Chapter 5 ( 2) Flashcards

1
Q

What is the purpose of address resolution in network communication?

A) Encrypting data packets for secure transmission
B) Translating physical MAC addresses to IP addresses
C) Converting domain names to IP addresses
D) Translating addresses from one type to another for message transmission

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An example of an application layer address is www.indiana.edu

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of address is associated with the Data Link Layer in network communication?

A) IP address
B) MAC address
C) Domain name
D) URL

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The data link layer address is generally encoded in a network card by the card’s
manufacturer

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Translating an application layer address to a network layer address and finally to a data link layer address is called address resolution

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A client computer is typically assigned a data link layer address by a:

a.) hardware manufacturer
b.) software manufacturer
c.) middleware manufacturer
d.) network manager who configures a file in a computer’s network layer software package
e.) ISO

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of address is associated with the Network Layer in network communication?

A) MAC address
B) IP address
C) Domain name
D) URL

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How are IP addresses typically assigned?

A) Automatically by network hardware manufacturers
B) Manually by network administrators or through software like DHCP
C) Based on geographic location
D) By domain name registrars

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do computers on the same network typically differ in terms of IP addresses?

A) They all have the same IP address
B) They have IP addresses assigned randomly
C) They have IP addresses assigned sequentially
D) They each have a unique IP address within a certain range

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What distinguishes the IP addresses of servers from those of clients?

A) Servers have dynamic IP addresses, while clients have static IP addresses
B) Servers have temporary IP addresses, while clients have permanent IP addresses
C) Servers have permanent IP addresses, while clients usually do not
D) Servers have public IP addresses, while clients have private IP addresses

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Part of the function of address resolution is translating the application layer address of
the destination into a network layer address

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who typically assigns Application Layer addresses?

A) Internet Service Providers (ISPs)
B) Network managers
C) Domain Name System (DNS) servers
D) Web developers

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where are Application Layer addresses placed?

A) In web browsers
B) In server logs
C) In configuration files
D) In email headers

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How many application layer addresses can a server computer have?

A) Only one
B) Two
C) Several
D) None

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the relationship between “www.kelley.indiana.edu” and “www.kelley.iu.edu”?

A) They are unrelated websites
B) They point to different servers
C) They are aliases for the same server
D) They are subdomains of each other

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who generally does not need an Application Layer address?

A) Servers
B) Network managers
C) Clients
D) Domain registrars

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which protocol is commonly used to translate domain names into IP addresses?

A) HTTP
B) DNS
C) TCP
D) SMTP

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the significance of the “.edu” domain in “www.kelley.indiana.edu”?

A) It specifies the type of server
B) It indicates the country of origin
C) It identifies the educational institution
D) It denotes the server’s location

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An application layer address using TCP/IPv4 looks like:
a. 128.192.78.5
b. www.cba.uga.edu
c. user@cba.uga.edu
d. 00-0F-00-81-14-00
e. Building 4, Room 2, User 3

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A client computer is assigned a data link layer address is by:
a. hardware manufacturers
b. software manufacturers
c. middleware manufacturers
d. network managers who configure a file in a computer’s network layer software
package
e. ISO

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ICANN:
a. developed the IPX/SPX network layer protocol
b. assigns data link layer addresses
c. approves which network layer addresses (usually, approved or assigned in groups or
classes) can be used by an organization for its computers that will connect to the
Internet
d. developed X.25 network layer protocol
e. refers to Interchange Computer Addressing Networks and Nodes

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Who manages Internet addresses, including both IP addresses and domain names?
a) ISP (Internet Service Provider)
b) ICANN (Internet Corporation for Assigned Names and Numbers)
c) IEEE (Institute of Electrical and Electronics Engineers)
d) NSA (National Security Agency)

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which organization directly manages some top-level domains like .com, .org, and .net?
a) DNS (Domain Name System)
b) IETF (Internet Engineering Task Force)
c) ICANN (Internet Corporation for Assigned Names and Numbers)
d) IEEE (Institute of Electrical and Electronics Engineers)

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Who authorizes private companies to become domain name registrars for certain domains?
a) Internet Protocol Society
b) ISOC (Internet Society)
c) ICANN (Internet Corporation for Assigned Names and Numbers)
d) IANA (Internet Assigned Numbers Authority)

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which organization sets rules for creating new domain names?
a) IEEE (Institute of Electrical and Electronics Engineers)
b) IANA (Internet Assigned Numbers Authority)
c) ICANN (Internet Corporation for Assigned Names and Numbers)
d) DNS (Domain Name System)

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

IP addresses are often assigned to organizations in:
a) Sequential order
b) Random order
c) Alphabetical order
d) Groups with numerically similar addresses

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the organization responsible for approving network layer addresses for organizations connecting to the Internet?
a) IEEE (Institute of Electrical and Electronics Engineers)
b) IETF (Internet Engineering Task Force)
c) ICANN (Internet Corporation for Assigned Names and Numbers)
d) IANA (Internet Assigned Numbers Authority)

