QUIZ 4 REVIEWER (MODULE 13-15)
B. Tunneling
A method of transporting an IPv6 packet over an IPv4 network. The IPv6 packet is encapsulated inside an IPv4 packet. A. Dual stack B. Tunneling C. Translation D. NAT64
A. Netstat
An important tool to verify connections. A. Netstat B. nslookup C. show ip route D. show ip interface
B. IMAP
Another protocol that describes a method to retrieve email messages. Copies of the messages are downloaded to the client application. The original messages are kept on the server until manually deleted. A. POP B. IMAP C. SMTP D. SNMP
A. Port 68
DHCP - Client process on well-known port ___. A. Port 68 B. Port 67 C. Port 53 D. Port 80
B. Port 67
DHCP - Server process on well-known port ___. A. Port 68 B. Port 67 C. Port 53 D. Port 80
C. Port 53
DNS process on well-known port ___. A. Port 68 B. Port 67 C. Port 53 D. Port 80
D. Port 80
HTTP process on well-known port ___. A. Port 68 B. Port 67 C. Port 53 D. Port 80
D. SACK
Host operating systems today typically employ an optional TCP feature called _______, negotiated during the three-way handshake. A. URG B. ACK C. SYN D. SACK
B. Each request is assigned source and destination port numbers.
How does a networked server manage requests from multiple clients for different services? A. The server sends all requests through a default gateway. B. Each request is assigned source and destination port numbers. C. The server uses IP addresses to identify different services. D. Each request is tracked through the physical address of the client.
D. 128
How many bits does IPv6 have? A. 48 B. 32 C. 64 D. 128
A. 48
How many bits does the Global Routing Prefix portion have? A. 48 B. 32 C. 16 D. 64
D. 64
How many bits does the Interface ID portion have? A. 48 B. 32 C. 16 D. 64
C. 16
How many bits does the Subnet ID portion have? A. 48 B. 32 C. 16 D. 64
A. True
IPv6 addresses are not case-sensitive and can be written in either lowercase or uppercase. A. True B. False
B. Hexadecimal
IPv6 addresses is written in which format? A. Binary B. Hexadecimal C. Octal D. Decimal
B. ICANN
In the OSI model, all of the following are protocols of the application layer except: A. IMAP B. ICANN C. POP3 D. HTTP
B. Subnet ID
Is the area between the Global Routing Prefix and the Interface ID. It is used by an organization to identify subnets within its site. A. Interface ID B. Subnet ID C. Global Routing Prefix
A. POP
Is used by an application to retrieve mail from a mail server. When mail is downloaded from the server to the client using _____ the messages are then deleted on the server. A. POP B. IMAP C. SMTP D. SNMP
C. FTP
It was developed to allow for data transfers between a client and a server. A. UDP B. TCP C. FTP D. HTTP
A. The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.
Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this? A. The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination. B. The source decreases the window size to decrease the rate of transmission from the destination. C. The destination decreases the window size. D. The destination sends fewer acknowledgement messages in order to conserve bandwidth.
B. Transmission Control Protocol (TCP)
Provides reliability and flow control. Number and track data segments transmitted to a specific host from a specific application. Acknowledge received data. Retransmit any unacknowledged data after a certain amount of time. Retransmit any unacknowledged data after a certain amount of time. Retransmit any unacknowledged data after a certain amount of time. A. User datagram Protocol (UDP) B. Transmission Control Protocol (TCP)
A. User datagram Protocol (UDP)
Provides the basic functions for delivering datagrams between the appropriate applications, with very little overhead and data checking. Is a connectionless protocol. Is known as a best-effort delivery protocol because there is no acknowledgment that the data is received at the destination. A. User datagram Protocol (UDP) B. Transmission Control Protocol (TCP)
B. Link-local Address (LLA)
Required for every IPv6-enabled device and used to communicate with other devices on the same local link. Are not routable and are confined to a single link. A. Global Unicast Address (GUA) B. Link-local Address (LLA)
A. Dual stack
The devices run both IPv4 and IPv6 protocol stacks simultaneously. A. Dual stack B. Tunneling C. Translation D. NAT64
D. Hyper-Text Transfer Protocol
The http at the beginning of a URL stands for A. Hidden-Tracking Text Protocol B. High-Traffic Time protocol C. Hyper-Tracking Textual Protocol D. Hyper-Text Transfer Protocol
C. Application layer
The upper three layers of the OSI model (application, presentation, and session) define functions of the TCP/IP application layer. Provides the interface between the applications used to communicate, and the underlying network over which messages are transmitted. A. Transport layer B. Network layer C. Application layer D. Data Link layer
A. Get
This is a client request for data. A client (web browser) sends the ______ to the web server to request HTML pages. A. Get B. Post C. Put
C. Anycast
This is any IPv6 unicast address that can be assigned to multiple devices. A packet sent is routed to the nearest device having that address. A. Unicast B. Multicast C. Anycast
A. Global Unicast Address (GUA)
This is similar to a public IPv4 address. These are globally unique, internet-routable addresses. A. Global Unicast Address (GUA) B. Link-local Address (LLA)
D. Domain Name Service (DNS)
This protocol defines an automated service that matches resource names with the required numeric network address. It includes the format for queries, responses, and data. A. Simple Mail Transfer Protocol (SMTP) B. Post Office Protocol (POP) & IMAP C. Hyper-Text Transfer Protocol (HTTP) D. Domain Name Service (DNS)
B. Post
This uploads data files to the web server, such as form data.. A. Get B. Post C. Put
C. Put
This uploads resources or content to the web server, such as an image. A. Get B. Post C. Put
A. Uniform Resource Locator
URL stands for A. Uniform Resource Locator B. Unified Resource Library C. Universal Resource Local D. United Resource Located
A. use of a double colon (::) to represent a string of all zero hextets B. omit all leading zeros from all hextets in the address
What are two methods that can be used to shorten the IPv6 address notation? (Choose two.) A. use of a double colon (::) to represent a string of all zero hextets B. omit all leading zeros from all hextets in the address C. emove all trailing zeros contained in the IPv6 address D. use double colons to represent a string of the same non-zero value
A. a continuous string of one or more hextets that contain only zeros
What does a double colon (::) represent in an IPv6 address notation? A. a continuous string of one or more hextets that contain only zeros B. at least eight occurrences of the same non-zero value C. the boundary between the network portion and the host portion of the address D. the beginning of the MAC address assigned to the IPv6 device
