Midterm Flashcards
Which IPv6 Multicast Address Space below is for all OSPFv3 ALL OSPF Routers.
FF02::5
An IPv6 ________ address is equivalent to an IPv4 public address.
Global unicast
Which classes defined for IPv4 are not used for unicast? (Select all correct answers.)
Class D, Class E
What special address is used for the IPv6 loopback?
::1
Which IPv6 Multicast Address Space below is for all all nodes on the local network segment.
FF02::1
In the IPv4 header, what is the size of the source and destination address fields?
32 bits
The length of the IPv6 address is ________ bits.
128
The term octet is used to describe what size of binary number?
8 bit
An IP address consists of a 32-bit binary number. When written like this: 192.168.1.1, it is known as ________ notation.
dotted-decimal
What class of IPv4 address includes the first octet numbers from 192 to 223?
Class C
From the following list, identify a valid Class B IP address:
129.112.54.6
IP multicasting is available for both:
IPv6, IPv4
Variable-Length Subnetting allows for:
maximum flexibility in choosing how to partition subnetting
Which of the following are public IP network IDs? (Choose two.)
172.32.0.0
8.0.0.0
________ defines a method of further subdividing the IPv4 address space into groups that are smaller than a single IP (classful) network.
subnetting
What class of IPv4 address includes the first octet numbers from 128 to 191?
Class B
Fixed-Lenth IPV4 Subnets are an example of
Classful IPV4 Network Addresses
Which IPv4 Multicast Address Space below is restricted to one network
224.0.0.1 - 224.0.0.255
All addresses that begin (in hex) with the digits FF are ________ addresses.
Multicast
Which IPv6 Multicast Address Space below is for all EIGRP routers
FF02::a
What is the binary equivalent of the hex digit C?
1100
Which layer of the TCP/IP network model specifies how packets travel end to end over a TCP/IP network?
network
When designing IP subnets, the ________ defines the size of the subnet.
subnet mask
The 32-bit subnet mask below is represented in dotted decimal representation as
11111111 11111111 11111111 00000000
255.255.255.0
How many bits is an IPV4 Address?
32
What type of protocol at the Link Layer has one sender, one receiver, one link? MAC addresses are normally not used.
point-to-point protocol
How many bits is a MAC Address?
48
What type of port carries frames between VLANS defined over multiple physical switches?
trunk port
When STP has placed a port in the blocked state, this port ________.
cannot receive or forward data frames
The IEEE 802.1Q standard adds a ________-byte tag to the original frame to identify the VLAN.
4
The IEEE defines three general categories of Ethernet MAC addresses. What are these three types? (Choose three.)
broadcast, multicast, unicast
What is the process on a NIC card called that determines Duplex & Speed?
auto negotiation
When configuring a trunk between two switches, which dynamic trunking mode should be used to always initiate a trunking connection?
dynamic desirable
How many bits within the IEEE 802.1Q tag are used to identify the VLAN of the frame?
12
A Layer 2 switch examines the source _____________ in each incoming frame to build a table that matches ________________ to each switch port.
MAC address
What three problems are solved through the use of Spanning Tree Protocol?
MAC table Instability
Multiple frame transmission
Broadcast Storm
What is a MAC Address?
A media access control address to identify a unique network interface controller card.
A Layer 2 VLAN switch allows the network manager to assign each port to a specific ___________.
VLAN
When connecting multiple switches with redundant links, which of the following protocols helps to ensure that you will have a loop-free Ethernet network?
STP
A ________ consists of all devices in the same broadcast domain.
LAN
What Layer of the OSI Model describes communication utilizing MAC address communication?
2
What is the name of the process that is defined by IEEE 802.1Q to relay traffic from multiple VLANs?
VLAN tagging
For Ethernet, IEEE standard 802.1Q specifies placing a ______________ field after the MAC source address.
VLAN tag
What protocol defines wireless LAN?
802.11
Which link-layer device takes an active role to forward ethernet frames using incoming MAC address frames?
switch
Which term can be used as an equivalent to default router?
default gateway
Transmission of an IP datagram between two machines on a single physical network occurs:
locally, between physical hardware addresses and sends the resulting frame directly to the destination.
ARP stands for:?
Address Resolution Protocol
What type of attack involves the proxy facility to masquerade as some host?
ARP
An ARP reply carries: (Check All that Apply)
the IPv4 address and hardware address of the sender
the IPv4 address and hardware address of the original requester
In practice, ARP is only used to:?
map a 32-bit IPv4 address to a 48-bit ethernet address
Which ARP destination address request below is accepted by all computers?
FF:FF:FF:FF:FF:FF
What is included in every ARP broadcast?
the sender’s IP-to-hardware address binding
What command can be used on most modern PC operating systems to display the contents of the ARP cache from the CLI?
arp -a
Pick the true statement below.