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In IPv4 addressing, what do the first “n” bits of an IP address represent?
a) The host portion
b) The specific network
c) The subnet mask
d) The broadcast address

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the term used to refer to the remaining (32 - n) bits of an IPv4 address?
a) Host mask
b) Network mask
c) Host portion
d) Network portion

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In slash notation (e.g., a.b.c.d/n), what does “n” represent?
a) The number of host bits
b) The number of network bits
c) The total number of bits in the address
d) The number of octets in the address

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the range of IP addresses within a subnet represented by the notation 192.168.1.0/24?
a) 256 addresses
b) 128 addresses
c) 512 addresses
d) 64 addresse

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which notation indicates the number of bits used for the network portion in an IP address?
a) Dot notation
b) Slash notation
c) Binary notation
d) Octet notation

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

How many possible IP addresses can be allocated within the subnet 10.0.0.0/28?
a) 256 addresses
b) 128 addresses
c) 16 addresses
d) 32 addresses

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

IPv4 uses ________ bytes per Internet address.
a. 4
b. 32
c. 8
d. 24
e. 16

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

IPv4 addresses offer unlimited opportunity for expansion and growth on the Internet.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The network layer address for IP is ten bytes long when using IPv4

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What defines a subnet?
a) A subdivision of a larger network
b) A group of computers with identical IP addresses
c) A logical grouping of computers with the same prefix
d) All of the above

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A(n) ________ refers to a group of computers that are logically grouped together by IP
number.
a. IPv6 group
b. subnet
c. data link group
d. TCP group
e. application net

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A subnet mask of ___________ means that all computers with only the same first two bytes
in their IPv4 addresses are on the same subnet.
a. 11111111.0.0.0
b. 255.255.255.0
c. 255.0.0.0
d. 255.255.0.0
e. 255.255.255.255

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the significance of an IP address with all 0s in the host portion within a subnet?
a) It represents the network address
b) It represents the broadcast address
c) It denotes the default gateway
d) It identifies a reserved IP address

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following IP addresses is an example of a network address within a subnet?
a) 128.192.56.0
b) 128.192.56.1
c) 128.192.56.254
d) 128.192.56.255

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which term describes an IP address with all 1s in the host portion within a subnet?
a) Default address
b) Broadcast address
c) Reserved address
d) Gateway address

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What role does the broadcast address play within a subnet?
a) It identifies the first host on the subnet
b) It denotes the last available host on the subnet
c) It allows communication with all devices on the subnet
d) It serves as the default gateway for the subnet

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the purpose of the network address within a subnet?
a) To identify the specific host on the network
b) To communicate with all devices on the subnet
c) To denote the boundary of the subnet
d) To uniquely identify the subnet within a larger network

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

In a subnet with a subnet mask of 255.255.255.0, how many possible host addresses are available?
a) 254
b) 256
c) 255
d) 128

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the primary function of routers in a network with multiple subnets?
a) Routing data packets between computers within the same subnet
b) Connecting subnets and enabling communication between them
c) Assigning IP addresses to devices within a subnet
d) Filtering incoming traffic to enhance network security

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Subnet masks tell computers what part of an IP address is to be used to determine whether a
destination is in the same subnet or in a different subnet

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is the primary purpose of subnet masks in networking?
a) To encrypt data transmitted over the network
b) To identify the physical location of network devices
c) To separate the network and host portions of an IP address
d) To assign unique IP addresses to each network device

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which part of an IP address does a subnet mask primarily specify?
a) The network portion
b) The host portion
c) The subnet portion
d) The gateway portion

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What part of an IP address can be designated as a subnet using a subnet mask?
a) Only the first byte
b) Only the last byte
c) Any portion of the address
d) Only the first 3 bytes

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which of the following best describes the function of a subnet mask?
a) It assigns unique IP addresses to each device on the network.
b) It specifies the range of IP addresses that belong to the same subnet.
c) It determines the physical location of network devices.
d) It encrypts data transmitted over the network for security purposes.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

The most common standard for dynamic addressing for TCP/IP networks is Dynamic Host
Control Protocol.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Dynamic addressing:
a. assigns a permanent network layer address to a client computer in a network
b. makes network management more complicated in dial-up networks
c. has only one standard, bootp
d. is always performed for servers only
e. can solve many updating headaches for network managers who have large, growing,
changing networks

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which scenario best describes dynamic addressing?
a) Assigning permanent IP addresses to devices
b) Assigning IP addresses to devices only when they are logged in to the network
c) Assigning IP addresses based on physical location
d) Assigning IP addresses manually by network administrators

