Shared Flashcard Set

Details

CIT 164 Pest 2
CIT
100
Computer Networking
Undergraduate 1
02/04/2015

Additional Computer Networking Flashcards

 


 

Cards

Term
Neighbor Discovery has five functional processes.
Definition
True
Term
Upon start-up, Neighbor Discovery collects information about how nodes configure their IPv6 addresses to communicate on the network.
Definition
False
Term
Neighbor Discovery makes abundant use of messages.
Definition
False
Term
ND takes over the functions that ARP and Reverse ARP handled in IPv4.
Definition
True
Term
Home Agents may include the Home Agent Information option in their Router Advertisement messages, but it should not be included if the Home Agent (H) bit is not set.
Definition
True
Term
DHCP can exclude individual addresses or address ranges from dynamic allocation to client machines.
Definition
True
Term
Clients ordinarily attempt to renew existing releases by default, but you can instruct a DHCP server to deny lease renewals, or even cancel leases, when necessary.
Definition
True
Term
The DHCP specification, RFC 2131, defines the default value for T1 as:
0.95 * duration_of_lease
Definition
False
Term
The structure of the DNS database mirrors the structure of the domain namespace itself.
Definition
True
Term
Twenty-six root name servers (named A.ROOT-SERVERS.NET., B.ROOT-SERVERS.NET., etc.) act as the top of the DNS hierarchy worldwide. They provide the ultimate source for all name lookups that cannot be resolved through other means.
Definition
False
Term
Domains (such as ibm.com) can be broken into subdomains (such as clearlake.ibm.com), as needed.
Definition
True
Term
Not all the data in a DNS cache has an expiration value.
Definition
False
Term
UDP offers connection-oriented services with sequencing, error recovery, and a sliding window mechanism.
Definition
False
Term
UDP is the only connectionless TCP/IP protocol at the Transport layer.
Definition
True
Term
TCP half-open connections occur when the handshake process does not end successfully with a final ACK.
Definition
True
Term
TCP keep-alives are enabled by default on Windows XP, Windows Vista, Windows 7, Windows Server 2003, and Windows Server 2008, although any application may disable TCP keep-alives, if desired by its programmer.
Definition
False
Term
The obvious solution to an Internet running two versions of IP is to have it populated by hosts and routers that also run two versions of IP.
Definition
True
Term
By default, application services such as DNS, DHCP, and FTP are compatible with the IPv6 address space.
Definition
False
Term
The nested model could be used for an IPv6 site that requires one or more “islands” of IPv4 subnets.
Definition
True
Term
The transition from IPv4 to IPv6 requires that multiple stages occur in the move from a pure IPv4 environment to one that exclusively uses IPv6.
Definition
True
Term
Both dual-IP-layer and dual-stack architecture require IPv6-over-IPv6 tunneling to be effective as a transition mechanism.
Definition
False
Term
When applications are written, they usually call functions in standard libraries that implement network tasks.
Definition
True
Term
Most IPv4 drivers are old, which means that they are full of bugs.
Definition
False
Term
The reasons for which a company is deploying IPv6 should not determine the due dates and project funding.
Definition
False
Term
You do not have to perform IP subnetting in IPv6 because each subnet can support an extremely large number of hosts.
Definition
True
Term
Use of DHCPv6 for address assignment will result in a locally unique host identifier that changes when you move to a different network.
Definition
True
Term
Fundamental protocols—including IP and TCP or UDP—offer no built-in security controls.
Definition
True
Term
A stealthy attacker may cover its tracks by deleting log files, or terminating any active direct connections.
Definition
True
Term
Proxy server software permits internal network addresses to be “translated” into public network addresses when packets leave inside networks so only public IP addresses are exposed on the public Internet.
Definition
False
Term
Strictly speaking, VPNs use tunneling protocols; therefore, they need to encrypt tunneled traffic.
Definition
False
Term
____ uses ICMPv6 type 134 messages.

a.Router Solicitation

c.Neighbor Advertisement

b.Router Advertisement

d.Neighbor Solicitation
Definition
B. Router Advertisement
Term
____ uses ICMPv6 type 135 messages.

a.Router Solicitation

c.Neighbor Advertisement

b.Router Advertisement

d.Neighbor Solicitation
Definition
D. Neighbor Solicitation
Term
____ uses ICMPv6 type 136 messages.

a.Router Solicitation

c.Neighbor Advertisement

b.Router Advertisement

d.Neighbor Solicitation
Definition
C. Neighbor Advertisement
Term
____ use ICMPv6 type 137 messages.

