+ All Categories
Home > Documents > 55975284-Review-TCP

55975284-Review-TCP

Date post: 22-Oct-2014
Category:
Upload: kurwamacdupa
View: 288 times
Download: 1 times
Share this document with a friend
Popular Tags:
84
1 Marks: 1 The ____ is where ongoing communications between a sender and a receiver, somewhat like a telephone conversation, are set up, maintained, and then terminated, or torn down,as needed. Choose one answer. a. Session layer b. Physical layer c. Network layer d. Presentation layer Correct Marks for this submission: 1/1. Question 2 Marks: 1 Many analyzers have configurable ____ that indicate unusual network events or errors. Choose one answer. a. ports b. alarms c. sockets d. sessions Correct Marks for this submission: 1/1. Question 3
Transcript

1

Marks: 1

The ____ is where ongoing communications between a sender and a receiver, somewhat like a telephone conversation, are set up, maintained, and then terminated, or torn down,as needed.

Choose one answer.

a. Session layer

b. Physical layer

c. Network layer

d. Presentation

layer Correct

Marks for this submission: 1/1.

Question 2

Marks: 1

Many analyzers have configurable ____ that indicate unusual network events or errors.

Choose one answer.

a. ports

b. alarms

c. sockets

d. sessions

Correct

Marks for this submission: 1/1.

Question 3

Marks: 1

A(n) ____ is holding area for packets copied off the network.

Choose one answer.

a. trace

buffer

b. payload

c. packet

d. layer Correct

Marks for this submission: 1/1.

Question 4

Marks: 1

TCP/IP application processes are sometimes called ____ and are identified by port numbers.

Choose one answer.

a. well-known

protocols

b. hosts

c. network services

d. display filters Correct

Marks for this submission: 1/1.

Question 5

Marks: 1

It is the job of the ____ to enable reliable transmission of data through the Physical layer at the sending end, and to check such reliability upon reception at the receiving end.

Choose one answer.

a. Data link

layer b. Physical layer

c. Network layer

d. Transport

layer Correct

Marks for this submission: 1/1.

Question 6

Marks: 1

The ____ manages the way data is presented to the network (on its way down the protocol stack), and to a specific machine/application combination (on its way up the protocol stack).

Choose one answer.

a. Session layer

b. Physical layer

c. Network layer

d. Presentation

layer Correct

Marks for this submission: 1/1.

Question 7

Marks: 1

The ____ is where notions of network location are addressed and where the intricacies involved in directing a PDU from sender to receiver are handled.

Choose one answer.

a. Data link layer

b. Application

layer c. Network layer

d. Transport layer

Correct

Marks for this submission: 1/1.

Question 8

Marks: 1

The TCP/IP Application layer also is known as the ____ layer because this is where the protocol stack interfaces with applications or processes on a host machine.

Choose one answer.

a. Session

b. Network

c. Process

d. Transport

Correct

Marks for this submission: 1/1.

Question 9

Marks: 1

Combining the various sources of outgoing data into a single output data stream is called ____.

Choose one answer.

a. segmentation

b. demultiplexing

c. protocol

analysis

d. multiplexing Correct

Marks for this submission: 1/1.

Question 10

Marks: 1

____ assign a series of numbers to represent a sizable collection of TCP/IP-based network services, such as file transfer (FTP), terminal emulation (Telnet), and e-mail.

Choose one answer.

a. Well-known

protocols

b. Daemons

c. Data frames

d. Datagrams Correct

Marks for this submission: 1/1.

Question 11

Marks: 1

The ____ includes the physical transmission medium (cables or wireless media) that any network must use to send and receive the signals that constitute the physical expression of networked communications.

Choose one answer.

a. Data link

layer b. Physical layer

c. Network layer

d. Transport

layer Correct

Marks for this submission: 1/1.

Question 12

Marks: 1

The ____ is the parent organization for all the various Internet boards and task forces.

Choose one answer.

a. ICANN

b. Internet Engineering Task

Force c. Internet Architecture Board

d. Internet Society Correct

Marks for this submission: 1/1.

Question 13

Marks: 1

Remote Monitoring (RMON) uses the ____ to collect traffic data at a remote switch and send the data to a management device.

Choose one answer.

a. Simple Network Management

Protocol

b. User Datagram Protocol

c. Virtual Private Network

d. Wide Area Information Service Correct

Marks for this submission: 1/1.

Question 14

Marks: 1

Many PDUs include a characteristic closing component called ____ that provides data integrity checks for the data portion of the PDU, known as the payload.

Choose one answer.

a. well-known

protocol

b. trailer

c. network service

d. host Correct

Marks for this submission: 1/1.

Question 15

Marks: 1

The term ____ refers to a single logical network composed of multiple physical networks, which may all be at a single physical location, or spread among multiple physical locations.

Choose one answer.

a. internetwork

b. session

c. connection-

oriented

d. checksum Correct

Marks for this submission: 1/1.

Question 16

Marks: 1

The ____ is the group responsible for drafting, testing, proposing, and maintaining official Internet Standards, in the form of RFCs, through the agencies of multiple working groups under its purview.

Choose one answer.

a. ICANN

b. Internet Engineering Task

Force c. Internet Architecture Board

d. Internet Society Correct

Marks for this submission: 1/1.

Question 17

Marks: 1

____ are applied to the packets that are captured into the trace buffer.

Choose one answer.

a. Ports

b. Runts

c. Filters

d. Decodes

Correct

Marks for this submission: 1/1.

Question 18

Marks: 1

The ____ is responsible for the more forward-looking activities of the ISOC, and handles research and development work for topics too far-out or impractical for immediate implementation, but which may (or may not) have a role to play on the Internet some day.

Choose one answer.

a. ICANN

b. Internet Engineering Task

Force c. Internet Research Task

Force

d. Internet Society Correct

Marks for this submission: 1/1.

Question 19

Marks: 1

The ____ is ultimately responsible for managing all Internet domain names, network addresses, and protocol parameters and behaviors.

Choose one answer.

a. ICANN

b. Internet Engineering Task

Force c. Internet Research Task

Force

d. Internet Society Correct

Marks for this submission: 1/1.

Question 20

Marks: 1

The ____ defines an interface that applications can use to request network services, rather than referring directly to applications themselves.

Choose one answer.

a. Application layer

b. Physical layer

c. Session layer

d. Presentation

layer Correct

OSPF and ____are two examples of routing protocols that support multiple types of services.Choose one answer.

a. Border Gateway

Protocol

b. T-carrier

c. TOS

d. IPCONFIG

CorrectMarks for this submission: 1/1.

Question 2 Marks: 1 ____ specifies how IP traffic should be encapsulated in 802.2 LLC frames that include the Sub-Network Access Protocol (SNAP) portion.Choose one answer.

a. RFC 144

b. RFC 1032

c. RFC 1035

d. RFC 1042

CorrectMarks for this submission: 1/1.

Question 3 Marks: 1 ARP is used only to find the hardware address of local IP hosts.Answer:

True False CorrectMarks for this submission: 1/1.

Question 4 Marks: 1 All IP packets have a pre-defined lifetime indicated in each packet’s ____ field.Choose one answer.

a. Time To Live

b. Frame Check

Sequence

c. Protocol Identifier

d. Flag

CorrectMarks for this submission: 1/1.

