Week 11 Flashcards

1
Q

The IPv6 header does not have a checksum.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The transition from IPv4 to IPv6 requires that ____________. (Check all that apply)

A

IPv4 routers still in use must “tunnel” IPv6 datagrams, by fragmenting/encapsulating them in IPv4 datagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A protocol designed to control access to a medium is most commonly called a

A

media access control protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A MAC address is permanent and unique.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

“Taking Turns” schemes

A

Token Ring Multiple Access

Token Ring Multiple Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If an Ethernet sender senses a clear channel, and begins transmission, but shortly thereafter detects a collision, it will…

A

Terminate transmission and enter exponential backoff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The default multiple access scheme of 802.11g is RTS/CTS.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In direct routing, after the initial contact with the home network, the correspondent sends packets to

A

The care-of address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following are used in a wireless network such as 802.11n?
Carrier Sense Multiple Access
Collision Avoidance
Exponential back-off/retry for collision resolution
Reservation system with Request to Send (RTS) and Clear to Send (CTS)

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In indirect routing, after the initial contact with the home network, the correspondent sends packets to

A

The permanent address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

S represents a source host and D represents a destination host. Which of the following is the most typical use of public key encryption, when S sends an encrypted message to D?

A

S encrypts a message using D’s public key, and D decrypts the message using D’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly