Networking Concepts (4) Flashcards

1
Q

Which of the following TCP/IP routing protocols does not include the subnet mask within its route update messages, preventing it from supporting subnetting?

Routing Information Protocol, version 1 (RIPv1)

Routing Information Protocol, version 2 (RIPv2)

Border Gateway Protocol (BGP)

A

Routing Information Protocol, version 1 (RIPv1)

RIP v1 does not include the subnet mask in its updates. RIPv2 supports subnetting and includes the subnet mask of each network address in its updates. OSPF and BGP both include the subnet mask within their updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following terms refers to a routing protocol that does not rely on hop counts to measure the efficiency of routes?

Edge gateway protocol

Distance vector protocol

Link state protocol

A

Link state protocol

Distance vector protocols rely on hop counts to evaluate the efficiency of routes. Link state protocols use a different type of calculation, usually based on Dijkstra’s algorithm. The terms interior gateway protocol and edge gateway protocol do not refer to the method of calculating routing efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the maximum number of routes that can be included in a single RIP broadcast packet?

20

25

32

A

25

A single RIP broadcast packet can include up to 25 routes. If there are more than 25 routes in the computer’s routing table, then RIP must generate additional packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following routing protocols can you use on a TCP/IP internetwork with segments running at different speeds, making hop counts an inaccurate measure of route efficiency? (Choose all correct answers.)

Enhanced Interior Gateway Routing Protocol (EIGRP)

Routing Information Protocol (RIP)

Open Shortest Path First (OSPF)

Border Gateway Protocol (BGP)

A

Enhanced Interior Gateway Routing Protocol (EIGRP)

Open Shortest Path First (OSPF)

OSPF is a link state routing protocol, which means that it does not rely solely on hop counts to measure the relative efficiency of a route. EIGRP is a hybrid protocol that can use link state routing. RIP is a distance vector routing protocol, meaning that it uses hop counts to measure route efficiency. BGP is an exterior gateway protocol that exchanges routing information among autonomous systems using path vectors or distance vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the term for the process by which dynamic routing protocols update other routers with routing table information?

Convergence

Distance vectoring

Redistribution

A

Convergence

Convergence is the term for the process by which routers propagate information from their routing tables to other routers on the network using dynamic routing protocols. Distance vectoring, redistribution, and dissemination do not describe this process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following are terms for an area of an enterprise network, separated by firewalls, that contains servers that must be accessible both from the Internet and from the internal network? (Choose all correct answers.)

DMZ

EGP

Stateless network

Perimeter network

A

DMZ

Perimeter network

Servers that must be accessible both from the internal network and from the Internet are typically located in an area of the enterprise called a perimeter network or a demilitarized zone (DMZ). This area is separated from both the Internet and the internal network by firewalls, which prevents unauthorized internet users from accessing the internal network. Intranet is another term for the internal network. Edge Gateway Protocol (EGP) is a type of routing protocol, and stateless is a type of firewall; neither applies to this definition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Each of the following Carrier Sense Multiple Access with Collision Detection (CSMA/CD) events occurs on an Ethernet network when two stations transmit simultaneously, although not in the order listed. Which of the following events occurs immediately after the collision?

The two stations observe a random back-off interval.

The two stations transmit a jam signal.

The two stations stop transmitting.

A

The two stations stop transmitting.

Stations on a CSMA/CD network first check the medium to see if it’s idle. If they detect an idle medium, they begin transmitting. If two or more devices transmit at the same time, a collision occurs. Immediately after a collision occurs, the two stations involved stop transmitting and then send out a jam signal. Then, the two stations back off for a random interval, and the transmission process begins again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following TCP/IP routing protocols measures the efficiency of routes by the number of hops between the source and the destination?

Routing Information Protocol (RIP)

Open Shortest Path First (OSPF)

Border Gateway Protocol (BGP)

A

Routing Information Protocol (RIP)

RIP is a distance vector protocol, which uses hop counts to measure the efficiency of routes. OSPF, BGP, and IS-IS are all link state protocols, which do not rely on hop counts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following IEEE standards calls for the use of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) media access control mechanism?

  1. 11ac
  2. 1X
  3. 3
A

802.11ac

The IEEE 802.11ac standard, like all of the wireless LAN standards in the 802.11 working group, uses CSMA/CA for media access control. The 802.1X standard defines an authentication mechanism and does not require a media access control mechanism. The IEEE 802.3 (Ethernet) standard uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following devices is used to physically connect computers in the same VLAN?