Question 5 Marks: 1 ____ is a method that allows an IP host to use a simplifiedsubnetting.Choose one answer.

a. Proxy ARP

b. Link Control

c. IPCP

d. IPCONFIG

CorrectMarks for this submission: 1/1.

Question 6 Marks: 1 ____ is a protocol used by many Internet service providers (including telecommunications companies and cable TV operators) to authenticate and manage broadband subscribers.Choose one answer.

a. X.25

b. ATM

c. PPPoE

d. Frame relay

CorrectMarks for this submission: 1/1.

Question 7 Marks: 1 ____ is considered a premium service connection, offering a service that appears as a “virtual lease line” between end points.

Choose one answer.

a. Expedited Forwarding

b. High Drop Precedence

c. Medium Drop

Precedence d. Low Drop Precedence

IncorrectMarks for this submission: 0/1.

Question 8 Marks: 1 A ____ is required to get the packet from one IP host to another IP host on a single network.Choose one answer.

a. frame

b. hardware address

c. delimiter

d. data link

IncorrectMarks for this submission: 0/1.

Question 9 Marks: 1 ____ is a general-purpose protocol that overcomes SLIP’s deficiencies and provides WAN data link encapsulation services similar to those available for LAN encapsulations.Choose one answer.

a. Border Gateway

Protocol b. Point-to-Point Protocol

c. Link Control Protocol

d. Token ring

CorrectMarks for this submission: 1/1.

Question 10 Marks: 1 The ____ field provides error detection on the contents of the IP header only.Choose one answer.

a. Protocol

b. Time To Live

c. Fragment Offset

d. IP Header

Checksum CorrectMarks for this submission: 1/1.

Question 11 Marks: 1 Routers use ____ to select a routing path when there are multiple paths available.Choose one answer.

a. tokens

b. precedence

c. Type of Service

d. repeaters

CorrectMarks for this submission: 1/1.

Question 12 Marks: 1 IP fragmentation enables a larger packet (for example, a token ring 4,096-byte packet) to be automatically fragmented by a ____ into smaller packets to cross a link that supports a smaller MTU, such as an Ethernet link.Choose one answer.

a. token

b. router

c. repeater

d. cable modem

CorrectMarks for this submission: 1/1.

Question 13 Marks: 1 When any particular switched technologies, such as X.25, frame relay, or ATM, are used to link together PPP peers, additional control and addressing information must be included in PPP headers to manage the connection.Answer:

True False IncorrectMarks for this submission: 0/1.

Question 14 Marks: 1 The default TTL in Windows 2000, Windows 2003, and Windows XP is ____.Choose one answer.

a. 64

b. 72

c. 112

d. 128

CorrectMarks for this submission: 1/1.

Question 15 Marks: 1 When a packet is fragmented, all fragments are given different TTL values.Answer:

True False

CorrectMarks for this submission: 1/1.

Question 16 Marks: 1 On a network that is low on available bandwidth, the ____ processcauses more traffic on the wire.Choose one answer.

a. data encapsulation

b. error-detection

c. circuit switching

d. fragmentation

retransmission CorrectMarks for this submission: 1/1.

Question 17 Marks: 1 ____ is a standard set of protocols defined in the 1970s by the International Telecommunications Union (ITU), and it is designed to send datagrams across a public packet-switched data network using noisy, narrow bandwidth, copper telephone lines.Choose one answer.

a. X.25

b. Frame relay

c. ATM

d. PPPoE

IncorrectMarks for this submission: 0/1.

Question 18 Marks: 1 Border Gateway Protocol is the original point-to-point protocol for encapsulating TCP/IP traffic over a WAN link and is still used for connecting to some ISPs today (mostly for access to older UNIX hosts).Answer:

True False CorrectMarks for this submission: 1/1.

Question 19 Marks: 1 If a packet with TTL=1 arrives at a router, the router must discard the packet because it cannot decrement the TTL to 0 and forward the packet.Answer:

True False CorrectMarks for this submission: 1/1.

Question 20 Marks: 1 ____ assumes that digital-quality transmission lines are available for creating WAN links.Choose one answer.

a. X.25

b. ATM

c. PPPoE

d. Frame relay

CorrectMarks for this submission: 1/1.

Question 21 Marks: 1 ____ defines a method for differentiating services for network traffic using the six high-order bits of the byte that was formerly the three-bit Precedence field and the first bit of the TOS field.Choose one answer.

a. RFC 1044

b. RFC 2034

c. RFC 2474

d. RFC 2700

CorrectMarks for this submission: 1/1.

Question 22 Marks: 1 A router uses ____ to determine what packet to send when several packets are queued for transmission from a single-output interface.Choose one answer.

a. proxy ARP

b. precedence

c. preamble

d. frames

CorrectMarks for this submission: 1/1.

Question 23 Marks: 1 ____ was designed to provide devices with a method for notifying each other that a link is experiencing congestion before the routers start to drop packets.Choose one answer.

a. ARP cache

b. Explicit Congestion

Notification

c. Circuit switching

d. Fragmentation

IncorrectMarks for this submission: 0/1.

Question 24 Marks: 1 ____ is used to obtain an IP address for an associated data link address.Choose one answer.

a. Proxy ARP

b. IEEE

c. Network Control

d. RARP

CorrectMarks for this submission: 1/1.

Question 25 Marks: 1 The primary function of ____ layer protocols is to move datagrams through an internetwork connected by routers.Choose one answer.

a. Data link

b. Application

c. Network

d. Transport

CorrectMarks for this submission: 1/1.

Question 26 Marks: 1 The recommended starting TTL value is ____.Choose one answer.

a. 64

b. 72

c. 112

d. 128

CorrectMarks for this submission: 1/1.

Using ICMP ____ and some manipulation of the TTL value in the IP header, TRACEROUTE results provide a list of routers along a path, as well as the round-trip latency time to each router.Choose one answer.

a. Echo Requests

b. paths

c. metrics

d. query messages

CorrectMarks for this submission: 1/1.

Question 2 Marks: 1 ____ defines a method for discovering a Path MTU (PMTU) using ICMP.Choose one answer.

a. RFC 1191

b. RFC 1241

c. RFC 1542

d. RFC 1577

CorrectMarks for this submission: 1/1.

Question 3 Marks: 1 Routers send ICMP Redirect messages to hosts to indicate that a preferable route exists.Answer:

True False CorrectMarks for this submission: 1/1.

Question 4 Marks: 1

The value 0 in the IP header Protocol field denotes that an ICMP header follows the IP header.Answer:

True False CorrectMarks for this submission: 1/1.

Question 5 Marks: 1 If configured to do so, routers periodically send unsolicitedICMP Router Advertisements to the all-hosts multicast address ____.Choose one answer.

a. 224.0.0.1

b. 255.255.0.0

c. 224.255.0.1

d. 255.224.0.1

CorrectMarks for this submission: 1/1.

Question 6 Marks: 1 A host or router can send the ____ error message to indicate that the protocol defined in the IP header cannot be processed.Choose one answer.

a. Code 2: Protocol Unreachable

b. Code 3:Port Unreachable

c. Code 4: Fragmentation Needed and Don’t Fragment

Was Set

d. Code 5: Source Route Failed

CorrectMarks for this submission: 1/1.

