Shared Flashcard Set

Details

CIT 164 Ptest1
CIT
100
Computer Networking
Undergraduate 1
01/19/2015

Additional Computer Networking Flashcards

 


 

Cards

Term
When two or more RFCs cover the same topic, they usually also share the same title.
Definition
True
Term
RFC 3300 describes how an RFC is created and what processes it must go through to become an official standard, adopted by the IETF.
Definition
False
Term
A divide and conquer approach permits concerns related to networking hardware to be completely separated from those related to networking software.
Definition
True
Term
PDUs typically include “envelope information” in the form of specific headers and trailers.
Definition
True
Term
The Session layer is equipped to request retransmission of all erroneous or missing PDUs when reassembly is underway, so that it can guarantee reliable delivery of data from sender to receiver.
Definition
False
Term
IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network.
Definition
True
Term
As a frame moves from interface to interface, the IP source and destination address information is preserved.
Definition
True
Term
Class D addresses always take the following binary form: bbbbbbbb.11111111.11111111.11111111.
Definition
False
Term
When a host uses a service that employs a multicast address, it registers itself to “listen” on that address, as well as on its own unique host address (and the broadcast address).
Definition
True
Term
Providing a narrower address space is the primary design goal for IPv6.
Definition
False
Term
The Internet Protocol (IP) primarily works to transmit and deliver data between devices on internetworks.
Definition
True
Term
Because PHB is independent of how individual routers are configured, the end-to-end behavior of traffic is predictable.
Definition
False
Term
When a packet is sent between two ECN-capable routers, the packet is usually marked ECT(0) or ECT(10) for ECN Capable Transport.
Definition
False
Term
Though defined in terms of seconds, a TTL value is implemented as a number of hops that a packet can travel before being discarded by a router.
Definition
True
Term
Unlike IPv4 packets, IPv6 packets ensure that data or application information is successfully transported from a source to a destination node on a network.
Definition
False
Term
ARP is used to obtain the hardware address of the destination IP hosts.
Definition
True
Term
If a packet with TTL=1 arrives at a router, the router must discard the packet because it cannot decrement the TTL to 0 and forward the packet.
Definition
True
Term
When a packet is fragmented, all fragments are given different TTL values.
Definition
False
Term
Routed protocols are Layer 1 protocols that are used to get packets through an internetwork.
Definition
False
Term
A network is usually said to be converged when all the routers know a loop-free path to get to all other networks.
Definition
True
Term
The value 0 in the IP header Protocol field denotes that an ICMP header follows the IP header.
Definition
False
Term
ICMP packets contain only three required fields after the IP header: Type, Code, and Checksum.
Definition
True
Term
Routers send ICMP Redirect messages to hosts to indicate that a preferable route exists.
Definition
True
Term
Routers can use ICMP to provide a default gateway setting to a host (if the host requests assistance).
Definition
True
Term
With router advertising, the default Lifetime value for route entries is 10 minutes.
Definition
False
Term
Neighbor Discovery has five functional processes.
Definition
True
Term
Upon start-up, Neighbor Discovery collects information about how nodes configure their IPv6 addresses to communicate on the network.
Definition
False
Term
Neighbor Discovery makes abundant use of messages.
Definition
False
Term
ND takes over the functions that ARP and Reverse ARP handled in IPv4.
Definition
True
Term
Home Agents may include the Home Agent Information option in their Router Advertisement messages, but it should not be included if the Home Agent (H) bit is not set.
Definition
True
Term
The term ____ refers to a single logical network composed of multiple physical networks, which may all be at a single physical location, or spread among multiple physical locations.

a.internetwork

c.connection-oriented

b.session

d.checksum
Definition
a.internetwork
Term
The ____ is the parent organization for all the various Internet boards and task forces.

a.ICANN

c.Internet Architecture Board

b.Internet Engineering Task Force

d.Internet Society
Definition
d.Internet Society
Term
The ____ is the group responsible for drafting, testing, proposing, and maintaining official Internet Standards, in the form of RFCs, through the agencies of multiple working groups under its purview.

a.ICANN

c.Internet Architecture Board

b.Internet Engineering Task Force

d.Internet Society
Definition
b.Internet Engineering Task Force
Term
The ____ is responsible for the more forward-looking activities of the ISOC, and handles research and development work for topics too far-out or impractical for immediate implementation, but which may (or may not) have a role to play on the Internet some day.

a.ICANN

c.Internet Research Task Force

b.Internet Engineering Task Force

d.Internet Society
Definition
c.Internet Research Task Force
Term
The ____ is ultimately responsible for managing all Internet domain names, network addresses, and protocol parameters and behaviors.

a.ICANN

c.Internet Research Task Force

b.Internet Engineering Task Force

d.Internet Society
Definition
a.ICANN
Term
The ____ includes the physical transmission medium (cables or wireless media) that any network must use to send and receive the signals that constitute the physical expression of networked communications.

a.Data Link layer

c.Network layer

b.Physical layer

d.Transport layer
Definition
b.Physical Layer
Term
The ____ is where ongoing communications between a sender and a receiver, somewhat like a telephone conversation, are set up, maintained, and then terminated, or torn down,as needed.

a.Session layer

c.Network layer

b.Physical layer

d.Presentation layer
Definition
a.Session Layer
Term
The ____ manages the way data is presented to the network (on its way down the protocol stack), and to a specific machine/application combination (on its way up the protocol stack).

a.Session layer

c.Network layer

b.Physical layer

d.Presentation layer
Definition
d.Presentation layer
Term
The TCP/IP Application layer also is known as the ____ layer because this is where the protocol stack interfaces with applications or processes on a host machine.

a.Session

c.Process

b.Network

d.Transport
Definition
c.Process
Term
Many PDUs include a characteristic closing component called a ____ that provides data integrity checks for the data portion of the PDU, known as the payload.

a.well-known protocol

c.network service

b.trailer

d.host
Definition
b.trailer
Term
____ is the process of tapping into the network communications system, capturing packets that cross the network, gathering network statistics, and decoding the packets into readable form.

a.Segmentation

c.Encapsulation

b.Multiplexing

d.Protocol analysis
Definition
d.Protocol analysis
Term
Remote Monitoring (RMON) uses the ____ to collect traffic data at a remote switch and send the data to a management device.

a.Simple Network Management Protocol

c.Virtual Private Network

b.User Datagram Protocol

d.Wide Area Information Service
Definition
a.Simple Network Management Protocol
Term
To be valid, any domain name must correspond to at least one unique ____.

a.loopback address

c.firewall

b.numeric IP address

d.IP gateway
Definition
b.numeric IP address
Term
The ____ address is a six-byte numeric address, burned into firmware (on a chip) by network interface manufacturers.

a.symbolic

c.reverse proxy

b.logical numeric

d.physical numeric
Definition
d.physical numeric
Term
____ is used to permit computers to translate numeric IP addresses to MAC layer addresses.

a.ARP

c.Reverse proxying

b.RARP

d.Subnet masking
Definition
a.ARP
Term
____ is used to translate MAC layer addresses into numeric IP addresses.

a.ARP

c.Reverse proxying

b.RARP

d.Subnet masking
Definition
b.RARP
Term
The term ____ is used to describe the data frame crossing a router.

a.firewall

c.loopback

b.hop

d.dot squad
Definition
b.hop
Term
A ____ is a special bit pattern that “blocks off ” the network portion of an IPv4 address with an all-ones pattern.

a.reverse proxy

c.broadcast address

b.summary address

d.subnet mask
Definition
d.subnet mask
Term
A(n) ____ is a device that interconnects multiple IP networks or subnets.