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

How does dynamic addressing handle IP address assignments when a device is moved to a new location?
a) It assigns the same IP address regardless of location.
b) It assigns a new IP address automatically based on the new network location.
c) It requires manual reconfiguration of IP addresses.
d) It maintains a static IP address for each device.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which statement accurately describes the efficiency of dynamic addressing in IP address space usage?
a) Dynamic addressing leads to wastage of IP addresses.
b) Dynamic addressing ensures efficient utilization of available IP addresses.
c) Dynamic addressing requires a large pool of IP addresses.
d) Dynamic addressing limits the number of devices connected to the network.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which protocol is commonly used for dynamic addressing in TCP/IP networks?
a) SMTP
b) DNS
c) DHCP
d) FTP

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which aspect of dynamic addressing allows for efficient use of IP address resources?
a) Manual IP address assignment
b) Static IP address allocation
c) Automatic IP address assignment upon login
d) Real-time monitoring of network traffic

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is the first step in the DHCP process when a computer connects to a network?
a) The DHCP server sends an IP address to the client.
b) The client sends a DHCP request message to the server.
c) The client broadcasts a DHCP message to any available server.
d) The server assigns a subnet mask to the client.

A

C. When a computer turns on and connects to the network, it sends a client broadcast DHCP message to any DHCP server available, requesting an address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

How does a DHCP server respond to a client’s DHCP request message?
a) By assigning a subnet mask to the client
b) By broadcasting an IP address to all clients on the network
c) By sending a message containing an IP address to the requesting client
d) By requesting authentication from the client

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

When does a DHCP client automatically obtain a new IP address?
a) When the DHCP server is restarted
b) When the client’s network adapter is replaced
c) When the lease duration expires
d) When the client’s operating system is updated

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

How do ISPs manage a larger number of users than available network layer addresses using DHCP?
a) By assigning static IP addresses to each user
b) By implementing subnetting techniques
c) By leasing IP addresses to users for a specified time period
d) By limiting the number of simultaneous connections

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Domain Name Servers provide the equivalent of directory assistance for application layer
addresses

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Server name resolution is done using the:
a. Address Resolution Protocol
b. Border Gateway Protocol
c. Internet Control Message Protocol
d. Routing Information Protocol
e. Domain Name Service

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is the primary function of Server Name Resolution?
a) Translating an IP address to a domain name
b) Translating a data link layer address to a network layer address
c) Translating a domain name to an IP address
d) Translating a network layer address to an application layer address

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

How is a destination host’s domain name translated into its corresponding IP address?
a) Through DHCP server assignment
b) Through MAC address allocation
c) Through DNS server resolution
d) Through subnetting configuration

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What technology is commonly used for Server Name Resolution?
a) FTP
b) DHCP
c) DNS
d) SNMP

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

How do DNS servers exchange information about address changes?
a) Through ARP broadcasts
b) Through HTTP requests
c) Through DHCP responses
d) Through replication

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is the purpose of DNS replication?
a) To translate IP addresses to domain names
b) To distribute domain names to clients
c) To synchronize address information across DNS servers
d) To secure network communication

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Server name resolution is done using the:
a. Address Resolution Protocol
b. Border Gateway Protocol
c. Internet Control Message Protocol
d. Routing Information Protocol
e. Domain Name Service

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is the primary function of DNS (Domain Name Service)?
a) Assigning domain names to websites
b) Determining the IP address for a given URL
c) Encrypting data transmitted over the internet
d) Creating directories of website content

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What are the computers responsible for providing DNS known as?
a) Web servers
b) Name servers
c) Domain servers
d) IP servers

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What do databases maintained by DNS servers contain?
a) Lists of website visitors
b) Directories of domain names and their corresponding IP addresses
c) Email addresses of website administrators
d) Records of website transactions

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

How do large organizations typically manage DNS?
a) They rely on name servers provided by their ISPs.
b) They use public DNS servers available on the internet.
c) They maintain their own name servers.
d) They delegate DNS management to domain registrars.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What do smaller organizations often do for DNS management?
a) They maintain their own name servers.
b) They rely on name servers provided by their ISPs.
c) They use public DNS servers exclusively.
d) They outsource DNS management to third-party companies.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What information must be provided to a domain registrar when registering a domain name?
a) The website’s content directory
b) The IP address of the web server
c) The IP address of the DNS server
d) The organization’s financial information

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Which of the following is an example of a domain name?
a) 192.168.1.1
b) www.example.com
c) 256.128.64.32
d) http://example.com

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

If a user wants to visit the website www.indiana.edu, what role does DNS play?
a) It translates the domain name into an IP address.
b) It encrypts the data transmitted to and from the website.
c) It verifies the authenticity of the website’s SSL certificate.
d) It blocks access to unauthorized users.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is the significance of providing the DNS server’s IP address to the registrar?
a) It allows the registrar to manage the website’s content.
b) It enables the registrar to route internet traffic to the correct server.
c) It ensures the registrar can send email notifications to the website owner.
d) It helps the registrar validate the website’s SSL certificate.

