Midterm Flashcards

(179 cards)

1
Q

Which IPv6 Multicast Address Space below is for all OSPFv3 ALL OSPF Routers.

A

FF02::5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An IPv6 ________ address is equivalent to an IPv4 public address.

A

Global unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which classes defined for IPv4 are not used for unicast? (Select all correct answers.)

A

Class D, Class E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What special address is used for the IPv6 loopback?

A

::1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which IPv6 Multicast Address Space below is for all all nodes on the local network segment.

A

FF02::1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the IPv4 header, what is the size of the source and destination address fields?

A

32 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The length of the IPv6 address is ________ bits.

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The term octet is used to describe what size of binary number?

A

8 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An IP address consists of a 32-bit binary number. When written like this: 192.168.1.1, it is known as ________ notation.

A

dotted-decimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What class of IPv4 address includes the first octet numbers from 192 to 223?

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

From the following list, identify a valid Class B IP address:

A

129.112.54.6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IP multicasting is available for both:

A

IPv6, IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Variable-Length Subnetting allows for:

A

maximum flexibility in choosing how to partition subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following are public IP network IDs? (Choose two.)

A

172.32.0.0
8.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________ defines a method of further subdividing the IPv4 address space into groups that are smaller than a single IP (classful) network.

A

subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What class of IPv4 address includes the first octet numbers from 128 to 191?

A

Class B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fixed-Lenth IPV4 Subnets are an example of

A

Classful IPV4 Network Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which IPv4 Multicast Address Space below is restricted to one network

A

224.0.0.1 - 224.0.0.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

All addresses that begin (in hex) with the digits FF are ________ addresses.

A

Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which IPv6 Multicast Address Space below is for all EIGRP routers

A

FF02::a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the binary equivalent of the hex digit C?

A

1100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which layer of the TCP/IP network model specifies how packets travel end to end over a TCP/IP network?

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When designing IP subnets, the ________ defines the size of the subnet.

A

subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The 32-bit subnet mask below is represented in dotted decimal representation as
11111111 11111111 11111111 00000000