a.Router Solicitation

c.Neighbor Advertisement

b.Router Advertisement

d.Redirect
Definition
D. Redirect
Term
ND makes use of multicast addresses, such as the “____” address with link-local scope (FF02::2).

a.all nodes

c.all proxies

b.all routers

d.all domains
Definition
B. all routers
Term
ND makes use of multicast addresses, such as the “____” address with link-local scope (FF02::1).

a.all nodes

c.all proxies

b.all routers

d.all domains
Definition
A. all nodes
Term
IPv6 Neighbor Solicitation protocol can be compared with IPv4 ____.
a.
ARP Request
c.
Router Advertisement
b.
Router Solicitation
d.
Redirect
Definition
A. ARP Request
Term
In the ICMPv6 Router Solicitation message, the ____ field is an unused field that is set to 0 by the source node and ignored by the destination node.

a.Reserved

c.Checksum

b.Options

d.Type
Definition
A. Reserved
Term
The Target Link-Layer Address option is used in Neighbor Advertisement and ____ messages.

a.Neighbor Advertisement

c.Router Solicitation

b.Router Advertisement

d.Neighbor Solicitation
Definition
B. Router Advertisement
Term
The ____ option is sent in Router Advertisement messages to provide a common MTU value for nodes on the same network segment.

a.Prefix Information

c.Redirected Header

b.Target Link-Layer Address

d.MTU
Definition
D. MTU
Term
The ____ option, if included, is used in Mobile IPv6 by mobile nodes receiving Router Advertisement messages for their movement detection algorithm.

a.Target Link Layer Address

c.Advertisement Interval

b.Redirected Header

d.Home Agent Information
Definition
C.Advertisement Interval
Term
A node invokes the ____ process when it wants to send a packet to an on-link neighbor but the sender does not know the link-layer address for the target node.

a.Address Resolution

c.Router Discovery

b.Duplicate Address Detection

d.Redirect Function
Definition
A. Address Resolution
Term
____ is used by nodes to discover neighbor routers on the local link, learn prefixes, configure their default gateway, and other possible configuration parameters relating to autoconfiguration (stateless or stateful) useful to the node.

a.Address Resolution

c.Router Discovery

b.Duplicate Address Detection

d.Redirect Function
Definition
C. Router Discovery
Term
____ was developed in the 1970s as a way to provide sufficient network access so diskless workstations could access startup information across the network, instead of reading it from a local disk drive.

a.TCP/IP

c.DHCP

b.WINS

d.BOOTP
Definition
D. BOOTP
Term
If no DHCP server is present in some broadcast domain, a special piece of software called a(n)____ must be present in that broadcast domain.

a.broadcast bit

c.DHCP relay agent

b.address pool

d.address scope
Definition
C. DHCP relay agent
Term
The job of the DHCP ____ software is to intercept address requests on a local cable segment and repackage those requests as a unicast to one or more DHCP servers.

a.relay agent

c.client

b.cluster

d.router
Definition
A. relay agent
Term
With a(n) ____ the administrator explicitly assigns an IP address manually by associating a client’s hardware address with a specific IP address to be leased to that client.

a.dynamic address lease

c.IP gateway

b.manual address lease

d.discovery broadcast
Definition
B. manual address lease
Term
A(n) ____ is used to assign addresses to clients or other machines when fixed IP addresses are not required.

a.dynamic address lease

c.IP gateway

b.manual address lease

d.discovery broadcast
Definition
A. dynamic address lease
Term
When a DHCP client boots up, it performs a Standard ____ to enable it to communicate on the network.

a.Address Discovery

c.Router Discovery

b.Client Discovery

d.Packet Discovery
Definition
A. Address Discovery
Term
The ____ packet includes the IP address that is offered to the client and, sometimes, answers to the requested options in the DHCP Discover packet.

a.Acknowledgement

c.Request

b.Offer

d.Discover
Definition
B. Offer
Term
The ____ packet is sent from the server to the client to indicate the completion of the four-packet DHCP Discovery process.

a.Acknowledgement

c.Request

b.Offer

d.Discover
Definition
A. Acknowledgement
Term
The ____ field contains the address being offered by the DHCP server.

a.Your IP Address

c.Flags

b.Hops

d.Transaction ID Number
Definition
A. Your IP Address
Term
The DHCP ____ process relies heavily on broadcasts, but most routers do not forward broadcasts.

a.discovery

c.request

b.lease

d.boot
Definition
D. boot
Term
One good way to troubleshoot DHCP is to use a ____.