A bridge

A hub

A switch

A

A switch

Replacing routers with switches turns an internetwork into a single large subnet, and virtual local area networks (VLANs) exist as logical elements on top of the switching fabric. Although VLANs are the functional equivalent of network layer subnets, the systems in a single VLAN are still physically connected by switches, not routers. Bridges connect network segments at the data link layer and selectively forward traffic between the segments. However, bridges do not provide a dedicated connection between two systems like a switch does, and they do not make it possible to convert a large routed internetwork into a single switched network. Therefore, they have no role in implementing VLANs. Hubs are physical layer devices that propagate all incoming traffic out through all of their ports. Replacing the routers on an internetwork with hubs would create a single shared broadcast domain with huge amounts of traffic and many collisions. Hubs, therefore, do not connect the computers in a VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following statements is true about an Ethernet network that uses CSMA/CD?

Collisions are a normal occurrence.

Collisions never occur unless there is a network fault.

Collisions cause data to be irretrievably lost.

A

Collisions are a normal occurrence.

Collisions are a normal occurrence on an Ethernet network; they occur when two nodes transmit at exactly the same time. There need not be a network fault for collisions to occur. When collisions occur, the nodes involved retransmit their packets so that no data is lost. Collisions are a phenomenon of data link layer protocols; they have nothing to do with IP addresses, which are network layer constructs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VLANs create the administrative boundaries on a switched network that are otherwise provided by which of the following devices?

Hubs

Routers

Domains

A

Routers

Connecting subnets with routers at the network layer maintains the data link layer administrative boundaries that prevent broadcast transmissions from being propagated throughout the entire internetwork. Switching eliminates those data link layer boundaries, and administrators can use virtual local area networks (VLANs) to simulate them. Because hubs propagate all of the traffic they receive out through all of their ports indiscriminately, they create no administrative boundaries. Domains are logical groups of network devices defined by the Domain Name System (DNS). Their functions are not related to VLANs in any way. Switches are essentially multiport bridges that forward incoming traffic only to the device for which it is destined. Therefore, bridges are more closely related to eliminating administrative boundaries than to establishing them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following statements about VLANs are true? (Choose all correct answers.)

All of the devices in a particular VLAN must be physically connected to the same switch.

A VLAN creates a limited broadcast domain on a switched network.

You must have VLANs on a switched network for communication between computers on different cable segments to occur.

A router is required for communication between VLANs.

A

A VLAN creates a limited broadcast domain on a switched network.

A router is required for communication between VLANs.

The computers in a single virtual local area network (VLAN) can be located anywhere on a switched network, irrespective of the switches’ physical configuration. A broadcast message generated by a computer in a VLAN is transmitted to all of the other computers in that VLAN only, just as if the systems were physically located on a separate LAN or subnet. Unicast transmissions between computers on a switched network do not require VLANs because the switches create what amounts to a direct connection between the two systems. VLANs are needed only for communication processes that require the use of broadcasts, which if transmitted without VLANs, would flood the network. Even though they are a purely logical construction, VLANs function just like physical subnets and require routers for communication between them. Routing capabilities are often integrated into switches to enable communication between VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following elements can be used to identify the devices in a particular VLAN? (Choose all correct answers.)

Hardware addresses

IP addresses

DNS names

Switch port numbers

A

Hardware addresses

Switch port numbers

Every network device has a unique hardware address coded into its network interface adapter, and administrators can use these addresses to select the devices that will be part of a specific virtual local area network (VLAN). When VLANs are implemented inside the switch, selecting the ports to which specific computers are attached is a simple way to identify the computers in a particular VLAN. IP addresses are layer 3 (network layer) constructs, so they do not apply to layer 2 (data link layer) devices like switches. Although DNS names do uniquely identify computers on a network, DNS is an application layer process and has nothing to do with the switching and routing processes, which occur at the data link and network layers. Therefore, you cannot use DNS names to identify the computers in a VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network address translation (NAT) operates at which layer of the Open Systems Interconnection (OSI) model?

Data link

Network

Transport

A

Network

NAT works by modifying IP addresses, which are a network layer element. The data link layer is concerned only with communications on the local subnet and is not involved with NAT processing. Because NAT modifies only the IP packet headers, it works with any transport layer protocol. NAT also works with most TCP/IP applications because it operates below the application layer of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following types of routing protocols route datagrams between autonomous systems?

EGP

RIP

IGP

A

EGP

An Exterior Gateway Protocol (EGP) routes datagrams between autonomous systems. An Interior Gateway Protocol (IGP) routes datagrams within an autonomous systems. Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) are examples of interior gateway protocols

17
Q

Which of the following is the most accurate description of the subnetting process on a TCP/IP network?

