Term
When two or more RFCs cover the same topic, they usually also share the same title. |
|
Definition
|
|
Term
RFC 3300 describes how an RFC is created and what processes it must go through to become an official standard, adopted by the IETF. |
|
Definition
|
|
Term
A divide and conquer approach permits concerns related to networking hardware to be completely separated from those related to networking software. |
|
Definition
|
|
Term
PDUs typically include “envelope information” in the form of specific headers and trailers. |
|
Definition
|
|
Term
The Session layer is equipped to request retransmission of all erroneous or missing PDUs when reassembly is underway, so that it can guarantee reliable delivery of data from sender to receiver. |
|
Definition
|
|
Term
IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network. |
|
Definition
|
|
Term
As a frame moves from interface to interface, the IP source and destination address information is preserved. |
|
Definition
|
|
Term
Class D addresses always take the following binary form: bbbbbbbb.11111111.11111111.11111111. |
|
Definition
|
|
Term
When a host uses a service that employs a multicast address, it registers itself to “listen” on that address, as well as on its own unique host address (and the broadcast address). |
|
Definition
|
|
Term
Providing a narrower address space is the primary design goal for IPv6. |
|
Definition
|
|
Term
The Internet Protocol (IP) primarily works to transmit and deliver data between devices on internetworks. |
|
Definition
|
|
Term
Because PHB is independent of how individual routers are configured, the end-to-end behavior of traffic is predictable. |
|
Definition
|
|
Term
When a packet is sent between two ECN-capable routers, the packet is usually marked ECT(0) or ECT(10) for ECN Capable Transport. |
|
Definition
|
|
Term
Though defined in terms of seconds, a TTL value is implemented as a number of hops that a packet can travel before being discarded by a router. |
|
Definition
|
|
Term
Unlike IPv4 packets, IPv6 packets ensure that data or application information is successfully transported from a source to a destination node on a network. |
|
Definition
|
|
Term
ARP is used to obtain the hardware address of the destination IP hosts. |
|
Definition
|
|
Term
If a packet with TTL=1 arrives at a router, the router must discard the packet because it cannot decrement the TTL to 0 and forward the packet. |
|
Definition
|
|
Term
When a packet is fragmented, all fragments are given different TTL values. |
|
Definition
|
|
Term
Routed protocols are Layer 1 protocols that are used to get packets through an internetwork. |
|
Definition
|
|
Term
A network is usually said to be converged when all the routers know a loop-free path to get to all other networks. |
|
Definition
|
|
Term
The value 0 in the IP header Protocol field denotes that an ICMP header follows the IP header. |
|
Definition
|
|
Term
ICMP packets contain only three required fields after the IP header: Type, Code, and Checksum. |
|
Definition
|
|
Term
Routers send ICMP Redirect messages to hosts to indicate that a preferable route exists. |
|
Definition
|
|
Term
Routers can use ICMP to provide a default gateway setting to a host (if the host requests assistance). |
|
Definition
|
|
Term
With router advertising, the default Lifetime value for route entries is 10 minutes. |
|
Definition
|
|
Term
Neighbor Discovery has five functional processes. |
|
Definition
|
|
Term
Upon start-up, Neighbor Discovery collects information about how nodes configure their IPv6 addresses to communicate on the network. |
|
Definition
|
|
Term
Neighbor Discovery makes abundant use of messages. |
|
Definition
|
|
Term
ND takes over the functions that ARP and Reverse ARP handled in IPv4. |
|
Definition
|
|
Term
Home Agents may include the Home Agent Information option in their Router Advertisement messages, but it should not be included if the Home Agent (H) bit is not set. |
|
Definition
|
|
Term
The term ____ refers to a single logical network composed of multiple physical networks, which may all be at a single physical location, or spread among multiple physical locations.
a.internetwork
c.connection-oriented
b.session
d.checksum |
|
Definition
|
|
Term
The ____ is the parent organization for all the various Internet boards and task forces.
a.ICANN
c.Internet Architecture Board
b.Internet Engineering Task Force
d.Internet Society |
|
Definition
|
|
Term
The ____ is the group responsible for drafting, testing, proposing, and maintaining official Internet Standards, in the form of RFCs, through the agencies of multiple working groups under its purview.
a.ICANN
c.Internet Architecture Board
b.Internet Engineering Task Force
d.Internet Society |
|
Definition
b.Internet Engineering Task Force |
|
|
Term
The ____ is responsible for the more forward-looking activities of the ISOC, and handles research and development work for topics too far-out or impractical for immediate implementation, but which may (or may not) have a role to play on the Internet some day.
a.ICANN
c.Internet Research Task Force
b.Internet Engineering Task Force
d.Internet Society |
|
Definition
c.Internet Research Task Force |
|
|
Term
The ____ is ultimately responsible for managing all Internet domain names, network addresses, and protocol parameters and behaviors.
a.ICANN
c.Internet Research Task Force
b.Internet Engineering Task Force
d.Internet Society |
|
Definition
|
|
Term
The ____ includes the physical transmission medium (cables or wireless media) that any network must use to send and receive the signals that constitute the physical expression of networked communications.
a.Data Link layer
c.Network layer
b.Physical layer
d.Transport layer |
|
Definition
|
|
Term
The ____ is where ongoing communications between a sender and a receiver, somewhat like a telephone conversation, are set up, maintained, and then terminated, or torn down,as needed.
a.Session layer
c.Network layer
b.Physical layer
d.Presentation layer |
|
Definition
|
|
Term
The ____ manages the way data is presented to the network (on its way down the protocol stack), and to a specific machine/application combination (on its way up the protocol stack).
a.Session layer
c.Network layer
b.Physical layer
d.Presentation layer |
|
Definition
|
|
Term
The TCP/IP Application layer also is known as the ____ layer because this is where the protocol stack interfaces with applications or processes on a host machine.
a.Session
c.Process
b.Network
d.Transport |
|
Definition
|
|
Term
Many PDUs include a characteristic closing component called a ____ that provides data integrity checks for the data portion of the PDU, known as the payload.
a.well-known protocol
c.network service
b.trailer
d.host |
|
Definition
|
|
Term
____ is the process of tapping into the network communications system, capturing packets that cross the network, gathering network statistics, and decoding the packets into readable form.
a.Segmentation
c.Encapsulation
b.Multiplexing
d.Protocol analysis |
|
Definition
|
|
Term
Remote Monitoring (RMON) uses the ____ to collect traffic data at a remote switch and send the data to a management device.
a.Simple Network Management Protocol
c.Virtual Private Network
b.User Datagram Protocol
d.Wide Area Information Service |
|
Definition
a.Simple Network Management Protocol |
|
|
Term
To be valid, any domain name must correspond to at least one unique ____.
a.loopback address
c.firewall
b.numeric IP address
d.IP gateway |
|
Definition
|
|
Term
The ____ address is a six-byte numeric address, burned into firmware (on a chip) by network interface manufacturers.
a.symbolic
c.reverse proxy
b.logical numeric
d.physical numeric |
|
Definition
|
|
Term
____ is used to permit computers to translate numeric IP addresses to MAC layer addresses.
a.ARP
c.Reverse proxying
b.RARP
d.Subnet masking |
|
Definition
|
|
Term
____ is used to translate MAC layer addresses into numeric IP addresses.
a.ARP
c.Reverse proxying
b.RARP
d.Subnet masking |
|
Definition
|
|
Term
The term ____ is used to describe the data frame crossing a router.
a.firewall
c.loopback
b.hop
d.dot squad |
|
Definition
|
|
Term
A ____ is a special bit pattern that “blocks off ” the network portion of an IPv4 address with an all-ones pattern.
a.reverse proxy
c.broadcast address
b.summary address
d.subnet mask |
|
Definition
|
|
Term
A(n) ____ is a device that interconnects multiple IP networks or subnets.