a.relay agent

c.firewall

b.router

d.protocol analyzer
Definition
D. protocol analyzer
Term
By ____ DNS data from one or more database segments on one or more DNS servers, DNS also provides a mechanism whereby it can attempt to satisfy name resolution requests locally before attempting them remotely, thereby greatly improving the speed of such name resolution.

a.transferring

c.resolving

b.caching

d.spoofing
Definition
B. caching
Term
A ____ record is used to create aliases.

a.canonical name

c.name server

b.mail exchange

d.pointer
Definition
A. canonical name
Term
A(n) ____ record stores IP address-to-domain name translation data and supports the operation known as a reverse DNS lookup.

a.well-known services

c.pointer

b.text

d.host information
Definition
C. pointer
Term
A(n) ____ record lists the IP-based services, such as Telnet, FTP, HTTP, and so forth, that an Internet host can supply.

a.well-known services

c.name server

b.text

d.host information
Definition
A. well-known services
Term
It is important to understand that the zone data on a secondary server always originates from a(n) ____ server.

a.caching

c.name

b.incremental

d.primary
Definition
D. primary
Term
A(n) ____ is usually some application or service that encounters a domain name for which it needs an IP address.

a.address request

c.caching server

b.TCP/IP client

d.DNS client
Definition
B. TCP/IP client
Term
Most DNS resolvers issue what is called a(n) ____ from the client side.

a.recursive query

c.nslookup

b.address query

d.name query
Definition
A. recursive query
Term
A ____ is a query that keeps working until an answer of some kind is forthcoming.

a.domain query

c.recursive query

b.reverse query

d.NSLOOKUP query
Definition
C. recursive query
Term
____ requests always go to the name server that is authoritative for the domain that contains the requested name or address to make completely sure data is obtained directly from the source.

a.Root server

c.Mail server

b.Client server

d.Cache server
Definition
A. Root server
Term
DNS ____ is responsible for initiating and sequencing DNS queries that result in name resolution for an application running on the computer.

a.name resolver

c.primary master

b.subdomain

d.caching server
Definition
A. name resolver
Term
By default, ____ queries the default name server specified in the current machine’s TCP/IP configuration.

a.nslookup

c.multi-homed

b.mail exchange

d.IP
Definition
A. nslookup
Term
____ is a simple protocol that is used by applications that contain their own connection-oriented timeout values and retry counters, similar to those provided by TCP.

a.UDP

c.RTO

b.DoS

d.MSS
Definition
A. UDP
Term
UDP runs up to ____ percent faster than TCP, under some conditions, because it does next to nothing.

a.20

c.40

b.30

d.50
Definition
C. 40
Term
Dynamic ports are used as ____ for specific communications while they are underway.

a.temporary ports

c.byte streams

b.core services

d.lost segments
Definition
A. temporary ports
Term
The ____ process guarantees that packets are ordered properly and protects against missing segments.

a.watchdog

c.handshake

b.keep-alive

d.sequence and acknowledgement
Definition
D. sequence and acknowledgement
Term
____ is the overloading of the network or a receiver.

a.Sequence number tracking

c.Congestion

b.Buffering

d.Windowing
Definition
C. Congestion
Term
The Fast Recovery process dictates that when a host receives three duplicate ACKs, it must immediately start retransmitting the ____ without waiting for the retransmission timer to expire.

a.duplicate ACKs

c.byte streams

b.core services

d.lost segments
Definition
D. lost segments
Term
TCP supports a ____ mechanism, which is a management method for data transmission used to determine the amount of unacknowledged data that can go out on the wire from any sender.

a.congestion

c.sliding window

b.retry

d.watchdog
Definition
C. sliding window
Term
____ is caused when enough data is sent to a TCP host to fill its receiver buffer, thereby putting the receiver in a zero-window state.

a.DoS

c.Time Wait delay

b.Silly Window Syndrome

d.Retransmission timeout
Definition
B. Silly Window Syndrome
Term
The initial sequence number used in a TCP connection is defined by the ____ and, for security purposes, should be randomly assigned.

a.host

c.port

b.packet

d.segment
Definition
A. host
Term
____ addresses are composed of a valid 64-bit unicast address prefix and an IPv4 interface identifier.

a.ISATAP

c.6to4

b.Teredo

d.6over4
Definition
A. ISATAP
Term
The ____ network model can represent a number of hybrid configurations, but it assumes that a site has a variety of different subnets, based on IP version implementation.

a.basic hybrid

c.nested

b.transition hybrid

d.true hybrid
Definition
D. true hybrid
Term
A(n) ____ protocol for a host or router is implemented at the level of the device’s operating system, allowing the device to support both IPv4 and IPv6, either as independent protocols or in a hybrid form.

a.dual-stack

c.hybrid

b.dual-architecture

d.transition
Definition
A. dual-stack
Term
With IPv6-over-IPv4, when the IPv4 header is created, the protocol field value is set at ____ to indicate that it is an encapsulated IPv6 packet.

a.37

c.53

b.41

d.61
Definition
B. 41
Term
The ____ node is responsible for reassembling any fragmented packets, removing the IPv4 header encapsulation, and processing the IPv6 packet.

a.encapsulator

c.decapsulator

b.parser

d.gateway
Definition
C. decapsulator
Term
ISATAP nodes locate an ISATAP router by using address prefixes advertised by the ISATAP ____ that identifies the logical ISATAP subnet for the nodes.

a.proxy

c.relay

b.gateway

d.router
Definition
D. router
Term
A 6to4 ____ is a specialized device that acts as an IPv6/IPv4 router.

a.router

c.node/router

b.relay

d.host/router
Definition
B. relay
Term
A Teredo ____ is an IPv4/IPv6 node that is connected to both an IPv4 Internet and an IPv6 Internet using different interfaces.

a.client

c.relay

b.host

d.server
Definition
D. server
Term
The key point with IPv6 deployments is that they use a new “____ layer” or “routed” protocol.

a.physical

c.network

b.data

d.transport
Definition
C. network
Term
____ address autoconfiguration is accomplished via a new version of DHCP known as DHCPv6.

a.Stateless

c.Aware

b.Stateful

d.Awareless
Definition
B. Stateful
Term
Stateless address autoconfiguration is defined in the aptly named RFC ____, “IPv6 Stateless Address Autoconfiguration.”

a.3314

c.4862

b.3786

d.5123
Definition
C. 4862
Term
Static tunnels on the routers are often called ____ tunnels.

a.private

c.automatic

b.configured

d.self-managed
Definition
B. configured
Term
ISATAP requires all hosts to be ____ stack.

a.single

c.home

b.mono

d.dual
Definition
D. dual
Term
RFC 6145 describes ____ IP/ICMP translation, or SIIT.

a.awareless

c.awareful

b.stateless

d.stateful
Definition
B. stateless
Term
The current clear front-runner for most IPv4-to-IPv6 transitions is the ____ method.

a.dual-stack

c.Teredo

b.6to4

d.ISATAP
Definition
A. dual-stack
Term
____ are quite popular in legacy IPv4 networks because they solve several issues regarding tracking and assignment of scarce resources and they facilitate DDNS.

a.DHCPv6

c.IPAMs

b.CMDBs

d.OOB gateways
Definition
C. IPAMs
Term
A relatively simple software program called a(n) ____ can attempt to communicate with any IP-based system while cycling through all valid TCP and UDP port addresses.

a.agent

c.port scanner

b.Trojan

d.socket
Definition
C. port scanner
Term
A ____ is an undocumented and illicit point of entry into an operating system or application added by a system’s programmers to bypass normal security.

a.back door

c.discovery

b.hole

d.hash
Definition
A. back door
Term
The purpose of ____ is to find out what you have and what is vulnerable.

a.reconnaissance

c.session hijacking

b.covering-up

d.packet sniffing
Definition
A. reconnaissance
Term
____-related attacks include SYN Flood, broadcast amplification attacks, and buffer overflow.

a.DoS

c.Man-in-the middle

b.Brute force

d.IP service
Definition
A. DoS
Term
____ is a type of software that opens the door for a compromised machine to display all kinds of unsolicited and unwanted advertising, often of an unsavory nature.

a.SA bundle

c.Adware

b.Spyware

d.Cache
Definition
C. Adware
Term
____ is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities.

a.Ingress filtering

c.Network sniffing

b.Data authentication

d.Spoofing
Definition
D. Spoofing
Term
____ means restricting who may view or use certain resources, including access to bandwidth or a computer, as well as access to information.

a.Access control

c.Data origin authentication

b.Connectionless integrity

d.Confidentiality
Definition
A. Access control
Term
A function that provides ____ checks the integrity of each packet individually.

a.access control

c.data origin authentication

b.connectionless integrity

d.confidentiality
Definition
B. connectionless integrity
Term
A ____ is a hardened computer specifically designed to resist and oppose illicit or unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks.

a.firewall

c.DMZ

b.bastion host

d.boundary router
Definition
B. bastion host
Term
A ____ is an area that’s accessible to both outsiders and insiders, but which establishes a buffer area between what’s completely inside and outside a network boundary.

a.firewall

c.DMZ

b.bastion host

d.boundary router
Definition
C. DMZ
Supporting users have an ad free experience!