Elective 2: Prelim Flashcards

1
Q

What does “LAN” stand for?

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does “IP” in IP address stand for?

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which device connects a LAN to the internet?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary function of a switch in a network?

A

Filter and forward data within a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the OSI model is responsible for data encryption?

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What device is used to amplify signals in a network?

A

Repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which network device operates at the Data Link layer of the OSI model?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary purpose of a firewall?

A

Protect against unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What device connects two different networks?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which protocol is used to send emails?

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does HTTP stand for?

A

HyperText Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which protocol is used for secure data transfer over the web?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the main purpose of DNS in a network?

A

Translate domain names to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which protocol is used to transfer files over the internet?

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a group of computers connected together called?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the maximum length of a UTP cable in a LAN?

A

100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the unique identifier assigned to a device on a network?

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the full form of DHCP?

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many layers are there in the OSI model?

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does “ping” test in a network?

A

Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which layer of the OSI model handles error connection?

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which OSI layer deals with end-to-end communication?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In the TCP/IP model, which layer corresponds to the OSI’s Physical and Data Link layers?

A

Network Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does TCP stand for?

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which topology connects all devices to a single central device?
Star
26
In which topology are all devices connected in a circular manner?
Ring
27
What is a disadvantage of a bus topology?
Entire network stops if the main cable fails
28
Which topology provides the highest redundancy?
Mesh
29
What is the most commonly used topology in LANs?
Star
30
What is the range of Class A IP addresses?
0.0.0.0 to 127.255.255.255
31
How many octets are in an IPv4 address?
4
32
Which frequency band is NOT used in Wi-Fi?
7GHz
33
What is the primary role of an ISP?
Provide internet services
34
Which of these is a popular messaging protocol?
XMPP
35
What is the default port number for HTTP?
80
36
SMTP
Simple Mail Transfer Protocol
37
FTP
File Transfer Protocol
38
HTTPS
Hypertext Transfer Protocol Secure
39
HTTP
HyperText Transfer Protocol
40
XMPP
Extensible Messaging and Presence Protocol
41
IMAP
Internet message access protocol
42
TCP
Transmission Control Protoco
43
IP
Internet Protocol
44
DNS
Domain Name System
45
POP3
Post Office Protocol 3
46
OSI (OSI _ or OSI Model)
Open System Interconnection Reference Model - Reference Model
47
abstract description for layered communications and computer network protocol design.
Open System Interconnection Reference Model (OSI Reference Model or OSI Model)
48
It divides network architecture into seven layers which, from top to bottom,
Open System Interconnection Reference Model (OSI Reference Model or OSI Model)
49
OSI Seven Layer Model.
Application, Presentation, Session, Transport, Network, Data Link, and Physical Layers
50
* In _, the _ began to develop its OSI framework architecture.
1978 the International Standards Organization (ISO)
51
* OSI has two major components: an abstract model of networking, called the ___
Basic Reference Model or seven-layer model, and a set of specific protocols.
52
* Various aspects of OSI design evolved from experiences with the
Advanced Research Projects Agency Network (ARPANET) and the fledgling Internet.
53
* The concept of a 7 layer model was provided by the __
work of Charles Bachman, then of Honeywell
54
OSI Layers
1. Application 2. Presentation 3. Session 4. Transport 5. Network 6. Data Link 7 Physical
55
Network process to ___
Application
56
Data representation, encryption and description
Presentation
57
Interhost communication
Session
58
End-to-end connections and reliability, Flow control
Transport
59
Path determination and logical addressing (IP) add ko yan describe
Network
60
Physical addressing (MAC and LLC)
Data Link
61