A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
How many bits is an IPV4 Address?
32
26
What type of protocol at the Link Layer has one sender, one receiver, one link? MAC addresses are normally not used.
point-to-point protocol
27
How many bits is a MAC Address?
48
28
What type of port carries frames between VLANS defined over multiple physical switches?
trunk port
29
When STP has placed a port in the blocked state, this port ________.
cannot receive or forward data frames
30
The IEEE 802.1Q standard adds a ________-byte tag to the original frame to identify the VLAN.
4
31
The IEEE defines three general categories of Ethernet MAC addresses. What are these three types? (Choose three.)
broadcast, multicast, unicast
32
What is the process on a NIC card called that determines Duplex & Speed?
auto negotiation
33
When configuring a trunk between two switches, which dynamic trunking mode should be used to always initiate a trunking connection?
dynamic desirable
34
How many bits within the IEEE 802.1Q tag are used to identify the VLAN of the frame?
12
35
A Layer 2 switch examines the source _____________ in each incoming frame to build a table that matches ________________ to each switch port.
MAC address
36
What three problems are solved through the use of Spanning Tree Protocol?
MAC table Instability Multiple frame transmission Broadcast Storm
37
What is a MAC Address?
A media access control address to identify a unique network interface controller card.
38
A Layer 2 VLAN switch allows the network manager to assign each port to a specific ___________.
VLAN
39
When connecting multiple switches with redundant links, which of the following protocols helps to ensure that you will have a loop-free Ethernet network?
STP
40
A ________ consists of all devices in the same broadcast domain.
LAN
41
What Layer of the OSI Model describes communication utilizing MAC address communication?
2
42
What is the name of the process that is defined by IEEE 802.1Q to relay traffic from multiple VLANs?
VLAN tagging
43
For Ethernet, IEEE standard 802.1Q specifies placing a ______________ field after the MAC source address.
VLAN tag
44
What protocol defines wireless LAN?
802.11
45
Which link-layer device takes an active role to forward ethernet frames using incoming MAC address frames?
switch
46
Which term can be used as an equivalent to default router?
default gateway
47
Transmission of an IP datagram between two machines on a single physical network occurs:
locally, between physical hardware addresses and sends the resulting frame directly to the destination.
48
ARP stands for:?
Address Resolution Protocol
49
What type of attack involves the proxy facility to masquerade as some host?
ARP
50
An ARP reply carries: (Check All that Apply)
the IPv4 address and hardware address of the sender the IPv4 address and hardware address of the original requester
51
In practice, ARP is only used to:?
map a 32-bit IPv4 address to a 48-bit ethernet address
52
Which ARP destination address request below is accepted by all computers?
FF:FF:FF:FF:FF:FF
53
What is included in every ARP broadcast?
the sender’s IP-to-hardware address binding
54
What command can be used on most modern PC operating systems to display the contents of the ARP cache from the CLI?
arp -a
55
Pick the true statement below.
ARP Requests to all hosts do not cross Broadcast domains through a router to other routers.
56
What does an ARP Table contain?
the table matches an IP address with the associated MAC address
57
Which protocol does a router use to obtain the MAC address of a PC host located on a directly connected subnet?
ARP
58
IPv6 does not support traditional MTU, rather IPv6 uses a trial-an-error mechanism called:
Path MTU Discovery (PMTUD)
59
Ethernet limits data transfter to how many octets of data?
1500
60
________ is a transport layer protocol that is connectionless and provides no reliability, no windowing, no reordering, and no segmentation.
UDP
61
If a datagram is fragmented, where is the gramented datagram reassembled?
the ultimate destination reassembles fragments (the destination host)
62
What does UDP mean:
User Datagram Protocol
63
________ protocol describes data sent over the network as packets, while ________ protocol desribes data sent over the network as datagrams.
TCP, UDP
64
____________ is based on the idea that a host has a "home" network but may visit other networks from time to time.
mobile IP
65
In IPv6, fragmentation of a datagram is performed by:
the original source
66
A typical IPV6 header contains _____ bytes (no options).
40
67
The IPv6 Fragment header contains a ___________ Identifcation field, similiar to IPV4, but twice as large.
32-bit
68
The ___________ field in the IPV4 header contains a number indicating the type of data found in the payload portino of the datagram.
protocol
69
A typical IPV4 header contains _____ bytes (no options).
20
70
Internet Protocol defines two major protocols. What are the two major protocols:
