Elective 2: Prelim Flashcards

1
Q

What does “LAN” stand for?

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does “IP” in IP address stand for?

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which device connects a LAN to the internet?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary function of a switch in a network?

A

Filter and forward data within a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the OSI model is responsible for data encryption?

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What device is used to amplify signals in a network?

A

Repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which network device operates at the Data Link layer of the OSI model?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary purpose of a firewall?

A

Protect against unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What device connects two different networks?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which protocol is used to send emails?

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does HTTP stand for?

A

HyperText Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which protocol is used for secure data transfer over the web?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the main purpose of DNS in a network?

A

Translate domain names to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which protocol is used to transfer files over the internet?

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a group of computers connected together called?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the maximum length of a UTP cable in a LAN?

A

100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the unique identifier assigned to a device on a network?

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the full form of DHCP?

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many layers are there in the OSI model?

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does “ping” test in a network?

A

Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which layer of the OSI model handles error connection?

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which OSI layer deals with end-to-end communication?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In the TCP/IP model, which layer corresponds to the OSI’s Physical and Data Link layers?

A

Network Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does TCP stand for?

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which topology connects all devices to a single central device?

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In which topology are all devices connected in a circular manner?

A

Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a disadvantage of a bus topology?

A

Entire network stops if the main cable fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which topology provides the highest redundancy?

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the most commonly used topology in LANs?

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the range of Class A IP addresses?

A

0.0.0.0 to 127.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How many octets are in an IPv4 address?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which frequency band is NOT used in Wi-Fi?

A

7GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the primary role of an ISP?

A

Provide internet services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of these is a popular messaging protocol?

A

XMPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the default port number for HTTP?

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

SMTP

A

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

FTP

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

HTTPS

A

Hypertext Transfer Protocol Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

HTTP

A

HyperText Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

XMPP

A

Extensible Messaging and Presence Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

IMAP

A

Internet message access protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

TCP

A

Transmission Control Protoco

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

IP

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

DNS

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

POP3

A

Post Office Protocol 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

OSI (OSI _ or OSI Model)

A

Open System Interconnection Reference Model
- Reference Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

abstract description for layered communications and computer network protocol design.

A

Open System Interconnection Reference Model (OSI Reference Model or OSI Model)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

It divides network architecture into seven layers which, from top to bottom,

A

Open System Interconnection Reference Model (OSI Reference Model or OSI Model)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

OSI Seven Layer Model.

A

Application, Presentation, Session, Transport, Network, Data Link, and Physical Layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q
  • In _, the _ began to develop its OSI framework architecture.
A

1978
the International Standards Organization (ISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q
  • OSI has two major components: an abstract model of networking,
    called the ___
A

Basic Reference Model or seven-layer model, and a set of
specific protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q
  • Various aspects of OSI design evolved from experiences with the
A

Advanced Research Projects Agency Network (ARPANET) and the
fledgling Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q
  • The concept of a 7 layer model was provided by the __
A

work of Charles
Bachman, then of Honeywell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

OSI Layers

A
  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data Link
    7 Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Network process to ___

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Data representation, encryption and description

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Interhost communication

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

End-to-end connections and reliability, Flow control

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Path determination and logical addressing

(IP) add ko yan describe

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Physical addressing

(MAC and LLC)

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Media, signal and binary transmission

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

defines the electrical and physical specifications for devices.

A

Layer1: Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

In particular, it defines the relationship between a device and a physical medium.

A

Layer1: Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q
  • This includes the layout of pin, voltages, cable specification, hubs,
    repeaters, network adapters, host bus adapters, and more.
A

Layer1: Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

*The major functions and services performed by the Physical Layer are:

A
  • Establishment and termination of a connection to a communication medium.
  • Participation in the process whereby the communication resources are effectively shared among multiple users. For example, flow control.
  • Modulation, or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. These are signals operating over the physical cabling (such as copper and optical fiber) or over a radio link.
  • The same applies to local-area networks, such as Ethernet, token ring ,
    FDDI(Fiber Distributed Data Interface),
    ITU-T( International Telecommunication Union Telecommunication Standardization Sector) G.hn and IEEE802.1I.
  • Personal area networks such as Bluetooth and IEEE 802.15.4.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

local-area networks: such as…

A

Ethernet, token ring ,
FDDI(Fiber Distributed Data Interface),
ITU-T( International Telecommunication Union Telecommunication Standardization Sector) G.hn and IEEE802.1I.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q
  • Personal area networks such as
A

Bluetooth and IEEE 802.15.4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

detect and possibly correct errors that may occur in the Physical Layer.