Media, signal and binary transmission
Physical
62
defines the electrical and physical specifications for devices.
Layer1: Physical Layer
63
In particular, it defines the relationship between a device and a physical medium.
Layer1: Physical Layer
64
* This includes the layout of pin, voltages, cable specification, hubs, repeaters, network adapters, host bus adapters, and more.
Layer1: Physical Layer
65
*The major functions and services performed by the Physical Layer are:
* Establishment and termination of a connection to a communication medium. * Participation in the process whereby the communication resources are effectively shared among multiple users. For example, flow control. * Modulation, or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. These are signals operating over the physical cabling (such as copper and optical fiber) or over a radio link. * The same applies to local-area networks, such as Ethernet, token ring , FDDI(Fiber Distributed Data Interface), ITU-T( International Telecommunication Union Telecommunication Standardization Sector) G.hn and IEEE802.1I. * Personal area networks such as Bluetooth and IEEE 802.15.4.
66
local-area networks: such as...
Ethernet, token ring , FDDI(Fiber Distributed Data Interface), ITU-T( International Telecommunication Union Telecommunication Standardization Sector) G.hn and IEEE802.1I.
67
* Personal area networks such as
Bluetooth and IEEE 802.15.4
68
detect and possibly correct errors that may occur in the Physical Layer.
Layer 2: Data Link Layer
69
provides the functional and procedural means to transfer data between network entities
Layer 2: Data Link Layer
70
* Originally, this layer was intended for point-to-point and point-to-multipoint media, characteristic of wide area media in the telephone system.
Layer 2: Data Link Layer
71
*The data link layer is divided into two sub-layers by __. 1. 2.
_ IEEE 1. Media Access Control (MAC) 2. Logical Link Control (LLC)
72
is lower sub-layer, and it defines the way about the media access transfer, such as CSMA/CD/CA(Carrier Sense Multiple Access/Collision Detection/Collision Avoidance)
Mac
73
provides data transmission method in different network
LLC
74
It will re-package date and add a new header.
LLC
75
provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality of service requested by the Transport Layer.
Layer 3: Network Layer
76
* The _ performs:
_ Network Layer * network routing functions, * perform fragmentation and reassembly, * report delivery errors.
77
* Routers operate at this layer—sending data throughout the extended network and making the Internet possible.
Layer 3: Network Layer
78
provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.
Layer 4: Transport Layer
79
controls the reliability of a given link through flow control, segmentation/desegmentation, and error control.
Layer 4: Transport Layer
80
controls the dialogues (connections) between computers.
Layer 5: Session Layer
81
* It establishes, manages and terminates the connections between the local and remote application.
Layer 5: Session Layer
82
* It provides for full-duplex, half-duplex, or simplex operation, and establishes checkpointing, adjournment, termination, and restart procedures.
Layer 5: Session Layer
83
* The OSI model made this layer __, which is a property of the __, and also for ___, which is not usually used in the Internet Protocol Suite.
Layer 5: Session Layer __ responsible for graceful close of sessions __ (TCP) Transmission Control Protocol ___session check pointing and recovery
84
The ___ is commonly implemented explicitly in application environments that use remote procedure calls.
___ Session Layer
85
establishes a context between Application Layer entities, in which the higher-layer entities can use different syntax and semantics, as long as the presentation service understands both and the mapping between them.
Layer 6: Presentation Layer
86
* This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa.
Layer 6: Presentation Layer
87
* This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems.
Layer 6: Presentation Layer
88
Presentation Layer
*It is sometimes called the syntax layer.
89
is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application.
Layer 7: Application Layer
90
* Application layer functions typically include:
* identifying communication partners, * determining resource availability, * synchronizing communication.
91
* Determines the identity and availability of communication partners for an application with data to transmit.
*Identifying communication partners
92
* Decide whether sufficient network or the requested communication exist.
* determining resource availability
93
* All communication between applications requires cooperation that is managed by the application layer.
*Synchronizing communication
94
* Some examples of application layer implementations include:
* Hypertext Transfer Protocol (HTTP) * File Transfer Protocol (FTP) * Simple Mail Transfer Protocol (SMTP)
95
TCP/IP Layers ng OSI Application, Presentation, Session = __ Transport = __ Network = ___ Data, Physical = __