You extend the IP address by adding bits for a subnet identifier.

You borrow bits from the network identifier to create a subnet identifier.

You borrow bits from the host identifier to create a subnet identifier.

A

You borrow bits from the host identifier to create a subnet identifier.

You cannot extend the IP address beyond its 32-bit size, and you cannot remove bits from the network identifier, or the packets will not be routed properly. You must therefore create a subnet by borrowing bits from the host identifier

18
Q

Which of the following IPv4 addresses are you unable to assign to a network host? (Choose all correct answers.)

  1. 1.1.1
  2. 6.87.3
  3. 256.77.4
  4. 34.0.1
A
  1. 6.87.3
  2. 256.77.4

IPv4 addresses with first byte values from 224 to 239 are Class D addresses, which are reserved for use as multicast addresses. Therefore, you cannot assign 229.6.87.3 to a host. Option C, 103.256.77.4, is an invalid address because the value 256 cannot be represented by an 8-bit binary value. The other options, 1.1.1.1 and 9.34.0.1, are both valid addresses

19
Q

How many bits are allocated to the host identifier in an IPv4 address on the 10.72.0.0/17 network?

8

15

16

A

15

The value after the slash in a classless inter-domain routing (CIDR) address specifies the number of bits in the network identifier. An IP address has 32 bits, so if 17 bits are allocated to the network identifier, 15 bits are left for the host identifier

20
Q

Which of the following are not valid IPv4 addresses in the private address space defined by RFC 1918? (Choose all correct answers.)

  1. 16.225.1
  2. 33.19.7
  3. 168.254.77
  4. 255.255.255
  5. 15.2.9
A
  1. 33.19.7
  2. 15.2.9

RFC 1918 defines the private address space as the following ranges:

  1. 0.0.0–10.255.255.255
  2. 16.0.0–172.31.255.255
  3. 168.0.0–192.168.255.255

Option B, 172:33:19:7, and Option E, 172.15.2.9, both fall outside the specified private Class B range and are therefore not valid private addresses

21
Q

Alice has been instructed to create a network with 8 subnets and 30 hosts per subnet. She has been assigned a Class C network address. Which of the following subnet masks will she have to use?

  1. 255.255.128
  2. 255.255.192
  3. 255.255.224
A

255.255.255.224

To create a network with 8 subnets and 30 hosts per subnet, Alice would have to allocate 3 of the 8 bits in the last octet for subnet identifiers. This would result in a binary value of 11100000 for the last octet in the subnet mask, which converts to a decimal value of 224

22
Q

Which of the following is the default subnet mask for an IPv4 Class A network?

  1. 0.0.0
  2. 255.0.0
  3. 255.255.0
A

255.0.0.0

A Class A address uses only the first octet as the network identifier, which yields a binary subnet mask of 11111111 00000000 00000000 00000000. In decimal form, the subnet mask is 255.0.0.0. The 255.255.0.0 mask is for Class B addresses, and 255.255.255.0 is for Class C addresses. Option D, 255.255.255.255, is the broadcast address for the current network

23
Q

Which of the following is the range of IPv4 addresses that Automatic Private IP Addressing (APIPA) assigns to DHCP clients that cannot access a DHCP server?

  1. 0.0.0 to 10.0.255.255
  2. 254.0.0 to 169.254.255.255
  3. 168.0.0 to 192.168.0.255
A

169.254.0.0 to 169.254.255.255

When a DHCP client cannot access a DHCP server, APIPA assigns it a Class B address in the range 169.254.0.0 to 169.254.255.255

24
Q

In which IPv4 class is the address 127.0.0.1 found?

Class A

Class B

Class C

None of the above

A

None of the above

Address 127.0.0.1 is the designated IPv4 local loopback address, and as such, it is reserved. It falls between Class A, which has first octet values from 1 to 126, and Class B, which has first octet values of 128 to 191

25
Q

Which of the following is a valid IPv6 address?

fe00: :b491:cf79:p493:23ff
2001: 0:49e6:39ff:8cf5:6812:ef56
fe00: :c955:c944:acdd:3fcb

A

fe00::c955:c944:acdd:3fcb

The address fe00::c955:c944:acdd:3fcb is correctly formatted for IPv6, with the double colon replacing three blocks of zeroes. Uncompressed, the address would appear as follows: fe00:0000:0000:0000:c955:c944:acdd:3fcb. Option A contains a nonhexadecimal digit. Option B contains only seven 16-bit blocks (and no double colon) instead of the eight required for 128 bits. Option D contains blocks larger than 16 bits