IS4560 CH 2 TCP/IP Review Flashcards

1
Q
1. What is the networking layer of the OSI reference model responsible for?
A. Physical layer connectivity 
B. Routing and delivery of IP packets 
C. Formatting the data 
D. Physical framing 
E. None of the above
A

Formatting the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which of the following is not an attribute of OSPF?
    A. Security
    B. The use of IP multicasts to send out router updates
    C. No limitation for hop count
    D. Subject to route poisoning
A

Subject to route poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
3. Which of the following makes UDP harder to scan for?
A. Low overhead 
B. Lack of startup and shutdown 
C. Speed 
D. Versatility
A

Lack of startup and shutdown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
4. Which of the following best describes how ICMP is used?
A. Packet delivery 
B. Error detection and correction 
C. Logical errors and diagnostics 
D. IP packet delivery
A

Logical errors and diagnostics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. The most common type of ICMP message is ________.
A

Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following statements most closely expresses the difference in routing and routable protocols?
    A. IP is a routing protocol, whereas RIP is a routable protocol.
    B. OSPF is a routing protocol, whereas IP is a routable protocol.
    C. BGP is used as a routable protocol, whereas RIP is a routing protocol.
    D. Routable protocols are used to define the best path from point A to point B, while routing protocols are used to transport the data.
A

OSPF is a routing protocol, whereas IP is a routable protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
7. What is another way used to describe Ethernet?
A. Collision detection 
B. Sends traffic to all nodes on a hub 
C. CSMA/CD 
D. All of the above
A

All Answers are correct

Collision detection

Sends traffic to all nodes on a hub

CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Botnets are used to bypass the functionality of a switch.

A. True B. False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
9. What is a security vulnerability found in RIP?
A. Slow convergence 
B. Travels only 56 hops 
C. No authentication 
D. Distance vector
A

No authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
10. Which of the following best describes the role of IP?
A. Guaranteed delivery 
B. Best effort at delivery 
C. Establishes sessions by means
of a handshake process 
D. Is considered an OSI Layer 2 protocol
A

Best effort at delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly