Midterm Flashcards

1
Q

Which IPv6 Multicast Address Space below is for all OSPFv3 ALL OSPF Routers.

A

FF02::5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An IPv6 ________ address is equivalent to an IPv4 public address.

A

Global unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which classes defined for IPv4 are not used for unicast? (Select all correct answers.)

A

Class D, Class E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What special address is used for the IPv6 loopback?

A

::1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which IPv6 Multicast Address Space below is for all all nodes on the local network segment.

A

FF02::1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the IPv4 header, what is the size of the source and destination address fields?

A

32 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The length of the IPv6 address is ________ bits.

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The term octet is used to describe what size of binary number?

A

8 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An IP address consists of a 32-bit binary number. When written like this: 192.168.1.1, it is known as ________ notation.

A

dotted-decimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What class of IPv4 address includes the first octet numbers from 192 to 223?

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

From the following list, identify a valid Class B IP address:

A

129.112.54.6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IP multicasting is available for both:

A

IPv6, IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Variable-Length Subnetting allows for:

A

maximum flexibility in choosing how to partition subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following are public IP network IDs? (Choose two.)

A

172.32.0.0
8.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

________ defines a method of further subdividing the IPv4 address space into groups that are smaller than a single IP (classful) network.

A

subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What class of IPv4 address includes the first octet numbers from 128 to 191?

A

Class B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fixed-Lenth IPV4 Subnets are an example of

A

Classful IPV4 Network Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which IPv4 Multicast Address Space below is restricted to one network

A

224.0.0.1 - 224.0.0.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

All addresses that begin (in hex) with the digits FF are ________ addresses.

A

Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which IPv6 Multicast Address Space below is for all EIGRP routers

A

FF02::a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the binary equivalent of the hex digit C?

A

1100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which layer of the TCP/IP network model specifies how packets travel end to end over a TCP/IP network?

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When designing IP subnets, the ________ defines the size of the subnet.

A

subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The 32-bit subnet mask below is represented in dotted decimal representation as
11111111 11111111 11111111 00000000

A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How many bits is an IPV4 Address?

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What type of protocol at the Link Layer has one sender, one receiver, one link? MAC addresses are normally not used.

A

point-to-point protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How many bits is a MAC Address?

A

48

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What type of port carries frames between VLANS defined over multiple physical switches?

A

trunk port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

When STP has placed a port in the blocked state, this port ________.

A

cannot receive or forward data frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The IEEE 802.1Q standard adds a ________-byte tag to the original frame to identify the VLAN.

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The IEEE defines three general categories of Ethernet MAC addresses. What are these three types? (Choose three.)

A

broadcast, multicast, unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the process on a NIC card called that determines Duplex & Speed?

A

auto negotiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

When configuring a trunk between two switches, which dynamic trunking mode should be used to always initiate a trunking connection?

A

dynamic desirable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

How many bits within the IEEE 802.1Q tag are used to identify the VLAN of the frame?

A

12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A Layer 2 switch examines the source _____________ in each incoming frame to build a table that matches ________________ to each switch port.

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What three problems are solved through the use of Spanning Tree Protocol?

A

MAC table Instability
Multiple frame transmission
Broadcast Storm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a MAC Address?

A

A media access control address to identify a unique network interface controller card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A Layer 2 VLAN switch allows the network manager to assign each port to a specific ___________.

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

When connecting multiple switches with redundant links, which of the following protocols helps to ensure that you will have a loop-free Ethernet network?

A

STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A ________ consists of all devices in the same broadcast domain.

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What Layer of the OSI Model describes communication utilizing MAC address communication?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the name of the process that is defined by IEEE 802.1Q to relay traffic from multiple VLANs?

A

VLAN tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

For Ethernet, IEEE standard 802.1Q specifies placing a ______________ field after the MAC source address.

A

VLAN tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What protocol defines wireless LAN?

A

802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which link-layer device takes an active role to forward ethernet frames using incoming MAC address frames?

A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which term can be used as an equivalent to default router?

A

default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Transmission of an IP datagram between two machines on a single physical network occurs:

A

locally, between physical hardware addresses and sends the resulting frame directly to the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

ARP stands for:?

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What type of attack involves the proxy facility to masquerade as some host?

A

ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

An ARP reply carries: (Check All that Apply)

A

the IPv4 address and hardware address of the sender
the IPv4 address and hardware address of the original requester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

In practice, ARP is only used to:?

A

map a 32-bit IPv4 address to a 48-bit ethernet address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which ARP destination address request below is accepted by all computers?

A

FF:FF:FF:FF:FF:FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is included in every ARP broadcast?

A

the sender’s IP-to-hardware address binding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What command can be used on most modern PC operating systems to display the contents of the ARP cache from the CLI?

A

arp -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Pick the true statement below.

A

ARP Requests to all hosts do not cross Broadcast domains through a router to other routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What does an ARP Table contain?

A

the table matches an IP address with the associated MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which protocol does a router use to obtain the MAC address of a PC host located on a directly connected subnet?

A

ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

IPv6 does not support traditional MTU, rather IPv6 uses a trial-an-error mechanism called:

A

Path MTU Discovery (PMTUD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Ethernet limits data transfter to how many octets of data?

A

1500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

________ is a transport layer protocol that is connectionless and provides no reliability, no windowing, no reordering, and no segmentation.

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

If a datagram is fragmented, where is the gramented datagram reassembled?

A

the ultimate destination reassembles fragments (the destination host)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What does UDP mean:

A

User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

________ protocol describes data sent over the network as packets, while ________ protocol desribes data sent over the network as datagrams.

A

TCP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

____________ is based on the idea that a host has a “home” network but may visit other networks from time to time.

A

mobile IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

In IPv6, fragmentation of a datagram is performed by:

A

the original source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A typical IPV6 header contains _____ bytes (no options).

A

40

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

The IPv6 Fragment header contains a ___________ Identifcation field, similiar to IPV4, but twice as large.

A

32-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

The ___________ field in the IPV4 header contains a number indicating the type of data found in the payload portino of the datagram.

A

protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A typical IPV4 header contains _____ bytes (no options).

A

20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Internet Protocol defines two major protocols. What are the two major protocols:

A

TCP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

A host that might move is called a _____________, and the hosts with which it is communication are called ___________.

A

mobile node, correspondent nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

A routing or forwarding table contains the following below. (check all that apply)

A

Interface
Next-Hop
Mask
Destination

73
Q

What do we mean by unreliable when considering IP Service, UDP as an example:

A

the packet delivery is not guaranteed

74
Q

Internet Protocol is a fundamental Internet Server consisting of a packet delivery system, which consists of UDP, a service is defined as: (Check all that Apply)

A

Connectionless Packet Delivery
Unreliable
Best Effort

75
Q

IP Software in each machine along a path from source to destination decrements the TTL or HOP Count. What happens when the field reaches zero?

A

the datagram is discarded

76
Q

________ provides for retransmission and helps to avoid congestion, whereas ________ does not.

A

TCP, UDP

77
Q

The values for the IPv6 Next Header field may indicate extensions or header for other protocols. Select all of the IPV6 extension header mechanisms below.

A

Encapsulating Security Payload (ESP)
Mobility (MIPv6)
Fragment
ICMPv6

78
Q

The ___________ field helps indetify each datagram sent by an IPV4 host.

A

identification

79
Q

A typical IP header contains the source and destination for: (Check-all-that-Apply)

A

IPv4, IPv6 Addresses

80
Q

IP supports a number of options that may be selected on a per-datagram basis. Select all of the options below.

A

Source Routing
Timestamp

81
Q

The ___________ field is calculated over the IPV4 header only, not the payload.

A

header checksum

82
Q

What makes MIPv6 work in a relatively simple way, and with CNs that are not Mobile-IP-aware?

A

bidirectional tunneling

83
Q

The ___________ field sets an upper limit on the number of routers through which a datagram can pass.

A

time-to-live

84
Q

Moving a host to a new network requires one of two possible changes: (Click all that Apply)

A

The host’s address must change
datagram forwarding must change

85
Q

What portion of the IP protocol specifies how long a datagram will be allowed to remain on the internet (Check all that apply)?

A

TIME-TO-LIVE (IPv4)
HOP LIMIT (IPv6)

86
Q

The process of dividing a datagram is known as ________.

A

fragmentation

87
Q

DHCP permits a computer to obtain all the information needed to communicate on a given network including: (Check-all-that-Apply)

A

Default Router
Subnet Mask
IPv4 Address

88
Q

What protocol can be used to automatically assign IP addresses and other parameters to a host or router?

A

DHCP

89
Q

Select the major functions fthat NDP Provides (Select-all-that-Apply)

A

DNS Server Discovery
Stateless Autoconfiguration
Duplicate Address Detection (DAD)
Router Discovery
Neighbor Discovery
Address Resolution

90
Q

The optimal time for a DHCP lease depends on:

A

the particular network and the needs of a particular host

91
Q

DHCP protocol is defined as:

A

Dynamic Host Configuration Protocol

92
Q

A DHCP server leases an address to a client for a ______________period of time.

A

finite

93
Q

IF the DHCP server sits on another link (lan) as compared to the client, a router can be configured as a _________________ to foward requests across networks.

A

DHCP relay agent

94
Q

An alternative method of DHCP for Ipv6 is:

A

stateless address autoconfiguration (SLAAC)

95
Q

IPv6 uses Nieghbor Solicitation and Neighbor Advertisements messages to determine if an IPv6 address is already in use. What process is this called?

A

Duplicate Address Detection (DAD)

96
Q

SLAAC utilizes which protocol to learn the IPv6 Prefix (netmask).

A

Neighbor Discovery Protocol

97
Q

IPv6 utilizes Neighbor Discovery Protocol (NDP) operating at the following layers: (Select-all-that-Apply)

A

layer 2, 3

98
Q

What three types of address assignment does DHCP allow? (Check-all-that-Apply)

A

dynamic, static, automatic

99
Q

What other method besides DHCP is used; for example connections such as DSL.

A

PPP over Ethernet (PPPoE)

100
Q

An alternative method of DHCP for Ipv6 is:

A

Stateless Address autoconfiguration (SLAAC)

101
Q

NDP defines five ICMPv6 message types:

A

Redirect
Neighbor Advertisement
Neighbor Solicitation
Router Advertisement
Router Solicitation

102
Q

What technology is used to translate an internal private ip address to a public IP address on the internet.

A

Network Address Translation (NAT)

103
Q

To be effective, a firewall that uses datagram (packet) filtering should restrict access to all: (Check-all-that-Apply)

A

IP sources
protocol ports
protocols
IP desitnations

104
Q

What protocol provides a way for two or more systems to communicate even if they are located behind relatively uncooperative NATS?

A

Traversal Using Relays around NAT(TURN)

105
Q

A NAT Translation Table stores stores:

A

Internal IP & Port
External IP & Port
NAT Port
Payload Type

106
Q

ICMP, Internet Control Message Protocol provides status information about IP Packets. When an CIMP error message passed through NAT, the addressses in the ___________________ need to be rewritten by NAT, so that the end client understands the ICMP error message.

A

offending datagram

107
Q

What is NAT called on a Windows System?

A

Internet Connection Sharing (ICS)

108
Q

Which generic facility has been develped to help UDP-based application hosted behind a NAT establish connectivity?

A

Interactive Connectivity Establishment (ICE)

109
Q

What are the two major types of firewalls commonly used:

A

proxy firewalls
packet-filtering firewalls

110
Q

A method that attempts to allow two or more systems, each behind NAT, to communicate directly using pinholes is called:

A

hole punching

111
Q

One of the primary workhorses for UNSAF and NAT traversal is called:

A

STUN

112
Q

Although serveral variants of NAT exist, the ________________ form is the most popular because it translates protocol port numbers as well as IP Addresses

A

Network Address and Port Translation (NAPT)

113
Q

Proxy firewalls are not really Internet routers, but are essentially hosts running one or more _____________ that relay traffic of certain types between one connection/associatin and another application layer.

A

application-layer gateways (ALGs)

114
Q

Which protocol below is a relatively simple client/server portocol that is able to ascertain the external IP address and port numbers being used on a NAT in most circumstances?

A

STUN

115
Q

One of the popular systems for building firewalls is included with modern versions of Linux and is called:

A

iptables

116
Q

Packet-filtering firewalls act as Internet routers and __________ some traffic.