A

Layer 2: Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

provides the functional and procedural means to transfer data between network entities

A

Layer 2: Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q
  • Originally, this layer was intended for point-to-point and point-to-multipoint media, characteristic of wide area media in the telephone system.
A

Layer 2: Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

*The data link layer is divided into two sub-layers by __.
1.
2.

A

_ IEEE

  1. Media Access Control (MAC)
  2. Logical Link Control (LLC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

is lower sub-layer, and it defines the way about the media access transfer, such as CSMA/CD/CA(Carrier Sense Multiple Access/Collision Detection/Collision Avoidance)

A

Mac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

provides data transmission method in different network

A

LLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

It will re-package date and add a new header.

A

LLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality
of service requested by the Transport Layer.

A

Layer 3: Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q
  • The _ performs:
A

_ Network Layer

  • network routing functions,
  • perform fragmentation and reassembly,
  • report delivery errors.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q
  • Routers operate at this layer—sending data throughout the extended network and making the Internet possible.
A

Layer 3: Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers.

A

Layer 4: Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

controls the reliability of a given link through flow control, segmentation/desegmentation, and error control.

A

Layer 4: Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

controls the dialogues (connections) between computers.

A

Layer 5: Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q
  • It establishes, manages and terminates the connections between the local and remote application.
A

Layer 5: Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q
  • It provides for full-duplex, half-duplex, or simplex operation, and establishes checkpointing, adjournment, termination, and restart procedures.
A

Layer 5: Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q
  • The OSI model made this layer __, which is a property of the __,
    and also for ___, which is not usually
    used in the Internet Protocol Suite.
A

Layer 5: Session Layer

__ responsible for graceful close of
sessions
__ (TCP) Transmission Control Protocol
___session check pointing and recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

The ___ is commonly implemented explicitly in application environments that use remote procedure calls.

A

___ Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

establishes a context between Application Layer entities, in which the higher-layer entities can use different syntax and semantics, as long as the presentation service understands both and the mapping between them.

A

Layer 6: Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q
  • This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa.
A

Layer 6: Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q
  • This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems.
A

Layer 6: Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Presentation Layer

A

*It is sometimes called the syntax layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application.

A

Layer 7: Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q
  • Application layer functions typically include:
A
  • identifying communication partners,
  • determining resource availability,
  • synchronizing communication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q
  • Determines the identity and availability of communication partners for an application with data to transmit.
A

*Identifying communication partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q
  • Decide whether sufficient network or the requested communication exist.
A
  • determining resource availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q
  • All communication between applications requires cooperation that is managed by the application layer.
A

*Synchronizing communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q
  • Some examples of application layer implementations include:
A
  • Hypertext Transfer Protocol (HTTP)
  • File Transfer Protocol (FTP)
  • Simple Mail Transfer Protocol (SMTP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

TCP/IP Layers ng OSI

Application, Presentation, Session = __
Transport = __
Network = ___
Data, Physical = __

A

A,P,S = TELNET, FTP, SMTP, POP3,SNMP, NNTP, DNS, NIS, NFS, HTTP

T = TCP, UDP…

N = IP, ICMP, ARP, RARP

D,P = FDDI, Ethernet, ISDN, X.25…

96
Q

TCP/IP Layers 4 Layers

A

Application Layer
Transportation Layer
Internet Layer
Network Access Layer

97
Q
  • Open system standards over the world
  • Rigorously defined structured, hierarchical network model
  • Complete description of the function
  • Provide standard test procedures
A

OSI Feature

98
Q

(commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks.

A

Internet Protocol Suite

99
Q

is the set of communications protocols used for the Internet and other similar networks.

