QUIZ 4 REVIEWER (MODULE 13-15)

Ace your homework & exams now with Quizwiz!

B. Tunneling

A method of transporting an IPv6 packet over an IPv4 network. The IPv6 packet is encapsulated inside an IPv4 packet. A. Dual stack B. Tunneling C. Translation D. NAT64

A. Netstat

An important tool to verify connections. A. Netstat B. nslookup C. show ip route D. show ip interface

B. IMAP

Another protocol that describes a method to retrieve email messages. Copies of the messages are downloaded to the client application. The original messages are kept on the server until manually deleted. A. POP B. IMAP C. SMTP D. SNMP

A. Port 68

DHCP - Client process on well-known port ___. A. Port 68 B. Port 67 C. Port 53 D. Port 80

B. Port 67

DHCP - Server process on well-known port ___. A. Port 68 B. Port 67 C. Port 53 D. Port 80

C. Port 53

DNS process on well-known port ___. A. Port 68 B. Port 67 C. Port 53 D. Port 80

D. Port 80

HTTP process on well-known port ___. A. Port 68 B. Port 67 C. Port 53 D. Port 80

D. SACK

Host operating systems today typically employ an optional TCP feature called _______, negotiated during the three-way handshake. A. URG B. ACK C. SYN D. SACK

B. Each request is assigned source and destination port numbers.

How does a networked server manage requests from multiple clients for different services? A. The server sends all requests through a default gateway. B. Each request is assigned source and destination port numbers. C. The server uses IP addresses to identify different services. D. Each request is tracked through the physical address of the client.

D. 128

How many bits does IPv6 have? A. 48 B. 32 C. 64 D. 128

A. 48

How many bits does the Global Routing Prefix portion have? A. 48 B. 32 C. 16 D. 64

D. 64

How many bits does the Interface ID portion have? A. 48 B. 32 C. 16 D. 64

C. 16

How many bits does the Subnet ID portion have? A. 48 B. 32 C. 16 D. 64

A. True

IPv6 addresses are not case-sensitive and can be written in either lowercase or uppercase. A. True B. False

B. Hexadecimal

IPv6 addresses is written in which format? A. Binary B. Hexadecimal C. Octal D. Decimal

B. ICANN

In the OSI model, all of the following are protocols of the application layer except: A. IMAP B. ICANN C. POP3 D. HTTP

B. Subnet ID

Is the area between the Global Routing Prefix and the Interface ID. It is used by an organization to identify subnets within its site. A. Interface ID B. Subnet ID C. Global Routing Prefix

A. POP

Is used by an application to retrieve mail from a mail server. When mail is downloaded from the server to the client using _____ the messages are then deleted on the server. A. POP B. IMAP C. SMTP D. SNMP

C. FTP

It was developed to allow for data transfers between a client and a server. A. UDP B. TCP C. FTP D. HTTP

A. The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.

Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this? A. The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination. B. The source decreases the window size to decrease the rate of transmission from the destination. C. The destination decreases the window size. D. The destination sends fewer acknowledgement messages in order to conserve bandwidth.

B. Transmission Control Protocol (TCP)

Provides reliability and flow control. Number and track data segments transmitted to a specific host from a specific application. Acknowledge received data. Retransmit any unacknowledged data after a certain amount of time. Retransmit any unacknowledged data after a certain amount of time. Retransmit any unacknowledged data after a certain amount of time. A. User datagram Protocol (UDP) B. Transmission Control Protocol (TCP)

A. User datagram Protocol (UDP)

Provides the basic functions for delivering datagrams between the appropriate applications, with very little overhead and data checking. Is a connectionless protocol. Is known as a best-effort delivery protocol because there is no acknowledgment that the data is received at the destination. A. User datagram Protocol (UDP) B. Transmission Control Protocol (TCP)

B. Link-local Address (LLA)

Required for every IPv6-enabled device and used to communicate with other devices on the same local link. Are not routable and are confined to a single link. A. Global Unicast Address (GUA) B. Link-local Address (LLA)