A

filter (drop)

117
Q

When configuring firewalls on a router, the network administrator configures one or more:

A

Access Control List (ACL)

118
Q

____________________ technology provides transparent IP-live access to the Internet for a host that has a private, non-routable IP Addres. ex….10.0.0.6

A

Network Address Translation (NAT)

119
Q

What are the two most common forms of proxy firewalls?

A

SOCKS firewalls
HTTP proxy Firewalls

120
Q

What is NAT called on Linux Systems?

A

IP masquerading

121
Q

Which protocols does STUN utilize below? Check-all-that-apply

A

UDP
TCP w/TLS
TCP

122
Q

When a datagram causes an error, ICMP can only report the error condition back to:

A

the original source of the datagram

123
Q

What is the mechanism is considered a required part of IP:

A

Internet Control Message Protocol

124
Q

Which protocol allows routers to send error or control messages back to the source of a datagram that caused a problem?

A

ICMP

125
Q

NDP operates at Layer 3 by using ICMPv6 meesages. Select the major functions fthat NDP Provides (Select-all-that-Apply)

A

Router Discovery
Stateless Autoconfiguration
Neighbor Discovery
Duplicate Address Detection (DAD)
DNS Server Discovery
Address Resoultion

126
Q

Secure Neighbor Discovery uses an entirely different IPv6 address called a:

A

cryptographically generated address (CGA)

127
Q

Whenever an error prevents a router from forwarding or delivering a datagram, the router sends this type of ICMP message back to the source:?

A

Destination Unreachable

128
Q

Which IPv6 ICMP protocol and a feature of ND is used to detect when reachability between two systems on the same link has become lost?

A

Neighbor Unreachability Detection (NUD)

129
Q

Which protocol is a special set of enhancements aimed at providing additional security for IPV6 ICMP ND messages?

A

Secure Neighbor Discovery (SEND)

130
Q

Because internet routers each use local information when forwarding datagrams, error can develop which can product routing loops. To prevent these loops, each IP datagram contains a hop limit, when this hop limit is reached, the router discards the datagram and send the following ICMP message:

A

Time Exceeded

131
Q

What protocol below is used in mobile IPv6

A

FMIP

132
Q

ICMP messages provide commu ncation between:

A

an ICMP module on one machine and an ICMP module on another

133
Q

What are the three standard fields that ICMP messages begin with? (Check all that Apply)

A

Code Field
Type Field
Checksum Field

134
Q

Using the ping command, ICMP utilizes the following message types: (Check all that Apply)

A

Echo Reply
Echo Request

135
Q

Routers are prohibited from fragmenting an IPv6 Datagram. The source sending the datagram must perform a path MTU discovery. Which IPv6 ICMP message is used for this?

A

Packet Too Big

136
Q

NDP defines five ICMPv6 message types:

A

Router Advertisement
Neighbor Advertisement
Redirect
Router Solicitation
Neighbor Solicitation

137
Q

How many levels of encapsulation are requirement when an ICMP message travels in an IP datagram?

A

2 layers

138
Q

The ping command utilizes the following protocol?

A

ICMP

139
Q

When a router detects a host using a nonoptimal first hop, the router send the host the ofllowing ICMP message:

A

Redirect Message

140
Q

Which IPv6 Multicast Address Space below is for all EIGRP routers

A

FF02::a

141
Q

Which specific protocols below support Multicast traffic?

A

MLD
IGMP

142
Q

Some hardware technologies support a second form of multi-point delivery called hardware _______.

A

multicast

143
Q

Which term below refers to a single device trasmitting a message to all other devices on the subnet?

A

broadcast

144
Q

Which IPv6 Multicast Address Space below is for all all nodes on the local network segment.

A

FF02::1

145
Q

Which term below refers to a single device trasmitting a message to a specific group of devices on the subnet?

A

multicast

146
Q

IP multicasting is availabe for both:

A

IPv6
IPv4

147
Q

Which IPv6 Multicast Address Space below is for all OSPFv3 ALLSPF Routers.

A

FF05::5

148
Q

A ________________ is a term to dentoe the set of computers that are listening to a particular multicast address.

A

multicast group

149
Q

Which term below refers to sending a frame from host to host.

