Chapter 4 Flashcards

1
Q

T or F: UDP provides error checking, but not sequencing.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T or F: IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T or F: IPv4 and IPv6 use the same packet format.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T or F: TCP uses a four-step process called a four-way handshake to establish a TCP connection.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T or F: The cost of upgrading infrastructure has been a major factor in the slow adoption of IPv6.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T or F: In general, a Layer 3 or Layer 4 switch is still optimized for fast Layer 2 data handling.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T or F: Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

T or F: The Border Gateway Protocol is considered to be a hybrid routing protocol.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T or F: The pathping utility sends 10 pings per hop by default.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T or F: The CTRL + S key combination can be used to stop an actively running command.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?

Framing
Connection-oriented Protocol
Sequencing and checksums
Flow Control

A

Framing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet?

Internet header length (IHL)
Padding
Differentiated Services (DiffServ)
Time to Live (TTL)

A

Differentiated Services (DiffServ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
What command will list only current connections, including IP addresses and port numbers?
  portstat
  netstat -n
  netstat -s
  show ip stats
A

netstat -n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
What utility is the equivalent to the pathping command on a Linux system?
  tracepath
  hping
  traceroute
  mtr
A

mtr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which statement regarding the Border Gateway Protocol (BGP) is accurate?
BGP is limited to a single autonomous system.
BGP is exclusively a distance-vector protocol.
BGP is a more advanced version of OSPF.
BGP utilizes TCP for communicating updates.

A

BGP utilizes TCP for communicating updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received?
  PSH flag
  urgent pointer
  sliding-window
  URG flag
A

sliding-window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is not a task handled by a router?
A router can interpret Layer 3 and often Layer 4 addressing.
A router can reroute traffic if the path of first choice is down but a second path is available.
A router forwards broadcasts over the network.
A router can connect dissimilar networks.

A

A router forwards broadcasts over the network.

18
Q
The IP connectionless protocol relies on what other protocol to guarantee delivery of data?
  ICMP
  TCP
  UDP
  ARP
A

TCP

19
Q
You are connected to your network's Cisco router, and need to verify the route table. What command should you enter?
  route print
  route -a
  show ip route
  show route-table
A

show ip route

20
Q
Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com?
  traceroute -o ICMP srv1.mycompany.com
  traceroute -w srv1.mycompany.com
  traceroute -i srv1.mycompany.com
  traceroute -I srv1.mycompany.com
A

traceroute -I srv1.mycompany.com

21
Q

What is the purpose of the checksum TCP field?

It allows the receiving node to determine whether the TCP segment became corrupted during transmission.

It confirms receipt of data via a return message to the sender.

It specifies special options, such as the maximum segment size a network can handle.

It identifies the data segment’s position in the stream of data segments being sent

A

It allows the receiving node to determine whether the TCP segment became corrupted during transmission.

22
Q

What happens when a router receives a packet with a TTL of 0?

The router marks the packet as corrupted and forwards it to the next hop.

The router attempts to forward the traffic on a local network.

The router drops the packet and sends an ICMP TTL expired message back to the host.

The router resets the TTL to 128.

A

The router drops the packet and sends an ICMP TTL expired message back to the host.

23
Q
In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to?
  group ID
  traffic exchange
  traffic class
  flow label
A

flow label

24
Q

What is routing protocol convergence time defined as?

It is the time it takes for the protocol to recognize that a change has occurred.

It is the amount of time involved in configuration of the routing protocol.

It is the time it takes for the protocol to recognize the best path in the event of a network change.

It is the amount of time it takes after initial configuration of the protocol for all routes to become known.

A

It is the time it takes for the protocol to recognize the best path in the event of a network change.

25
Q
Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols?
  interior gateway protocols
  border gateway protocols
  distance vector protocols
  link-state protocols
A

link-state protocols

26
Q
Which routing protocol started as a Cisco proprietary protocol and combines some of the features of a link-state protocol with that of distance-vector protocols?
  BGP
  IS-IS
  OSPF
  EIGRP
A

EIGRP

27
Q

You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate?
Convergence time will be increased with EIGRP.
EIGRP will increase CPU utilization on core routers.
EIGRP may not be available on non-Cisco routers.
Increased traffic will result from the switch to EIGRP.

A

EIGRP may not be available on non-Cisco routers.

28
Q
What tcpdump command can be used to filter out all traffic except SSH traffic?
  tcpdump port 22
  tcpdump -p 22
  tcpdump only ssh
  tcpdump -f +ssh
A

tcpdump port 22

29
Q
Which command will produce statistics about each message transmitted by a host, separated according to protocol type?
  netstat -s
  ipconfig -s
  netstat -an
  ipstat -a
A

netstat -s

30
Q
When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable?
  20
  32
  8
  15
A

15

31
Q

What occurs when a collision happens on a network?
Each node on the network stops transmitting, until manually told to reconnect and transmit.

The collision will create an error in the network switch, but otherwise, no issues will occur as a result.

The collision goes undetected, and data transmission continues.

Each node on the network waits a random amount of time and then resends the transmission.

A

Each node on the network waits a random amount of time and then resends the transmission.

32
Q

You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?

The network is not based on the Ethernet standard.

The MTU for the network can be as high as 9198 bytes.

Fragmented frames will be consolidated into whole frames before being sent.

The MTU for the network is set at 65,535 bytes.

A

The MTU for the network can be as high as 9198 bytes.

33
Q
What IPv6 field is similar to the TTL field in IPv4 packets?
  hop limit
  flow label
  distance vector
  next header
A

hop limit

34
Q
If the VLAN tag is present in an Ethernet frame, what is the maximum frame size?
  1492 bytes
  1522 bytes
  1500 bytes
  1518 bytes
A

1522 bytes

35
Q
By default, what is the MTU size on a typical Ethernet network?
  1518 bytes
  1522 bytes
  1492 bytes
  1500 bytes
A

1500 bytes

36
Q
What routing metric affects a path's potential performance due to delay?
  latency
  load
  MTU
  theoretical bandwidth
A

latency

37
Q

Which statement does NOT accurately describe characteristics of the OSPF protocol?

OSPF requires very little CPU or memory resources.
OSPF maintains a database of other routers’ links.
OSPF provides low network overhead.
OSPF has no hop limits on a transmission path.

A

OSPF requires very little CPU or memory resources.

38
Q

Originally codified by ISO, what does the “intermediate system” in IS-IS (Intermediate System to Intermediate System) stand for?

An entire network consisting of various network devices.
The administrative boundaries of an organization.
The autonomous systems used by an organization.
An IS-IS capable network router.

A

An IS-IS capable network router.

39
Q

What statement regarding the differences between the Windows tracert utility and the Linux/UNIX/macOS traceroute utility is accurate?

Only tracert can send UDP messages for tracing a path.

The tracert utility expects an ICMP port unreachable error message as the final reply to a trace.

By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages.

The Windows tracert utility does not place limits on the TTL of repeated trial messages.

A

By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages.

40
Q

In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate?

The network switch will eventually crash due to being unable to properly forward traffic.

The hosts that share the same MAC addresses will be completely unable to communicate with any other devices.

The hosts will generate new MAC addresses until the conflict is resolved.

The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

A

The hosts will still send and receive traffic, but traffic may not always reach the correct destination.