Question 7

Marks: 1 The ____ utility uses route tracingto identify a pathfrom the sender to the target host.Choose one answer.

a. gateway

b. TRACEROUTE

c. firewalking

d. auto-recovery

CorrectMarks for this submission: 1/1.

Question 8 Marks: 1 For any network node to communicate and exchange data with another network node, some way of forwarding packets from the sender to receiver must exist. This concept is called ____.Choose one answer.

a. response time

b. route tracing

c. reachability

d. network congestion

CorrectMarks for this submission: 1/1.

Question 9 Marks: 1 ____ enables a source to learn the currently supported MTU across an entire path, without requiring fragmentation.Choose one answer.

a. Firewalking

b. TRACEROUTE

c. PATHPING

d. PMTU Discovery

CorrectMarks for this submission: 1/1.

Question 10 Marks: 1 With router advertising, the default Lifetime value for route entries is 10 minutes.Answer:

True False CorrectMarks for this submission: 1/1.

Question 11 Marks: 1 ____ typically learn about routes through manual configuration of the default gateway parameter and redirection messages.Choose one answer.

a. Packets

b. Firewalls

c. Ports

d. IP hosts

CorrectMarks for this submission: 1/1.

Question 12 Marks: 1 The ____ utility is a command-line utility that uses ICMP Echo packets to test router and link latency, as well as packet loss.Choose one answer.

a. NTP

b. PATHPING

c. Path MTU

d. TRACEROUTE

CorrectMarks for this submission: 1/1.

Question 13 Marks: 1 A(n) ____ process is one method of obtaining a list of the active hosts on a network.Choose one answer.

a. ICMP query

b. query

c. IP address scanning

d. firewalking

IncorrectMarks for this submission: 0/1.

Question 14 Marks: 1 ICMP packets contain only three required fields after the IP header: Type, Code, and Checksum.Answer:

True False CorrectMarks for this submission: 1/1.

Question 15 Marks: 1 The message type ____ permits a gateway (router) on a nonoptimal route between sender and receiver to redirect traffic to a more optimal path.Choose one answer.

a. ICMP Echo/Echo Reply

b. ICMP Source Quench

c. ICMP Redirect

d. ICMP Destination

Unreachable CorrectMarks for this submission: 1/1.

Question 16 Marks: 1 There are two versions of the ____ ICMP reply - the standard version that simply states the packet had the Don’t Fragment bit set when it reached a router that needed to fragment it, and the PMTU version that includes information about the restricting link.Choose one answer.

a. Code 2: Protocol Unreachable

b. Code 3:Port Unreachable

c. Code 4: Fragmentation Needed and Don’t Fragment

Was Set

d. Code 5: Source Route Failed

CorrectMarks for this submission: 1/1.

Question 17 Marks: 1 The message type ____ documents when routing or delivery errors prevent IP datagrams from reaching their destinations.Choose one answer.

a. ICMP Echo/Echo Reply

b. ICMP Source Quench

c. ICMP Time Exceeded

d. ICMP Destination

Unreachable CorrectMarks for this submission: 1/1.

Question 18 Marks: 1 ICMP Type ____ is used for Echo Request packets.Choose one answer.

a. 2

b. 4

c. 6

d. 8

CorrectMarks for this submission: 1/1.

Question 19 Marks: 1 Hackers can use ____ as part of a reconnaissance processto learn about active network addresses and active processes.Choose one answer.

a. availability

b. ICMP

c. auto recovery

d. presence

CorrectMarks for this submission: 1/1.

Question 20 Marks: 1 Routers can use ICMP to provide a default gateway setting to a host (if the host requests assistance).Answer:

True False CorrectMarks for this submission: 1/1.

Question 21 Marks: 1 The message type ____ supports functionality for reachability utilities like PING and TRACERT; essential when installing, configuring, and troubleshooting IP networks.Choose one answer.

a. ICMP Echo/Echo Reply

b. ICMP Source Quench

c. ICMP Time Exceeded

d. ICMP Destination

Unreachable CorrectMarks for this submission: 1/1.

Question 22 Marks: 1 A router or host may use ____ as a way to indicate that it is becoming congested or overloaded.Choose one answer.

a. Checksum

b. Source Quench

c. GMT

d. PMTU

CorrectMarks for this submission: 1/1.

Question 23 Marks: 1 Although RFC ____ dictates that IP routers“must support the router part of the ICMP Router Discovery protocol on all connected networks on which the router supports either IP multicast or IP broadcast addressing,” many do not.Choose one answer.

a. 1812

b. 1900

c. 1955

d. 1972

CorrectMarks for this submission: 1/1.

Question 24 Marks: 1 The ICMP packet field____ provides error detection for the ICMP header only.Choose one answer.

a. Checksum

b. Type

c. Host

d. Code

CorrectMarks for this submission: 1/1.

Question 25 Marks: 1 ____ messages serve to keep hosts apprised of networking conditions and problems, and equipped to use best paths around the network.Choose one answer.

a. NTP

b. Path MTU

c. ICMP

d. GMT

CorrectMarks for this submission: 1/1.

Question 26 Marks: 1 A router sends the ____ ICMP reply to indicate that the router cannot use the strict or loose source routing path specified in the original packet.Choose one answer.

a. Code 2: Protocol Unreachable

b. Code 3:Port Unreachable

c. Code 4: Fragmentation Needed and Don’t Fragment

Was Set

d. Code 5: Source Route Failed

CorrectMarks for this submission: 1/1.

____ is a simple protocol that is used by applications that contain their own connection-oriented timeout values and retry counters, similar to those provided by TCP.Choose one answer.

a. UDP

b. DoS

c. RTO

d. MSS

IncorrectMarks for this submission: 0/1.

Question 2 Marks: 1 ____ is detected whenever three or more duplicate ACK packets (known as a triple-ACK) or timeout events occur, and timeout events are considered more serious than duplicate acknowledgements.Choose one answer.

a. Logical connection

b. Congestion

c. Retransmission

d. Windowing

IncorrectMarks for this submission: 0/1.

Question 3 Marks: 1 Overloading a receiver occurs when the number of data bytes is greater than the ____.Choose one answer.

a. advertised window

b. bandwidth

c. sliding window

d. ephemeral port

CorrectMarks for this submission: 1/1.

Question 4 Marks: 1 The ____ field value defines the destination application or process that uses the IP and UDP headers.Choose one answer.

a. Checksum

b. Dynamic Port Number

c. Length

d. Destination Port

Number CorrectMarks for this submission: 1/1.

Question 5 Marks: 1 TCP supports ____ - the process of sending numerous data packets in sequence without waiting for an intervening acknowledgment.Choose one answer.

a. retries

b. sequence number

tracking

c. windowing

d. error recovery

CorrectMarks for this submission: 1/1.

Question 6 Marks: 1 The Fast Recovery process dictates that when a host receives three duplicate ACKs, it must immediately start retransmitting the ____, without waiting for the retransmission timer to expire.Choose one answer.

a. duplicate ACKs

b. core services

c. byte streams

d. lost segments

CorrectMarks for this submission: 1/1.