ARP Requests to all hosts do not cross Broadcast domains through a router to other routers.
What does an ARP Table contain?
the table matches an IP address with the associated MAC address
Which protocol does a router use to obtain the MAC address of a PC host located on a directly connected subnet?
ARP
IPv6 does not support traditional MTU, rather IPv6 uses a trial-an-error mechanism called:
Path MTU Discovery (PMTUD)
Ethernet limits data transfter to how many octets of data?
1500
________ is a transport layer protocol that is connectionless and provides no reliability, no windowing, no reordering, and no segmentation.
UDP
If a datagram is fragmented, where is the gramented datagram reassembled?
the ultimate destination reassembles fragments (the destination host)
What does UDP mean:
User Datagram Protocol
________ protocol describes data sent over the network as packets, while ________ protocol desribes data sent over the network as datagrams.
TCP, UDP
____________ is based on the idea that a host has a “home” network but may visit other networks from time to time.
mobile IP
In IPv6, fragmentation of a datagram is performed by:
the original source
A typical IPV6 header contains _____ bytes (no options).
40
The IPv6 Fragment header contains a ___________ Identifcation field, similiar to IPV4, but twice as large.
32-bit
The ___________ field in the IPV4 header contains a number indicating the type of data found in the payload portino of the datagram.
protocol
A typical IPV4 header contains _____ bytes (no options).
20
Internet Protocol defines two major protocols. What are the two major protocols:
TCP, UDP
A host that might move is called a _____________, and the hosts with which it is communication are called ___________.
mobile node, correspondent nodes
A routing or forwarding table contains the following below. (check all that apply)
Interface
Next-Hop
Mask
Destination
What do we mean by unreliable when considering IP Service, UDP as an example:
the packet delivery is not guaranteed
Internet Protocol is a fundamental Internet Server consisting of a packet delivery system, which consists of UDP, a service is defined as: (Check all that Apply)
Connectionless Packet Delivery
Unreliable
Best Effort
IP Software in each machine along a path from source to destination decrements the TTL or HOP Count. What happens when the field reaches zero?
the datagram is discarded
________ provides for retransmission and helps to avoid congestion, whereas ________ does not.
TCP, UDP
The values for the IPv6 Next Header field may indicate extensions or header for other protocols. Select all of the IPV6 extension header mechanisms below.
Encapsulating Security Payload (ESP)
Mobility (MIPv6)
Fragment
ICMPv6
The ___________ field helps indetify each datagram sent by an IPV4 host.
identification
A typical IP header contains the source and destination for: (Check-all-that-Apply)
IPv4, IPv6 Addresses
IP supports a number of options that may be selected on a per-datagram basis. Select all of the options below.
Source Routing
Timestamp
The ___________ field is calculated over the IPV4 header only, not the payload.
header checksum
What makes MIPv6 work in a relatively simple way, and with CNs that are not Mobile-IP-aware?
bidirectional tunneling
The ___________ field sets an upper limit on the number of routers through which a datagram can pass.
time-to-live
Moving a host to a new network requires one of two possible changes: (Click all that Apply)
The host’s address must change
datagram forwarding must change
What portion of the IP protocol specifies how long a datagram will be allowed to remain on the internet (Check all that apply)?
TIME-TO-LIVE (IPv4)
HOP LIMIT (IPv6)
The process of dividing a datagram is known as ________.
fragmentation
DHCP permits a computer to obtain all the information needed to communicate on a given network including: (Check-all-that-Apply)
Default Router
Subnet Mask
IPv4 Address
What protocol can be used to automatically assign IP addresses and other parameters to a host or router?
DHCP
Select the major functions fthat NDP Provides (Select-all-that-Apply)
DNS Server Discovery
Stateless Autoconfiguration
Duplicate Address Detection (DAD)
Router Discovery
Neighbor Discovery
Address Resolution
The optimal time for a DHCP lease depends on:
the particular network and the needs of a particular host
DHCP protocol is defined as:
Dynamic Host Configuration Protocol
A DHCP server leases an address to a client for a ______________period of time.
finite
IF the DHCP server sits on another link (lan) as compared to the client, a router can be configured as a _________________ to foward requests across networks.
DHCP relay agent
An alternative method of DHCP for Ipv6 is:
stateless address autoconfiguration (SLAAC)
IPv6 uses Nieghbor Solicitation and Neighbor Advertisements messages to determine if an IPv6 address is already in use. What process is this called?
Duplicate Address Detection (DAD)
SLAAC utilizes which protocol to learn the IPv6 Prefix (netmask).
Neighbor Discovery Protocol
IPv6 utilizes Neighbor Discovery Protocol (NDP) operating at the following layers: (Select-all-that-Apply)
layer 2, 3
What three types of address assignment does DHCP allow? (Check-all-that-Apply)
dynamic, static, automatic
What other method besides DHCP is used; for example connections such as DSL.
PPP over Ethernet (PPPoE)
An alternative method of DHCP for Ipv6 is:
Stateless Address autoconfiguration (SLAAC)
NDP defines five ICMPv6 message types:
Redirect
Neighbor Advertisement
Neighbor Solicitation
Router Advertisement
Router Solicitation
What technology is used to translate an internal private ip address to a public IP address on the internet.
Network Address Translation (NAT)
To be effective, a firewall that uses datagram (packet) filtering should restrict access to all: (Check-all-that-Apply)
IP sources
protocol ports
protocols
IP desitnations
What protocol provides a way for two or more systems to communicate even if they are located behind relatively uncooperative NATS?
Traversal Using Relays around NAT(TURN)
A NAT Translation Table stores stores:
Internal IP & Port
External IP & Port
NAT Port
Payload Type
ICMP, Internet Control Message Protocol provides status information about IP Packets. When an CIMP error message passed through NAT, the addressses in the ___________________ need to be rewritten by NAT, so that the end client understands the ICMP error message.
offending datagram
What is NAT called on a Windows System?
Internet Connection Sharing (ICS)
Which generic facility has been develped to help UDP-based application hosted behind a NAT establish connectivity?
Interactive Connectivity Establishment (ICE)
What are the two major types of firewalls commonly used:
proxy firewalls
packet-filtering firewalls
A method that attempts to allow two or more systems, each behind NAT, to communicate directly using pinholes is called:
hole punching
One of the primary workhorses for UNSAF and NAT traversal is called:
STUN
Although serveral variants of NAT exist, the ________________ form is the most popular because it translates protocol port numbers as well as IP Addresses
Network Address and Port Translation (NAPT)
Proxy firewalls are not really Internet routers, but are essentially hosts running one or more _____________ that relay traffic of certain types between one connection/associatin and another application layer.
application-layer gateways (ALGs)
Which protocol below is a relatively simple client/server portocol that is able to ascertain the external IP address and port numbers being used on a NAT in most circumstances?
STUN
One of the popular systems for building firewalls is included with modern versions of Linux and is called:
iptables
Packet-filtering firewalls act as Internet routers and __________ some traffic.
filter (drop)
When configuring firewalls on a router, the network administrator configures one or more:
Access Control List (ACL)
____________________ technology provides transparent IP-live access to the Internet for a host that has a private, non-routable IP Addres. ex….10.0.0.6
Network Address Translation (NAT)
What are the two most common forms of proxy firewalls?
SOCKS firewalls
HTTP proxy Firewalls
What is NAT called on Linux Systems?
IP masquerading
Which protocols does STUN utilize below? Check-all-that-apply
UDP
TCP w/TLS
TCP
When a datagram causes an error, ICMP can only report the error condition back to:
the original source of the datagram
What is the mechanism is considered a required part of IP:
Internet Control Message Protocol
Which protocol allows routers to send error or control messages back to the source of a datagram that caused a problem?
ICMP
NDP operates at Layer 3 by using ICMPv6 meesages. Select the major functions fthat NDP Provides (Select-all-that-Apply)
Router Discovery
Stateless Autoconfiguration
Neighbor Discovery
Duplicate Address Detection (DAD)
DNS Server Discovery
Address Resoultion
Secure Neighbor Discovery uses an entirely different IPv6 address called a:
cryptographically generated address (CGA)
Whenever an error prevents a router from forwarding or delivering a datagram, the router sends this type of ICMP message back to the source:?
Destination Unreachable
Which IPv6 ICMP protocol and a feature of ND is used to detect when reachability between two systems on the same link has become lost?
Neighbor Unreachability Detection (NUD)
Which protocol is a special set of enhancements aimed at providing additional security for IPV6 ICMP ND messages?
Secure Neighbor Discovery (SEND)
Because internet routers each use local information when forwarding datagrams, error can develop which can product routing loops. To prevent these loops, each IP datagram contains a hop limit, when this hop limit is reached, the router discards the datagram and send the following ICMP message:
Time Exceeded
What protocol below is used in mobile IPv6
FMIP
ICMP messages provide commu ncation between:
an ICMP module on one machine and an ICMP module on another
What are the three standard fields that ICMP messages begin with? (Check all that Apply)
Code Field
Type Field
Checksum Field
Using the ping command, ICMP utilizes the following message types: (Check all that Apply)
Echo Reply
Echo Request
Routers are prohibited from fragmenting an IPv6 Datagram. The source sending the datagram must perform a path MTU discovery. Which IPv6 ICMP message is used for this?
Packet Too Big
NDP defines five ICMPv6 message types:
Router Advertisement
Neighbor Advertisement
Redirect
Router Solicitation
Neighbor Solicitation
How many levels of encapsulation are requirement when an ICMP message travels in an IP datagram?
2 layers
The ping command utilizes the following protocol?
ICMP
When a router detects a host using a nonoptimal first hop, the router send the host the ofllowing ICMP message:
Redirect Message
Which IPv6 Multicast Address Space below is for all EIGRP routers
FF02::a
Which specific protocols below support Multicast traffic?
MLD
IGMP
Some hardware technologies support a second form of multi-point delivery called hardware _______.
multicast
Which term below refers to a single device trasmitting a message to all other devices on the subnet?
broadcast
Which IPv6 Multicast Address Space below is for all all nodes on the local network segment.
FF02::1
Which term below refers to a single device trasmitting a message to a specific group of devices on the subnet?
multicast
IP multicasting is availabe for both:
IPv6
IPv4
Which IPv6 Multicast Address Space below is for all OSPFv3 ALLSPF Routers.
FF05::5
A ________________ is a term to dentoe the set of computers that are listening to a particular multicast address.
multicast group
Which term below refers to sending a frame from host to host.
unicast
Which IPv4 Multicast Address Space below is for all OSPFIGP Routers.
224.0.0.5
Which IPv4 Multicast Address Space below is for all systems on this subnet
224.0.0.1
Which specific protocols below supports Multicast traffic for IPV6?
MLD
IGMP works with multicast and has two phases:
when a host joins a multicast group, the host sends an IGMP message to the groups multicast declaring its membership.
local multicast routers periodically poll hosts on the local network to determine whether any hosts still remain members of each group.
Which IPv4 Multicast Address Space below is global across the internet.
224.0.1.0 - 238.255.255.255
IGMP is considered to be a service that is integrated with the IP Layer and stands for:
Internet Group Managment Protocol
Which specific protocols below support Multicast traffic for IPV4?
IGMP
Which IPv4 Multicast Address Space below is restricted to one network
224.0.0.1 - 224.0.0.255
Which IPv6 Multicast Address Space below is for all EIGRP routers
FF02::a
Which IPv6 Multicast Address Space below is for all all nodes on the local network segment.
FF02::1
The ARPANET reference model was utilimately adopted and called the:?
TCP/IP Model
Which protocol is considered a reliable flow of data between two hosts?
TCP
When type of devices forward packets to another network across the internet?
Routers
What defines the primary goal to develop an effective technique for multiplexed utilization of existing interconnected networks?
Internet Architecture
When utilizing a Uniform Resource Locator (URL) to access www.google.com, an IP Address is needed, because packets are routed to the destination using the IP Address. What service is used to convert a URL to a IP Address?
Domain Name System (DNS)
What Internet Protocol is considered a layer 3.5 protocol and is uses to exchange error messages and other vital information ?
Internet Control Message Protocol (ICMP)
There are some circumstances where data within a network gets corrupt, damaged, or lost. Dealing with this is called:
Error Control
What network standards did the Defense Advanced Research Project Agency (DARPA) provide? Hint: Draws its origins from ARPANET
TCP/IP Internet Protocol Suite
What defines “chunks” of digitial information comprsiong some number of bytes carried through the network somewhat independently?
Packet Switching
How many bits is an IPV6 Address?
128
The Transport layer (TCP) of the TCP/IP Model opens sockets between two hosts (Also called ports), what is a commend port number for HTTP?
80
What Internet Protocol is to send multicast addressing and delivery messages to manage which hosts are members of a multcast group. ?
Internet Group Management Protocol (IGMP)
How many bits is an IPV4 Address?
32
How is every official standard in the Internet community published?
Request For Comments (RFC)
What defines the format and order of messages exchanged between two or more communicating entities, as well as the actions taken on the transmission and/or recipt of a message or other event.
protocol
THe simjplest method for scheduling the way packets are processed as they move through the network is:
First in First Out (FIFO)
What are some of the secondary goals for Internet Architecure? (Select all that Apply)
(all)
The reosurces used in the Internet archtecutre must be accountable.
The Internet must support multiple types of communication services
The internet communcaiton must continue despite loss of networks or gateways
The Internet architecture must permit host attachment with a low level of effort.
The Internet architecture must permit distributed management of its resources.
The Internet archictures must accommodate a variety of networks.
The internet architecure must be cost-effective.
Porotol Multiplexing is a benefit of a layered architecture allowing multiple protocols to coexist on the same infrastructure. In networks, a protocol data unit, at one layer is carried bya a lower layer. This process is also defined as:
encapsulation
What is the most frequently mentioned concept of protocol layering as defined by the International Organization for Standardization (ISO)?
Open Systems Interconnection (OSI) Model
Which protocol is provides a simpler service to the application layer, but no guranteed that the datagrams will reach the host?
UDP