a.subnet mask
c.layer-3 switch
b.IP gateway
d.network address |
|
Definition
|
|
Term
When a computer on one subnet wishes to communicate with a computer on another subnet, traffic must be forwarded from the sender to a nearby ____ to send the message on its way from one subnet to another.
a.broadcast address
c.subnet mask
b.IP gateway
d.proxy server |
|
Definition
|
|
Term
One form of subnet masking uses a technique called ____ and permits a single address to be subdivided into multiple subnets, in which subnets need not all be the same size.
a.IP gateway
c.variable-length subnet masking
b.constant-length subnet masking
d.IP renumbering |
|
Definition
c.variable-length subnet masking |
|
|
Term
____ allows IPv4 addresses from Class A, B, or C to be combined and treated as a larger address space, or subdivided arbitrarily, as needed.
a.Supernetting
c.Subnet masking
b.Classless Inter-Domain Routing
d.Address masquerading |
|
Definition
b.Classless Inter-Domain Routing |
|
|
Term
____ may be performed by boundary devices that include proxy server capabilities to replace private IP addresses with one or more public IP addresses as outbound traffic exits the server, and to replace such public addresses with their proper private equivalents as incoming traffic passes through the server.
a.IP renumbering
c.Address masquerading
b.Supernetting
d.Subnetting |
|
Definition
|
|
Term
One of the most important services that a ____ provides is to manage what source addresses appear in outbound packets that pass through it.
a.loopback
c.subnet mask
b.proxy server
d.layer-3 switch |
|
Definition
|
|
Term
____ lets networks use multiple private IPv4 addresses internally and maps them to one or more public IPv4 addresses externally.
a.DNS
c.NAT
b.IP gateway
d.VoIP |
|
Definition
|
|
Term
Multicast addresses in IPv6 use a(n) ____ to define the portion of the Internet to which the multicast group pertains.
a.scope identifier
c.loopback identifier
b.interface identifier
d.aggregatable global unicast address |
|
Definition
|
|
Term
Previously, IPv6 specified that interface identifiers followed the modified ____ format, which specifies a unique 64-bit interface identifier for each interface.
a.RFC 4941
c.EULA-64
b.EUI-64
d.IEEE 802.64v6 |
|
Definition
|
|
Term
There are ____ fields possible in the IPv4 header.
a.14
c.19
b.15
d.21 |
|
Definition
|
|
Term
The Type of Service field actually has two components: Precedence and ____.
a.Trailer
c.Payload
b.Type of Service
d.Frame |
|
Definition
|
|
Term
RFC ____ defines a method for differentiating services for network traffic using the six high-order bits of the byte that was formerly the 3-bit Precedence field and the first bit of the TOS field.
a.1212
c.2156
b.1974
d.2474 |
|
Definition
|
|
Term
In networking terms, a packet’s ____ is the remaining distance that the packet can travel.
a.time to live (TTL)
c.offset
b.number of hops (NOH)
d.remaining path |
|
Definition
|
|
Term
In IPv4 the maximum time to live value is ____.
a.64
c.255
b.128
d.312 |
|
Definition
|
|
Term
The specifications for IPv6, including the header format, were established in RFC 1883, which was subsequently made obsolete by RFC ____.
a.1983
c.2517
b.2460
d.3114 |
|
Definition
|
|
Term
RFC ____ is the proposed standard for the Flow Label specification and defines the minimum requirements for this field.
a.3697
c.4554
b.4545
d.5674 |
|
Definition
|
|
Term
IPv6 jumbograms are specified in RFC ____ as a proposed standard.
a.1100
c.2314
b.1700
d.2675 |
|
Definition
|
|
Term
The 8-bit ____ field specifies the header type of the header immediately following the IPv6 header.