Question 7 Marks: 1 TCP keep-alives are enabled by default on Windows 2000, Windows Server 2003, and Windows XP, although any application may disable TCP keep-alives, if desired by its programmer.Answer:

True False CorrectMarks for this submission: 1/1.

Question 8 Marks: 1 By default, Windows 2000 and Windows XP support up to ____ ports.Choose one answer.

a. 200

b. 500

c. 2000

d. 5000

CorrectMarks for this submission: 1/1.

Question 9 Marks: 1 UDP offers connection-oriented services with sequencing, error recovery, and a sliding window mechanism.Answer:

True False CorrectMarks for this submission: 1/1.

Question 10 Marks: 1 TCP hosts create a virtual connection with each other using a ____.Choose one answer.

a. sliding window

b. handshake process

c. teardown sequence

d. retry mechanism

CorrectMarks for this submission: 1/1.

Question 11 Marks: 1 The initial sequence number used in a TCP connection is defined by the ____ and, for security purposes, should be randomly assigned.Choose one answer.

a. host

b. packet

c. port

d. segment

CorrectMarks for this submission: 1/1.

Question 12 Marks: 1 UDP runs up to ____ percent faster than TCP, under some conditions, because it does next to nothing!Choose one answer.

a. 20

b. 30

c. 40

d. 50

CorrectMarks for this submission: 1/1.

Question 13 Marks: 1 ____ is the overloading of the network or a receiver.Choose one answer.

a. Sequence number

tracking

b. Buffering

c. Congestion

d. Windowing

CorrectMarks for this submission: 1/1.

Question 14

Marks: 1 The ____ field defines the length of the packet from the UDP header to the end of valid data(not including any data link padding, if padding is required).Choose one answer.

a. Checksum

b. Dynamic Port Number

c. Length

d. Destination Port

Number CorrectMarks for this submission: 1/1.

Question 15 Marks: 1 The TCP connection termination process requires ____ packets.Choose one answer.

a. 1

b. 2

c. 3

d. 4

CorrectMarks for this submission: 1/1.

Question 16 Marks: 1 ____ provide the simplest kind of transport services because they simply package messages, taken as is from the TCP/IP Application layer, into datagrams.Choose one answer.

a. Core services

b. Port numbers

c. Logical connections

d. Connectionless protocols

CorrectMarks for this submission: 1/1.

Question 17 Marks: 1 TCP half-open connections occur when the handshake process does not end successfully with a final ACK.Answer:

True False CorrectMarks for this submission: 1/1.

Question 18 Marks: 1 ____ is caused when enough data is sent to a TCP host to fill its receiver buffer, thereby putting the receiver in a zero-window state.Choose one answer.

a. DoS

b. Silly Window Syndrome

c. Time Wait delay

d. Retransmission timeout

CorrectMarks for this submission: 1/1.

Question 19 Marks: 1 The ____ process guarantees that packets are ordered properly and protects against missing segments.Choose one answer.

a. watchdog

b. keep-alive

c. handshake

d. sequence and

acknowledgement IncorrectMarks for this submission: 0/1.

Question 20 Marks: 1 TCP supports a ____ mechanism, which is a management method for data transmission used to determine the amount of unacknowledged data that can go out on the wire from any sender.Choose one answer.

a. congestion

b. retry

c. sliding window

d. watchdog

CorrectMarks for this submission: 1/1.

Question 21 Marks: 1 The ____ flag is used to indicate that the host completed a transaction.Choose one answer.

a. Reset

b. FIN

c. SYN

d. URG

CorrectMarks for this submission: 1/1.

Question 22 Marks: 1

UDP is the only connectionless TCP/IP protocol at the Transport layer.Answer:

True False CorrectMarks for this submission: 1/1.

Question 23 Marks: 1 When an out-of-order data segment is received, the Fast Retransmit process requires the receiver to immediately send ____.Choose one answer.

a. duplicate ACKs

b. core services

c. byte streams

d. lost segments

CorrectMarks for this submission: 1/1.

Question 24 Marks: 1 When the Protocol field of an IP header contains the value 17 (0x11), the UDP header follows the IP header.Answer:

True False CorrectMarks for this submission: 1/1.

Question 25 Marks: 1 Dynamic ports are used as ____ for specific communications while they are underway.Choose one answer.

a. temporary ports

b. core services

c. byte streams

d. lost segments

CorrectMarks for this submission: 1/1.

Question 26 Marks: 1 Once the TCP connection is established, a ____ can maintain the connection when there is no data sent across the wire.Choose one answer.

a. watchdog process

b. core service

c. keep-alive process

d. handshake process

CorrectMarks for this submission: 1/1.

The ____ receives partially-authenticated connections from the dispatch server, and repeats some of the protocol negotiation that occurs during that initial client-dispatch server phase.Choose one answer.

a. dispatch server

b. principal

c. notification server

d. switchboard server

CorrectMarks for this submission: 1/1.

Question 2

Marks: 1 The ____ arbitrates connections between recipient principals, acting something like a proxy to bridge such conversations.Choose one answer.

a. dispatch server

b. principal

c. notification server

d. switchboard server

IncorrectMarks for this submission: 0/1.

Question 3 Marks: 1 ____ is the necessary name-to-numbers correlation similar to the coupling between hostnames and IP addresses.Choose one answer.

a. Hypermedia

b. Address translation

c. Presence

d. Replication

CorrectMarks for this submission: 1/1.

Question 4 Marks: 1 TCP port 7 is assigned to the UDP Echo process.Answer:

True False IncorrectMarks for this submission: 0/1.

Question 5 Marks: 1

____ is a TCP or UDP service that echoes all characters received on the port to which it listens back to the sender.Choose one answer.

a. Echo

b. Quote of the Day

c. Whois

d. Character

Generation IncorrectMarks for this submission: 0/1.

Question 6 Marks: 1 A ____ is defined as the end-point in the conversation, which can be a client interface in executable or Web script form,or a programmed automaton called a bot (short for robot).Choose one answer.

a. dispatch server

b. principal

c. notification server

d. switchboard server

IncorrectMarks for this submission: 0/1.

Question 7 Marks: 1 FTP is an Application layer protocol that relies on ____.Choose one answer.

a. FTP

b. UDP

c. HTTP

d. Chargen

IncorrectMarks for this submission: 0/1.

Question 8 Marks: 1 HTTP methods are commands that the HTTP client issues to the HTTP server.Answer:

True False IncorrectMarks for this submission: 0/1.

Question 9 Marks: 1 ____ is a standard for initiating, modifying, or terminating interactive users sessions that involve one or more multimedia elements that can include video, voice, instant messaging, videoconferencing, or even online games.Choose one answer.

a. MCU

b. SMTP

c. VoIP

d. SIP

IncorrectMarks for this submission: 0/1.

Question 10 Marks: 1 A(n) ____ is typically a hardware-implemented audio chip either integrated into the endpoint device, whether it’s a standalone handheld unit or a full-fledged server, or an external peripheral device, such as the variety of inline VoIP adapters for standard handsets.Choose one answer.

a. digital-to-analog

converter

b. alias

c. analog-to-digital converter

d. SNMP trap

IncorrectMarks for this submission: 0/1.

Question 11 Marks: 6 Match each item with a statement below.

Server-specific information is replicated from one server to another.