A

B

80
Q

When a computer wants to visit a website but doesn’t know its IP address, what does it do first?
a) Checks its own address table
b) Sends a DNS request packet to the website
c) Contacts the ISP directly
d) Sends an email to the website owner

A

A

81
Q

What does the DNS server do when it receives a DNS request packet?
a) Ignores the request
b) Searches for the IP address in its own directory
c) Sends a response packet back to the client
d) Asks the client to resend the request

A

B

82
Q

What does the resolving name server do after finding the IP address of the requested URL?
a) Ignores the request
b) Sends a DNS request packet to the client
c) Sends a DNS response packet back to the client
d) Asks the client to resend the request

A

C

83
Q

When the resolving name server cannot find the URL in its own directory, where does it send the DNS request packet next?
a) To the website owner’s server
b) To a DNS “root server”
c) To a random DNS server on the internet
d) To the client’s computer

A

B

84
Q

What is the next step if the DNS root server does not have the requested URL?
a) The resolving name server sends a request to a ( Top Level Domain) TLD server.
b) The resolving name server ignores the request.
c) The resolving name server sends the request to the client.
d) The resolving name server shuts down.

A

A

85
Q

What does the resolving name server do if the TLD server also does not have the requested URL?
a) It sends a request to the client’s computer.
b) It shuts down.
c) It sends a request to the DNS root server.
d) It sends a request to the authoritative name server for the domain.

A

D

86
Q

What is the DNS root server responsible for?
a) Managing all DNS requests on the internet
b) Maintaining a directory of IP addresses for all websites
c) Providing the IP addresses of TLD servers
d) Resolving domain names to IP addresses for all websites

A

C

87
Q

When TCP/IP translates an application layer address into an IP address, it sends a special
__________ to the nearest DNS server.
a. broadcast message
b. DNS request packet
c. SNA packet
d. IPX message
e. X.25 packet

A

B

88
Q

An Address Resolution Protocol message is broadcast to all computers in a subnet to find the
data link layer address

A

T

89
Q

When TCP/IP translates a network layer address into a data link layer address, it sends a
special ____________ to all computers in the subnet.
a. physical layer packet
b. multicast message
c. X.25 message
d. broadcast message
e. application layer packet

A

D

90
Q

_________ is a specially formatted request used to perform IP address to data link address
resolution.
a. Address Resolution Protocol
b. Domain Service Request
c. HTTP request
d. Link state request
e. Autonomous System Request

A

A

91
Q

What does Data Link Layer Address Resolution involve?
a) Translating IP addresses into domain names
b) Identifying MAC addresses corresponding to IP addresses
c) Converting domain names into IP addresses
d) Assigning IP addresses to network devices

A

B

92
Q

Which protocol is used for Data Link Layer Address Resolution?
a) DNS
b) TCP
c) ARP
d) DHCP

A

C

93
Q

What is the purpose of Address Resolution Protocol (ARP)?
a) Encrypting data transmission
b) Resolving IP addresses to MAC addresses
c) Routing messages across the internet
d) Assigning IP addresses dynamically

A

B

94
Q

When does a computer broadcast an ARP message?
a) When it wants to find the IP address of a remote computer
b) When it wants to find the MAC address of a remote computer
c) When it wants to communicate with a DNS server
d) When it wants to obtain a new IP address from a DHCP server

A

B

95
Q

What does a computer do after receiving the MAC address in response to an ARP message?
a) Broadcasts the message to all computers on the subnet
b) Stores the MAC address in its address table
c) Encrypts the message before transmission
d) Forwards the message to the DNS server

A

B

96
Q

What is the format of a MAC address?
a) 192.168.1.1
b) www.example.com
c) 00-0C-00-F5-03-5A
d) 255.255.255.0

A

C

97
Q

The _____________ is used by a computer to determine how messages will travel through
the network.
a. routing table
b. configuration listing
c. linking loader
d. bus header assignment list
e. file allocation table

A

A

98
Q

___________ is the process of determining the path that a message will travel from sending
computer to receiving computer.
a. Routing
b. Addressing
c. Interfacing
d. Broadcasting
e. Packetizing

A

A

99
Q

In its simplest form, the __________ has two columns: the first column lists every computer
and device in the network, while the second column lists the computer or device to which
that computer should send messages, if they are destined for the computer in the first column.
a. linking loader
b. routing table
c. configuration listing
d. bus header assignment list
e. file allocation table

A

B

100
Q

What is the primary function of a routing table in a computer network?
a) Determine the speed of the network
b) Control access to the network resources
c) Decide how messages will travel through the network
d) Monitor network security

A

B

101
Q

Which network device typically maintains a routing table?
a) Modem
b) Switch
c) Router
d) Firewall

A

C. Routing table kept by each router to make routing decision

102
Q

. Connections on a router, to the Internet and other routers for example, are called
applications.

A

F. Interface

103
Q

What is the primary function of a router?
a) Secure network connections
b) Handle routing decisions
c) Manage software applications
d) Monitor network traffic

A

B

104
Q

The router will use its routing table to determine the appropriate interface to forward the message when

A

If a computer in one subnet sends a message to another computer in a different subnet within the same network

105
Q

If the destination is outside the local network, such as a webpage on the Interne

A

the router forwards the message to the next hop router based on the routing table entry for the destination address.

106
Q

In centralized routing, where are all routing decisions typically made?
a) By individual computers
b) By multiple routers
c) By one central computer or router
d) By network switches

A

C

107
Q

How are messages routed in a centralized routing system when a message needs to be sent to a destination?
a) Each computer directly communicates with the destination
b) The message is sent to multiple routers for redundancy
c) The message is sent to the central computer, which then retransmits it to the destination
d) The message is broadcasted to all devices on the network

A

C

108
Q

There are four fundamental approaches to routing: centralized, static routing,
dynamic routing, and monitor routing.

A

F. Centralized routing, decentralize routing. static routing, dynamic routing

109
Q

The three fundamental approaches to routing are centralized, static routing, and
dynamic routing.

A

T

110
Q

Centralized routing is a type of dynamic routing.

A

F

111
Q

An advantage of centralized routing is:
a. routing does reflect changing network conditions, such as computers that are
overloaded by many messages
b. if anything happens to the computer developing the routing table, the routing
tables cannot be changed until that computer is fixed, or until a new computer is
selected to perform the function
c. routing decisions are simple
d. the routing tables are stored at all computers in the network
e. it requires more processing by each computer or router in the network than
dynamic routing

A

C

112
Q

What characterizes decentralized routing in terms of routing decisions?
a) Routing decisions are made by a central server
b) Routing decisions are made by each router independently
c) Routing decisions are made by network switches
d) Routing decisions are made by the network administrator

A

B

113
Q

What is a key requirement for decentralized routing to function effectively?
a) High-speed network connections
b) Centralized control over routing decisions
c) Exchange of information to prepare routing tables
d) Manual configuration of routing tables

A

C

114
Q

How do decentralized routing protocols typically respond to changes in network configuration?
a) They require manual intervention from network administrators
b) They remain unchanged regardless of network changes
c) They automatically adapt to changes without manual intervention
d) They rely on external servers to update routing tables

A

C

115
Q

____________ refers to the type of routing in which the routing table is developed by
the network manager and modifications are made only when computers are added to
or removed from the network.
a. Adaptive routing
b. Dynamic routing
c. Static routing
d. Distance vector routing

A

C

116
Q

How are routing tables typically developed in static routing?
a) By individual computers
b) By a central routing authority
c) By the network manager
d) Automatically by the router

A

C

117
Q

In static routing, does each router have its own routing table?
a) Yes, each router shares the same routing table
b) No, routing tables are shared among multiple routers
c) Yes, each router maintains its own routing table
d) No, routing tables are managed centrally by the network manager

A

C

118
Q

When does a routing table change in a static routing environment?
a) Routinely, based on network traffic
b) When new routing protocols are implemented
c) When computers are added or removed from the network
d) When the network manager decides to update it

A

C

119
Q

Static routing is typically used in which type of networks?
a) Highly dynamic networks
b) Large-scale enterprise networks
c) Relatively simple networks with few routing options
d) Peer-to-peer networks

A

C

120
Q

What characterizes the routing options in networks where static routing is used?
a) They are frequently updated
b) They are complex and interconnected
c) They rarely change and are relatively simple
d) They are managed by external routing authorities

A

C

121
Q

How are routing tables updated in dynamic routing?
a) Manually by network administrators
b) Automatically by the routers
c) By the network manager during scheduled updates
d) By external routing authorities

A

B

122
Q

What information is exchanged between routers in dynamic routing?
a) MAC addresses of connected devices
b) Routing tables
c) Routing condition information
d) DNS server addresses

A

C

123
Q

When is dynamic routing typically used?
a) In networks with a single route
b) In networks with static IP addresses
c) In networks where routing tables rarely change
d) In networks with multiple routes through the network

A

D

124
Q

Circuitous routing is a type of dynamic routing.

A

F. Distance Vector Dynamic Routing and Link State Dynamic Routing

125
Q

Centralized routing is a type of dynamic routing.

A

F

126
Q

Link state is a type of dynamic routing.

A

T

127
Q

One drawback to dynamic routing is:
a. Routing usually does not reflect changing network conditions, such as computers
that are overloaded by many messages
b. It cannot be used with non-government networks
c. The transmission of status information “wastes” network capacity that could be
used to send user messages
d. It is the job of the network manager, not the computers or devices themselves, to
maintain the routing table.
e. It requires less processing by each computer than static routing.

