Week 1: Computer Network Foundatoins Flashcards
Which layer links the network support layers and user support layers?
a. Physical Layer
b. Data Link Layer
c. Transport Layer
c. Transport Layer
The physical, data link and network layers are network support layers and session, presentation and application layers are user support layers.
Which layer is responsible for process to process delivery?
a. Transport Layer
b. Network Layer
c. Data Link Layer
a. Transport Layer
Routers operate at which layer of the OSI model?
a. Network Layer
b. Physical Layer
c. Transport Layer
a. Network Layer
The network layer is responsible for packet forwarding and routing.
In the TCP IP Model, when data is sent from device A to device B, what is the 4th layer to receive data at B?
a. Application Layer
b. Data Link Layer
c. Transport Layer
a. Application Layer
The application layer provides the basis for what?
a. Frame Division
b. Email Services
c. Error Control
b. Email Services
Which layer is used to deal with mechanical and electrical specifications?
a. Transport Layer
b. Physical Layer
c. Network Layer
d. Data Link Layer
b. Physical Layer
What service can be used to allocate IP addresses for hosts?
a. DHCP
b. DNS
c. ARP
d. NAT
a. DHCP
What service can be used to allocate IP addresses for hosts?
a. DHCP
b. DNS
c. ARP
d. NAT
a. DHCP
What is the correct order of the OSI Model?
a. Network Layer
b. Data Link Layer
c. Transport Layer
d. Application Layer
e. Session Layer
f. Presentation Layer
g. Physical Layer
d. Application Layer
f. Presentation Layer
e. Session Layer
c. Transport Layer
a. Network Layer
b. Data Link Layer
g. Physical Layer
What is the correct order of the TCP/IP Model?
a. Transport Layer
b. Application Layer
c. Network Interface Layer
d. Internet Layer
b. Application Layer
a. Transport Layer
d. Internet Layer
c. Network Interface Layer
What are the pros of subnetting?
a. Assigns IP address more effectively
b. Adds a layer of complexity
c. Speeds up the network
d. Easy to organize the network resources
e. Difficult to change once hierarchy is established
f. Improves security
a. Assigns IP address more effectively
c. Speeds up the network
d. Easy to organize the network resources
f. Improves security
What are the pros of subnetting?
a. Assigns IP address more effectively
b. Adds a layer of complexity
c. Speeds up the network
d. Easy to organize the network resources
e. Difficult to change once hierarchy is established
f. Improves security
a. Assigns IP address more effectively
c. Speeds up the network
d. Easy to organize the network resources
f. Improves security
How can we address the problem of adding layers of security and difficulty to change once hierarchy is established with standard subnetting?
We solved this by introducing CIDR (Classless Inter-Domain Routing)
How can we address the problem of adding layers of security and difficulty to change once hierarchy is established with standard subnetting?
We solved this by introducing CIDR (Classless Inter-Domain Routing)
What is a unicast address?
a. Address of a set of interfaces
b. Address of a single interface
c. Delivery to single interface
d. Address of a set of interfaces
b. Address of a single interface
c. Delivery to single interface
What is a multicast address?
a. Address of a set of interfaces
b. Address of a single interface
c. Delivery to single interface
d. Address of a set of interfaces
e. Delivery to all interfaces in the set
a. Address of a set of interfaces
e. Delivery to all interfaces in the set
What is an any cast address?
a. Delivery to a single interface in the set
b. Address of a single interface
c. Delivery to single interface
d. Address of a set of interfaces
e. Delivery to all interfaces in the set
d. Address of a set of interfaces
a. Delivery to a single interface in the set
What is the range that port numbers can range from?
0 - 65,535
What are the well-known ports?
a. 1024-49151
b. 0-1023
c. 49152-65535
b. 0-1023
What are the registered ports?
a. 1024-49151
b. 0-1023
c. 49152-65535
a. 1024-49151
What are the dynamic ports?
a. 1024-49151
b. 0-1023
c. 49152-65535
c. 49152-65535
What is the definition of a physical network?
a. Virtual Representation
b. Virtual network of nodes and logical links
c. Visible and physically presented
c. Visible and physically presented
What is the definition of a logical network?
a. Virtual Representation
b. Virtual network of nodes and logical links
c. Visible and physically presented
a. Virtual Representation
What is the definition of a overlay network?
a. Virtual Representation
b. Virtual network of nodes and logical links
c. Visible and physically presented
b. Virtual network of nodes and logical links
Does DHCP run over UDP or TCP?
a. UDP
What is the linux hostname lookup directory?
a. /etc/hosts
What is the windows hostname lookup directory?