A,P,S = TELNET, FTP, SMTP, POP3,SNMP, NNTP, DNS, NIS, NFS, HTTP T = TCP, UDP... N = IP, ICMP, ARP, RARP D,P = FDDI, Ethernet, ISDN, X.25...
96
TCP/IP Layers 4 Layers
Application Layer Transportation Layer Internet Layer Network Access Layer
97
* Open system standards over the world * Rigorously defined structured, hierarchical network model * Complete description of the function * Provide standard test procedures
OSI Feature
98
(commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks.
Internet Protocol Suite
99
is the set of communications protocols used for the Internet and other similar networks.
Internet Protocol Suite (commonly known as TCP/IP)
100
*It is named from two of the most important protocols in it:
Internet Protocol Suite (commonly known as TCP/IP) *the Transmission Control Protocol (TCP) and *the Internet Protocol (IP)
101
which were the first two networking protocols defined in this standard.
*the Transmission Control Protocol (TCP) and *the Internet Protocol (IP)
102
Why Layering Considered Harmful? * __ implies that the functions of each layer are carried out completely before the protocol data unit is passed to the next layer.
In the data networking context structured layering
103
Why Layering Considered Harmful? This means that the optimization of each layer has to be done ___.
separately
104
Why Layering Considered Harmful? Such ordering constraints are in conflict with efficient implementation of data manipulation functions.
true
105
___ logically segment switched networks based on the functions, project teams, or applications of the organization regardless of the physical location or connections to the network.
VLANs
106
All workstations and servers used by a particular workgroup ___, regardless of the physical connection or Location.
share the same VLAN
107
___ function by logically segmenting the network into different broadcast domains so that packets are only switched between ports that are designated for the same VLAN.
VLANs
108
___ provide broadcast filtering, security, and traffic flow management.
Routers in VLAN topologies
109
___ address scalability, security, and network management.
VLANs
110
___ may not bridge any traffic between VLANs, as this would violate the integrity of the VLAN broadcast domain.
Switches
111
__ should only be routed between VLANs.
Traffic
112
A __ is a broadcast domain created by one or more switches.
VLAN
113
__ allows the router to send packets to the three different broadcast domains.
Layer 3 routing
114
Broadcast domains with VLANs and routers Implementing VLANs on a switch causes the following to occur: ◼ If the __, the switch searches the bridging table for VLAN 1.
frame comes in on a port in VLAN 1
115
Broadcast domains with VLANs and routers Implementing VLANs on a switch causes the following to occur: ◼The ___ maintains a separate bridging table for each VLAN.
switch
116
Broadcast domains with VLANs and routers Implementing VLANs on a switch causes the following to occur: ◼When the ___, the switch adds the source address to the bridging table if it is currently unknown.
frame is received
117
Broadcast domains with VLANs and routers Implementing VLANs on a switch causes the following to occur: ◼The __ so a forwarding decision can be made.
destination is checked
118
Broadcast domains with VLANs and routers Implementing VLANs on a switch causes the following to occur: ◼For __ is made against the address table for that VLAN only.
learning and forwarding the search
119
VLAN operation * __ could be assigned to a different ___.
Each switch port VLAN
120
VLAN operation * Ports assigned to the same VLAN ___
share broadcasts.
121
VLAN operation * Ports that do not belong to that VLAN __
do not share these broadcasts.
122
VLAN operation
* Int fa0/1 * Switchport mode access * Switchport access vlan 1
123
VLAN operation ___, share the bandwidth of that segment.
Users attached to the same shared segment
124
VLAN operation ___ means less bandwidth and deterioration of network performance.
Each additional user attached to the shared medium
125
VLAN operation __ offer more bandwidth to users than a __.
VLANs shared network.
126
VLAN operation The __ for every port in the switch is the __.
default VLAN management VLAN.
127
VLAN operation The ___ is always VLAN 1 and may not be deleted. All ___ may be reassigned to alternate VLANs.
management VLAN other ports on the switch
128
VLAN operation ___ allow for membership based on the MAC address of the device connected to the switch port.
Dynamic VLANs
129
VLAN operation As a __, it queries a database within the switch for a VLAN membership
device enters the network
130
VLAN operation In ___, the port is assigned to a specific VLAN membership independent of the user or system attached to the port.
port-based or port-centric VLAN membership
131
VLAN operation All users of the same port must be in the __.
same VLAN
132
VLAN operation _ are responsible for configuring VLANs both manually and statically.
Network administrators
133