Server-to-server traff ic

Offers a method for transferring files over a connection-oriented transport, or TCP.

FTP

Each side of a Telnet communication.NVT

Parameters or conventions used for the Telnet connection. Replication

The most widely used protocol for sending electronic mail (e-mail) on the Internet.

SMTP

Sends status replies that include a numeric reply code. Options

Partially correctMarks for this submission: 1/6.

Question 12 Marks: 1 A(n) ____ is a designation by which an endpoint is identified, and may be an e-mail ID in the format of [email protected], or a simple numeric value.Choose one answer.

a. digital-to-analog

converter

b. alias

c. analog-to-digital converter

d. SNMP trap

CorrectMarks for this submission: 1/1.

Question 13

Marks: 1 ____ defines a programming mechanism originally developed at Sun Microsystems for programmers to develop distributed applications easily (a procedure within a process on one computer that communicates or invokes another procedure running within a different process on the same computer, or on some other computer on the network).Choose one answer.

a. SSL

b. Remote Procedure

Call

c. Replication

d. QOD

IncorrectMarks for this submission: 0/1.

Question 14 Marks: 1 The ____ service outputs a continuing sequence of characters in response to a client request to this service.Choose one answer.

a. Echo

b. Quote of the Day

c. Whois

d. Character Generator

IncorrectMarks for this submission: 0/1.

Question 15 Marks: 1 The FTP command ____ asks the server to listen on a non-default data port and wait for the client to establish a new connection on the port number.Choose one answer.

a. TYPE code

b. RETR

pathname/filename

c. PASV

d. STOR

pathname/filenameIncorrectMarks for this submission: 0/1.

Question 16 Marks: 1 FTP relies on UDP to establish the underlying connection, track the order of packets, define and adjust the data transfer window according to the rules of congestion control and avoidance, and recover from data loss.Answer:

True False IncorrectMarks for this submission: 0/1.

Question 17 Marks: 1 The ____ User Information Protocol provides a mechanism for obtaining information about TCP/IP hosts or users.Choose one answer.

a. Trivial File Transfer

Protocol

b. VoIP

c. SMTP

d. Finger

IncorrectMarks for this submission: 0/1.

Question 18 Marks: 1 The ____ handles the protocol version and identification process for MSN messaging clients and represents the first server contact for all initial client connections.Choose one answer.

a. dispatch server

b. principal

c. notification server

d. switchboard server

IncorrectMarks for this submission: 0/1.

Question 19 Marks: 1 ____ was designed as a simple peer-to-peer protocol for lightweight file transfer between two IP hosts.Choose one answer.

a. Trivial File Transfer

Protocol

b. VoIP

c. SMTP

d. Finger

IncorrectMarks for this submission: 0/1.

Question 20 Marks: 1 ____ is the process of moving the data across the data connection only.Choose one answer.

a. Data Transfer

Process

b. FTP

c. Notification

d. Load balancing

IncorrectMarks for this submission: 0/1.

Question 21

Marks: 1 A ____ is a combination of a Uniform Resource Locator (URL) and a Uniform Resource Name (URN).Choose one answer.

a. NS

b. URI

c. Stelnet

d. SSL

CorrectMarks for this submission: 1/1.

Question 22 Marks: 1 ____ is a suite of protocols that describes the properties and procedures for routing voice conversations across the Internet using general-purpose packet-switching technology.Choose one answer.

a. VoIP

b. NetBIOS

c. RPC

d. SMTP

CorrectMarks for this submission: 1/1.

Question 23 Marks: 1 ____ is a service that simply sends a short message in reply to any request packet.Choose one answer.

a. Echo

b. Quote of the Day

c. Whois

d. Character

Generation IncorrectMarks for this submission: 0/1.

Question 24 Marks: 1 ____ is a proprietary protocol specification that provides an asynchronous communications framework for establishing Internet presence and real-time instant messaging.Choose one answer.

a. MCU

b. RPC

c. SNMP

d. MSN Messenger

CorrectMarks for this submission: 1/1.

Question 25 Marks: 1 By default, HTTP communications use port ____.Choose one answer.

a. 20

b. 60

c. 80

d. 101

CorrectMarks for this submission: 1/1.

By ____ DNS data from one or more database segments on one or more DNS servers, DNS also provides a mechanism whereby it can attempt to satisfy name resolution requests locally before attempting them remotely, thereby greatly improving the speed of such name resolution.

Choose one answer.

a. transferring

b. caching

c. resolving

d. spoofing

CorrectMarks for this submission: 1/1.

Question 2 Marks: 1 A(n) ____ record stores IP address-to-domain name translation data and supports the operation known as a reverse DNS lookup.Choose one answer.

a. well-known services

b. text

c. pointer

d. host information

CorrectMarks for this submission: 1/1.

Question 3 Marks: 1 Files that map addresses to domain names for reverse lookups are usually called ____.Choose one answer.

a. addr.in-

addr.arpa.dns

b. domain.dns

c. tree.dn

d. clearlake.dns

Correct

Marks for this submission: 1/1.

Question 4 Marks: 1 The records in the ____file are provided to support reverse DNS lookups.Choose one answer.

a. arpa.addr

b. db.addr

c. cname.addr

d. dns.addr

CorrectMarks for this submission: 1/1.

Question 5 Marks: 1 Domains (such as ibm.com) can be broken into subdomains(such as clearlake.ibm.com), as needed.Answer:

True False CorrectMarks for this submission: 1/1.

Question 6 Marks: 1 Most DNS resolvers issue what is called a(n) ____from the client side.Choose one answer.

a. recursive query

b. address query

c. NSLOOKUP

d. name query

IncorrectMarks for this submission: 0/1.

Question 7

Marks: 1 When a TCP/IP client uses a resolver to send a name query to a DNS server, that client obtains the address for the DNS server it queries from its TCP/IP configuration data.Answer:

True False CorrectMarks for this submission: 1/1.

Question 8 Marks: 1 A ____ record is used to create aliases.Choose one answer.

a. canonical name

b. mail exchange

c. name server

d. pointer

CorrectMarks for this submission: 1/1.

Question 9 Marks: 1 DNS servers cache name and address pairs for addresses they resolved, and they keep information about name requests that result in error messages. This kind of information is called ____.Choose one answer.

a. DNS round robin

b. name resolution

c. negative caching

d. IP spoofing

CorrectMarks for this submission: 1/1.

Question 10 Marks: 1 Not all the data in a DNS cache has an expiration value.Answer:

True False CorrectMarks for this submission: 1/1.

Question 11 Marks: 1 A(n) ____ record lists the IP-based services, such as Telnet, FTP, HTTP, and so forth, that an Internet host can supply.Choose one answer.

a. well-known services

b. text

c. name server

d. host information

CorrectMarks for this submission: 1/1.

Question 12 Marks: 1 Data associated with domain names, address records, and other specific data of interest to the Domain Name System is stored on a DNS server in special database records called ____.Choose one answer.

a. hosts

b. resource records

c. zones

d. primary master

CorrectMarks for this submission: 1/1.

Question 13 Marks: 1 By default, ____ queries the default name server specified in the current machine’s TCP/IP configuration.Choose one answer.

a. NSLOOKUP

b. mail exchange

c. multi-homed

d. IP

CorrectMarks for this submission: 1/1.

