Chapter 4: Network Protocols and Routing Flashcards

1
Q

By default, what is the MTU size on a typical Ethernet network?

1500 bytes
1492 bytes
1518 bytes
1522 bytes

A

1500 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to?

flow label
group ID
traffic exchange
traffic class

A

flow label

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate?

a) The hosts will generate new MAC addresses until the conflict is resolved.

b) The hosts that share the same MAC addresses will be completely unable to communicate with any other devices.

c) The network switch will eventually crash due to being unable to properly forward traffic.

d) The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

A

d) The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols?

distance vector protocols

link-state protocols

interior gateway protocols

border gateway protocols

A

link-state protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What IPv6 field is similar to the TTL field in IPv4 packets?

distance vector

hop limit

flow label

next header

A

hop limit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet?

Internet header length (IHL)

Time to Live (TTL)

Padding

Differentiated Services (DiffServ)

A

Differentiated Services (DiffServ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?

Sequencing and checksums

Framing

Connection-oriented Protocol

Flow Control

A

Framing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of the checksum TCP field?

a) It allows the receiving node to determine whether the TCP segment became corrupted during transmission.

b) It identifies the data segment’s position in the stream of data segments being sent.

c) It specifies special options, such as the maximum segment size a network can handle.

d) It confirms receipt of data via a return message to the sender.

A

a) It allows the receiving node to determine whether the TCP segment became corrupted during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What routing metric affects a path’s potential performance due to delay?

MTU

latency

load

theoretical bandwidth

A

latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What tcpdump command can be used to filter out all traffic except SSH traffic?

tcpdump -f +ssh

tcpdump port 22

tcpdump only ssh

tcpdump -p 22

A

tcpdump port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable?

15
8
32
20

A

15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is not a task handled by a router?

a) A router can interpret Layer 3 and often Layer 4 addressing.

b) A router forwards broadcasts over the network.

c) A router can connect dissimilar networks.

d) A router can reroute traffic if the path of first choice is down but a second path is available.

A

b) A router forwards broadcasts over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which statement does NOT accurately describe characteristics of the OSPF protocol?

OSPF requires very little CPU or memory resources.

OSPF provides low network overhead.

OSPF maintains a database of other routers’ links.

OSPF has no hop limits on a transmission path.

A

OSPF requires very little CPU or memory resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com?

traceroute -o ICMP srv1.mycompany.com

traceroute -w srv1.mycompany.com

traceroute -I srv1.mycompany.com

traceroute -i srv1.mycompany.com

A

traceroute -I srv1.mycompany.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ou have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?

The MTU for the network can be as high as 9198 bytes.

The network is not based on the Ethernet standard.

The MTU for the network is set at 65,535 bytes.

Fragmented frames will be consolidated into whole frames before being sent.

A

The MTU for the network can be as high as 9198 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which statement regarding the Border Gateway Protocol (BGP) is accurate?

BGP is limited to a single autonomous system.

BGP is exclusively a distance-vector protocol.

BGP is a more advanced version of OSPF.

BGP utilizes TCP for communicating updates.

A

BGP utilizes TCP for communicating updates.

17
Q

What statement regarding the differences between the Windows tracert utility and the Linux/UNIX/macOS traceroute utility is accurate?

Only tracert can send UDP messages for tracing a path.

By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages.

The Windows tracert utility does not place limits on the TTL of repeated trial messages.

The tracert utility expects an ICMP port unreachable error message as the final reply to a trace

A

By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages.

18
Q

What is routing protocol convergence time defined as?

It is the time it takes for the protocol to recognize the best path in the event of a network change.

It is the amount of time involved in configuration of the routing protocol.

It is the amount of time it takes after initial configuration of the protocol for all routes to become known.

It is the time it takes for the protocol to recognize that a change has occurred.

A

It is the amount of time it takes after initial configuration of the protocol for all routes to become known.

19
Q

What occurs when a collision happens on a network?

The collision goes undetected, and data transmission continues.

Each node on the network waits a random amount of time and then resends the transmission.

The collision will create an error in the network switch, but otherwise, no issues will occur as a result.

Each node on the network stops transmitting, until manually told to reconnect and transmit.

A

Each node on the network waits a random amount of time and then resends the transmission.

20
Q

What command will list only current connections, including IP addresses and port numbers?

portstat

show ip stats

netstat -n

netstat -s

A

netstat -n