%Systemroot%\System32\Drivers\Etc\hosts
What are the three main configuration files when configuring DNS?
a. /etc/bind/named.conf
b. /etc/bind/named.conf.forwarders
c. /etc/bind/named.conf.options
d. /etc/bind/named.conf.local
a. /etc/bind/named.conf
b. /etc/bind/named.conf.forwarders
d. /etc/bind/named.conf.local
What are the chains under the filter table for iptables?
a. Input, output, prerouting
b. Input, output, forward
c. Input, forward, prerouting
d. prerouting, post routing, output
b. Input, output, forward
What is the iptables command structure?
iptables -t operation chain specs -j target
What is the first level of the two-level hierarchy system for internet routing?
The first level is autonomous systems (AS’s)
- These are regions of networks under a single administrator domain like Comcast, AT&T, Verizon, etc
What do AS’s use for intra-domain routing protocols?
a. Distance Vector (RIP)
b. BGP
c. BGP-4
d. Link State (OSPF)
a. Distance Vector (RIP)
d. Link State (OSPF)
What do AS’s use for inter-domain routing protocols?
a. Distance Vector (RIP)
b. BGP
c. BGP-4
d. Link State (OSPF)
b. BGP
c. BGP-4
What is used to determine what a good path is?
a. The shortest path
b. Load balanced
c. Lowest cost
Which protocol between distance vector and link state will have each network periodically flood the immediate reachability information to all other routers?
Link state (OSPF) based on Dijkstra algorithm
Internet routing protocols cannot be classified as____
a. Inter and Intra Domain Routing Protocols
b. Breadth First Protocol Depth First Protocol
c. Classful or Classless Protocol
d. Distance Vector Protocol, Link-state Protocol, or Path-vector Protocol
b. Breadth First Protocol Depth First Protocol
DHCP server will send ____ after the DHCP discover message is received.
a. DHCP Request
b. DHCP Discover
c. DHCP Offer
d. DHCP ACK
c. DHCP Offer
Address resolution protocol does not consist of information about ____ being used.
a. Receiver Hardware Address (RHA)
b. Sender Network Address (SNA)
c. ARP Protocol Version
d. IP Version Protocol
c. ARP Protocol Version
For the URL asu.canvas.edu, what is the top domain level?
a. canvas
b. edu
c. ASU
b. edu
Which firewall table is responsible for translating IP packets?
a. NAT Table
b. Mangle Table
c. Filter Table
d. Raw Table
a. NAT Table
The _____ option during the NAT procedure is used to perform source network address translation and is applicable to outbound traffic.
a. DNAT
b. SNAT
c. MASQUERADE
b. SNAT
Which firewall table is responsible for changing packet content?
a. Mangle Table
b. Raw Table
c. Filter Table
d. NAT Table
a. Mangle Table
What is the equivalent of a postal letter’s “receiver name” in electronic mail?
a. Port Number
b. Host IP Address
c. Network Prefix
a. Port Number
_______ allows the inside host with a local address to always use an inside global address.
a. Dynamic Address Mapping
b. Static Address Mapping
c. Network Address and Port Translation (NAPT)
b. Static Address Mapping
In the OSI model, which layer works with MAC addresses?
a. Data Link Layer
b. Transport Layer
c. Network Layer
a. Data Link Layer
The CIDR concept is designed for IPv4 to _______ .
a. make old classful IP addresses invalid
b. address an IP address shortage issue
c. remove subnet concepts
b. address an IP address shortage issue
An ip (v6) address has ____bits.
128
What type of address is used at the end host to identify the application thread that sent and received the packet?
a. Port Number
b. MAC Address
c. IP Address
d. Process ID
d. Process ID
For the URL www.1.asu.edu, what is top domain level?
a. 1
b. edu
c. ASU
d. www
b. edu
If we have /16 as our CIDR network mask, how many C subnets we can have?
256
Which port does the HTTP Server need to use when communicating with an HTTP Client using port 50000?
a. 80
b. 443
c. 22
a. 80