A

C

128
Q

With ________ routing, computers or routers count the number of hops along a route
and periodically exchange information on the hop count with their neighbors

A

C

129
Q

How does Distance Vector Dynamic Routing determine the routing path for a packet?
a) By analyzing the quality of network connections
b) By using the least amount of bandwidth
c) By choosing the path with the least number of hops
d) By prioritizing certain types of traffic

A

C

130
Q

Which routing protocol commonly utilizes Distance Vector Dynamic Routing?
a) Border Gateway Protocol (BGP)
b) Open Shortest Path First (OSPF)
c) Routing Information Protocol (RIP)
d) Enhanced Interior Gateway Routing Protocol (EIGRP)

A

C

131
Q

What information types does Link State Dynamic Routing utilize to decide how to route a packet?
a) Only the number of hops
b) Only congestion levels
c) A variety of information types such as number of hops, congestion, and speed of circuit
d) Only the speed of circuit

A

C

132
Q

How is link state information exchanged in Link State Dynamic Routing?
a) Manually configured by network administrators
b) Periodically by each router to keep every other router in the network up to date
c) By broadcasting to all devices on the network
d) Through a centralized routing authority

A

b

133
Q

Which routing protocol commonly utilizes Link State Dynamic Routing?
a) Routing Information Protocol (RIP)
b) Border Gateway Protocol (BGP)
c) Enhanced Interior Gateway Routing Protocol (EIGRP)
d) Open Shortest Path First (OSPF)

A

d

134
Q

What advantage does Link State Dynamic Routing provide over other routing methods?
a) Lower latency
b) Simpler routing decisions
c) More reliable and up-to-date paths to destinations
d) Higher bandwidth utilization

A

C

135
Q

How are routing decisions in static routing typically described?
a) Variable
b) Dynamic
c) Fixed
d) Adaptive

A

C

136
Q

What characterizes the processing overhead of dynamic routing compared to centralized or static routing?
a) Dynamic routing requires less processing by each computer or router
b) Dynamic routing requires more processing by each computer or router
c) Centralized routing requires the most processing
d) Static routing requires the most processing

A

B

137
Q

What potential impact does the frequent transmission of routing information have on network performance in dynamic routing?
a) It improves network performance
b) It has no effect on network performance
c) It enhances network stability
d) It can potentially slow down the network

A

D

138
Q

What is the primary purpose of a routing protocol?
a) To transmit data packets between routers
b) To build and maintain routing tables by exchanging information among routers
c) To encrypt network traffic for secure transmission
d) To manage network infrastructure such as switches and hubs

A

B

139
Q

A routing protocol used inside an autonomous system is called an exterior routing
protocol

A

F

140
Q

What is an Autonomous System (AS)?
a) A network operated by a single user
b) A network operated by multiple organizations
c) A network operated by an organization
d) A network operated by a government agency

A

C

141
Q

Which of the following best defines an example of an Autonomous System?
a) A home network
b) A local coffee shop’s Wi-Fi network
c) Indiana University’s network
d) A public library’s computer lab network

A

C

142
Q

Which category of routing protocols operates within a network (autonomous system)?
a) Interior routing protocols
b) Exterior routing protocols
c) Hybrid routing protocols
d) Dynamic routing protocols

A

A

143
Q

Which routing protocols are examples of interior routing protocols?
a) BGP
b) RIP, OSPF, EIGRP
c) ICMP
d) OSPF, BGP

A

B

144
Q

What kind of information do interior routing protocols provide about each router and paths?
a) Basic network topology
b) Preferred routes between autonomous systems
c) Detailed information about each router and paths
d) Information about network congestion

A

C

145
Q

Which protocol operates between networks (autonomous systems)?
a) RIP
b) OSPF
c) ICMP
d) BGP

A

D. Border Gateway protocols ( BGP)

146
Q

What distinguishes exterior routing protocols from interior routing protocols?
a) They provide detailed information about each router and paths.
b) They operate within a network.
c) They focus on network topology within an autonomous system.
d) They provide information about preferred or best routes rather than all possible routes.

A

D

147
Q

Which routing protocol provides information about preferred or best routes between networks?
a) OSPF
b) EIGRP
c) BGP
d) RIP

A

C

148
Q

The Enhanced Interior Gateway Routing Protocol is an interior routing protocol
originally developed by Cisco

A

T

149
Q

What type of routing protocol is Border Gateway Protocol (BGP)?
a) Static routing protocol
b) Interior routing protocol
c) Exterior routing protocol
d) Hybrid routing protocol

A

C

150
Q

Which routers primarily use Border Gateway Protocol (BGP) to exchange routing information?
a) Core routers within a single autonomous system
b) Access routers connecting end-user devices
c) Border routers between autonomous systems
d) Distribution routers within a LAN

A

C

151
Q

What is the primary function of Border Gateway Protocol (BGP)?
a) To exchange routing information within a single autonomous system
b) To prioritize certain types of network traffic
c) To establish preferred routes between autonomous systems
d) To manage network security settings