Question 14 Marks: 1 Twenty-six root name servers (named A.ROOT-SERVERS.NET., B.ROOT-SERVERS.NET., etc.) act as the top of the DNS hierarchy worldwide. They provide the ultimate source for all name lookups that cannot be resolved through other means.Answer:

True False CorrectMarks for this submission: 1/1.

Question 15 Marks: 1 ____ requests always go to the name server that is authoritative for the domain that contains the requested name or address to make completely sure data is obtained directly from the source.Choose one answer.

a. Root server

b. Client server

c. Mail server

d. Cache server

CorrectMarks for this submission: 1/1.

Question 16 Marks: 1 The ____ command provides access to all kinds of DNS information, either from the current default server, or from a server whose name or IP address you provide as an argument to this command.Choose one answer.

a. NSLOOKUP

b. mail exchange

c. multi-homed

d. IP

CorrectMarks for this submission: 1/1.

Question 17 Marks: 1 The piece of software that accesses DNS name servers on behalf of the network client is called a(n) ____.Choose one answer.

a. name resolver

b. subdomain

c. primary master

d. caching server

CorrectMarks for this submission: 1/1.

Question 18 Marks: 1 Configuring how a DNS server responds to requests for name-to-address resolution where one domain name corresponds to multiple IP addresses sits at the heart of a technique called ____.

Choose one answer.

a. IP spoofing

b. name resolution

c. FQDN

d. DNS round robin

CorrectMarks for this submission: 1/1.

Question 19 Marks: 1 When one DNS server receives a recursive request, that DNS server issues what are called ____ to the name servers in its hierarchy, or to servers provided as pointers in reply to earlier iterative requests, until an answer is receivedChoose one answer.

a. recursive queries

b. address queries

c. domain queries

d. iterative queries

IncorrectMarks for this submission: 0/1.

Question 20 Marks: 1 A(n) ____ record may be used to add arbitrary text information to a DNS database, usually for documentation.Choose one answer.

a. well-known services

b. text

c. pointer

d. host information

CorrectMarks for this submission: 1/1.

Question 21 Marks: 1 The structure of the DNS database mirrors the structure of the domain namespace itself.Answer:

True False CorrectMarks for this submission: 1/1.

Question 22 Marks: 1 ____ store recently accessed DNS records from other domains to avoid incurring the performance overhead involved in making a remote query each time a resource outside the local domain is accessed.Choose one answer.

a. Name resolvers

b. Primary DNS

servers

c. Subdomains

d. Caching servers

CorrectMarks for this submission: 1/1.

Question 23 Marks: 1 A ____ record is used to route SMTP-based e-mail on the Internet and identify the IP address for a domain’s master e-mail server.Choose one answer.

a. canonical name

b. mail exchange

c. name server

d. pointer

CorrectMarks for this submission: 1/1.

Question 24 Marks: 1 A(n) ____ is usually some application or service that encounters a domain name for which it needs an IP address.Choose one answer.

a. address request

b. TCP/IP client

c. caching server

d. DNS client

IncorrectMarks for this submission: 0/1.

Question 25 Marks: 1 A ____ is a query that keeps working until an answer of some kind is forthcoming.Choose one answer.

a. domain query

b. reverse query

c. recursive query

d. NSLOOKUP

query CorrectMarks for this submission: 1/1.

Question 26 Marks: 1 It is important to understand that the zone data on a secondary server always originates from a(n) ____ server.

Choose one answer.

a. caching

b. incremental

c. name

d. primary

CorrectMarks for this submission: 1/1.

Marks: 1 ____ is defined as the time that the client begins to broadcast a renewal request for an extended lease time from another DHCP server.Choose one answer.

a. R1

b. T2

c. T1

d. R2

CorrectMarks for this submission: 1/1.

Question 2 Marks: 1 If no DHCP server is present in some broadcast domain, a special piece of software called a(n)____ must be present in that broadcast domain.Choose one answer.

a. broadcast bit

b. address pool

c. DHCP relay agent

d. address scope

CorrectMarks for this submission: 1/1.

Question 3 Marks: 1 The ____ packet includes the IP address that is offered to the client and, sometimes, answers to the requested options in the DHCP Discover packet.Choose one answer.

a. Acknowledgement

b. Offer

c. Request

d. Discover

IncorrectMarks for this submission: 0/1.

Question 4 Marks: 1 ____ use dynamic IP addresses because they initiate the connections to the servers, and the servers simply respond to the clients based on the clients’ IP addresses.Choose one answer.

a. Clients

b. Routers

c. IP gateways

d. Servers

CorrectMarks for this submission: 1/1.

Question 5 Marks: 1 When a DHCP client boots up, it performs a Standard ____ to enable it to communicate on the network.Choose one answer.

a. Address Discovery

b. Client Discovery

c. Router Discovery

d. Packet Discovery

CorrectMarks for this submission: 1/1.

Question 6 Marks: 1 A(n) ____ is used to assign addresses to clients or other machines when fixed IP addresses are not required.Choose one answer.

a. dynamic address

lease b. manual address lease

c. IP gateway

d. discovery broadcast

CorrectMarks for this submission: 1/1.

Question 7 Marks: 1 ____ is defined as the time that the client tries to renew its network address by contacting the DHCP server that sent the original address to the client.Choose one answer.

a. R1

b. T2

c. T1

d. R2

CorrectMarks for this submission: 1/1.

Question 8 Marks: 1 DHCP servers can manage one or more ranges of IP addresses, each of which may be called a(n) ____.Choose one answer.

a. address pool

b. relay agent

c. release

d. local agent

CorrectMarks for this submission: 1/1.

Question 9 Marks: 1 Microsoft Windows 2000 Server and Windows Server 2003 support the creation of a DHCP ____.Choose one answer.

a. VoIP

b. class

c. superscope

d. router

CorrectMarks for this submission: 1/1.

Question 10 Marks: 1 One good way to troubleshoot DHCP is to use a ____.Choose one answer.

a. relay agent

b. router

c. firewall

d. protocol analyzer

CorrectMarks for this submission: 1/1.

Question 11 Marks: 1 The ____ software, or other similar software available for most other modern operating systems, is enabled at a client machine when you select the Obtain an IP address automatically option in the Internet Protocol (TCP/IP) Properties window.Choose one answer.

a. DHCP relay

agent

b. DHCP server

c. DHCP client

d. DHCP router

IncorrectMarks for this submission: 0/1.

Question 12 Marks: 1 The ____ field contains a random number selected by the client and is used to match requests and responses between the client and server.Choose one answer.

a. Your IP Address

b. Hops

c. Flags

d. Transaction ID

Number CorrectMarks for this submission: 1/1.

Question 13 Marks: 1 ____ have static IP addresses because their addresses are key parts of any subnet’s IP configuration.Choose one answer.

a. Clients

b. Relay agents

c. Broadcast bits

d. Routers

IncorrectMarks for this submission: 0/1.

Question 14 Marks: 1 The ____ packet is sent from the server to the client to indicate the completion of the four-packet DHCP Discovery process.Choose one answer.

a. Acknowledgement

b. Offer

c. Request

d. Discover

CorrectMarks for this submission: 1/1.