A

Internet Protocol Suite (commonly known as TCP/IP)

100
Q

*It is named from two of the most important protocols in it:

A

Internet Protocol Suite (commonly known as TCP/IP)

*the Transmission Control Protocol (TCP) and
*the Internet Protocol (IP)

101
Q

which were the first two networking protocols defined in this standard.

A

*the Transmission Control Protocol (TCP) and
*the Internet Protocol (IP)

102
Q

Why Layering Considered Harmful?

  • __ implies that the functions of each layer are carried out completely before the protocol data unit is passed to the next layer.
A

In the data networking context structured layering

103
Q

Why Layering Considered Harmful?

This means that the optimization of each layer has to be done ___.

A

separately

104
Q

Why Layering Considered Harmful?

Such ordering constraints are in conflict with efficient implementation of data manipulation functions.

105
Q

___ logically segment switched networks based on the functions, project teams, or applications of the organization regardless of the physical location or connections to the
network.

106
Q

All workstations and servers used by a particular workgroup ___, regardless of the physical connection or Location.

A

share the same VLAN

107
Q

___ function by logically segmenting the network into different broadcast domains so that packets are only switched between ports that are designated for the same VLAN.

108
Q

___ provide broadcast filtering, security, and traffic flow management.

A

Routers in VLAN topologies

109
Q

___ address scalability, security, and network management.

110
Q

___ may not bridge any traffic between VLANs, as this would violate the integrity of the VLAN broadcast domain.

111
Q

__ should only be routed between VLANs.

112
Q

A __ is a broadcast domain created by one or more switches.

113
Q

__ allows the router to send packets to the three different broadcast domains.

A

Layer 3 routing

114
Q

Broadcast domains with VLANs and routers

Implementing VLANs on a switch causes the following to occur:

◼ If the __, the switch searches the bridging table for VLAN 1.

A

frame comes in on a port in VLAN 1

115
Q

Broadcast domains with VLANs and routers

Implementing VLANs on a switch causes the following to occur:

◼The ___ maintains a separate bridging table for each VLAN.

116
Q

Broadcast domains with VLANs and routers

Implementing VLANs on a switch causes the following to occur:

◼When the ___, the switch adds the source address to the bridging table if it is currently unknown.

A

frame is received

117
Q

Broadcast domains with VLANs and routers

Implementing VLANs on a switch causes the following to occur:

◼The __ so a forwarding decision can be made.

A

destination is checked

118
Q

Broadcast domains with VLANs and routers

Implementing VLANs on a switch causes the following to occur:

◼For __ is made against the address
table for that VLAN only.

A

learning and forwarding the search

119
Q

VLAN operation

  • __ could be assigned to a different ___.
A

Each switch port

VLAN

120
Q

VLAN operation

  • Ports assigned to the same VLAN ___
A

share broadcasts.

121
Q

VLAN operation

  • Ports that do not belong to that VLAN __
A

do not share these broadcasts.

122
Q

VLAN operation

A
  • Int fa0/1
  • Switchport mode access
  • Switchport access vlan 1
123
Q

VLAN operation

___, share the bandwidth of that segment.

A

Users attached to the same shared segment

124
Q

VLAN operation

___ means less bandwidth and deterioration of network performance.

A

Each additional user attached to the shared medium

125
Q

VLAN operation

__ offer more bandwidth to users than a __.

A

VLANs

shared network.

126
Q

VLAN operation

The __ for every port in the switch is the __.

A

default VLAN
management VLAN.

127
Q

VLAN operation

The ___ is always VLAN 1 and may not be deleted. All ___ may be reassigned to alternate VLANs.

A

management VLAN

other ports on the switch

128
Q

VLAN operation

___ allow for membership based on the MAC address of the device connected to the switch port.

A

Dynamic VLANs

129
Q

VLAN operation

As a __, it queries a database within the switch for a VLAN membership

A

device enters the network

130
Q

VLAN operation

In ___, the port is assigned to a specific VLAN membership independent of the user or system attached to the port.

A

port-based or port-centric VLAN membership

131
Q

VLAN operation

All users of the same port must be in the __.

132
Q

VLAN operation

_ are responsible for configuring VLANs both manually and statically.

A

Network administrators

133
Q

VLAN operation

Configuring VLANs
1.
2.