a.subnet mask

c.layer-3 switch

b.IP gateway

d.network address
Definition
b.IP gateway
Term
When a computer on one subnet wishes to communicate with a computer on another subnet, traffic must be forwarded from the sender to a nearby ____ to send the message on its way from one subnet to another.

a.broadcast address

c.subnet mask

b.IP gateway

d.proxy server
Definition
b.IP gateway
Term
One form of subnet masking uses a technique called ____ and permits a single address to be subdivided into multiple subnets, in which subnets need not all be the same size.

a.IP gateway

c.variable-length subnet masking

b.constant-length subnet masking

d.IP renumbering
Definition
c.variable-length subnet masking
Term
____ allows IPv4 addresses from Class A, B, or C to be combined and treated as a larger address space, or subdivided arbitrarily, as needed.

a.Supernetting

c.Subnet masking

b.Classless Inter-Domain Routing

d.Address masquerading
Definition
b.Classless Inter-Domain Routing
Term
____ may be performed by boundary devices that include proxy server capabilities to replace private IP addresses with one or more public IP addresses as outbound traffic exits the server, and to replace such public addresses with their proper private equivalents as incoming traffic passes through the server.

a.IP renumbering

c.Address masquerading

b.Supernetting

d.Subnetting
Definition
c.Address masquerading
Term
One of the most important services that a ____ provides is to manage what source addresses appear in outbound packets that pass through it.

a.loopback

c.subnet mask

b.proxy server

d.layer-3 switch
Definition
b.proxy server
Term
____ lets networks use multiple private IPv4 addresses internally and maps them to one or more public IPv4 addresses externally.

a.DNS

c.NAT

b.IP gateway

d.VoIP
Definition
c.NAT
Term
Multicast addresses in IPv6 use a(n) ____ to define the portion of the Internet to which the multicast group pertains.

a.scope identifier

c.loopback identifier

b.interface identifier

d.aggregatable global unicast address
Definition
a.scope identifier
Term
Previously, IPv6 specified that interface identifiers followed the modified ____ format, which specifies a unique 64-bit interface identifier for each interface.

a.RFC 4941

c.EULA-64

b.EUI-64

d.IEEE 802.64v6
Definition
b.EUI-64
Term
There are ____ fields possible in the IPv4 header.

a.14

c.19

b.15

d.21
Definition
a.14
Term
The Type of Service field actually has two components: Precedence and ____.

a.Trailer

c.Payload

b.Type of Service

d.Frame
Definition
b.Type of Service
Term
RFC ____ defines a method for differentiating services for network traffic using the six high-order bits of the byte that was formerly the 3-bit Precedence field and the first bit of the TOS field.

a.1212

c.2156

b.1974

d.2474
Definition
d.2474
Term
In networking terms, a packet’s ____ is the remaining distance that the packet can travel.

a.time to live (TTL)

c.offset

b.number of hops (NOH)

d.remaining path
Definition
a.time to live (TTL)
Term
In IPv4 the maximum time to live value is ____.

a.64

c.255

b.128

d.312
Definition
c.255
Term
The specifications for IPv6, including the header format, were established in RFC 1883, which was subsequently made obsolete by RFC ____.

a.1983

c.2517

b.2460

d.3114
Definition
b.2460
Term
RFC ____ is the proposed standard for the Flow Label specification and defines the minimum requirements for this field.


a.3697

c.4554

b.4545

d.5674
Definition
a.3697
Term
IPv6 jumbograms are specified in RFC ____ as a proposed standard.

a.1100

c.2314

b.1700

d.2675
Definition
d.2675
Term
The 8-bit ____ field specifies the header type of the header immediately following the IPv6 header.

a.Next Header

c.Traffic Class

b.Payload Class

d.Header Type
Definition
a.Next Header
Term
The value in the 8-bit ____ field decrements by one each time it is forwarded by a network node, and the IPv6 packet is discarded if the value in this field reaches 0.