a.Next Header
c.Traffic Class
b.Payload Class
d.Header Type |
|
Definition
|
|
Term
The value in the 8-bit ____ field decrements by one each time it is forwarded by a network node, and the IPv6 packet is discarded if the value in this field reaches 0.
a.Hop Count
c.Hop Limit
b.Time to Live
d.Time Limit |
|
Definition
|
|
Term
The ____ extension header provides a method for extending the IPv6 header to support options for packet handling and preferences.
a.Extended Header Options
c.Hop-by-Hop Options
b.Destination Options
d.Next Payload Options |
|
Definition
|
|
Term
In IPv6, the ____ extension header should be used to encrypt data.
a.Cryptographic
c.Secure Payload
b.Authentication Data
d.Encapsulating Security Payload |
|
Definition
d.Encapsulating Security Payload |
|
|
Term
____ is a method that allows an IP host to use a simplified subnetting design.
a.Proxy ARP
c.IPCP
b.Link Control
d.IPCONFIG |
|
Definition
|
|
Term
The primary function of ____ layer protocols is to move datagrams through an internetwork connected by routers.
a.Data link
c.Network
b.Application
d.Transport |
|
Definition
|
|
Term
Routers use ____ to select a routing path when there are multiple paths available.
a.tokens
c.Type of Service
b.precedence
d.repeaters |
|
Definition
|
|
Term
A(n) ____ is a compilation of information about all the networks that the router can reach.
a.host
c.black hole
b.routing table
d.agent |
|
Definition
|
|
Term
A(n) ____ occurs on a network when ICMP is turned off and a router discards packets without sending any notification about its actions.
a.black hole
c.link state
b.agent
d.distance vector |
|
Definition
|
|
Term
In a RIPv2 packet, the ____ field contains a plain text password.
a.Authentication
c.Next Hop
b.Route Tag
d.Address Family |
|
Definition
|
|
Term
When a router is configured with ____, it watches for traffic on its LAN that does not match its own IP address.
a.link-state
c.intra-domain routing
b.Local Area Mobility
d.external route entry |
|
Definition
|
|
Term
____ messages serve to keep hosts apprised of networking conditions and problems, and equipped to use best paths around the network.
a.NTP
c.ICMP
b.Path MTU
d.GMT |
|
Definition
|
|
Term
The message type ____ supports functionality for reachability utilities like Ping and Tracert; essential when installing, configuring, and troubleshooting IP networks.
a.ICMP Echo/Echo Reply
c.ICMP Time Exceeded
b.ICMP Source Quench
d.ICMP Destination Unreachable |
|
Definition
|
|
Term
The message type ____ documents when routing or delivery errors prevent IP datagrams from reaching their destinations.
a.ICMP Echo/Echo Reply
c.ICMP Time Exceeded
b.ICMP Source Quench
d.ICMP Destination Unreachable |
|
Definition
d.ICMP Destination Unreachable |
|
|
Term
The message type ____ permits a gateway (router) on a nonoptimal route between sender and receiver to redirect traffic to a more optimal path.
a.ICMP Echo/Echo Reply
c.ICMP Redirect
b.ICMP Source Quench
d.ICMP Destination Unreachable |
|
Definition
|
|
Term
The ICMP packet field____ provides error detection for the ICMP header only.
a.Checksum
c.Host
b.Type
d.Code |
|
Definition
|
|
Term
A host or router can send the ____ error message to indicate that the protocol defined in the IP header cannot be processed.
a.Code 2: Protocol Unreachable
b.Code 3:Port Unreachable
c.Code 4: Fragmentation Needed and Don’t Fragment Was Set
d.Code 5: Source Route Failed |
|
Definition
a.Code 2: Protocol Unreachable |
|
|
Term
There are two versions of the ____ ICMP reply - the standard version that simply states the packet had the Don’t Fragment bit set when it reached a router that needed to fragment it, and the PMTU version that includes information about the restricting link.