A

Statically
Dynamically

134
Q

___configure port-by-port.

A

Statically

Network administrators

135
Q

Each port is associated with a specific VLAN

A

Statically

136
Q

The__ is responsible for keying in the mappings between the ports and VLANs.

A

Statically

network administrator

137
Q

The ports are able to dynamically work out their VLAN configuration

A

Dynamically

138
Q

Uses a software database of MAC address to VLAN mappings (which the network administrator must set up first)

A

Dynamically

139
Q

The key benefit of VLANs is that they permit the network administrator to ___

A

organize the LAN logically instead of physically.

140
Q

VLAN types

There are three basic VLAN memberships for determining and controlling how a packet gets assigned:

A

◼Port-based VLANs
◼MAC address based
◼Protocol based VLANs

141
Q

The ___ are encapsulated or modified to reflect a VLAN ID before the frame is sent over the link between switches.

A

frame headers

142
Q
  • Before forwarding to the destination device, the___is changed back to the original format.
A

frame header

143
Q

The number of VLANs in a switch vary depending on several factors:

A

◼Traffic patterns
◼Types of applications
◼Network management needs
◼Group commonality

144
Q
  • An important consideration in defining the size of the switch and the number of VLANs is the ___.
A

IP addressing scheme.

145
Q
  • Because a ___ is strongly recommended, there can be no more than __ devices in any one VLAN.
A

one-to-one correspondence between VLANs and IP subnets

254

146
Q
  • It is further recommended that VLANs should not __ domain of the distribution switch.
A

extend outside of the Layer 2

147
Q

world’s largest public data network, doubling in size every nine months

148
Q

defines a 32-bit address

149
Q

2^32 (4,294,967,296) __ addresses available

150
Q

The __ is concerned with the eventual depletion of the IP address space.

A

first problem

151
Q
  • __ of classful addressing does not allow the address space to be used to its maximum potential.
A

Traditional model

152
Q
  • When IP was first standardized in __, each system attached to the IP based Internet had to be assigned a unique 32-bit address
153
Q
  • The 32-bit IP addressing scheme involves a ___
A

two level addressing hierarchy

154
Q

two level addressing hierarchy

A
  1. Network Number/Prefix
  2. Host Number
155
Q

Classful Addressing

Divided into _ classes

156
Q
  • Class A __ bits __ and __ bits __ and so on B,C.
A

8 N/W id
24 host id

157
Q

*__ by assigning blocks of addresses which fall along octet boundaries

A

*Wastage of IP addresses

158
Q

Techniques to reduce address shortage in IPv4

A
  • Subnetting
  • Classless Inter Domain Routing (CIDR)
  • Network Address Translation (NAT)
159
Q

Three-level hierarchy:

A

Subnetting

160
Q

Three-level hierarchy:

A

network, subnet, and host.

161
Q
  • The __ is composed of the classful network-prefix and the subnet-number
A

extended-network-prefix

162
Q

has traditionally been identified by the subnet mask

A

extended-network-prefix

163
Q

Network Address Translation

Each organization

A
  • single IP address
164
Q

Network Address Translation

  • each host with IP unique to the orgn., from reserved set of IP addresses
A

Within organization

165
Q

Features of IPv6

A
  • Larger Address Space
  • Aggregation-based address hierarchy
    – Efficient backbone routing
  • Efficient and Extensible IP datagram
  • Stateless Address Autoconfiguration
  • Security (IPsec mandatory)
  • Mobility
166
Q

_-bit IPv6 Address

167
Q

IPv6 is separated by?

A

: also known as colon

168
Q

_ groups of _-bit __ numbers

A

8
16
hexadecimal

169
Q

= all zeros in one or more group of 16-bit hexadecimal numbers

170
Q

Extension Headers

A
  • Routing
  • Fragmentation
  • Authentication
  • Encapsulation
    *Hop-by-Hop Option
  • Destination Options
171
Q

Extended routing, like IPv4 loose list of routers to visit

172
Q

Fragmentation and reassembly

A

Fragmentation

173
Q

Integrity and authentication, security

A

Authentication

174
Q

Confidentiality

A

Encapsulation

175
Q

Special options that require hop-by-hop processing

A

Hop-by-Hop Option

176
Q

Optional information to be examined by the destination node

A

Destination Options

177
Q

❑ IPv6 is NEW …

A

– built on the experiences learned from IPv4
– new features
– large address space
– new efficient header
– autoconfiguration