A

unicast

150
Q

Which IPv4 Multicast Address Space below is for all OSPFIGP Routers.

A

224.0.0.5

151
Q

Which IPv4 Multicast Address Space below is for all systems on this subnet

A

224.0.0.1

152
Q

Which specific protocols below supports Multicast traffic for IPV6?

A

MLD

153
Q

IGMP works with multicast and has two phases:

A

when a host joins a multicast group, the host sends an IGMP message to the groups multicast declaring its membership.
local multicast routers periodically poll hosts on the local network to determine whether any hosts still remain members of each group.

154
Q

Which IPv4 Multicast Address Space below is global across the internet.

A

224.0.1.0 - 238.255.255.255

155
Q

IGMP is considered to be a service that is integrated with the IP Layer and stands for:

A

Internet Group Managment Protocol

156
Q

Which specific protocols below support Multicast traffic for IPV4?

A

IGMP

157
Q

Which IPv4 Multicast Address Space below is restricted to one network

A

224.0.0.1 - 224.0.0.255

158
Q

Which IPv6 Multicast Address Space below is for all EIGRP routers

A

FF02::a

159
Q

Which IPv6 Multicast Address Space below is for all all nodes on the local network segment.

A

FF02::1

160
Q

The ARPANET reference model was utilimately adopted and called the:?

A

TCP/IP Model

161
Q

Which protocol is considered a reliable flow of data between two hosts?

A

TCP

162
Q

When type of devices forward packets to another network across the internet?

A

Routers

163
Q

What defines the primary goal to develop an effective technique for multiplexed utilization of existing interconnected networks?

A

Internet Architecture

164
Q

When utilizing a Uniform Resource Locator (URL) to access www.google.com, an IP Address is needed, because packets are routed to the destination using the IP Address. What service is used to convert a URL to a IP Address?

A

Domain Name System (DNS)

165
Q

What Internet Protocol is considered a layer 3.5 protocol and is uses to exchange error messages and other vital information ?

A

Internet Control Message Protocol (ICMP)

166
Q

There are some circumstances where data within a network gets corrupt, damaged, or lost. Dealing with this is called:

A

Error Control

167
Q

What network standards did the Defense Advanced Research Project Agency (DARPA) provide? Hint: Draws its origins from ARPANET

A

TCP/IP Internet Protocol Suite

168
Q

What defines “chunks” of digitial information comprsiong some number of bytes carried through the network somewhat independently?

A

Packet Switching

169
Q

How many bits is an IPV6 Address?

A

128

170
Q

The Transport layer (TCP) of the TCP/IP Model opens sockets between two hosts (Also called ports), what is a commend port number for HTTP?

A

80

171
Q

What Internet Protocol is to send multicast addressing and delivery messages to manage which hosts are members of a multcast group. ?

A

Internet Group Management Protocol (IGMP)

172
Q

How many bits is an IPV4 Address?

A

32

173
Q

How is every official standard in the Internet community published?

A

Request For Comments (RFC)

174
Q

What defines the format and order of messages exchanged between two or more communicating entities, as well as the actions taken on the transmission and/or recipt of a message or other event.

A

protocol

175
Q

THe simjplest method for scheduling the way packets are processed as they move through the network is:

A

First in First Out (FIFO)

176
Q

What are some of the secondary goals for Internet Architecure? (Select all that Apply)

A

(all)
The reosurces used in the Internet archtecutre must be accountable.
The Internet must support multiple types of communication services
The internet communcaiton must continue despite loss of networks or gateways
The Internet architecture must permit host attachment with a low level of effort.
The Internet architecture must permit distributed management of its resources.
The Internet archictures must accommodate a variety of networks.
The internet architecure must be cost-effective.

177
Q

Porotol Multiplexing is a benefit of a layered architecture allowing multiple protocols to coexist on the same infrastructure. In networks, a protocol data unit, at one layer is carried bya a lower layer. This process is also defined as:

A

encapsulation

178
Q

What is the most frequently mentioned concept of protocol layering as defined by the International Organization for Standardization (ISO)?

A

Open Systems Interconnection (OSI) Model

179
Q

Which protocol is provides a simpler service to the application layer, but no guranteed that the datagrams will reach the host?

A

UDP