VLAN operation Configuring VLANs 1. 2.
Statically Dynamically
134
___configure port-by-port.
Statically Network administrators
135
Each port is associated with a specific VLAN
Statically
136
The__ is responsible for keying in the mappings between the ports and VLANs.
Statically network administrator
137
The ports are able to dynamically work out their VLAN configuration
Dynamically
138
Uses a software database of MAC address to VLAN mappings (which the network administrator must set up first)
Dynamically
139
The key benefit of VLANs is that they permit the network administrator to ___
organize the LAN logically instead of physically.
140
VLAN types There are three basic VLAN memberships for determining and controlling how a packet gets assigned:
◼Port-based VLANs ◼MAC address based ◼Protocol based VLANs
141
The ___ are encapsulated or modified to reflect a VLAN ID before the frame is sent over the link between switches.
frame headers
142
* Before forwarding to the destination device, the___is changed back to the original format.
frame header
143
The number of VLANs in a switch vary depending on several factors:
◼Traffic patterns ◼Types of applications ◼Network management needs ◼Group commonality
144
* An important consideration in defining the size of the switch and the number of VLANs is the ___.
IP addressing scheme.
145
* Because a ___ is strongly recommended, there can be no more than __ devices in any one VLAN.
one-to-one correspondence between VLANs and IP subnets 254
146
* It is further recommended that VLANs should not __ domain of the distribution switch.
extend outside of the Layer 2
147
world’s largest public data network, doubling in size every nine months
INTERNET
148
defines a 32-bit address
IPv4
149
2^32 (4,294,967,296) __ addresses available
IPv4
150
The __ is concerned with the eventual depletion of the IP address space.
first problem
151
* __ of classful addressing does not allow the address space to be used to its maximum potential.
Traditional model
152
* When IP was first standardized in __, each system attached to the IP based Internet had to be assigned a unique 32-bit address
Sep 1981
153
* The 32-bit IP addressing scheme involves a ___
two level addressing hierarchy
154
two level addressing hierarchy
1. Network Number/Prefix 2. Host Number
155
Classful Addressing Divided into _ classes
5
156
* Class A __ bits __ and __ bits __ and so on B,C.
8 N/W id 24 host id
157
*__ by assigning blocks of addresses which fall along octet boundaries
*Wastage of IP addresses
158
Techniques to reduce address shortage in IPv4
* Subnetting * Classless Inter Domain Routing (CIDR) * Network Address Translation (NAT)
159
Three-level hierarchy:
Subnetting
160
Three-level hierarchy:
network, subnet, and host.
161
* The __ is composed of the classful network-prefix and the subnet-number
extended-network-prefix
162
has traditionally been identified by the subnet mask
extended-network-prefix
163
Network Address Translation Each organization
- single IP address
164
Network Address Translation - each host with IP unique to the orgn., from reserved set of IP addresses
Within organization
165
Features of IPv6
* Larger Address Space * Aggregation-based address hierarchy – Efficient backbone routing * Efficient and Extensible IP datagram * Stateless Address Autoconfiguration * Security (IPsec mandatory) * Mobility
166
_-bit IPv6 Address
128
167
IPv6 is separated by?
: also known as colon
168
_ groups of _-bit __ numbers
8 16 hexadecimal
169
= all zeros in one or more group of 16-bit hexadecimal numbers
::
170
Extension Headers
* Routing * Fragmentation * Authentication * Encapsulation *Hop-by-Hop Option * Destination Options
171
Extended routing, like IPv4 loose list of routers to visit
Routing
172
Fragmentation and reassembly
Fragmentation
173
Integrity and authentication, security
Authentication
174
Confidentiality
Encapsulation
175
Special options that require hop-by-hop processing
Hop-by-Hop Option
176
Optional information to be examined by the destination node
Destination Options
177
❑ IPv6 is NEW ...
– built on the experiences learned from IPv4 – new features – large address space – new efficient header – autoconfiguration
178
❑ ... and OLD
– still IP – build on a solid base – started in 1995, a lot of implementations and tests done
179
1. What does OSI stand for? A) Open System Internet B) Open Source Interconnection C) Open System Interconnection D) Operating System Interconnection
C) Open System Interconnection
180
2. How many layers does the OSI Model have? A) 4 B) 5 C) 6 D) 7
D) 7
181
3. Which layer of the OSI model is responsible for physical transmission of data? A) Data Link B) Network C) Physical D) Transport
C) Physical
182
4. What is the main function of the Transport Layer in the OSI model? A) Error detection B) Data encryption C) End-to-end communication and reliability D) Logical addressing
C) End-to-end communication and reliability
183
5. Which of the following protocols operates at the Application Layer of the OSI model? A) IP B) TCP C) HTTP D) ARP
C) HTTP
184
6. Which OSI layer ensures that data is properly formatted and encrypted? A) Transport B) Session C) Presentation D) Application
C) Presentation
185
7. The Network Layer is responsible for which of the following? A) Routing and addressing B) Encryption C) Error detection D) Physical transmission of bits
A) Routing and addressing
186
8. Which layer in the OSI model is responsible for establishing, maintaining, and terminating sessions? A) Application B) Session C) Presentation D) Transport
B) Session
187
9. Which of the following is a Layer 2 protocol? A) TCP B) IP C) Ethernet D) UDP
C) Ethernet
188
10. What is the function of the Data Link Layer? A) Ensuring reliable data transmission B) Managing network congestion C) Handling logical addressing D) Providing physical addressing and error detection
D) Providing physical addressing and error detection
189
11. Which protocol is responsible for logical addressing? A) TCP B) IP C) HTTP D) FTP
B) IP
190
12. What is the primary difference between TCP and UDP? A) TCP is faster than UDP B) TCP is connection-oriented, while UDP is connectionless C) UDP provides error correction, while TCP does not D) UDP is more reliable than TCP
B) TCP is connection-oriented, while UDP is connectionless
191
13. Which layer of the OSI model does a router operate at? A) Data Link B) Network C) Transport D) Session
B) Network
192
14. Which of the following is NOT a function of the Application Layer? A) Determining resource availability B) Identifying communication partners C) Managing end-to-end transmission D) Synchronizing communication
C) Managing end-to-end transmission
193
15. Which protocol translates domain names into IP addresses? A) HTTP B) FTP C) DNS D) SMTP
C) DNS
194
16. What does ARP stand for? A) Automatic Routing Protocol B) Address Resolution Protocol C) Application Routing Process D) Active Request Protocol
B) Address Resolution Protocol
195
17. Which OSI layer is responsible for segmenting and reassembling data? A) Network B) Transport C) Data Link D) Session
B) Transport
196
18. The TCP/IP model has how many layers? A) 4 B) 5 C) 6 D) 7
A) 4
197
19. Which of the following operates at Layer 3 of the OSI Model? A) Switch B) Router C) Hub D) Repeater
B) Router
198
20. Which OSI layer is sometimes referred to as the “syntax layer”? A) Network B) Presentation C) Transport D) Application
B) Presentation
199
1. What does VLAN stand for? A) Virtual Local Area Network B) Virtual Large Area Network C) Variable Local Area Network D) Variable Large Area Network
A) Virtual Local Area Network
200
2. What is the primary purpose of VLANs? A) To increase physical connections B) To segment networks logically C) To enhance physical security D) To replace switches
B) To segment networks logically
201
3. In a VLAN, workstations share the same VLAN regardless of what? A) Physical connection B) Network topology C) Internet speed D) Data type
A) Physical connection
202
4. What is a broadcast domain in the context of VLANs? A) A physical segment of the network B) A group of devices that receive broadcast messages C) A layer of the OSI model D) A type of network protocol
B) A group of devices that receive broadcast messages
203
5. Which layer of the OSI model is primarily involved in VLAN routing? A) Layer 1 B) Layer 2 C) Layer 3 D) Layer 4
C) Layer 3
204
6. What happens to traffic between different VLANs? A) It is bridged directly B) It is filtered by switches C) It is routed by routers D) It is discarded
C) It is routed by routers
205
8. In VLAN operation, what determines which VLAN a port belongs to? A) The physical location of the port B) The user connected to the port C) The port's assigned VLAN configuration D) The network speed
C) The port's assigned VLAN configuration
206
9. What is the default VLAN for every port in a switch? A) VLAN 10 B) VLAN 100 C) VLAN 1 D) VLAN 0
C) VLAN 1
207
10. Which VLAN membership type assigns VLAN based on the MAC address of the device? A) Port-based VLAN B) MAC address-based VLAN C) Protocol-based VLAN D) Dynamic VLAN
B) MAC address-based VLAN
208
11. What do dynamic VLANs allow for? A) Manual configuration B) Port-based assignment C) Membership based on device MAC address D) Physical connection reassignment
C) Membership based on device MAC address
209
12. What is one key benefit of using VLANs? A) Physical network restructuring B) Logical organization of the LAN C) Enhanced bandwidth for all devices D) Simplified hardware requirements
B) Logical organization of the LAN
210
13. Which of the following is NOT a basic type of VLAN membership? A) Port-based VLANs B) MAC address-based VLANs C) Protocol-based VLANs D) User-based VLANs
D) User-based VLANs
211
14. What must be considered when defining the size of a switch regarding VLANs? A) The physical size of the switch B) The network bandwidth C) The IP addressing scheme D) The number of connected devices
C) The IP addressing scheme
212
15. How many devices are recommended to be in a single VLAN? A) No more than 100 B) No more than 200 C) No more than 254 D) No more than 300