a.Hop Count

c.Hop Limit

b.Time to Live

d.Time Limit
Definition
c.Hop Limit
Term
The ____ extension header provides a method for extending the IPv6 header to support options for packet handling and preferences.

a.Extended Header Options

c.Hop-by-Hop Options

b.Destination Options

d.Next Payload Options
Definition
b.Destination Options
Term
In IPv6, the ____ extension header should be used to encrypt data.

a.Cryptographic

c.Secure Payload

b.Authentication Data

d.Encapsulating Security Payload
Definition
d.Encapsulating Security Payload
Term
____ is a method that allows an IP host to use a simplified subnetting design.

a.Proxy ARP

c.IPCP

b.Link Control

d.IPCONFIG
Definition
a.Proxy ARP
Term
The primary function of ____ layer protocols is to move datagrams through an internetwork connected by routers.

a.Data link

c.Network

b.Application

d.Transport
Definition
c.Network
Term
Routers use ____ to select a routing path when there are multiple paths available.

a.tokens

c.Type of Service

b.precedence

d.repeaters
Definition
c.Type of Service
Term
A(n) ____ is a compilation of information about all the networks that the router can
reach.

a.host

c.black hole

b.routing table

d.agent
Definition
b.routing table
Term
A(n) ____ occurs on a network when ICMP is turned off and a router discards packets without sending any notification about its actions.

a.black hole

c.link state

b.agent

d.distance vector
Definition
a.black hole
Term
In a RIPv2 packet, the ____ field contains a plain text password.

a.Authentication

c.Next Hop

b.Route Tag

d.Address Family
Definition
a.Authentication
Term
When a router is configured with ____, it watches for traffic on its LAN that does not match its own IP address.

a.link-state

c.intra-domain routing

b.Local Area Mobility

d.external route entry
Definition
b.Local Area Modility
Term
____ messages serve to keep hosts apprised of networking conditions and problems, and equipped to use best paths around the network.

a.NTP

c.ICMP

b.Path MTU

d.GMT
Definition
c.ICMP
Term
The message type ____ supports functionality for reachability utilities like Ping and Tracert; essential when installing, configuring, and troubleshooting IP networks.

a.ICMP Echo/Echo Reply

c.ICMP Time Exceeded

b.ICMP Source Quench

d.ICMP Destination Unreachable
Definition
a.ICMP Echo/Echo Reply
Term
The message type ____ documents when routing or delivery errors prevent IP datagrams from reaching their destinations.

a.ICMP Echo/Echo Reply

c.ICMP Time Exceeded

b.ICMP Source Quench

d.ICMP Destination Unreachable
Definition
d.ICMP Destination Unreachable
Term
The message type ____ permits a gateway (router) on a nonoptimal route between sender and receiver to redirect traffic to a more optimal path.

a.ICMP Echo/Echo Reply

c.ICMP Redirect

b.ICMP Source Quench

d.ICMP Destination Unreachable
Definition
c.ICMP Redirect
Term
The ICMP packet field____ provides error detection for the ICMP header only.

a.Checksum

c.Host

b.Type

d.Code
Definition
a.Checksum
Term
A host or router can send the ____ error message to indicate that the protocol defined in the IP header cannot be processed.

a.Code 2: Protocol Unreachable

b.Code 3:Port Unreachable

c.Code 4: Fragmentation Needed and Don’t Fragment Was Set

d.Code 5: Source Route Failed
Definition
a.Code 2: Protocol Unreachable
Term
There are two versions of the ____ ICMP reply - the standard version that simply states the packet had the Don’t Fragment bit set when it reached a router that needed to fragment it, and the PMTU version that includes information about the restricting link.

a.Code 2: Protocol Unreachable

b.Code 3:Port Unreachable

c.Code 4: Fragmentation Needed and Don’t Fragment Was Set

d.Code 5: Source Route Failed
Definition
c.Code 4: Fragmentation Needed and Don’t Fragment Was Set
Term
The ____ utility uses route tracing to identify a path from the sender to the target host.

