IS4560 CH 2 TCP/IP Review Flashcards
1
Q
1. What is the networking layer of the OSI reference model responsible for? A. Physical layer connectivity B. Routing and delivery of IP packets C. Formatting the data D. Physical framing E. None of the above
A
Formatting the data
2
Q
- Which of the following is not an attribute of OSPF?
A. Security
B. The use of IP multicasts to send out router updates
C. No limitation for hop count
D. Subject to route poisoning
A
Subject to route poisoning
3
Q
3. Which of the following makes UDP harder to scan for? A. Low overhead B. Lack of startup and shutdown C. Speed D. Versatility
A
Lack of startup and shutdown
4
Q
4. Which of the following best describes how ICMP is used? A. Packet delivery B. Error detection and correction C. Logical errors and diagnostics D. IP packet delivery
A
Logical errors and diagnostics
5
Q
- The most common type of ICMP message is ________.
A
Ping
6
Q
- Which of the following statements most closely expresses the difference in routing and routable protocols?
A. IP is a routing protocol, whereas RIP is a routable protocol.
B. OSPF is a routing protocol, whereas IP is a routable protocol.
C. BGP is used as a routable protocol, whereas RIP is a routing protocol.
D. Routable protocols are used to define the best path from point A to point B, while routing protocols are used to transport the data.
A
OSPF is a routing protocol, whereas IP is a routable protocol
7
Q
7. What is another way used to describe Ethernet? A. Collision detection B. Sends traffic to all nodes on a hub C. CSMA/CD D. All of the above
A
All Answers are correct
Collision detection
Sends traffic to all nodes on a hub
CSMA/CD
8
Q
- Botnets are used to bypass the functionality of a switch.
A. True B. False
A
False
9
Q
9. What is a security vulnerability found in RIP? A. Slow convergence B. Travels only 56 hops C. No authentication D. Distance vector
A
No authentication
10
Q
10. Which of the following best describes the role of IP? A. Guaranteed delivery B. Best effort at delivery C. Establishes sessions by means of a handshake process D. Is considered an OSI Layer 2 protocol
A
Best effort at delivery