
False
Both the IPv4 and IPv6 implementations of the OSPF routing protocol can manage multiple addresses and instances per interface.
False
Data for Echo Request messages may consist of one or more octets of arbitrary data.
False
Path MTU discovery is only available for IPv6.
False
Routed protocols are Layer 1 protocols that are used to get packets through an internetwork.
False
The Code field provides error detection for the ICMP header only.
False
The ICMP Echo Request guarantees packet delivery.
False
The ICMP redirection process serves only IP routers, not IP hosts.
False
The value 0 in the IP header protocol field denotes that an ICMP header follows the IP header.
False
When a packet is fragmented, all fragments are given different TTL values.
False
With router advertising, the default Lifetime value for route entries is 10 minutes.
False
_________ describes the concept of walking a firewall ACL or ruleset to determine what it filters and how.
Firewalking
A ________ is required to get the packet from one IP host to another IP host on a single network.
Hardware address
What type of scan occurs when a series of ping requests for a range of IP addresses is performed?
Host probe (scan)
Hackers can use _________ as part of a reconnaissance process to learn about active network addresses and active processes.
ICMP
__________ messages serve to keep hosts apprised of networking conditions and problems, and equipped to use best paths around the network.
ICMP
The message type __________ documents when routing or delivery errors prevent IP datagrams from reaching their destinations.
ICMP Destination Unreachable
Which of the following statements best defines the intent of the PMTU process?
Instructs the sender on what MTU to use to avoid further fragmentation en route
RIP and OSPF are examples of ________ gateway protocols
Interior
__________ switches are devices that can perform switching based on the MAC address and, when necessary, examine the Network layer header to make routing decisions.
Layer 3
_________ IP is defined by the IETF in RFCs 2003 through 2006 and RFC 3220.
Mobile
An Ipv6 node uses NDP to discover the link-layer address of the next-hop router by sending a Router Solicitation message as what kind of network message?
Multicast
IPv6 network nodes send ________ messages in order to request the link-layer address of a target node.
Neighbor Solicitation
_________ seeks to determine the link-layer address for a node's neighbors.
Neighbor Solicitation
If a router becomes unavailable to a node, that node will invoke the ________ process.
Neighbor unreachability detection
All IPv4 packets have a predefined lifetime indicated in each packet's _________ field.
None of these choices
The ICMP packet field ________ provides error detection for the ICMP header only.
None of these choices
The link-local scope all-routers multicast address is which of the following?
None of these choices
Which RFC most completely defines Neighbor Discovery for IPv6?
None of these choices
Which of the following ICMP message types relates to congestion control?
None of these choices
Which of the following routing protocols is a link-state protocol?
None of these choices
The __________ utility is a command-line that uses ICMP Echo packets to test router and link latency, as well as packet loss.
PATHPING
_________ enables a source to learn the currently supported MTU across an entire path, without requiring fragmentation.
PMTU Discovery
_________ is a general-purpose protocol that provides WAN data link encapsulation services similar to those available for LAN encapsulations.
PPP
Two of the most well-known utilities, Ping and Traceroute, rely on ICMP to perform connectivity tests and _________.
Path discovery
Which of the following Windows command-line utilities is the primary tool for performing connectivity or reachability tests?
Ping
_________ is a technique for assigning costs to routes designed to prevent routing loops.
Poison reverse
__________ is a method that allows and IP host to use a simplified subnetting design.
Proxy ARP
________ is used to obtain an IP address for an associated data link address.
RARP
ICMP ________ permits a gateway (router) on a non-optimal route between sender and receiver to redirect traffic to a more optimal path.
Redirect
_______ use ICMPv6 type 137 messages.
Redirect
_______ help keep local routing optimized in the face of change conditions and also reflect status as various destinations come on and off-link.
Redirects
By default, IPv6 nodes will send a _________ multicast request for configuration parameters immediately upon start-up.
Router Solicitation
A(n) ________ is a compilation of information about all the networks that the router can reach.
Routing table
Upon receiving a packet sent by a source node, what is the first task an IPv6 router performs?
Running error checks on the packet header fields
________ simply prevents a router from advertising a network on the same interface from which it learned that network.
Split horizon
What gives BGP the ability to run on IPv6 networks?
The addition of multiprotocol extensions
What allows the IS-IS routing protocol to operate on IPv6 networks?
The addition of two new type-length values(TVLs) as extensions
To ensure that packets cannot loop endlessly through a network, each packet has a(n) _________ value - defined in the Network layer header.
Time To Live
The ___________ command-line utility uses route tracing to identify a path from the sender to the target host.
Traceroute
A network is usually said to be converged when all the routers know a loop-free path to get to all other networks.
True
ARP is used only to find the hardware address of local IP hosts.
True
ARP is used to obtain the hardware address of the destination IP hosts.
True
An IP host probe is performed by sending a ping packet (ICMP Echo Request packet) to each host within a range and noting the responses.
True
Configuring hosts to be weak or strong can be performed on both IPv4 and IPv6 network nodes.
True
ICMP packets contain only three required fields after the IP header: Type, Code, and Checksum.
True
ICMP reports errors only about IP datagrams. Errors about error messages are not reported.
True
ICMP reports errors only about processing of non-ICMP IP datagrams.
True
ICMP's job is to provide a variety of information about IP routing behavior, reachability, routes between specific pairs of hosts, delivery errors, and so forth.
True
IP addresses are used to identify individual IP hosts on a TCP/IP internetwork.
True
If a packet with TTL=1 arrives at a router, the router must discard the packet because it cannot decrement the TTL to 0 and forward the packet
True
It's up to the IP host that receives incoming ICMP messages to act on the content of those messages.
True
Neighbor Discovery has five functional processes.
True
Nodes generally have a single entry in their default router lists, and all packets destined to nodes that are off-link are sent to their default gateway.
True
One of the most difficult types of networks to implement and manage is one in which the users are always moving around.
True
Routers can use ICMP to provide a default gateway setting to a host (if the host requests assistance).
True
Routers send ICMP Redirect messages to hosts to indicate that a preferable route exists.
True
The principal difference between these two versions of ICMP protocol is the integration of different messaging types under the ICMPv6 protocol.
True
Routers use ________ to select a routing path where there are multiple paths available.
Type of Service
What type of packet is a node sending to another node that is on-link?
Unicast
What is an update for the IPv6 routing protocol RIPng that did not exist in the IPv4 RIP implementation?
Use of multicast for sending updates
On a network that is low on available bandwidth, the _________ process causes more traffic on the wire.
fragmentation retransmission
At the Data Link layer, protocol data units are called __________.
frames
At the command prompt on a windows 7 computer, what command is used to show the routing table for the IPv6 interface?
netsh interface ipv6 show route
When used over an asynchronous connection like an analog telephone link, PPP supports which of the following WAN encapsulation services?
protocol identification bit-level integrity check delimitation
What is the name of the concept that indicates that a path exists between two TCP/IP hosts on an internetwork?
reachability
When looking for a destination address for a datagram ultimately bound for a remote network, an IP host must check which structure to obtain the necessary information?
routing tables