Question 15 Marks: 1 ____ is a service that provides a way for a client computer that lacks an IP address assignment to request one from any listening DHCP server - without the help of an administrator.Choose one answer.

a. TCP/IP

b. DHCP

c. BOOTP

d. PING

CorrectMarks for this submission: 1/1.

Question 16 Marks: 1 The DHCP ____ process relies heavily on broadcasts, but most routers do not forward broadcasts.Choose one answer.

a. discovery

b. lease

c. request

d. boot up

IncorrectMarks for this submission: 0/1.

Question 17 Marks: 1 The ____ field contains the address being offered by the DHCP server.Choose one answer.

a. Your IP Address

b. Hops

c. Flags

d. Transaction ID

Number CorrectMarks for this submission: 1/1.

Question 18 Marks: 1

The job of the DHCP ____ software is to intercept address requests on a local cable segment and repackage those requests as a unicast to one or more DHCP servers.Choose one answer.

a. relay agent

b. cluster

c. client

d. router

CorrectMarks for this submission: 1/1.

Question 19 Marks: 1 With a(n) ____ the administrator explicitly assigns an IP address manually by associating a client’s hardware address with a specific IP address to be leased to that client.Choose one answer.

a. dynamic address

lease b. manual address lease

c. IP gateway

d. discovery broadcast

CorrectMarks for this submission: 1/1.

Question 20 Marks: 1 The ____ field is set to 0 by the client and may be used by relay agents as they assist a client in obtaining an IP address and/or configuration information.Choose one answer.

a. Hardware

b. Hops

c. Flags

d. Transaction ID

Number CorrectMarks for this submission: 1/1.

Question 21 Marks: 1 DHCP can exclude individual addresses or address ranges from dynamic allocation to client machines.Answer:

True False CorrectMarks for this submission: 1/1.

Question 22 Marks: 1 The DHCP specification, RFC 2131, defines the default value for T1 as: 0.95 * duration_of_leaseAnswer:

True False CorrectMarks for this submission: 1/1.

Question 23 Marks: 1 Clients ordinarily attempt to renew existing releases by default, but you can instruct a DHCP server to deny lease renewals, or even cancel leases, when necessary.Answer:

True False CorrectMarks for this submission: 1/1.

Question 24 Marks: 1 ____ was developed in the 1970s as a way to provide sufficient network access so diskless workstations could access startup information across the network, instead of reading it from a local disk drive.Choose one answer.

a. TCP/IP

b. WINS

c. DHCP

d. BOOTP

CorrectMarks for this submission: 1/1.

A(n) ____ refers to a successful attempt to compromise a system’s security.Choose one answer.

a. discovery

b. exploit

c. break-in

d. gateway

IncorrectMarks for this submission: 0/1.

Question 2 Marks: 1 ____ is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities.Choose one answer.

a. Ingress filtering

b. Data authentication

c. Network sniffing

d. Spoofing

CorrectMarks for this submission: 1/1.

Question 3 Marks: 1

An attempt to snoop inside traffic moving across the Internet to look for unprotected account and password information, or to obtain other sensitive information while it’s in transit is called ____.Choose one answer.

a. brute force attack

b. user impersonation

c. session hijacking

d. packet sniffing

IncorrectMarks for this submission: 0/1.

Question 4 Marks: 1 ____ is the ability to verify that the data received did in fact come from the named source.Choose one answer.

a. Access control

b. Connectionless integrity

c. Data origin authentication

d. Confidentiality

CorrectMarks for this submission: 1/1.

Question 5 Marks: 1 A ____ is a hardened computer specifically designed to resist and oppose illicit or unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks.Choose one answer.

a. firewall

b. bastion host

c. DMZ

d. boundary router

CorrectMarks for this submission: 1/1.

Question 6 Marks: 1 ____ is a type of software that opens the door for a compromised machine to display all kinds of unsolicited and unwanted advertising, often of an unsavory nature.Choose one answer.

a. SA bundle

b. Spyware

c. Adware

d. Cache

CorrectMarks for this submission: 1/1.

Question 7 Marks: 1 A(n) ____ documents a vulnerability (i.e., a weakness), usually in the context of a recipe, or by including software tools used to mount an attack.Choose one answer.

a. router

b. exploit

c. port

d. gateway

CorrectMarks for this submission: 1/1.

Question 8 Marks: 1

Because of TCP/IP’s optimistic security model, basic fundamental protocols offer no built-in security controls.Answer:

True False CorrectMarks for this submission: 1/1.

Question 9 Marks: 1 The purpose of a(n) ____ attack is not to deny service but to masquerade to be an authorized user so as to gain access to a system.Choose one answer.

a. egress filtering

b. session hijacking

c. data authentication

d. network sniffing

CorrectMarks for this submission: 1/1.

Question 10 Marks: 1 A ____ is a weak spot or known place of attack on any common operating system, application, or service.Choose one answer.

a. back door

b. hole

c. discovery

d. hash

CorrectMarks for this submission: 1/1.

Question 11 Marks: 1

A stealthy attackermay cover its tracks by deleting log files, or terminating any active direct connections.Answer:

True False CorrectMarks for this submission: 1/1.

Question 12 Marks: 1 ____ means restricting who may view or use certain resources, including access to bandwidth or a computer, as well as access to information.Choose one answer.

a. Access control

b. Connectionless integrity

c. Data origin authentication

d. Confidentiality

CorrectMarks for this submission: 1/1.

Question 13 Marks: 1 Trying every likely or possible password for an account is called a(n) ____.Choose one answer.

a. brute force attack

b. user impersonation

c. session hijacking

d. packet sniffing

CorrectMarks for this submission: 1/1.

Question 14 Marks: 1

____ are designed to interrupt or completely disrupt operations of a network device or network communications.Choose one answer.

a. Trojan horse attacks

b. Dictionary attacks

c. DoS attacks

d. Worms

CorrectMarks for this submission: 1/1.

Question 15 Marks: 1 A(n) ____ is a kind of virus that eschews most activity except as it relates to self-replication.Choose one answer.

a. Trojan horse

b. dictionary attack

c. DoS

d. worm

CorrectMarks for this submission: 1/1.

Question 16 Marks: 1 A relatively simple software program called a(n) ____ can attempt to communicate with any IP-based system while cycling through all valid TCP and UDP port addresses.Choose one answer.

a. agent

b. Trojan

c. port scanner

d. socket

CorrectMarks for this submission: 1/1.

Question 17 Marks: 1 In a(n) ____ attack, the attacker is able to intercept traffic from both parties and either pass the traffic unaltered to the other end of the communication link, or the attacker can forge replies from either side.Choose one answer.

a. DoS

b. brute force

c. Man-in-the middle

d. IP service

CorrectMarks for this submission: 1/1.

Question 18 Marks: 1 A function that provides ____ checks the integrity of each packet individually.Choose one answer.

a. access control

b. connectionless integrity

c. data origin authentication

d. confidentiality

IncorrectMarks for this submission: 0/1.

Question 19 Marks: 1 Internet Security IP implementations make it possible to encrypt and protect segments at the Transport layer, thereby protecting the contents of all communications across the Internet at the Transport layer.

Answer:

True False CorrectMarks for this submission: 1/1.