TCP, UDP
71
A host that might move is called a _____________, and the hosts with which it is communication are called ___________.
mobile node, correspondent nodes
72
A routing or forwarding table contains the following below. (check all that apply)
Interface Next-Hop Mask Destination
73
What do we mean by unreliable when considering IP Service, UDP as an example:
the packet delivery is not guaranteed
74
Internet Protocol is a fundamental Internet Server consisting of a packet delivery system, which consists of UDP, a service is defined as: (Check all that Apply)
Connectionless Packet Delivery Unreliable Best Effort
75
IP Software in each machine along a path from source to destination decrements the TTL or HOP Count. What happens when the field reaches zero?
the datagram is discarded
76
________ provides for retransmission and helps to avoid congestion, whereas ________ does not.
TCP, UDP
77
The values for the IPv6 Next Header field may indicate extensions or header for other protocols. Select all of the IPV6 extension header mechanisms below.
Encapsulating Security Payload (ESP) Mobility (MIPv6) Fragment ICMPv6
78
The ___________ field helps indetify each datagram sent by an IPV4 host.
identification
79
A typical IP header contains the source and destination for: (Check-all-that-Apply)
IPv4, IPv6 Addresses
80
IP supports a number of options that may be selected on a per-datagram basis. Select all of the options below.
Source Routing Timestamp
81
The ___________ field is calculated over the IPV4 header only, not the payload.
header checksum
82
What makes MIPv6 work in a relatively simple way, and with CNs that are not Mobile-IP-aware?
bidirectional tunneling
83
The ___________ field sets an upper limit on the number of routers through which a datagram can pass.
time-to-live
84
Moving a host to a new network requires one of two possible changes: (Click all that Apply)
The host's address must change datagram forwarding must change
85
What portion of the IP protocol specifies how long a datagram will be allowed to remain on the internet (Check all that apply)?
TIME-TO-LIVE (IPv4) HOP LIMIT (IPv6)
86
The process of dividing a datagram is known as ________.
fragmentation
87
DHCP permits a computer to obtain all the information needed to communicate on a given network including: (Check-all-that-Apply)
Default Router Subnet Mask IPv4 Address
88
What protocol can be used to automatically assign IP addresses and other parameters to a host or router?
DHCP
89
Select the major functions fthat NDP Provides (Select-all-that-Apply)
DNS Server Discovery Stateless Autoconfiguration Duplicate Address Detection (DAD) Router Discovery Neighbor Discovery Address Resolution
90
The optimal time for a DHCP lease depends on:
the particular network and the needs of a particular host
91
DHCP protocol is defined as:
Dynamic Host Configuration Protocol
92
A DHCP server leases an address to a client for a ______________period of time.
finite
93
IF the DHCP server sits on another link (lan) as compared to the client, a router can be configured as a _________________ to foward requests across networks.
DHCP relay agent
94
An alternative method of DHCP for Ipv6 is:
stateless address autoconfiguration (SLAAC)
95
IPv6 uses Nieghbor Solicitation and Neighbor Advertisements messages to determine if an IPv6 address is already in use. What process is this called?
Duplicate Address Detection (DAD)
96
SLAAC utilizes which protocol to learn the IPv6 Prefix (netmask).
Neighbor Discovery Protocol
97
IPv6 utilizes Neighbor Discovery Protocol (NDP) operating at the following layers: (Select-all-that-Apply)
layer 2, 3
98
What three types of address assignment does DHCP allow? (Check-all-that-Apply)
dynamic, static, automatic
99
What other method besides DHCP is used; for example connections such as DSL.
PPP over Ethernet (PPPoE)
100
An alternative method of DHCP for Ipv6 is:
Stateless Address autoconfiguration (SLAAC)
101
NDP defines five ICMPv6 message types:
Redirect Neighbor Advertisement Neighbor Solicitation Router Advertisement Router Solicitation
102
What technology is used to translate an internal private ip address to a public IP address on the internet.
Network Address Translation (NAT)
103
To be effective, a firewall that uses datagram (packet) filtering should restrict access to all: (Check-all-that-Apply)
IP sources protocol ports protocols IP desitnations
104
What protocol provides a way for two or more systems to communicate even if they are located behind relatively uncooperative NATS?
Traversal Using Relays around NAT(TURN)
105
A NAT Translation Table stores stores:
Internal IP & Port External IP & Port NAT Port Payload Type
106
ICMP, Internet Control Message Protocol provides status information about IP Packets. When an CIMP error message passed through NAT, the addressses in the ___________________ need to be rewritten by NAT, so that the end client understands the ICMP error message.
