Midterm Flashcards
Which IPv6 Multicast Address Space below is for all OSPFv3 ALL OSPF Routers.
FF02::5
An IPv6 ________ address is equivalent to an IPv4 public address.
Global unicast
Which classes defined for IPv4 are not used for unicast? (Select all correct answers.)
Class D, Class E
What special address is used for the IPv6 loopback?
::1
Which IPv6 Multicast Address Space below is for all all nodes on the local network segment.
FF02::1
In the IPv4 header, what is the size of the source and destination address fields?
32 bits
The length of the IPv6 address is ________ bits.
128
The term octet is used to describe what size of binary number?
8 bit
An IP address consists of a 32-bit binary number. When written like this: 192.168.1.1, it is known as ________ notation.
dotted-decimal
What class of IPv4 address includes the first octet numbers from 192 to 223?
Class C
From the following list, identify a valid Class B IP address:
129.112.54.6
IP multicasting is available for both:
IPv6, IPv4
Variable-Length Subnetting allows for:
maximum flexibility in choosing how to partition subnetting
Which of the following are public IP network IDs? (Choose two.)
172.32.0.0
8.0.0.0
________ defines a method of further subdividing the IPv4 address space into groups that are smaller than a single IP (classful) network.
subnetting
What class of IPv4 address includes the first octet numbers from 128 to 191?
Class B
Fixed-Lenth IPV4 Subnets are an example of
Classful IPV4 Network Addresses
Which IPv4 Multicast Address Space below is restricted to one network
224.0.0.1 - 224.0.0.255
All addresses that begin (in hex) with the digits FF are ________ addresses.
Multicast
Which IPv6 Multicast Address Space below is for all EIGRP routers
FF02::a
What is the binary equivalent of the hex digit C?
1100
Which layer of the TCP/IP network model specifies how packets travel end to end over a TCP/IP network?
network
When designing IP subnets, the ________ defines the size of the subnet.
subnet mask
The 32-bit subnet mask below is represented in dotted decimal representation as
11111111 11111111 11111111 00000000
255.255.255.0
How many bits is an IPV4 Address?
32
What type of protocol at the Link Layer has one sender, one receiver, one link? MAC addresses are normally not used.
point-to-point protocol
How many bits is a MAC Address?
48
What type of port carries frames between VLANS defined over multiple physical switches?
trunk port
When STP has placed a port in the blocked state, this port ________.
cannot receive or forward data frames
The IEEE 802.1Q standard adds a ________-byte tag to the original frame to identify the VLAN.
4
The IEEE defines three general categories of Ethernet MAC addresses. What are these three types? (Choose three.)
broadcast, multicast, unicast
What is the process on a NIC card called that determines Duplex & Speed?
auto negotiation
When configuring a trunk between two switches, which dynamic trunking mode should be used to always initiate a trunking connection?
dynamic desirable
How many bits within the IEEE 802.1Q tag are used to identify the VLAN of the frame?
12
A Layer 2 switch examines the source _____________ in each incoming frame to build a table that matches ________________ to each switch port.
MAC address
What three problems are solved through the use of Spanning Tree Protocol?
MAC table Instability
Multiple frame transmission
Broadcast Storm
What is a MAC Address?
A media access control address to identify a unique network interface controller card.
A Layer 2 VLAN switch allows the network manager to assign each port to a specific ___________.
VLAN
When connecting multiple switches with redundant links, which of the following protocols helps to ensure that you will have a loop-free Ethernet network?
STP
A ________ consists of all devices in the same broadcast domain.
LAN
What Layer of the OSI Model describes communication utilizing MAC address communication?
2
What is the name of the process that is defined by IEEE 802.1Q to relay traffic from multiple VLANs?
VLAN tagging
For Ethernet, IEEE standard 802.1Q specifies placing a ______________ field after the MAC source address.
VLAN tag
What protocol defines wireless LAN?
802.11
Which link-layer device takes an active role to forward ethernet frames using incoming MAC address frames?
switch
Which term can be used as an equivalent to default router?
default gateway
Transmission of an IP datagram between two machines on a single physical network occurs:
locally, between physical hardware addresses and sends the resulting frame directly to the destination.
ARP stands for:?
Address Resolution Protocol
What type of attack involves the proxy facility to masquerade as some host?
ARP
An ARP reply carries: (Check All that Apply)
the IPv4 address and hardware address of the sender
the IPv4 address and hardware address of the original requester
In practice, ARP is only used to:?
map a 32-bit IPv4 address to a 48-bit ethernet address
Which ARP destination address request below is accepted by all computers?
FF:FF:FF:FF:FF:FF
What is included in every ARP broadcast?
the sender’s IP-to-hardware address binding
What command can be used on most modern PC operating systems to display the contents of the ARP cache from the CLI?
arp -a
Pick the true statement below.
ARP Requests to all hosts do not cross Broadcast domains through a router to other routers.
What does an ARP Table contain?
the table matches an IP address with the associated MAC address
Which protocol does a router use to obtain the MAC address of a PC host located on a directly connected subnet?
ARP
IPv6 does not support traditional MTU, rather IPv6 uses a trial-an-error mechanism called:
Path MTU Discovery (PMTUD)
Ethernet limits data transfter to how many octets of data?
1500
________ is a transport layer protocol that is connectionless and provides no reliability, no windowing, no reordering, and no segmentation.
UDP
If a datagram is fragmented, where is the gramented datagram reassembled?
the ultimate destination reassembles fragments (the destination host)
What does UDP mean:
User Datagram Protocol
________ protocol describes data sent over the network as packets, while ________ protocol desribes data sent over the network as datagrams.
TCP, UDP
____________ is based on the idea that a host has a “home” network but may visit other networks from time to time.
mobile IP
In IPv6, fragmentation of a datagram is performed by:
the original source
A typical IPV6 header contains _____ bytes (no options).
40
The IPv6 Fragment header contains a ___________ Identifcation field, similiar to IPV4, but twice as large.
32-bit
The ___________ field in the IPV4 header contains a number indicating the type of data found in the payload portino of the datagram.
protocol
A typical IPV4 header contains _____ bytes (no options).
20
Internet Protocol defines two major protocols. What are the two major protocols:
TCP, UDP
A host that might move is called a _____________, and the hosts with which it is communication are called ___________.
mobile node, correspondent nodes