export_week 10 summary exercises Flashcards

1
Q

When encountering an IPv4-only router, an IPv6 datagram is dropped.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Select all features explicit in IPv6 which are not explicitly available in IPv4. (Check all that apply)

A
  • 128-bit addresses
  • Extension headers
  • Flow labeling
  • Explicit Payload Length
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1234:aac:a03::abcd is a valid preferred-format IPv6 address.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following are used in a wired Ethernet network? (Check all that apply)

A
  • Exponential back-off/retry for collision resolution
  • Collision Detection (CD)
  • Carrier Sense Multi-Access (CSMA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Given the following diagram of typical Ethernet hardware frame:

Select the proper portion of the data encapsulation from the dropdown menu, which corresponds to the letter in the figure.

A
  • Hardware framing characters
  • hardware frame header
  • IP Header
  • TCP/UDP header
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A link-layer link between only two adjacent nodes is called a/an _____ link.

A

point to point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In Random Access multiple access schemes, no two nodes will ever transmit at the same time.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Select all Random Access schemes below.

A
  • ALOHA

* CSMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

There are reserved MAC addresses unusable for devices.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Most modern Ethernet LANs use a _____ topology.

A

star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A MAC address is permanent and unique.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In an Ethernet network, after 8 collisions, the range of wait times will be …

A

[0, 1, … 255] * 512 bit times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ethernet uses a RTS/CTS contention-free period.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If an Ethernet sender senses a clear channel, and begins transmission, but shortly thereafter detects a collision, it will…

A

Terminate transmission and enter exponential backoff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240A702B7615BA8D0.jpg

A

01h 78h 1Bh 79h 1Bh 7Ah 1Bh 7Ah 04h

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following are used in a wireless network such as 802.11n?

A
  • Exponential back-off/retry for collision resolution
  • Collision Avoidance
  • Reservation system with Request to Send (RTS) and Clear to Send (CTS)
  • Carrier Sense Multiple Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In direct routing, after the initial contact with the home network, the correspondent sends packets to

A

The care-of address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A device which moves between networks is a _____device.

A

Mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In indirect routing, after the initial contact with the home network, the correspondent sends packets to _____

A

The permanent address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following are major issues that must be handled in wireless networks (i.e., issues that are more significant than in wired networks). Check all that apply.

A
  • Radio waves are more susceptible to interference than signals carried on cable
  • The “hidden node” problem
  • Multi-path propagation when radio signals bounce off obstacles
  • Obstacles that block radio signals
  • Hosts may frequently move from one network to another
21
Q

When an organization establishes a network security policy, which of the following should be considered? Check all that apply.

A
  • The cost of damage control after various types of security breaches
  • The cost of installing “secure” systems
  • The values of the information that is stored or transmitted by the site
22
Q

When an organization establishes a network security policy, which of the following should be considered?

A
  • The value of the information that is stored or transmitted by the site
  • The cost of damage control after various types of security breaches
  • The cost of installing “secure” systems
23
Q

When using an RSA algorithm to construct private and public keys for a public key encryption system, choose prime numbers p and q, and then calculate n = pq, z = (p-1)(q-1). Then choose e and d to create the public key and the private key . Suppose that p = 5, and q = 11. Which of the following values will work for d and e? Check all that apply.

A
  • e = 7, d = 63
24
Q

S represents a source host and D represents a destination host. Which of the following is the most typical use of public key encryption, when S sends an authenticated (digitally signed) message to D?

A

S encrypts a signature using S’s private key, and D decrypts the signature using S’s public key.

25
When encountering an IPv4-only router, an IPv6 datagram is dropped.
False
26
The transition from IPv4 to IPv6 requires that ____________. (Check all that apply)
* IPv4 routers still in use must “tunnel” IPv6 datagrams, by fragmenting/encapsulating them in IPv4 datagrams
27
::ffff:ABCD:DBCA is a valid preferred-format IPv6 address.
False
28
A multiple access scheme which uses a master node to poll each slave node, and control who has 'permission' to transmit at any given time is called...
"taking turns" protocol
29
A protocol designed to control access to a medium is most commonly called a 
multiple access protocol 
30
A link-layer link between more than two adjacent nodes is called a/an ____ link.
broadcast
31
https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240ADFE0A380001D7.jpg
1. No Error | 2. No Error
32
On the sending or receiving host, most of the protocol tasks "below" the application layer of the protocol stack (data encapsulation, IP addressing, etc. ) are handled by
the network interface controller (NIC) 
33
A MAC address is permanent and unique.
False
34
https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240AEFB1C04E338C7.jpg
1. Parity | 2. Parity
35
In Random Access multiple access schemes, no two nodes will ever transmit at the same time.
False
36
If an Ethernet sender senses a clear channel, and begins transmission, but shortly thereafter detects a collision, it will...
Terminate transmission and enter exponential backoff. 
37
https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240AFF5312EF2C329.jpg
* Hardware framing character(s) * Hardware frame header(s) * IP header(s) * TCP/UDP header(s)
38
Ethernet uses a RTS/CTS contention-free period.
False
39
https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240B1598F6B852555.jpg
01h 78h 1Bh 79h 1Bh 7Ah 1Bh 7Ah 04h 
40
A device which is connected to the network through a link which does not utilize any physical connection is a _____ device.
Wireless
41
The default multiple access scheme of 802.11g is RTS/CTS.
False
42
In one type of wireless network, hosts communicate through a central “base station” access point, which is typically connected to a wired network. This communication model is called a(n)
infrastructure network 
43
Which of the following are major issues that must be handled in wireless networks (i.e., issues that are more significant than in wired networks). Check all that apply.
* Obstacles that block radio signals * The "hidden node" problem * Multi-path propagation when radio signals bounce off obstacles * Hosts may frequently move from one network to another * Radio waves are more susceptible to interference than signals carried on cable
44
In indirect routing, after the initial contact with the home network, the correspondent sends packets to 
The permanent address 
45
When using an RSA algorithm to construct private and public keys for a public key encryption system, choose prime numbers p and q, and then calculate n = pq, z = (p-1)(q-1). Then choose e and d to create the public key and the private key . Suppose that p = 5, and q = 11. Which of the following values will work for d and e? Check all that apply.
* e = 7, d = 63
46
An organization typically implements its firewall security by using
packet filtering 
47
S represents a source host and D represents a destination host. Which of the following is the most typical use of public key encryption, when S sends an encrypted message to D?
S encrypts a message using D's public key, and D decrypts the message using D's private key.
48
When an organization establishes a network security policy, which of the following should be considered? Check all that apply.
* The cost of damage control after various types of security breaches * The cost of installing "secure" systems * The value of the information that is stored or transmitted by the site