A. Dual stack

The devices run both IPv4 and IPv6 protocol stacks simultaneously. A. Dual stack B. Tunneling C. Translation D. NAT64

D. Hyper-Text Transfer Protocol

The http at the beginning of a URL stands for A. Hidden-Tracking Text Protocol B. High-Traffic Time protocol C. Hyper-Tracking Textual Protocol D. Hyper-Text Transfer Protocol

C. Application layer

The upper three layers of the OSI model (application, presentation, and session) define functions of the TCP/IP application layer. Provides the interface between the applications used to communicate, and the underlying network over which messages are transmitted. A. Transport layer B. Network layer C. Application layer D. Data Link layer

A. Get

This is a client request for data. A client (web browser) sends the ______ to the web server to request HTML pages. A. Get B. Post C. Put

C. Anycast

This is any IPv6 unicast address that can be assigned to multiple devices. A packet sent is routed to the nearest device having that address. A. Unicast B. Multicast C. Anycast

A. Global Unicast Address (GUA)

This is similar to a public IPv4 address. These are globally unique, internet-routable addresses. A. Global Unicast Address (GUA) B. Link-local Address (LLA)

D. Domain Name Service (DNS)

This protocol defines an automated service that matches resource names with the required numeric network address. It includes the format for queries, responses, and data. A. Simple Mail Transfer Protocol (SMTP) B. Post Office Protocol (POP) & IMAP C. Hyper-Text Transfer Protocol (HTTP) D. Domain Name Service (DNS)

B. Post

This uploads data files to the web server, such as form data.. A. Get B. Post C. Put

C. Put

This uploads resources or content to the web server, such as an image. A. Get B. Post C. Put

A. Uniform Resource Locator

URL stands for A. Uniform Resource Locator B. Unified Resource Library C. Universal Resource Local D. United Resource Located

A. use of a double colon (::) to represent a string of all zero hextets B. omit all leading zeros from all hextets in the address

What are two methods that can be used to shorten the IPv6 address notation? (Choose two.) A. use of a double colon (::) to represent a string of all zero hextets B. omit all leading zeros from all hextets in the address C. emove all trailing zeros contained in the IPv6 address D. use double colons to represent a string of the same non-zero value

A. a continuous string of one or more hextets that contain only zeros

What does a double colon (::) represent in an IPv6 address notation? A. a continuous string of one or more hextets that contain only zeros B. at least eight occurrences of the same non-zero value C. the boundary between the network portion and the host portion of the address D. the beginning of the MAC address assigned to the IPv6 device

C. The part of the FTP message that was lost is re-sent.

What happens if part of an FTP message is not delivered to the destination? A. The message is lost because FTP does not use a reliable delivery method. B. The FTP source host sends a query to the destination host. C. The part of the FTP message that was lost is re-sent. D. The entire FTP message is re-sent.

B. tracking individual conversations

What is a responsibility of transport layer protocols? A. providing network access B. tracking individual conversations C. determining the best path to forward a packet D. translating private IP addresses to public IP addresses

B. the combination of a source IP address and port number or a destination IP address and port number

What is a socket? A. the combination of the source and destination IP address and source and destination Ethernet address B. the combination of a source IP address and port number or a destination IP address and port number C. the combination of the source and destination sequence and acknowledgment numbers D. the combination of the source and destination sequence numbers and port numbers

A. more addresses for networks and hosts

What is an advantage of using IPv6 ? A. more addresses for networks and hosts B. faster connectivity C. higher bandwidth D. more frequencies

A. 49,152 to 65,535

What is the complete range of TCP and UDP Private and Dynamic Ports? A. 49,152 to 65,535 B. 0 to 1023 C. 256 - 1023 D. 1024 - 49151

D. 1024 - 49151

What is the complete range of TCP and UDP registered ports? A. 49,152 to 65,535 B. 0 to 1023 C. 256 - 1023 D. 1024 - 49151

B. 0 to 1023

What is the complete range of TCP and UDP well-known ports? A. 0 to 255 B. 0 to 1023 C. 256 - 1023 D. 1024 - 49151

C. to keep track of multiple conversations between devices

What is the purpose of using a source port number in a TCP communication? A. to notify the remote device that the conversation is over B. to assemble the segments that arrived out of order C. to keep track of multiple conversations between devices D. to inquire for a nonreceived segment

C. Files can be downloaded from or uploaded to the server. The client needs to run a daemon program to establish an FTP connection with a server. D. The first connection established is for traffic control and the second connection is created to transfer a file.