A

C

152
Q

Why is Border Gateway Protocol (BGP) often considered complex and difficult to administer?
a) Due to its reliance on static routing tables
b) Because it requires minimal configuration
c) Due to its large scale and complexity
d) Because it is primarily used within small-scale networks

A

C

153
Q

What type of routing protocol is Routing Information Protocol (RIP)?
a) Static routing protocol
b) Dynamic routing protocol
c) Hybrid routing protocol
d) Manual routing protocol

A

B. A dynamic distance vector ( number of hop) interior routing protocol

154
Q

What metric does RIP primarily use to determine the best route?
a) Bandwidth availability
b) Latency
c) Number of hops
d) Network reliability

A

C

155
Q

In which type of network is RIP commonly used?
a) Large enterprise networks
b) Complex networks with diverse topology
c) Simple networks
d) Public Wi-Fi networks

A

C

156
Q

How does RIP update routing tables when a new router is added?
a) By manually configuring the routing tables
b) By counting the number of hops between computers
c) By exchanging routing information with all routers
d) By consulting a centralized routing authority

A

B

157
Q

What action does a router running RIP perform approximately every minute?
a) Sends a broadcast message containing its routing status to all other routers
b) Updates its routing table based on real-time network traffic
c) Reboots to apply routing changes
d) Adjusts the bandwidth allocation for different network segments

A

C

158
Q

What type of routing protocol is Open Shortest Path First (OSPF)?
a) Static routing protocol
b) Dynamic routing protocol
c) Hybrid routing protocol
d) Manual routing protocol

A

C. A dynamic “hybrid” (distance vector or link-state) interior routing protocol

159
Q

How does OSPF incorporate traffic and error rate measurements?
a) By periodically broadcasting status update messages to all routers
b) By selectively sending status update messages directly to selected routers
c) By relying on manual configuration for routing updates
d) By using a centralized routing authority for updates

A

B. It does not use broadcast messages

160
Q

Why has OSPF become more popular on the Internet?
a) It consumes less network bandwidth.
b) It provides less reliable paths.
c) It does not support dynamic routing.
d) It offers more reliable paths and incorporates traffic and error rate measurements.

A

D.

161
Q

What type of routing protocol is Enhanced Interior Gateway Routing Protocol (EIGRP)?
a) Static routing protocol
b) Dynamic routing protocol
c) Hybrid routing protocol
d) Manual routing protocol

A

C

162
Q

What characteristics distinguish EIGRP from other interior routing protocols?
a) It records transmission capacity, delay time, reliability, and load for all paths.
b) It relies solely on distance vector routing.
c) It focuses on network topology within an autonomous system.
d) It operates primarily between autonomous systems.

A

A

163
Q

How does EIGRP contribute to routing decisions?
a) By manually configuring routing tables
b) By relying on a centralized routing authority
c) By keeping routing tables for its neighbors and using this information in its routing decisions
d) By broadcasting routing updates to all routers in the network

A

C

164
Q

What type of routing does IS-IS employ?
a) Distance vector routing
b) Link-state routing
c) Path-vector routing
d) Static routing

A

B

165
Q

Which organization initially developed Intermediate System to Intermediate System (IS-IS)?
a) Cisco
b) Internet Engineering Task Force (IETF)
c) International Organization for Standardization (ISO)
d) Open Networking Foundation (ONF)

A

C

166
Q

What is the primary purpose of IS-IS?
a) To exchange routing information between autonomous systems
b) To provide efficient routing within a single autonomous system
c) To prioritize certain types of network traffic
d) To establish secure network connections

A

B

167
Q

What does IS-IS stand for?
a) Interior State to Interior State
b) Intermediate System to Intermediate System
c) Internal Security and Integrity
d) Internet Service and Integration System

A

B

168
Q

Which type of network environment is IS-IS commonly used in?
a) Small office networks
b) Public Wi-Fi networks
c) TCP/IP networks
d) Personal home networks

A

C

169
Q

The ping command uses the most basic interior routing protocol on the Internet,
which is the:
a. Border Gateway Protocol
b. Internet Control Message Protocol
c. Routing Information Protocol
d. Enhanced Interior Gateway Routing Protocol
e. Open Shortest Path First

A

B

170
Q

How does ICMP primarily contribute to network operations?
a) By configuring routing tables
b) By exchanging routing information between routers
c) By enabling computers to report routing errors
d) By prioritizing network traffic

A

C

171
Q

What is the main limitation of ICMP in terms of routing functionality?
a) It consumes excessive network bandwidth.
b) It does not support dynamic routing.
c) It cannot update routing tables extensively.
d) It prioritizes certain types of traffic over others.

A

C

172
Q

What is the primary characteristic of a unicast message?
a) It is sent from one computer to another computer.
b) It is sent from one computer to all computers in the network.
c) It is sent from one computer to a group of computers.
d) It is sent from multiple computers to one computer.

