export_week 10 summary exercises Flashcards

1
Q

When encountering an IPv4-only router, an IPv6 datagram is dropped.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Select all features explicit in IPv6 which are not explicitly available in IPv4. (Check all that apply)

A
  • 128-bit addresses
  • Extension headers
  • Flow labeling
  • Explicit Payload Length
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1234:aac:a03::abcd is a valid preferred-format IPv6 address.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following are used in a wired Ethernet network? (Check all that apply)

A
  • Exponential back-off/retry for collision resolution
  • Collision Detection (CD)
  • Carrier Sense Multi-Access (CSMA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Given the following diagram of typical Ethernet hardware frame:

Select the proper portion of the data encapsulation from the dropdown menu, which corresponds to the letter in the figure.

A
  • Hardware framing characters
  • hardware frame header
  • IP Header
  • TCP/UDP header
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A link-layer link between only two adjacent nodes is called a/an _____ link.

A

point to point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In Random Access multiple access schemes, no two nodes will ever transmit at the same time.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Select all Random Access schemes below.

A
  • ALOHA

* CSMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

There are reserved MAC addresses unusable for devices.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Most modern Ethernet LANs use a _____ topology.

A

star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A MAC address is permanent and unique.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In an Ethernet network, after 8 collisions, the range of wait times will be …

A

[0, 1, … 255] * 512 bit times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ethernet uses a RTS/CTS contention-free period.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If an Ethernet sender senses a clear channel, and begins transmission, but shortly thereafter detects a collision, it will…

A

Terminate transmission and enter exponential backoff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240A702B7615BA8D0.jpg

A

01h 78h 1Bh 79h 1Bh 7Ah 1Bh 7Ah 04h

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following are used in a wireless network such as 802.11n?

A
  • Exponential back-off/retry for collision resolution
  • Collision Avoidance
  • Reservation system with Request to Send (RTS) and Clear to Send (CTS)
  • Carrier Sense Multiple Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In direct routing, after the initial contact with the home network, the correspondent sends packets to

A

The care-of address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A device which moves between networks is a _____device.

A

Mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In indirect routing, after the initial contact with the home network, the correspondent sends packets to _____

A

The permanent address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following are major issues that must be handled in wireless networks (i.e., issues that are more significant than in wired networks). Check all that apply.

A
  • Radio waves are more susceptible to interference than signals carried on cable
  • The “hidden node” problem
  • Multi-path propagation when radio signals bounce off obstacles
  • Obstacles that block radio signals
  • Hosts may frequently move from one network to another
21
Q

When an organization establishes a network security policy, which of the following should be considered? Check all that apply.

A
  • The cost of damage control after various types of security breaches
  • The cost of installing “secure” systems
  • The values of the information that is stored or transmitted by the site
22
Q

When an organization establishes a network security policy, which of the following should be considered?

A
  • The value of the information that is stored or transmitted by the site
  • The cost of damage control after various types of security breaches
  • The cost of installing “secure” systems
23
Q

When using an RSA algorithm to construct private and public keys for a public key encryption system, choose prime numbers p and q, and then calculate n = pq, z = (p-1)(q-1). Then choose e and d to create the public key and the private key . Suppose that p = 5, and q = 11. Which of the following values will work for d and e? Check all that apply.

A
  • e = 7, d = 63
24
Q

S represents a source host and D represents a destination host. Which of the following is the most typical use of public key encryption, when S sends an authenticated (digitally signed) message to D?

A

S encrypts a signature using S’s private key, and D decrypts the signature using S’s public key.

25
Q

When encountering an IPv4-only router, an IPv6 datagram is dropped.

A

False

26
Q

The transition from IPv4 to IPv6 requires that ____________. (Check all that apply)

A
  • IPv4 routers still in use must “tunnel” IPv6 datagrams, by fragmenting/encapsulating them in IPv4 datagrams
27
Q

::ffff:ABCD:DBCA is a valid preferred-format IPv6 address.

A

False

28
Q

A multiple access scheme which uses a master node to poll each slave node, and control who has ‘permission’ to transmit at any given time is called…

A

“taking turns” protocol

29
Q

A protocol designed to control access to a medium is most commonly called a

A

multiple access protocol

30
Q

A link-layer link between more than two adjacent nodes is called a/an ____ link.

A

broadcast

31
Q

https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240ADFE0A380001D7.jpg

A
  1. No Error

2. No Error

32
Q

On the sending or receiving host, most of the protocol tasks “below” the application layer of the protocol stack (data encapsulation, IP addressing, etc. ) are handled by

A

the network interface controller (NIC)

33
Q

A MAC address is permanent and unique.

A

False

34
Q

https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240AEFB1C04E338C7.jpg

A
  1. Parity

2. Parity

35
Q

In Random Access multiple access schemes, no two nodes will ever transmit at the same time.

A

False

36
Q

If an Ethernet sender senses a clear channel, and begins transmission, but shortly thereafter detects a collision, it will…

A

Terminate transmission and enter exponential backoff.

37
Q

https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240AFF5312EF2C329.jpg

A
  • Hardware framing character(s)
  • Hardware frame header(s)
  • IP header(s)
  • TCP/UDP header(s)
38
Q

Ethernet uses a RTS/CTS contention-free period.

A

False

39
Q

https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240B1598F6B852555.jpg

A

01h 78h 1Bh 79h 1Bh 7Ah 1Bh 7Ah 04h

40
Q

A device which is connected to the network through a link which does not utilize any physical connection is a _____ device.

A

Wireless

41
Q

The default multiple access scheme of 802.11g is RTS/CTS.

A

False

42
Q

In one type of wireless network, hosts communicate through a central “base station” access point, which is typically connected to a wired network. This communication model is called a(n)

A

infrastructure network

43
Q

Which of the following are major issues that must be handled in wireless networks (i.e., issues that are more significant than in wired networks). Check all that apply.

A
  • Obstacles that block radio signals
  • The “hidden node” problem
  • Multi-path propagation when radio signals bounce off obstacles
  • Hosts may frequently move from one network to another
  • Radio waves are more susceptible to interference than signals carried on cable
44
Q

In indirect routing, after the initial contact with the home network, the correspondent sends packets to

A

The permanent address

45
Q

When using an RSA algorithm to construct private and public keys for a public key encryption system, choose prime numbers p and q, and then calculate n = pq, z = (p-1)(q-1). Then choose e and d to create the public key and the private key . Suppose that p = 5, and q = 11. Which of the following values will work for d and e? Check all that apply.

A
  • e = 7, d = 63
46
Q

An organization typically implements its firewall security by using

A

packet filtering

47
Q

S represents a source host and D represents a destination host. Which of the following is the most typical use of public key encryption, when S sends an encrypted message to D?

A

S encrypts a message using D’s public key, and D decrypts the message using D’s private key.

48
Q

When an organization establishes a network security policy, which of the following should be considered? Check all that apply.

A
  • The cost of damage control after various types of security breaches
  • The cost of installing “secure” systems
  • The value of the information that is stored or transmitted by the site