What two characteristics describe an FTP connection? (Choose two.) A. A large file requires more than two connections between the client and the server to successfully download it. B. The server establishes the first connection with the client to control traffic that consists of server commands and client replies. C. Files can be downloaded from or uploaded to the server. The client needs to run a daemon program to establish an FTP connection with a server. D. The first connection established is for traffic control and the second connection is created to transfer a file.

A. applications that are sensitive to delay

What type of applications are best suited for using UDP? A. applications that are sensitive to delay B. applications that need reliable delivery C. applications that require retransmission of lost segments D. applications that are sensitive to packet loss

B. to relieve IPv4 address depletion

What was the reason for the creation and implementation of IPv6? A. to make reading a 32-bit address easier B. to relieve IPv4 address depletion C. to provide moren address space in the Internet Names Registry D. to allow NAT support for private addressing

C. Port 25

When a client sends email, the client SMTP process connects with a server SMTP process on well-known port ___. A. Port 465 B. Port 2525 C. Port 25 D. Port 587

C.) 2001:DB8:0:1111::200

Which IPv6 address notation is valid? A.) 2001:0DB8::ABCD::1234 B.) ABCD:160D::4GAB:FFAB C.) 2001:DB8:0:1111::200 D>) 2001::ABCD::

C. The client randomly selects a source port number.

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer? A. The client sets the window size for the session. B. The client sends an ISN to the server to start the 3-way handshake. C. The client randomly selects a source port number. D. The client sends a synchronization segment to begin the session.

A. f

Which letter represents the hexadecimal value of the decimal number 15? A. f B. g C. h D. b

C. 192.168.1.1:80

Which number or set of numbers represents a socket? A. 01-23-45-67-89-AB B. 21 C. 192.168.1.1:80 D. 10.1.1.15

C. nslookup

Which of the following utility allows you to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa? A. ipconfig B. tracert C. nslookup D. wireshark

B. HTTP

Which protocol is used by web servers to serve up a web page? A. FTP B. HTTP C. IMAP D. POP

C. HTTP

Which protocol is used to transfer web pages from a server to a client device? A. HTML B. SMTP C. HTTP D. SSH E. POP

B. They define how messages are exchanged between the source and the destination.

Which statement is correct about network protocols? A. Network protocols define the type of hardware that is used and how it is mounted in racks. B. They define how messages are exchanged between the source and the destination. C. They all function in the network access layer of TCP/IP. D. They are only required for exchange of messages between devices on remote networks.

A. NAT64

Which technology enables devices in an IPv6-only network to communicate with devices in an IPv4-only network? A. NAT64 B. tunneling C. DHCP D. link-local addressing

B. TCP 3-way handshake

Which transport layer feature is used to guarantee session establishment? A. UDP ACK flag B. TCP 3-way handshake C. UDP sequence number D. TCP port number

B. HTTP E. HTTPS

Which two application layer protocols manage the exchange of messages between a client with a web browser and a remote web server? (Choose two.) A. DNS B. HTTP C. HTML D. DHCP E. HTTPS

A. ACK E. SYN

Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.) A. ACK B. FIN C. PSH D. RST E. SYN F. URG

B. acknowledging received data D. retransmitting any unacknowledged data

Which two operations are provided by TCP but not by UDP? (Choose two.) A. identifying the applications B. acknowledging received data C. tracking individual conversations D. retransmitting any unacknowledged data E. reconstructing data in the order received

