Chapter 3 - Introduction To TCP/IP Flashcards

1
Q

What layer of the DoD model is equivalent to the Transport layer of the OSI model?

A

Host-to-Host or Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the valid range of a Class A network address?

A

1 through 126

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the 127.0.0.1 address used for?

A

Loopback or diagnostics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you find the network address from the listed IP address?

A

Turn all host bits off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you find the broadcast address from the listed IP address?

A

Turn all host bits on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Class A private IP address space?

A

10.0.0.0 through 10.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Class B private IP address space?

A

172.16.0.0 through 172.31.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Class C private IP address space?

A

192.168.0.0 through 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are all the available characters that you can use in hexidecimal addressing?

A

0through9andA,B,C,D,E,andF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What layer of the DoD model is Internet Protocol (IP)?

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What layer of the DoD model does Telnet operate?

A

Process/Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What layer of the DoD model does FTP operate?

A

Process/Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What layer of the DoD model does SNMP operate?

A

Process/Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What layer of the DoD model does DNS operate?

A

Process/Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What layer of the DoD model does The Address Resolution Protocol operate?

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What layer of the DoD model does DHCP/Bootp operate?

A

Process/Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What layer of the DoD model does The Transmission Control Protocol (TCP) operate?

A

Host-to-host/Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What layer of the DoD model does X window operate?

A

Process/Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What layer of the DoD model does User Datagram Protocol (UDP) operate?

A

Host-to-host/Transport

20
Q

What layer of the DoD model does NFS operate?

A

Process/Application

21
Q

What layer of the DoD model does Internet Control Message Protocol (ICMP) operate?

A

Internet

22
Q

What layer of the DoD model does Reverse Address Resolution Protocol (RARP) operate?

A

Internet

23
Q

What layer of the DoD model does Proxy ARP operate?

A

Internet

24
Q

What layer of the DoD model does TFTP operate?

A

Process/Application

25
Q

What layer of the DoD model does SMTP operate?

A

Process/Application

26
Q

What layer of the DoD model does LPD operate?

A

Process/Application

27
Q
  1. What must happen if a DHCP IP conflict occurs?
    A. Proxy ARP will fix the issue.
    B. The client uses a gratuitous ARP to fix the issue.
    C. The administrator must fix the conflict by hand at the DHCP server.
    D. The DHCP server will reassign new IP addresses to both computers.
A

C. If a DHCP conflict is detected, either by the server sending a ping and getting a response or by a host using a gratuitous ARP (arp’ing for its own IP address and seeing if a host responds), then the server will hold that address and not use it again until it is fixed by an administrator.

28
Q
  1. Which of the following Application layer protocols sets up a secure session that’s similar to Telnet?
    A. FTP B. SSH C. DNS
    D. DHCP
A

B. Secure Shell (SSH) protocol sets up a secure session that’s similar to Telnet over a standard TCP/IP connection and is employed for doing things like logging into systems, running programs on remote systems, and moving files from one system to another.

29
Q
3. Which of the following mechanisms is used by the client to avoid a duplicate IP address during the DHCP process?
A. Ping
B. Traceroute
C. Gratuitous ARP
D. Pathping
A

C. A host uses something called a gratuitous ARP to help avoid a possible duplicate address. The DHCP client sends an ARP broadcast out on the local LAN or VLAN using its newly assigned address to help solve conflicts before they occur.

30
Q
  1. What protocol is used to find the hardware address of a local device?
    A. RARP B. ARP C. IP
    D. ICMP E. BootP
A

B. Address Resolution Protocol (ARP) is used to find the hardware address from a known IP address.

31
Q
  1. Which of the following are layers in the TCP/IP model? (Choose three.) A. Application
    B. Session
    C. Transport
    D. Internet E. Data Link F. Physical
A

A, C, D. The listed answers are from the OSI model and the question asked about the TCP/IP protocol stack (DoD model). Yes, it is normal for the objectives to have this type of question. However, let’s just look for what is wrong. First, the Session layer is not in the TCP/IP model; neither are the Data Link and Physical layers. This leaves us with the Transport layer (Host-to-Host in the DoD model), Internet layer (Network layer in the OSI), and Application layer (Application/Process in the DoD). Remember, the CCENT objectives can list the layers as OSI layers or DoD layers at any time, regardless of what the question is asking.

