Chapter 4 & 5 Flashcards

1
Q

For any network node to communicate and exchange data with another network node, some way of forwarding packets from the sender to the receiver must exist. This concept is called _______-

A

reachability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ICMP router solicitation packet is sent to the all-routers IP multicast address of _____

A

224.0.0.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hackers can use ICMp as part of a _________ to learn about active network addresses and active processes.

A

reconnaissance process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ICMP type number 0

A

Echo Reply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ICMP type number 3

A

Destination unreachable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ICMP type number 5

A

Redirect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ICMP type number 8

A

Echo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ICMP type number 9

A

Router Advertisement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ICMP type number 10

A

Router Solicitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ICMP type number 11

A

Time exceeded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The checksum field provides error detection for the ________ only.

A

ICMP header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ICMP is a distinct Network layer TCP/IP protocol that has nothing in common with IP. True/False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the name of the concept that indicates that a path exists between two TCP/IP hosts on an internetwork?

A

reachability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following services does ICMp add to basic IP datagram deliver services?
A. improved reliability for datagram delivery
b. reachability analysis support
c. path discovery services
d. delivery error reporting
e. network congestion management
f. network utilization metrics

A

b. reachability analysis
d. delivery error reporting
e. network Congestion managementeporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It’s up to the IP host that receives incoming ICMP messages to act on the content of those messages. True or false?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following RFCs describes ICMP?

a. 792
b. 950
c. 1191
d. 1812

A

a. 792

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ping -l

A

sets the size of the data to send

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ping -f

A

sets the don’t fragment bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

ping -i

A

sets the TTL value of the TTL field in the IP header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The process of PMTU discovery continues until the ____________ is discovered.

A

end-to-end minimum MTU size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ICMP reports errors only about IP datagrams. Errors about error messages are not reported. True of False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following ICMP message types relates to the reachability analysis?

a. Destination Unreachable
b. echo/echo reply
c. redirect
d. Source Quench

A

b. echo/echo reply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following ICMp message types reports delivery errors?

a. Destination Unreachable
b. echo/echo reply
c. redirect
d. Source Quench

A

a. Destination unreachable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following ICMP message types relates to congestion control?

a. Destination Unreachable
b. echo/echo reply
c. redirect
d. Source Quench

A

d. source quench

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following ICMP message types relates to route optimization?

a. Destination Unreachable
b. echo/echo reply
c. redirect
d. Source Quench

A

c. redirect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following Windows command-line utilities performs connectivity or reachability tests?

a. ping
b. tracert
c. traceroute
d. ipconfig

A

a. ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

which of the following Windows command-line utilities performs patch discovery tests?

a. ping
b. tracert
c. traceroute
d. ipconfig

A

b. tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What additional functionality does PATHPING provide?

a. reports on all the visted hosts and routers between a sender and a receiver.
b. resolves all possible IP addresses into symbolic names for visted nodes
c. uses the ICMP TRACEROUTE message type
d. test router and link latency

A

d. tests router and link latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following statements best defines the intent of the PMTU process?

a. determines the largest possible MTU in the path between sender and reciever
b. determines the smallest possible MTU in the path between sender and receiver
c. instructs the sender what MTU to use to avoid further fragmentation en route
d. justifies the inclusion of the Don’t Fragment flag in ICMP messages

A

c. instructs the sender what MTU to use to avoid further fragmentation en route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following statements best describes a black hole router?
a. a router that discard all incoming traffic
b. a router tat does not support PMTU, but is configured to send Destination Unreachable messages
a router that does not support PMTU, and is configured not to send destination unreachable messages
d. a router that does not support PMTU

A

c. a router that does not support PMTU and is configured no to send destination unreachable messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following accurately represents the default advertising rate for unsolicited ICMP Router Advertisements?

a. every 30 seconds
b. every 60 seconds
c. two to five minutes
d. 7 to 10 minutes

A

d. 7 to 10 minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The ICMP redirection process serves only IP routers, not IP hosts. True or False?

A

Fales, it only serves hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What type of scan occurs when a series of PING requests for a range of IP addresses is performed?

a. port scan
b. protocol scan
c. host probe
d. network mapping

A

c. host probe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

which of the following ICMP Type nubmers identify echo and echo reply messages? Choose all that apply

a. 0
b. 1
c. 3
d. 8
e. 30

A

a. 0

d. 8

35
Q

Which of the following ICMP type numbers relate to Router Advertisement and solicitation messages?

a. 8
b. 9
c. 10
d. 11
e. 12

A

b. 9

c. 10

36
Q

Which of the following TCP/IP protocols are Transport layer protocols? (choose all that apply)

a. IP
b. TCP
c. UDP
d. FTP

A

b. TCP

c. UDP

37
Q

Whereas UDP is a _____________ protocol, TCP is a _________ protocol.

A

connectionless, connection-oriented

38
Q

Which of the following services are characteristic of a connection-oriented protocol? (choose all that apply).

a. connection handling
b. delivery guarantees
c. segmentation and reassembly
d. message-level checksum in header

A

a. connection handling
b. delivery guarentees
d. message level checksum in header

(not 100% sure on this answer)

39
Q

A connection-oriented protocol creates more overhead than a connectionless protocol. True or False?

A

true

40
Q

Connectionless protocols usually run slower than connection-oriented protocols. True or false

A

false

41
Q

For connectionless protocols, the application layer protocol or service must provide messages that do no exceed a datagram’s MTU. True of false?

A

true

42
Q

Which of the following services does UDP provide? (choose all that apply)

a. segmentation
b. optional header checksum
c. identification of source and destination port addressees
d. explicit transmission of acknowledgment
e. reassembly

A

b. optional header checksum

c. id of source and destination port addresses

43
Q

how many bytes are in a UDP header?

A

a. 8

44
Q

What range of addresses traditionally defines a well-known port address?

A

0-1023

45
Q

What range of addresses corresponds to the registered port numbers?

A

1024-49151

46
Q

What range of addresses corresponds to the dynamic port numbers?

A

49152-65535

47
Q

Identical UDP and TCP port numbers always map to the same TCP/IP protocol or service. True or False?

A

false, usually but not always

48
Q

An acknowlegement is tantamount to a positive response, indicating that a set of data arrived at it’s destination. True or false

A

True

49
Q

What does TCP use to track the transfer of data and it’s successful delivery? (choose all that apply)

a. logical connection between peers
b. acknowledgements
c. sequence numbers
d. retry mechanism

A

b. acknowledgements

c. sequence numbers

50
Q

what makes TCP preferable for reliable delivery requirements?

a. sequencing
b. error recovery
c. end to end reliability
d. use of the handshake process

A

c. end to end reliability

51
Q

The name of the TCP process used to maintain an active connection between peers is called _________

a. TCP startup connection
b. TCP connection termination
c. Keep-alive
d. congestion control

A

c. keep-alive

52
Q

How many steps occur in the TCP hanshake process?

A

Three

53
Q

Which of the following statements best defines a half-open connection?

a. The handshake process does not end with a final SYN.
b. The handshake process does not end with a final ACK.
c. The handshake process does not end with a final FIN.
d. The handshake process does not end with a final RST

A

b. the handshake process does not end with a final ACK

54
Q

TCP keep-alives are enabled by default on Windows 2000 and XP. True or False

A

false

55
Q

What is the proper response to a TCP connection termination?

a. Host 1 sends a TCP packet with no data, with FIN and ACK flags set.
b. Host 2 sends a TCP packets with no data, with FIN and ACK flags set.
c. Host 2 sends an ACK to respond, followed by a TCP packet with no data and FIN and ACK flags set.
d. Host 1 returns an ACK response.

A

d. Host 1 returns an ACK response.

56
Q

TCP acknowledgments include sequence numbers to indicate what was received. True of false?

A

False

57
Q

Which of the following mechanisms is part of TCP’s error-detection and error-recovery capabilities?

a. Sequencing and reassembly
b. retransmission timer
c. explicit acknowledgment
d. Congestion control

A

b. retransmission timer

the value is the RTO (retransmission timeout)

58
Q

The current TCP window size is always the greater of what the network and the receiver can handle at any given moment. True or false

A

true

59
Q

Where is TCP data stored when it is received?

a. on the receiver’s network interface card
b. inside the TCP window
c. in the TCP buffer area
d. inside the network window

A

c. in the TCP buffer area

60
Q

What is the initial size of the TCP congestion window?

a. twice the maximum receiver buffer size
b. twice the MTU size
c. twice the sender’s MSS
d. twice the receiver’s MSS

A

c. twice the sender’s MSS

61
Q

What sequence of events signals the TCP Fast recovery process?

a. duplicate ACKs
b. Three sets of duplicate ACKS
c. duplicate FINs
d. three duplicate FINs

A

b. Three sets of duplicate ACKS

62
Q

Which of the statements define the edges of the TCP sliding window mechanism? (choose both correct answers)

a. acknowledged data plus the receiver’s window size
b. all data that was received
c. all data pending transmission
d. all data that was acknowleged

A

a. acknowledged data plus the receiver’s window size
b. all data that was received

not sure on this one…

63
Q

Which of the following values are valid TCP Flag settings? (choose all that apply)

a. SYN
b. ACK
c. NUL
d. FIN
e. PSH

A

a. SYN
b. ACK
d. FIN
e. PSH (push

64
Q

Protocol 17

A

UDP

65
Q

Protocol 06

A

TCP

66
Q

UDP port 53

A

DNS

67
Q

UDP port 161

A

SNMP

68
Q

UDP port 69

A

TFTP

69
Q

UDP port 520

A

RIP

70
Q

UDP port 67 + 68

A

DHCP

71
Q

TCP port 53

A

DNS

72
Q

TCP port 21

A

FTP

73
Q

TCP port 23

A

Telnet

74
Q

TCP port 80

A

HTTP

75
Q

TCP port 110

A

POP3

76
Q

TYPE 0800

A

IPv4

77
Q

________is the overloading of the network or a receiver.

A

congestion

78
Q

_________is a management method for data transmission used to determine the amount of unacknowledged data that can go out on the wire from any sender

A

sliding window mechanism

79
Q

TCP header size

A

at least 20 bytes

80
Q

TCP header fields

A
Source port 
Destination port
sequence number
acknowledgment number
header length
flags
Window size
TCP checksum
Urgent point
TCP options
81
Q

TCP flags field settings

A
URG
ACK
PSH
reset
SYN
FIN
82
Q

ICMP fields

A

Type
Code
Checksum

83
Q

______means to point out another path.

A

redirect

84
Q

The route a packet can take through the network.

A

path