178
Q

❑ … and OLD

A

– still IP
– build on a solid base
– started in 1995, a lot of implementations and tests done

179
Q
  1. What does OSI stand for?
    A) Open System Internet
    B) Open Source Interconnection
    C) Open System Interconnection
    D) Operating System Interconnection
A

C) Open System Interconnection

180
Q
  1. How many layers does the OSI Model have?
    A) 4
    B) 5
    C) 6
    D) 7
181
Q
  1. Which layer of the OSI model is responsible for physical transmission of data?
    A) Data Link
    B) Network
    C) Physical
    D) Transport
A

C) Physical

182
Q
  1. What is the main function of the Transport Layer in the OSI model?
    A) Error detection
    B) Data encryption
    C) End-to-end communication and reliability
    D) Logical addressing
A

C) End-to-end communication and reliability

183
Q
  1. Which of the following protocols operates at the Application Layer of the OSI model?
    A) IP
    B) TCP
    C) HTTP
    D) ARP
184
Q
  1. Which OSI layer ensures that data is properly formatted and encrypted?
    A) Transport
    B) Session
    C) Presentation
    D) Application
A

C) Presentation

185
Q
  1. The Network Layer is responsible for which of the following?
    A) Routing and addressing
    B) Encryption
    C) Error detection
    D) Physical transmission of bits
A

A) Routing and addressing

186
Q
  1. Which layer in the OSI model is responsible for establishing, maintaining, and terminating
    sessions?
    A) Application
    B) Session
    C) Presentation
    D) Transport
A

B) Session

187
Q
  1. Which of the following is a Layer 2 protocol?
    A) TCP
    B) IP
    C) Ethernet
    D) UDP
A

C) Ethernet

188
Q
  1. What is the function of the Data Link Layer?
    A) Ensuring reliable data transmission
    B) Managing network congestion
    C) Handling logical addressing
    D) Providing physical addressing and error detection
A

D) Providing physical addressing and error detection

189
Q
  1. Which protocol is responsible for logical addressing?
    A) TCP
    B) IP
    C) HTTP
    D) FTP
190
Q
  1. What is the primary difference between TCP and UDP?
    A) TCP is faster than UDP
    B) TCP is connection-oriented, while UDP is connectionless
    C) UDP provides error correction, while TCP does not
    D) UDP is more reliable than TCP
A

B) TCP is connection-oriented, while UDP is connectionless

191
Q
  1. Which layer of the OSI model does a router operate at?
    A) Data Link
    B) Network
    C) Transport
    D) Session
A

B) Network

192
Q
  1. Which of the following is NOT a function of the Application Layer?
    A) Determining resource availability
    B) Identifying communication partners
    C) Managing end-to-end transmission
    D) Synchronizing communication
A

C) Managing end-to-end transmission

193
Q
  1. Which protocol translates domain names into IP addresses?
    A) HTTP
    B) FTP
    C) DNS
    D) SMTP
194
Q
  1. What does ARP stand for?
    A) Automatic Routing Protocol
    B) Address Resolution Protocol
    C) Application Routing Process
    D) Active Request Protocol
A

B) Address Resolution Protocol

195
Q
  1. Which OSI layer is responsible for segmenting and reassembling data?
    A) Network
    B) Transport
    C) Data Link
    D) Session
A

B) Transport

196
Q
  1. The TCP/IP model has how many layers?
    A) 4
    B) 5
    C) 6
    D) 7
197
Q
  1. Which of the following operates at Layer 3 of the OSI Model?
    A) Switch
    B) Router
    C) Hub
    D) Repeater
198
Q
  1. Which OSI layer is sometimes referred to as the “syntax layer”?
    A) Network
    B) Presentation
    C) Transport
    D) Application
A

B) Presentation

199
Q
  1. What does VLAN stand for?
    A) Virtual Local Area Network
    B) Virtual Large Area Network
    C) Variable Local Area Network
    D) Variable Large Area Network
A

A) Virtual Local Area Network

200
Q
  1. What is the primary purpose of VLANs?
    A) To increase physical connections
    B) To segment networks logically
    C) To enhance physical security
    D) To replace switches
A

B) To segment networks logically

201
Q
  1. In a VLAN, workstations share the same VLAN regardless of what?
    A) Physical connection
    B) Network topology
    C) Internet speed
    D) Data type
A

A) Physical connection

202
Q
  1. What is a broadcast domain in the context of VLANs?
    A) A physical segment of the network
    B) A group of devices that receive broadcast messages
    C) A layer of the OSI model
    D) A type of network protocol
A

B) A group of devices that receive broadcast messages

203
Q
  1. Which layer of the OSI model is primarily involved in VLAN routing?
    A) Layer 1
    B) Layer 2
    C) Layer 3
    D) Layer 4
A

C) Layer 3

204
Q
  1. What happens to traffic between different VLANs?
    A) It is bridged directly
    B) It is filtered by switches
    C) It is routed by routers
    D) It is discarded
A

C) It is routed by routers

205
Q
  1. In VLAN operation, what determines which VLAN a port belongs to?
    A) The physical location of the port
    B) The user connected to the port
    C) The port’s assigned VLAN configuration
    D) The network speed
A

C) The port’s assigned VLAN configuration

206
Q
  1. What is the default VLAN for every port in a switch?
    A) VLAN 10
    B) VLAN 100
    C) VLAN 1
    D) VLAN 0
207
Q
  1. Which VLAN membership type assigns VLAN based on the MAC address of the device?
    A) Port-based VLAN
    B) MAC address-based VLAN
    C) Protocol-based VLAN
    D) Dynamic VLAN
A

B) MAC address-based VLAN

208
Q
  1. What do dynamic VLANs allow for?
    A) Manual configuration
    B) Port-based assignment
    C) Membership based on device MAC address
    D) Physical connection reassignment
A

C) Membership based on device MAC address

209
Q
  1. What is one key benefit of using VLANs?
    A) Physical network restructuring
    B) Logical organization of the LAN
    C) Enhanced bandwidth for all devices
    D) Simplified hardware requirements
A

B) Logical organization of the LAN

210
Q
  1. Which of the following is NOT a basic type of VLAN membership?
    A) Port-based VLANs
    B) MAC address-based VLANs
    C) Protocol-based VLANs
    D) User-based VLANs
A

D) User-based VLANs

211
Q
  1. What must be considered when defining the size of a switch regarding VLANs?
    A) The physical size of the switch
    B) The network bandwidth
    C) The IP addressing scheme
    D) The number of connected devices
A

C) The IP addressing scheme

212
Q
  1. How many devices are recommended to be in a single VLAN?
    A) No more than 100
    B) No more than 200
    C) No more than 254
    D) No more than 300
A

C) No more than 254

213
Q
  1. What is the consequence of bridging traffic between VLANs?
    A) Enhanced network performance
    B) Increased broadcast traffic
    C) Violation of VLAN integrity
    D) Improved security
A

C) Violation of VLAN integrity

214
Q
  1. VLANs are primarily used to address which of the following?
    A) Scalability, security, and network management
    B) Physical connections and speed
    C) Data encryption and compression
    D) Hardware configuration
A

A) Scalability, security, and network management

215
Q
  1. What does each port in a VLAN share?
    A) Physical connections
    B) Management permissions
    C) Broadcast traffic
    D) Security protocols
A

C) Broadcast traffic

216
Q
  1. How does a switch learn MAC addresses in a VLAN?
    A) By manual entry
    B) Through user authentication
    C) By adding source addresses to the bridging table
    D) By polling connected devices
A

C) By adding source addresses to the bridging table

217
Q
  1. What is a key feature of port-based VLAN membership?
    A) It is user-dependent
    B) It allows for multiple VLANs per port
    C) Each port is assigned to a specific VLAN
    D) It is dynamic in nature
A

C) Each port is assigned to a specific VLAN

218
Q
  1. What is the primary reason for the development of IPv6?
    A) To provide faster internet speeds
    B) To address the depletion of IPv4 addresses
    C) To simplify network configurations
    D) To enhance security features
A