offending datagram
107
What is NAT called on a Windows System?
Internet Connection Sharing (ICS)
108
Which generic facility has been develped to help UDP-based application hosted behind a NAT establish connectivity?
Interactive Connectivity Establishment (ICE)
109
What are the two major types of firewalls commonly used:
proxy firewalls packet-filtering firewalls
110
A method that attempts to allow two or more systems, each behind NAT, to communicate directly using pinholes is called:
hole punching
111
One of the primary workhorses for UNSAF and NAT traversal is called:
STUN
112
Although serveral variants of NAT exist, the ________________ form is the most popular because it translates protocol port numbers as well as IP Addresses
Network Address and Port Translation (NAPT)
113
Proxy firewalls are not really Internet routers, but are essentially hosts running one or more _____________ that relay traffic of certain types between one connection/associatin and another application layer.
application-layer gateways (ALGs)
114
Which protocol below is a relatively simple client/server portocol that is able to ascertain the external IP address and port numbers being used on a NAT in most circumstances?
STUN
115
One of the popular systems for building firewalls is included with modern versions of Linux and is called:
iptables
116
Packet-filtering firewalls act as Internet routers and __________ some traffic.
filter (drop)
117
When configuring firewalls on a router, the network administrator configures one or more:
Access Control List (ACL)
118
____________________ technology provides transparent IP-live access to the Internet for a host that has a private, non-routable IP Addres. ex....10.0.0.6
Network Address Translation (NAT)
119
What are the two most common forms of proxy firewalls?
SOCKS firewalls HTTP proxy Firewalls
120
What is NAT called on Linux Systems?
IP masquerading
121
Which protocols does STUN utilize below? Check-all-that-apply
UDP TCP w/TLS TCP
122
When a datagram causes an error, ICMP can only report the error condition back to:
the original source of the datagram
123
What is the mechanism is considered a required part of IP:
Internet Control Message Protocol
124
Which protocol allows routers to send error or control messages back to the source of a datagram that caused a problem?
ICMP
125
NDP operates at Layer 3 by using ICMPv6 meesages. Select the major functions fthat NDP Provides (Select-all-that-Apply)
Router Discovery Stateless Autoconfiguration Neighbor Discovery Duplicate Address Detection (DAD) DNS Server Discovery Address Resoultion
126
Secure Neighbor Discovery uses an entirely different IPv6 address called a:
cryptographically generated address (CGA)
127
Whenever an error prevents a router from forwarding or delivering a datagram, the router sends this type of ICMP message back to the source:?
Destination Unreachable
128
Which IPv6 ICMP protocol and a feature of ND is used to detect when reachability between two systems on the same link has become lost?
Neighbor Unreachability Detection (NUD)
129
Which protocol is a special set of enhancements aimed at providing additional security for IPV6 ICMP ND messages?
Secure Neighbor Discovery (SEND)
130
Because internet routers each use local information when forwarding datagrams, error can develop which can product routing loops. To prevent these loops, each IP datagram contains a hop limit, when this hop limit is reached, the router discards the datagram and send the following ICMP message:
Time Exceeded
131
What protocol below is used in mobile IPv6
FMIP
132
ICMP messages provide commu ncation between:
an ICMP module on one machine and an ICMP module on another
133
What are the three standard fields that ICMP messages begin with? (Check all that Apply)
Code Field Type Field Checksum Field
134
Using the ping command, ICMP utilizes the following message types: (Check all that Apply)
Echo Reply Echo Request
135
Routers are prohibited from fragmenting an IPv6 Datagram. The source sending the datagram must perform a path MTU discovery. Which IPv6 ICMP message is used for this?
Packet Too Big
136
NDP defines five ICMPv6 message types:
Router Advertisement Neighbor Advertisement Redirect Router Solicitation Neighbor Solicitation
137
How many levels of encapsulation are requirement when an ICMP message travels in an IP datagram?
2 layers
138
The ping command utilizes the following protocol?
ICMP
139
When a router detects a host using a nonoptimal first hop, the router send the host the ofllowing ICMP message:
Redirect Message
140
Which IPv6 Multicast Address Space below is for all EIGRP routers
FF02::a
141
Which specific protocols below support Multicast traffic?
MLD IGMP
142
Some hardware technologies support a second form of multi-point delivery called hardware _______.
multicast
143
Which term below refers to a single device trasmitting a message to all other devices on the subnet?
broadcast
144