a.gateway

c.firewalking

b.Traceroute

d.auto-recovery
Definition
b.Traceroute
Term
The ____ utility is a command-line utility that uses ICMP Echo packets to test router and link latency, as well as packet loss.

a.NTP

c.Path MTU

b.Pathping

d.Traceroute
Definition
b.Pathping
Term
Although RFC ____ dictates that IP routers“must support the router part of the ICMP Router Discovery protocol on all connected networks on which the router supports either IP multicast or IP broadcast addressing,” many do not.

a.1812

c.1955

b.1900

d.1972
Definition
a.1812
Term
Hackers can use ____ as part of a reconnaissance process to learn about active network addresses and active processes.

a.availability

c.auto recovery

b.ICMP

d.presence
Definition
b.ICMP
Term
A(n) ____ process is one method of obtaining a list of the active hosts on a network.

a.ICMP query

c.IP address scanning

b.query

d.firewalking
Definition
c.IP address scanning
Term
____ uses ICMPv6 type 133 messages.

a.Router Solicitation

c.Neighbor Advertisement

b.Router Advertisement

d.Neighbor Solicitation
Definition
a.Router Solicitation
Term
____ uses ICMPv6 type 135 messages.

a.Router Solicitation

c.Neighbor Advertisement

b.Router Advertisement

d.Neighbor Solicitation
Definition
d.Neighbor Solicitation
Term
____ use ICMPv6 type 137 messages.

a.Router Solicitation

c.Neighbor Advertisement

b.Router Advertisement

d.Redirect
Definition
d.Redirect
Term
ND makes use of multicast addresses, such as the “____” address with link-local scope (FF02::2).

a.all nodes

c.all proxies

b.all routers

d.all domains
Definition
b.all routers
Term
ND makes use of multicast addresses, such as the “____” address with link-local scope (FF02::1).

a.all nodes

c.all proxies

b.all routers

d.all domains
Definition
a.all nodes
Term
IPv6 Neighbor Solicitation protocol can be compared with IPv4 ____.

a.ARP Request

c.Router Advertisement

b.Router Solicitation

d.Redirect
Definition
a.ARP Request
Term
IPv6 Router Advertisement protocol can be compared with IPv4 ____.

a.ARP Request

c.Router Advertisement

b.Router Solicitation

d.Redirect
Definition
c.Router Advertisement
Term
In the ICMPv6 Router Solicitation message, the ____ field is an unused field that is set to 0 by the source node and ignored by the destination node.

a.Reserved

c.Checksum

b.Options

d.Type
Definition
a.Reserved
Term
Routers periodically send ____ messages to inform hosts of link prefixes (if address autoconfiguration is enabled), link MTU, valid and preferred lifetimes, and other possible options.

a.Router Solicitation

c.Router Advertisement

b.Neighbor Advertisement

d.Neighbor Solicitation
Definition
c.Router Advertisement
Term
____ help keep local routing optimized in the face of changing conditions and also reflect status as various destinations come on- and off-link.

a.Route Advertisement

c.Route Solicitation

b.Neighbor Advertisement

d.Redirects
Definition
d.Redirects
Term
The ____ option, if included, is used in Mobile IPv6 by mobile nodes receiving Router Advertisement messages for their movement detection algorithm.

a.Target Link Layer Address

c.Advertisement Interval

b.Redirected Header

d.Home Agent Information
Definition
c.Advertisement Interval
Term
____ is used by nodes to discover neighbor routers on the local link, learn prefixes, configure their default gateway, and other possible configuration parameters relating to autoconfiguration (stateless or stateful) useful to the node.

a.Address Resolution

c.Router Discovery

b.Duplicate Address Detection

d.Redirect Function
Definition
c.Router Discovery
Supporting users have an ad free experience!