A

A

173
Q

What is the primary characteristic of a broadcast message?
a) It is sent from one computer to another computer.
b) It is sent from one computer to all computers in the network.
c) It is sent from one computer to a group of computers.
d) It is sent from multiple computers to one computer.

A

B

174
Q

What is the primary characteristic of a multicast message?
a) It is sent from one computer to another computer.
b) It is sent from one computer to all computers in the network.
c) It is sent from one computer to a group of computers.
d) It is sent from multiple computers to one computer.

A

C

175
Q

In which scenario would a multicast message be typically used?
a) Sending an email to a single recipient
b) Sending a software update to all computers in the network
c) Broadcasting an urgent message to all employees
d) Streaming a video to a group of users in a videoconference

A

D

176
Q

What is the primary function of Internet Group Management Protocol (IGMP)?
a) To manage network security settings
b) To facilitate communication between routers
c) To enable computers to participate in multicast groups
d) To prioritize network traffic

A

C

177
Q

How do computers signal their desire to participate in a multicast group using IGMP?
a) By sending a broadcast message to all computers in the network
b) By sending an IGMP message to the organizing computer or router
c) By configuring their routing tables manually

A

B

177
Q

What special identifier is assigned to multicast groups?
a) A unique IP address for each computer
b) A broadcast IP address
c) A multicast IP address
d) A static IP address

A

C

177
Q

What action does a router take regarding the data link layer address of multicast messages?
a) It sets the data link layer address to match the multicast group’s IP address.
b) It sets the data link layer address to match the organizing computer’s IP address.
c) It discards multicast messages with incorrect data link layer addresses.

A

A

177
Q

What components are typically found inside a router?
a) Disk drives, monitor, keyboard, mouse
b) CPU, memory, ports/interfaces, operating system
c) Speakers, microphone, webcam
d) Printer, scanner, fax machine

A

B

178
Q

When does a participating computer send an IGMP message to remove itself from a multicast group?
a) When the computer’s IP address changes
b) When the computer connects to the network
c) When the multicast session ends
d) When the router sends a specific command

A

C

178
Q

How does a router handle multicast messages with the special IP address?
a) By discarding them to prevent network congestion
b) By routing them to all computers in the network
c) By forwarding them only to computers in the multicast group
d) By prioritizing them over other network traffic

A

C

178
Q

What components are not typically found inside a router?
a) CPU, memory, ports/interfaces, operating system
b) Disk drives, monitor, keyboard, mouse
c) Printer, scanner, fax machine
d) Speakers, microphone, webcam

A

B

179
Q

Which of the following is not a component of a router?
a. CPU
b. Interface
c. Memory
d. Keyboard
e. Port

A

D

179
Q
  1. IGMP refers to:
    a. Internet Giga Memory Parameters
    b. Interchange Group Management Parameters
    c. Internet Guided Meta Protocol
    d. Internet Group Management Protocol
    e. Interchange Guided Meta Protocol
A

D

180
Q

A majority of routers use the following operating system:
a. Windows 95
b. Red Hat Linux
c. Windows Server 2008
d. Cisco Internetwork Operating System
e. Linksys OSI System

A

D

181
Q

What is the purpose of a console port on a router?
a) To connect to devices for networking
b) To allow network administrators to configure the router using terminal emulation software
c) To provide a direct, non-network connection for logging in
d) To establish secure connections using SSH

A

B

182
Q

How is the console port typically connected to a computer?
a) Via a blue rollover cable
b) Via a network interface port
c) Via a modem
d) Via a standard Ethernet cable

A

A

183
Q

Why is the console port used when configuring a router for the first time?
a) Because it provides the fastest connection speed
b) Because it does not require any additional cables
c) Because the router does not have an IP address assigned initially
d) Because it offers the most secure connection

A

C

184
Q

What software is typically used to communicate with a router via the console port?
a) Web browser
b) Email client
c) Terminal emulation software
d) Antivirus software

A

C

185
Q

Once the basic setup of a router is complete, how can a network manager log in to the router from any computer?
a) Using a blue rollover cable
b) Using a modem connection
c) Using TCP/IP and Telnet with Secure Shell (SSH) via the network interface port
d) Using a direct, non-network connection via the auxiliary port

A

C

186
Q

What is the purpose of the auxiliary port on a router?
a) To provide the fastest connection speed
b) To offer the most secure connection
c) To allow direct, non-network connections via modems
d) To connect to devices for networking

A

C

187
Q

Why is the auxiliary port rarely used today?
a) Because it requires specialized cables
b) Because it provides slower connection speeds
c) Because it is incompatible with modern networking technologies
d) Because network administrators prefer to use network interface ports

A

D

188
Q

The ______ defines what type of packets should be routed and what types of packets should be
discarded.
a. ACL
b. AFL
c. TCP
d. IOS
e. OSI

A

A. ( Access Control List)

189
Q
A