32
Q
6. Which class of IP address provides a maximum of only 254 host addresses per network ID?
A. Class A 
B. Class B 
C. Class C 
D. Class D 
E. Class E
A

C. A Class C network address has only 8 bits for defining hosts: 28 – 2 = 256.

33
Q
  1. Which of the following describe the DHCP Discover message? (Choose two.) A. It uses ff:ff:ff:ff:ff:ff as a layer 2 broadcast.
    B. It uses UDP as the Transport layer protocol.
    C. It uses TCP as the Transport layer protocol.
    D. It does not use a layer 2 destination address
A

A, B. A client that sends out a DHCP Discover message in order to receive an IP address sends out a broadcast at both layer 2 and layer 3. The layer 2 broadcast is all Fs in hex, or FF:FF:FF:FF:FF:FF. The layer 3 broadcast is 255.255.255.255, which means any networks and all hosts. DHCP is connectionless, which means it uses User Datagram Protocol (UDP) at the Transport layer, also called the Host-to-Host layer.

34
Q
8. Which layer 4 protocol is used for a Telnet connection?
A. IP
B. TCP
C. TCP/IP
D. UDP E. ICMP
A

B. Although Telnet does use TCP and IP (TCP/IP), the question specifically asks about layer 4, and IP works at layer 3. Telnet uses TCP at layer 4.

35
Q
  1. Private IP addressing was specified in RFC __________ .
A

RFC 1918. These addresses can be used on a private network, but they’re not routable through the Internet.

36
Q
  1. Which of the following services use TCP? (Choose three.)
    A. DHCP B. SMTP C. SNMP
    D. FTP E. HTTP
    F. TFTP
A

B,D,E.SMTP,FTP,andHTTPuseTCP.

37
Q
  1. Which Class of IP addresses uses the pattern shown here?
    Network.Network.Network.Host
    A. Class A B. Class B C. Class C D. Class D
A

C. Class C devote 24 bits to the network portion and 8 bots to the host portion

38
Q
  1. Which of the following is an example of a multicast address? A. 10.6.9.1
    B. 192.168.10.6 C. 224.0.0.10
    D. 172.16.9.5
A

C. 224.0.0.10

The range of multicast addresses ranges from 224.0.0.0 and goes through 239.255.255.256

39
Q
  1. If you use either Telnet or FTP, what layer are you using to generate the data?
    A. Application B. Presentation C. Session
    D. Transport
A

A. Both FTP and Telnet use TCP at the Transport layer; however, they both are Application layer protocols, so the Application layer is the best answer for this question.

40
Q
  1. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model?
    A. Application B. Host-to-Host C. Internet
    D. Network Access
A

C. The four layers of the DoD model are Application/Process, Host-to-Host, Internet, and Network Access. The Internet layer is equivalent to the Network layer of the OSI model.

41
Q
  1. Which two of the following are private IP addresses?
    A. 12.0.0.1
    B. 168.172.19.39 C. 172.20.14.36
    D. 172.33.194.30 E. 192.168.24.43
A

C, E. The Class A private address range is 10.0.0.0 through 10.255.255.255. The Class B private address range is 172.16.0.0 through 172.31.255.255, and the Class C private address range is 192.168.0.0 through 192.168.255.255.

42
Q
  1. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? A. Application
    B. Host-to-Host C. Internet
    D. Network Access
A

B. The four layers of the TCP/IP stack (also called the DoD model) are Application/Process, Host-to-Host (also called Transport on the objectives), Internet, and Network Access/Link. The Host-to-Host layer is equivalent to the Transport layer of the OSI model.

43
Q
  1. Which statements are true regarding ICMP packets? (Choose two.)
    A. ICMP guarantees datagram delivery.
    B. ICMP can provide hosts with information about network problems. C. ICMP is encapsulated within IP datagrams.
    D. ICMP is encapsulated within UDP datagrams.
A

B, C. ICMP is used for diagnostics and destination unreachable messages. ICMP is encapsulated within IP datagrams, and because it is used for diagnostics, it will provide hosts with information about network problems.

44
Q
  1. What is the address range of a Class B network address in binary?
    A. 01xxxxxx B. 0xxxxxxx C. 10xxxxxx D. 110xxxxx
A

C. The range of a Class B network address is 128–191. This makes our binary range 10xxxxxx.

45
Q
20. Drag the steps in the DHCP process and place them in the correct order on the right.
DHCPOffer Drop Target A 
DHCPDiscover Drop Target B 
DHCPAck Drop Target C 
DHCPRequest DropTargetD
A
20. Drag the steps in the DHCP process and place them in the correct order on the right.
DHCPOffer Drop Target A 
DHCPDiscover Drop Target B 
DHCPAck Drop Target C 
DHCPRequest DropTargetD