Which IPv6 Multicast Address Space below is for all all nodes on the local network segment.
FF02::1
145
Which term below refers to a single device trasmitting a message to a specific group of devices on the subnet?
multicast
146
IP multicasting is availabe for both:
IPv6 IPv4
147
Which IPv6 Multicast Address Space below is for all OSPFv3 ALLSPF Routers.
FF05::5
148
A ________________ is a term to dentoe the set of computers that are listening to a particular multicast address.
multicast group
149
Which term below refers to sending a frame from host to host.
unicast
150
Which IPv4 Multicast Address Space below is for all OSPFIGP Routers.
224.0.0.5
151
Which IPv4 Multicast Address Space below is for all systems on this subnet
224.0.0.1
152
Which specific protocols below supports Multicast traffic for IPV6?
MLD
153
IGMP works with multicast and has two phases:
when a host joins a multicast group, the host sends an IGMP message to the groups multicast declaring its membership. local multicast routers periodically poll hosts on the local network to determine whether any hosts still remain members of each group.
154
Which IPv4 Multicast Address Space below is global across the internet.
224.0.1.0 - 238.255.255.255
155
IGMP is considered to be a service that is integrated with the IP Layer and stands for:
Internet Group Managment Protocol
156
Which specific protocols below support Multicast traffic for IPV4?
IGMP
157
Which IPv4 Multicast Address Space below is restricted to one network
224.0.0.1 - 224.0.0.255
158
Which IPv6 Multicast Address Space below is for all EIGRP routers
FF02::a
159
Which IPv6 Multicast Address Space below is for all all nodes on the local network segment.
FF02::1
160
The ARPANET reference model was utilimately adopted and called the:?
TCP/IP Model
161
Which protocol is considered a reliable flow of data between two hosts?
TCP
162
When type of devices forward packets to another network across the internet?
Routers
163
What defines the primary goal to develop an effective technique for multiplexed utilization of existing interconnected networks?
Internet Architecture
164
When utilizing a Uniform Resource Locator (URL) to access www.google.com, an IP Address is needed, because packets are routed to the destination using the IP Address. What service is used to convert a URL to a IP Address?
Domain Name System (DNS)
165
What Internet Protocol is considered a layer 3.5 protocol and is uses to exchange error messages and other vital information ?
Internet Control Message Protocol (ICMP)
166
There are some circumstances where data within a network gets corrupt, damaged, or lost. Dealing with this is called:
Error Control
167
What network standards did the Defense Advanced Research Project Agency (DARPA) provide? Hint: Draws its origins from ARPANET
TCP/IP Internet Protocol Suite
168
What defines "chunks" of digitial information comprsiong some number of bytes carried through the network somewhat independently?
Packet Switching
169
How many bits is an IPV6 Address?
128
170
The Transport layer (TCP) of the TCP/IP Model opens sockets between two hosts (Also called ports), what is a commend port number for HTTP?
80
171
What Internet Protocol is to send multicast addressing and delivery messages to manage which hosts are members of a multcast group. ?
Internet Group Management Protocol (IGMP)
172
How many bits is an IPV4 Address?
32
173
How is every official standard in the Internet community published?
Request For Comments (RFC)
174
What defines the format and order of messages exchanged between two or more communicating entities, as well as the actions taken on the transmission and/or recipt of a message or other event.
protocol
175
THe simjplest method for scheduling the way packets are processed as they move through the network is:
First in First Out (FIFO)
176
What are some of the secondary goals for Internet Architecure? (Select all that Apply)
(all) The reosurces used in the Internet archtecutre must be accountable. The Internet must support multiple types of communication services The internet communcaiton must continue despite loss of networks or gateways The Internet architecture must permit host attachment with a low level of effort. The Internet architecture must permit distributed management of its resources. The Internet archictures must accommodate a variety of networks. The internet architecure must be cost-effective.
177
Porotol Multiplexing is a benefit of a layered architecture allowing multiple protocols to coexist on the same infrastructure. In networks, a protocol data unit, at one layer is carried bya a lower layer. This process is also defined as:
encapsulation
178
What is the most frequently mentioned concept of protocol layering as defined by the International Organization for Standardization (ISO)?
Open Systems Interconnection (OSI) Model
179
Which protocol is provides a simpler service to the application layer, but no guranteed that the datagrams will reach the host?
UDP