a.Code 2: Protocol Unreachable
b.Code 3:Port Unreachable
c.Code 4: Fragmentation Needed and Don’t Fragment Was Set
d.Code 5: Source Route Failed |
|
Definition
c.Code 4: Fragmentation Needed and Don’t Fragment Was Set |
|
|
Term
The ____ utility uses route tracing to identify a path from the sender to the target host.
a.gateway
c.firewalking
b.Traceroute
d.auto-recovery |
|
Definition
|
|
Term
The ____ utility is a command-line utility that uses ICMP Echo packets to test router and link latency, as well as packet loss.
a.NTP
c.Path MTU
b.Pathping
d.Traceroute |
|
Definition
|
|
Term
Although RFC ____ dictates that IP routers“must support the router part of the ICMP Router Discovery protocol on all connected networks on which the router supports either IP multicast or IP broadcast addressing,” many do not.
a.1812
c.1955
b.1900
d.1972 |
|
Definition
|
|
Term
Hackers can use ____ as part of a reconnaissance process to learn about active network addresses and active processes.
a.availability
c.auto recovery
b.ICMP
d.presence |
|
Definition
|
|
Term
A(n) ____ process is one method of obtaining a list of the active hosts on a network.
a.ICMP query
c.IP address scanning
b.query
d.firewalking |
|
Definition
|
|
Term
____ uses ICMPv6 type 133 messages.
a.Router Solicitation
c.Neighbor Advertisement
b.Router Advertisement
d.Neighbor Solicitation |
|
Definition
|
|
Term
____ uses ICMPv6 type 135 messages.
a.Router Solicitation
c.Neighbor Advertisement
b.Router Advertisement
d.Neighbor Solicitation |
|
Definition
|
|
Term
____ use ICMPv6 type 137 messages.
a.Router Solicitation
c.Neighbor Advertisement
b.Router Advertisement
d.Redirect |
|
Definition
|
|
Term
ND makes use of multicast addresses, such as the “____” address with link-local scope (FF02::2).
a.all nodes
c.all proxies
b.all routers
d.all domains |
|
Definition
|
|
Term
ND makes use of multicast addresses, such as the “____” address with link-local scope (FF02::1).
a.all nodes
c.all proxies
b.all routers
d.all domains |
|
Definition
|
|
Term
IPv6 Neighbor Solicitation protocol can be compared with IPv4 ____.
a.ARP Request
c.Router Advertisement
b.Router Solicitation
d.Redirect |
|
Definition
|
|
Term
IPv6 Router Advertisement protocol can be compared with IPv4 ____.
a.ARP Request
c.Router Advertisement
b.Router Solicitation
d.Redirect |
|
Definition
|
|
Term
In the ICMPv6 Router Solicitation message, the ____ field is an unused field that is set to 0 by the source node and ignored by the destination node.
a.Reserved
c.Checksum
b.Options
d.Type |
|
Definition
|
|
Term
Routers periodically send ____ messages to inform hosts of link prefixes (if address autoconfiguration is enabled), link MTU, valid and preferred lifetimes, and other possible options.
a.Router Solicitation
c.Router Advertisement
b.Neighbor Advertisement
d.Neighbor Solicitation |
|
Definition
|
|
Term
____ help keep local routing optimized in the face of changing conditions and also reflect status as various destinations come on- and off-link.
a.Route Advertisement
c.Route Solicitation
b.Neighbor Advertisement
d.Redirects |
|
Definition
|
|
Term
The ____ option, if included, is used in Mobile IPv6 by mobile nodes receiving Router Advertisement messages for their movement detection algorithm.
a.Target Link Layer Address
c.Advertisement Interval
b.Redirected Header
d.Home Agent Information |
|
Definition
|
|
Term
____ is used by nodes to discover neighbor routers on the local link, learn prefixes, configure their default gateway, and other possible configuration parameters relating to autoconfiguration (stateless or stateful) useful to the node.
a.Address Resolution
c.Router Discovery
b.Duplicate Address Detection
d.Redirect Function |
|
Definition
|
|