C. The part of the FTP message that was lost is re-sent.
What happens if part of an FTP message is not delivered to the destination? A. The message is lost because FTP does not use a reliable delivery method. B. The FTP source host sends a query to the destination host. C. The part of the FTP message that was lost is re-sent. D. The entire FTP message is re-sent.
B. tracking individual conversations
What is a responsibility of transport layer protocols? A. providing network access B. tracking individual conversations C. determining the best path to forward a packet D. translating private IP addresses to public IP addresses
B. the combination of a source IP address and port number or a destination IP address and port number
What is a socket? A. the combination of the source and destination IP address and source and destination Ethernet address B. the combination of a source IP address and port number or a destination IP address and port number C. the combination of the source and destination sequence and acknowledgment numbers D. the combination of the source and destination sequence numbers and port numbers
A. more addresses for networks and hosts
What is an advantage of using IPv6 ? A. more addresses for networks and hosts B. faster connectivity C. higher bandwidth D. more frequencies
A. 49,152 to 65,535
What is the complete range of TCP and UDP Private and Dynamic Ports? A. 49,152 to 65,535 B. 0 to 1023 C. 256 - 1023 D. 1024 - 49151
D. 1024 - 49151
What is the complete range of TCP and UDP registered ports? A. 49,152 to 65,535 B. 0 to 1023 C. 256 - 1023 D. 1024 - 49151
B. 0 to 1023
What is the complete range of TCP and UDP well-known ports? A. 0 to 255 B. 0 to 1023 C. 256 - 1023 D. 1024 - 49151
C. to keep track of multiple conversations between devices
What is the purpose of using a source port number in a TCP communication? A. to notify the remote device that the conversation is over B. to assemble the segments that arrived out of order C. to keep track of multiple conversations between devices D. to inquire for a nonreceived segment
C. Files can be downloaded from or uploaded to the server. The client needs to run a daemon program to establish an FTP connection with a server. D. The first connection established is for traffic control and the second connection is created to transfer a file.
What two characteristics describe an FTP connection? (Choose two.) A. A large file requires more than two connections between the client and the server to successfully download it. B. The server establishes the first connection with the client to control traffic that consists of server commands and client replies. C. Files can be downloaded from or uploaded to the server. The client needs to run a daemon program to establish an FTP connection with a server. D. The first connection established is for traffic control and the second connection is created to transfer a file.
A. applications that are sensitive to delay
What type of applications are best suited for using UDP? A. applications that are sensitive to delay B. applications that need reliable delivery C. applications that require retransmission of lost segments D. applications that are sensitive to packet loss
B. to relieve IPv4 address depletion
What was the reason for the creation and implementation of IPv6? A. to make reading a 32-bit address easier B. to relieve IPv4 address depletion C. to provide moren address space in the Internet Names Registry D. to allow NAT support for private addressing
C. Port 25
When a client sends email, the client SMTP process connects with a server SMTP process on well-known port ___. A. Port 465 B. Port 2525 C. Port 25 D. Port 587
C.) 2001:DB8:0:1111::200
Which IPv6 address notation is valid? A.) 2001:0DB8::ABCD::1234 B.) ABCD:160D::4GAB:FFAB C.) 2001:DB8:0:1111::200 D>) 2001::ABCD::
C. The client randomly selects a source port number.
Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer? A. The client sets the window size for the session. B. The client sends an ISN to the server to start the 3-way handshake. C. The client randomly selects a source port number. D. The client sends a synchronization segment to begin the session.