C) No more than 254
213
16. What is the consequence of bridging traffic between VLANs? A) Enhanced network performance B) Increased broadcast traffic C) Violation of VLAN integrity D) Improved security
C) Violation of VLAN integrity
214
17. VLANs are primarily used to address which of the following? A) Scalability, security, and network management B) Physical connections and speed C) Data encryption and compression D) Hardware configuration
A) Scalability, security, and network management
215
18. What does each port in a VLAN share? A) Physical connections B) Management permissions C) Broadcast traffic D) Security protocols
C) Broadcast traffic
216
19. How does a switch learn MAC addresses in a VLAN? A) By manual entry B) Through user authentication C) By adding source addresses to the bridging table D) By polling connected devices
C) By adding source addresses to the bridging table
217
20. What is a key feature of port-based VLAN membership? A) It is user-dependent B) It allows for multiple VLANs per port C) Each port is assigned to a specific VLAN D) It is dynamic in nature
C) Each port is assigned to a specific VLAN
218
1. What is the primary reason for the development of IPv6? A) To provide faster internet speeds B) To address the depletion of IPv4 addresses C) To simplify network configurations D) To enhance security features
B) To address the depletion of IPv4 addresses
219
2. How many unique addresses are available in the IPv4 addressing scheme? A) 2^16 B) 2^32 C) 2^64 D) 2^128
B) 2^32
220
3. What addressing hierarchy does the 32-bit IP addressing scheme use? A) Host Number/Network Number B) Network Number/Host Number C) Subnet/Host/Network D) Prefix/Host
B) Network Number/Host Number
221
4. How many classes of addresses were defined in classful addressing? A) 2 B) 3 C) 4 D) 5
D) 5
222
5. What is one technique used to reduce address shortages in IPv4? A) IPsec B) NAT C) OSPF D) ARP
B) NAT
223
6. In subnetting, how many levels of hierarchy are there? A) One B) Two C) Three D) Four
C) Three
224
7. What does a subnet mask do? A) Identifies the class of an IP address B) Indicates which portion of the address is the network and which is the host C) Provides security for IP addresses D) Translates IP addresses to MAC addresses
b
225
8. What are the reserved IP address ranges for private networks? A) 10.0.0.0 – 10.255.255.255 B) 192.168.0.0 – 192.168.255.255 C) 172.16.0.0 – 172.31.255.255 D) All of the above
D) All of the above
226
9. What is a key feature of IPv6? A) Smaller address space B) Classful addressing C) Stateless Address Autoconfiguration D) Limited mobility
C) Stateless Address Autoconfiguration
227
10. How is an IPv6 address structured? A) Four groups of 8-bit decimal numbers B) Eight groups of 16-bit hexadecimal numbers C) A single 32-bit number D) Two groups of 32-bit binary numbers
B) Eight groups of 16-bit hexadecimal numbers
228
11. What does the "::" notation in an IPv6 address represent? A) All bits are set to one B) All zeros in one or more groups C) A wildcard address D) A reserved address
B) All zeros in one or more groups
229
12. Which feature of IPv6 ensures mandatory security? A) NAT B) Subnetting C) IPsec D) DHCP
C) IPsec
230
13. Which of the following is NOT an extension header in IPv6? A) Fragmentation B) Hop-by-Hop Option C) Network Address Translation D) Authentication
C) Network Address Translation
231
14. What is the purpose of the Routing extension header in IPv6? A) To encrypt packets B) To provide a list of routers to visit C) To verify the integrity of packets D) To configure IP addresses
B) To provide a list of routers to visit
232
15. What was the starting year for IPv6 development? A) 1981 B) 1995 C) 2000 D) 2005
A) 1981
233
16. Which of the following best describes IPv6? A) Completely new protocol B) An evolution of IPv4 with new features C) A protocol with the same features as IPv4 D) A protocol that only focuses on security
B) An evolution of IPv4 with new features
234
17. What is the significance of the larger address space in IPv6? A) It allows for more devices to connect to the internet B) It increases network speeds C) It simplifies network configurations D) It enhances security measures
A) It allows for more devices to connect to the internet
235
18. What aspect of IPv6 enhances routing efficiency? A) Classful addressing B) Aggregation-based address hierarchy C) Network Address Translation D) Static IP addressing
B) Aggregation-based address hierarchy
236
19. Which of the following is true about the header of IPv6 packets? A) It is less efficient than IPv4 headers. B) It is simplified and more efficient than IPv4 headers. C) It requires more processing time. D) It contains more fields than IPv4 headers.
B) It is simplified and more efficient than IPv4 headers.
237
20. What feature allows IPv6 addresses to be assigned without manual configuration? A) DHCP B) Static addressing C) Stateless Address Autoconfiguration D) Dynamic Host Configuration Protocol
C) Stateless Address Autoconfiguration