Question 20 Marks: 1 Default Lock-Down allows the Windows XP or Windows Server 2003 system to be used as a router and a network address translation (NAT) system.Answer:

True False CorrectMarks for this submission: 1/1.

Question 21 Marks: 1 A ____ is an undocumented and illicit point of entry into an operating system or application added by a system’s programmers to bypass normal security.Choose one answer.

a. back door

b. hole

c. discovery

d. hash

CorrectMarks for this submission: 1/1.

Question 22 Marks: 1 In a(n) ____ attack, a service is inundated with service requests, or malformed service requests cause a server to hang.Choose one answer.

a. DoS

b. brute force

c. man-in-the middle

d. IP service

CorrectMarks for this submission: 1/1.

Question 23 Marks: 1 ____ is unsolicited and unwanted software that takes up stealthy unauthorized and uninvited residence on a computer.Choose one answer.

a. SA bundle

b. Spyware

c. Adware

d. Cache

CorrectMarks for this submission: 1/1.

Question 24 Marks: 1 A ____ is a specially, “hardened” software service, or a software/hardware product, that erects a barrier to inspect and control traffic flow between networks.Choose one answer.

a. firewall

b. bastion host

c. DMZ

d. boundary router

CorrectMarks for this submission: 1/1.

Question 25 Marks: 1 A ____ is an area that’s accessible to both outsiders and insiders, but which establishes a buffer area between what’s completely inside and outside a network boundary.

Choose one answer.

a. firewall

b. bastion host

c. DMZ

d. boundary router

CorrectMarks for this submission: 1/1.

In a RIPv2 packet, the ____ field is used to define the protocol that is using RIP.Choose one answer.

a. Authentication

b. Route Tag

c. Reserved

d. Address Family

IncorrectMarks for this submission: 0/1.

Question 2 Marks: 1 A(n) ____ occurs on a network when ICMP is turned off and a router discards packets without sending any notification about its actions.Choose one answer.

a. black hole

b. agent

c. link state

d. distance vector

Correct

Marks for this submission: 1/1.

Question 3 Marks: 1 As packets travel through an internetwork, routers examine the TTL value to determine whether the packet has enough life remaining to be forwarded.Answer:

True False CorrectMarks for this submission: 1/1.

Question 4 Marks: 1 Routed protocols are Layer 1 protocols that are used to get packets through an internetwork.Answer:

True False CorrectMarks for this submission: 1/1.

Question 5 Marks: 1 ____ use routing protocols to share information about the various networks on an internetwork.Choose one answer.

a. Distance vectors

b. Databases

c. Routers

d. Agents

CorrectMarks for this submission: 1/1.

Question 6 Marks: 1 To connect autonomous systems, routers use ____.Choose one answer.

a. distance vectors

b. exterior gateway

protocols

c. agents

d. host routes

CorrectMarks for this submission: 1/1.

Question 7 Marks: 1 The Border Gateway Protocol is an example of a(n) ____.Choose one answer.

a. distance vector

b. agent

c. exterior gateway protocol

d. host route

CorrectMarks for this submission: 1/1.

Question 8 Marks: 1 Link-state routers meet their neighbor routers through a process called the ____.Choose one answer.

a. Hello process

b. neighborhood process

c. host process

d. inter-domain process

CorrectMarks for this submission: 1/1.

Question 9 Marks: 1

____ is one of the methods devised to speed up the process of convergence and resolve the counting-to-infinity problem, in most cases.Choose one answer.

a. System routing

b. Link state routing

c. On-Demand Routing

d. Split horizon

CorrectMarks for this submission: 1/1.

Question 10 Marks: 1 ____ simply prevents a router from advertising a network on the same interface from which it learned that network.Choose one answer.

a. System routing

b. Link state routing

c. On-Demand Routing

d. Split horizon

CorrectMarks for this submission: 1/1.

Question 11 Marks: 1 In a RIPv2 packet, the ____ field can be used to associate another router with a route entry.Choose one answer.

a. Authentication

b. Route Tag

c. Next Hop

d. Address Family

CorrectMarks for this submission: 1/1.

Question 12 Marks: 1 Mobile IP allows an IP host to travel anywhere there is a Mobile IP ____ (a router configured with the protocol), and still maintain its home IP address.Choose one answer.

a. split horizon

b. agent

c. host

d. distance vector

CorrectMarks for this submission: 1/1.

Question 13 Marks: 1 One of the most difficult challenges in automating the routing process is preventing ____.Choose one answer.

a. routing loops

b. triggered updates

c. slave routers

d. host routes

CorrectMarks for this submission: 1/1.

Question 14 Marks: 1 A(n) ____ is a compilation of information about all the networks that the router can reach.Choose one answer.

a. host

b. routing table

c. black hole

d. agent

IncorrectMarks for this submission: 0/1.

Question 15 Marks: 1 ____ can summarize routing information before sending link-state packets to other networks.Choose one answer.

a. Split horizons

b. Distance vectors

c. Backbone areas

d. Area border routers

CorrectMarks for this submission: 1/1.

Question 16 Marks: 1 Exterior gateway protocols (EGP) are used to exchange routing information between separate autonomous systems.Answer:

True False CorrectMarks for this submission: 1/1.

Question 17 Marks: 1 A ____ routing protocol shares information about how far away all networks are to the destination.Choose one answer.

a. triggered

b. link-state

c. distance vector

d. split horizon

CorrectMarks for this submission: 1/1.

Question 18 Marks: 1 On each local network, OSPF uses the router IDs to establish one ____.Choose one answer.

a. master router

b. slave router

c. database router

d. client router

CorrectMarks for this submission: 1/1.

Question 19 Marks: 1 When a router is configured with ____, it watches for traffic on its LAN that does not match its own IP address.Choose one answer.

a. link-state

b. Local Area Mobility

c. intra-domain routing

d. external route entry

IncorrectMarks for this submission: 0/1.

Question 20

Marks: 1 Each RIP packet can contain information for up to ____ networks.Choose one answer.

a. 10

b. 15

c. 20

d. 25

CorrectMarks for this submission: 1/1.

Question 21 Marks: 1 Extremely large networks can be broken down into regions called ____, which are groups of routers under a single administrative authority.Choose one answer.

a. agents

b. vectors

c. autonomous systems

d. protocols

CorrectMarks for this submission: 1/1.

Question 22 Marks: 1 The RIPv2 IP multicast address is ____.Choose one answer.

a. 224.0.0.9

b. 10.32.0.0

c. 10.3.99.99

d. 220.0.00

CorrectMarks for this submission: 1/1.

Question 23 Marks: 1 In a RIPv2 packet, the ____ field contains a plain text password.Choose one answer.

a. Authentication

b. Route Tag

c. Next Hop

d. Address Family

CorrectMarks for this submission: 1/1.

Question 24 Marks: 1 Exterior gateway routers periodically multicast summaries of their link-state databases on directly connected links.Answer:

True False CorrectMarks for this submission: 1/1.

Question 25 Marks: 1 In a RIPv2 packet, the ____ field can be used to indicate whether the route information that follows is an internal route entryor an external route entry.Choose one answer.

a. Authentication

b. Route Tag

c. Reserved

d. Address Family

CorrectMarks for this submission: 1/1.


Recommended