A. f
Which letter represents the hexadecimal value of the decimal number 15? A. f B. g C. h D. b
C. 192.168.1.1:80
Which number or set of numbers represents a socket? A. 01-23-45-67-89-AB B. 21 C. 192.168.1.1:80 D. 10.1.1.15
C. nslookup
Which of the following utility allows you to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa? A. ipconfig B. tracert C. nslookup D. wireshark
B. HTTP
Which protocol is used by web servers to serve up a web page? A. FTP B. HTTP C. IMAP D. POP
C. HTTP
Which protocol is used to transfer web pages from a server to a client device? A. HTML B. SMTP C. HTTP D. SSH E. POP
B. They define how messages are exchanged between the source and the destination.
Which statement is correct about network protocols? A. Network protocols define the type of hardware that is used and how it is mounted in racks. B. They define how messages are exchanged between the source and the destination. C. They all function in the network access layer of TCP/IP. D. They are only required for exchange of messages between devices on remote networks.
A. NAT64
Which technology enables devices in an IPv6-only network to communicate with devices in an IPv4-only network? A. NAT64 B. tunneling C. DHCP D. link-local addressing
B. TCP 3-way handshake
Which transport layer feature is used to guarantee session establishment? A. UDP ACK flag B. TCP 3-way handshake C. UDP sequence number D. TCP port number
B. HTTP E. HTTPS
Which two application layer protocols manage the exchange of messages between a client with a web browser and a remote web server? (Choose two.) A. DNS B. HTTP C. HTML D. DHCP E. HTTPS
A. ACK E. SYN
Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.) A. ACK B. FIN C. PSH D. RST E. SYN F. URG
B. acknowledging received data D. retransmitting any unacknowledged data
Which two operations are provided by TCP but not by UDP? (Choose two.) A. identifying the applications B. acknowledging received data C. tracking individual conversations D. retransmitting any unacknowledged data E. reconstructing data in the order received
B. POP D. SMTP
Which two protocols are used in the process of sending and receiving emails? (Choose two.) A. HTTP B. POP C. SSH D. SMTP E. FTP
B. DNS E. VoIP
Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two) A. FTP B. DNS C. HTTP D. POP3 E. VoIP
A. IPv6 addresses are represented by hexadecimal numbers. D. IPv4 addresses are 32 bits in length.
Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.) A. IPv6 addresses are represented by hexadecimal numbers. B. IPv4 addresses are represented by hexadecimal numbers. C. IPv6 addresses are 32 bits in length. D. IPv4 addresses are 32 bits in length. E. IPv4 addresses are 128 bits in length. G. IPv6 addresses are 64 bits in length.
B. TCP
____ is also used by request-and-reply applications where the data is minimal, and retransmission can be done quickly. A. UDP B. TCP C. FTP D. HTTP
B. Post Office Protocol (POP) & IMAP
____ used for clients to receive mail. A. Simple Mail Transfer Protocol (SMTP) B. Post Office Protocol (POP) & IMAP C. Hyper-Text Transfer Protocol (HTTP) D. Domain Name Service (DNS)
A. Simple Mail Transfer Protocol (SMTP)
_____ used to send mail. A. Simple Mail Transfer Protocol (SMTP) B. Post Office Protocol (POP) & IMAP C. Hyper-Text Transfer Protocol (HTTP) D. Domain Name Service (DNS)
E. FTP
_____ was developed to allow for data transfers between a client and a server. client is an application which runs on a computer that is being used to push and pull data from an ___ server. A. HTTP B. POP C. SSH D. SMTP E. FTP
B. Dynamic Host Configuration Protocol (DHCP)
______ automates the assignment of IPv4 addresses, subnet masks, gateways, and other IPv4 networking parameters. Is considered dynamic addressing compared to static addressing. Static addressing is manually entering IP address information. A. Simple Mail Transfer Protocol (SMTP) B. Dynamic Host Configuration Protocol (DHCP) C. Hyper-Text Transfer Protocol (HTTP) D. Service Message Block (SMB)
D. HTTP
______ is a request/response protocol that specifies the message types used for that communication. A. UDP B. TCP C. FTP D. HTTP
C. Translation
allows IPv6-enabled devices to communicate with IPv4-enabled devices using a translation technique similar to NAT for IPv4. A. Dual stack B. Tunneling C. Translation D. NAT64
D. Service Message Block (SMB)
is a client/server, request-response file sharing protocol. Servers can make their own resources available to clients on the network. A. Simple Mail Transfer Protocol (SMTP) B. Post Office Protocol (POP) & IMAP C. Hyper-Text Transfer Protocol (HTTP) D. Service Message Block (SMB)
A. Interface ID
is equivalent to term the host portion of an IPv4 address. A. Interface ID B. Subnet ID C. Global Routing Prefix
C. Global Routing Prefix
is the prefix, or network, portion of the address that is assigned by the provider, such as an ISP, to a customer or site. Will vary depending on ISP policies. A. Interface ID B. Subnet ID C. Global Routing Prefix
B. Multicast
is used to send a single IPv6 packet to multiple destinations. A. Unicast B. Multicast C. Anycast
A. Unicast
uniquely identifies an interface on an IPv6-enabled device. A. Unicast B. Multicast C. Anycast