B) To address the depletion of IPv4 addresses

219
Q
  1. How many unique addresses are available in the IPv4 addressing scheme?
    A) 2^16
    B) 2^32
    C) 2^64
    D) 2^128
220
Q
  1. What addressing hierarchy does the 32-bit IP addressing scheme use?
    A) Host Number/Network Number
    B) Network Number/Host Number
    C) Subnet/Host/Network
    D) Prefix/Host
A

B) Network Number/Host Number

221
Q
  1. How many classes of addresses were defined in classful addressing?
    A) 2
    B) 3
    C) 4
    D) 5
222
Q
  1. What is one technique used to reduce address shortages in IPv4?
    A) IPsec
    B) NAT
    C) OSPF
    D) ARP
223
Q
  1. In subnetting, how many levels of hierarchy are there?
    A) One
    B) Two
    C) Three
    D) Four
224
Q
  1. What does a subnet mask do?
    A) Identifies the class of an IP address
    B) Indicates which portion of the address is the network and which is the host
    C) Provides security for IP addresses
    D) Translates IP addresses to MAC addresses
225
Q
  1. What are the reserved IP address ranges for private networks?
    A) 10.0.0.0 – 10.255.255.255
    B) 192.168.0.0 – 192.168.255.255
    C) 172.16.0.0 – 172.31.255.255
    D) All of the above
A

D) All of the above

226
Q
  1. What is a key feature of IPv6?
    A) Smaller address space
    B) Classful addressing
    C) Stateless Address Autoconfiguration
    D) Limited mobility
A

C) Stateless Address Autoconfiguration

227
Q
  1. How is an IPv6 address structured?
    A) Four groups of 8-bit decimal numbers
    B) Eight groups of 16-bit hexadecimal numbers
    C) A single 32-bit number
    D) Two groups of 32-bit binary numbers
A

B) Eight groups of 16-bit hexadecimal numbers

228
Q
  1. What does the “::” notation in an IPv6 address represent?
    A) All bits are set to one
    B) All zeros in one or more groups
    C) A wildcard address
    D) A reserved address
A

B) All zeros in one or more groups

229
Q
  1. Which feature of IPv6 ensures mandatory security?
    A) NAT
    B) Subnetting
    C) IPsec
    D) DHCP
230
Q
  1. Which of the following is NOT an extension header in IPv6?
    A) Fragmentation
    B) Hop-by-Hop Option
    C) Network Address Translation
    D) Authentication
A

C) Network Address Translation

231
Q
  1. What is the purpose of the Routing extension header in IPv6?
    A) To encrypt packets
    B) To provide a list of routers to visit
    C) To verify the integrity of packets
    D) To configure IP addresses
A

B) To provide a list of routers to visit

232
Q
  1. What was the starting year for IPv6 development?
    A) 1981
    B) 1995
    C) 2000
    D) 2005
233
Q
  1. Which of the following best describes IPv6?
    A) Completely new protocol
    B) An evolution of IPv4 with new features
    C) A protocol with the same features as IPv4
    D) A protocol that only focuses on security
A

B) An evolution of IPv4 with new features

234
Q
  1. What is the significance of the larger address space in IPv6?
    A) It allows for more devices to connect to the internet
    B) It increases network speeds
    C) It simplifies network configurations
    D) It enhances security measures
A

A) It allows for more devices to connect to the internet

235
Q
  1. What aspect of IPv6 enhances routing efficiency?
    A) Classful addressing
    B) Aggregation-based address hierarchy
    C) Network Address Translation
    D) Static IP addressing
A

B) Aggregation-based address hierarchy

236
Q
  1. Which of the following is true about the header of IPv6 packets?
    A) It is less efficient than IPv4 headers.
    B) It is simplified and more efficient than IPv4 headers.
    C) It requires more processing time.
    D) It contains more fields than IPv4 headers.
A

B) It is simplified and more efficient than IPv4 headers.

237
Q
  1. What feature allows IPv6 addresses to be assigned without manual configuration?
    A) DHCP
    B) Static addressing
    C) Stateless Address Autoconfiguration
    D) Dynamic Host Configuration Protocol
A

C) Stateless Address Autoconfiguration