B. POP D. SMTP

Which two protocols are used in the process of sending and receiving emails? (Choose two.) A. HTTP B. POP C. SSH D. SMTP E. FTP

B. DNS E. VoIP

Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two) A. FTP B. DNS C. HTTP D. POP3 E. VoIP

A. IPv6 addresses are represented by hexadecimal numbers. D. IPv4 addresses are 32 bits in length.

Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.) A. IPv6 addresses are represented by hexadecimal numbers. B. IPv4 addresses are represented by hexadecimal numbers. C. IPv6 addresses are 32 bits in length. D. IPv4 addresses are 32 bits in length. E. IPv4 addresses are 128 bits in length. G. IPv6 addresses are 64 bits in length.

B. TCP

____ is also used by request-and-reply applications where the data is minimal, and retransmission can be done quickly. A. UDP B. TCP C. FTP D. HTTP

B. Post Office Protocol (POP) & IMAP

____ used for clients to receive mail. A. Simple Mail Transfer Protocol (SMTP) B. Post Office Protocol (POP) & IMAP C. Hyper-Text Transfer Protocol (HTTP) D. Domain Name Service (DNS)

A. Simple Mail Transfer Protocol (SMTP)

_____ used to send mail. A. Simple Mail Transfer Protocol (SMTP) B. Post Office Protocol (POP) & IMAP C. Hyper-Text Transfer Protocol (HTTP) D. Domain Name Service (DNS)

E. FTP

_____ was developed to allow for data transfers between a client and a server. client is an application which runs on a computer that is being used to push and pull data from an ___ server. A. HTTP B. POP C. SSH D. SMTP E. FTP

B. Dynamic Host Configuration Protocol (DHCP)

______ automates the assignment of IPv4 addresses, subnet masks, gateways, and other IPv4 networking parameters. Is considered dynamic addressing compared to static addressing. Static addressing is manually entering IP address information. A. Simple Mail Transfer Protocol (SMTP) B. Dynamic Host Configuration Protocol (DHCP) C. Hyper-Text Transfer Protocol (HTTP) D. Service Message Block (SMB)

D. HTTP

______ is a request/response protocol that specifies the message types used for that communication. A. UDP B. TCP C. FTP D. HTTP

C. Translation

allows IPv6-enabled devices to communicate with IPv4-enabled devices using a translation technique similar to NAT for IPv4. A. Dual stack B. Tunneling C. Translation D. NAT64

D. Service Message Block (SMB)

is a client/server, request-response file sharing protocol. Servers can make their own resources available to clients on the network. A. Simple Mail Transfer Protocol (SMTP) B. Post Office Protocol (POP) & IMAP C. Hyper-Text Transfer Protocol (HTTP) D. Service Message Block (SMB)

A. Interface ID

is equivalent to term the host portion of an IPv4 address. A. Interface ID B. Subnet ID C. Global Routing Prefix

C. Global Routing Prefix

is the prefix, or network, portion of the address that is assigned by the provider, such as an ISP, to a customer or site. Will vary depending on ISP policies. A. Interface ID B. Subnet ID C. Global Routing Prefix

B. Multicast

is used to send a single IPv6 packet to multiple destinations. A. Unicast B. Multicast C. Anycast

A. Unicast

uniquely identifies an interface on an IPv6-enabled device. A. Unicast B. Multicast C. Anycast


Related study sets

Adult Health II Musculoskeletal Chapter 35-37 PREP U

View Set

Quiz 4 unit 1 english sentence elements

View Set

Help Desk Customer Service Quiz #8(Homework)

View Set

CHAPTER 11-EPIDEMIOLOGY AND PUBLIC HEALTH

View Set

BIO 201 NERVOUS SYSTEM TEST PRACTICE

View Set

Lesson 7/Chapter 20: The Lymphatic System

View Set

Drugs & Society Module 3- Stimulants

View Set

Lower Limb: Lesson 12 & 13 (Critique - Knee & Distal Femur)

View Set

UCA African American Cinema Final

View Set