Quiz 2 Flashcards
What advantages does IPv6 have over IPv4? (Choose all that apply.)
A) IPv6 uses DHCP for its configuration settings.
B) IPv6 uses a 128-bit address space.
C) IPv4 cannot support IPsec.
D) IPv6 incorporates IPsec.
B) IPv6 uses a 128-bit address space.
D) IPv6 incorporates IPsec.
A Class C address has a first octet decimal range of __________ to ___________.
191, 224
192, 239
192, 223
172, 191
192, 223
Which of the following is a method of hiding internal host IP addresses? (Choose all
that apply.)
A) Network Address Translation (NAT)
B) Proxy servers
C)Setting up software firewalls on all internal hosts
D) Configuring the computer to insert a fake source IP address into outgoing
messages
B) Proxy servers
A) Network Address Translation (NAT)
The Class A address 127.0.0.1 is used for which of the following?
Broadcasting to all hosts on a subnet
Testing the local NIC
Experimentation
Testing the local TCP/IP software implementation
Testing the local TCP/IP software implementation
Why is UDP considered unreliable?
Routers typically drop a large number of UDP packets.
The data is transmitted in clear text.
It is connectionless.
The header does not contain a checksum
It is connectionless.
In CIDR notation, the IP address and subnet mask 191.9.205.22 255.255.192.0 are
written as __________.
191.9.205.22/19
191.9.205.22/16
191.9.205.22/18
191.9.205.22/17
191.9.205.22/18
How do routers handle packets that are too large to pass through because of frame size
limitations?
Routers adjust their MTUs to accommodate the oversized packet.
Routers drop packets that are too large.
Routers break packets into smaller pieces called fragments.
Routers bounce packets back to the sender to be resized
Routers break packets into smaller pieces called fragments.
Which of the following is an IPv6 protocol? (Choose all that apply.)
A) Multicast Listening Detection
B) Multicast Listener Discovery
C) Neighbor Discovery
D) IGMPv6
Multicast Listener Discovery
Neighbor Discovery
A DNS server translates __________ to __________.
Question 9 options:
static addresses, DHCP
encrypted IP addresses, clear text
IP addresses, MAC addresses
FQDNs, IP addresses
FQDNs, IP addresses
Why is fragmentation considered a security risk?
Fragments numbered 0 contain port information.
Fragmented packets cannot be assembled.
Fragments numbered 1 or higher are passed through filters.
Fragmentation is frequently used.
Fragments numbered 1 or higher are passed through filters.
Which of the following is used for one-to-many communication, in which a single host
can send packets to a group of recipients?
Question 11 options:
unicast
netcast
multicast
anycast
multicast
The number of TCP segments that can be sent before an acknowledgement must be
received is determined by the __________.
port number in use for the session
sliding window size
sequence number
transmission rate
sliding window size
When one host wants to initiate a TCP session with another host, it sends a packet
with the flag set.
ACK
FIN
SYN
RST
SYN
An ICMPv6 header is indicated by a Next Header value of __________.
54
58
60
22
58
Compressing the IPv6 address 1080:0:0:0:8:800:200C:417A results in which of the
following?
1080::8:800:200C:417A
1080::8:8:::2::C:417A
1080::8:8::::20:C:417A
:1080::8:800:200C:417A
1080::8:800:200C:417A