Term
The ___ Protocol works at the Network layer, where it takes data chunks from the Transport layer, adds addressing, and creates the final IP packet. (pg. 173)
A. Hypertext Transfer (HTTP)
B. Internet (IP)
C. Transmission Control (TCP)
D. User Datagram (UDP) |
|
Definition
B. Internet Protocol
HTTP operates at the Application Layer.
TCP and UDP operate at the Transport Layer. |
|
|
Term
The connection-oriented protocol used with TCP/IP is called the ___. The connectionless one is called the ___. (pg. 174)
A. Hypertext Transfer Protocol (HTTP)
B. User Datagram Protocol (UDP)
C. Internet Control Message Protocol (ICMP)
D. Transmission Control Protocol (TCP) |
|
Definition
D. and B.
TCP gets an application's data from one machine to another reliably and completely.
UDP works best with a lot of data that doesn't need to be perfect or when the chances of a problem occurring are too small to worry about. |
|
|
Term
The three parts of the TCP three-way handshake are: (pick three)
A. ACK
B. ACK-SYN
C. SYN-ACK
D. SYN |
|
Definition
A. C. and D.
The three parts in order are SYN, SYN-ACK and ACK. |
|
|
Term
___ is/are used by systems to determine what application needs the data received or requested from a sending device. (pg. 175)
A. Checksum
B. Sequence numbers and acknowledgement numbers
C. Flags
D. Port numbers |
|
Definition
D. Port numbers range from 1- 65,535. Each application is assigned a specific port number on which to listen/send. |
|
|
Term
The ___ field(s) in the TCP header enable the sending and receiving computers to keep track of the various pieces of data flowing back and forth. (pg. 175)
A. port numbers
B. sequence/acknowledgement numbers
C. flags
D. checksum |
|
Definition
B. Sequence numbers and acknowledgement numbers |
|
|
Term
Individual bits of a TCP header that gives both sides detailed information about the state of the connection. (pg. 175)
A. Flags
B. SYN, SYN-ACK and ACK
C. Datagram
D. Segments |
|
Definition
A. Flags, also known as TCP flags |
|
|
Term
The recipient device of a TCP packet can use the ___ to check the header for errors such as bits flipped or lost during transmission. (pg. 175)
A. Protocol
B. Checksum
C. SYN
D. Flags |
|
Definition
B. The checksum adds a numerical value to the end of each packet, enabling the receiver to detect corruption that can occur as the packet moves through the network. |
|
|
Term
True or False:
Data gets chopped into chunks at the Transport layer when using UDP. These chunks are called segments. (pg. 176) |
|
Definition
False: UDP data is sent as datagrams and don't get divided; they just get a header.
TCP data is chopped into segments at the Transport layer. |
|
|
Term
The process and protocol used in resolving an IP address to an Ethernet MAC address is called ___. (pg. 180)
A. Address Resolution Protocol (ARP)
B.Transmission Control Protocol (TCP)
C. Internet Control Message Protocol (ICMP)
D. Hypertext Transfer Protocol (HTTP) |
|
Definition
A. A computer sends an ARP request to MAC address FF-FF-FF-FF-FF-FF. The switch forwards the broadcast to every node, and the intended recipient responds to the ARP request by sending the first computer an ARP reply through the switch. |
|
|
Term
An IP address is made up of two parts: a network ID and a host ID. What is the difference between them? (pg. 189) |
|
Definition
The network ID is the part of an IP address that each computer on a LAN share identically. The host ID is the unique part of the IP address for each device. |
|
|
Term
When you have a router that routes traffic out to other networks, both the router's interface on a LAN and the router itself are called the ___. (pg. 190)
A. Subnet mask
B. Host ID
C. Routing table
D. Default gateway |
|
Definition
D. The IP address of the default gateway is used to configure a client to access the network beyond the router (in a typical scenario). |
|
|
Term
The instructions that tell a router what to do with incoming packets and where to send them. (pg. 190)
A. Address Resolution Protocol (ARP)
B. Transmission Control Protocol (TCP)
C. Routing table
D. Domain Naming System (DNS) |
|
Definition
C. A routing table is a list of various networks and the next hop to reach them. Routers direct traffic for each network to the next hop. |
|
|
Term
The value used in TCP/IP settings to divide the IP address of a host into its component parts: network ID and host ID. (pg. 193, 879)
A. MAC address
B. ARP table entry
C. subnet mask
D. binary |
|
Definition
C. A subnet mask is a string of ones followed by zeroes totaling 32 bits set on every TCP/IP host. It allows a sending device to determine if the intended recipient is on the same network. |
|
|
Term
Which of the following shows an IP address and subnet mask represented by CIDR notation? (pg. 196)
A. 10.15.40.83/24
B. 10.15.40.83/1x24
C. 00001010.00001111.00101000.01010011/24
D. 10.15.40.83/255.255.255.0 |
|
Definition
A. CIDR notation uses a backslash (/) to distinguish the IP address (in dotted decimal form) and the subnet mask, represented by a number equal to the number of ones it has. |
|
|
Term
Which of these IP addresses is in the Class B block? (pg. 197)
A. 111.54.13.201
B. 164.23.45.123
C. 192.168.72.24
D. 240.126.50.40 |
|
Definition
B. The Class ID system goes:
[image] |
|
|
Term
The concept of taking a single class of IP addresses and chopping it up into multiple smaller groups is called ___. (pg. 199)
A. segmenting
B. networking
C. masking
D. subnetting |
|
Definition
D. Subnetting enables a much more efficient use of IP addresses compared to class blocks, and enables you to separate a network for security and bandwidth control. |
|
|
Term
The IP addressing method that involves typing all of the IP information into each host. (pg. 210)
A. Advanced
B. Dynamic
C. Manual
D. Static |
|
Definition
|
|
Term
The four-step process that a DHCP client uses to obtain an IP address from a DHCP server is referred to as ___ (pg.215-216)
A. AT-AT (Ask, Test, Accept, Trust)
B. ICCA (Inquire, Check, Confirm, Accept)
C. DORA (Discover, Offer, Request, Acknowledgment)
D. SFTK (Search, Find, Try, Keep) |
|
Definition
C. Discover - client broadcasts a message to a server.
Offer - the server replies with IP information.
Request - the client verifies the offer is valid and accepts.
Acknowledgment - the server sends a message listing the client's MAC address and IP information in a database. |
|
|
Term
What are the ports that DHCP servers and clients use? (pg. 216)
A. TCP ports 67 and 68
B. UDP ports 67 and 68
C.TCP ports 80 and 443
D. UDP ports 80 and 443 |
|
Definition
B. UDP ports 67 and 68 are reserved for DHCP requests. TCP port 80 is used by HTTP servers to field client requests, and HTTPS servers use port 443 for the same. |
|
|
Term
Pick three: A DHCP server requires: (pg. 217)
A. A pool of IP addresses to issue to clients
B. The subnet mask for the network
C. The MAC address of the ISP's router
D. The IP address for the default gateway for the network |
|
Definition
|
|
Term
What is the purpose of a DHCP relay? (pg. 219)
A. It allows DHCP broadcasts to cross routers.
B. It allows DHCP servers to set up MAC reservations.
C. It allows devices with reserved addresses to work in a DHCP environment.
D. It allows a client to connect to a network without manual setup |
|
Definition
A. A DHCP relay (or relay agent) enables a router to accept DHCP broadcasts from clients and then use UDP forwarding to send them on via unicast addresses directly to the DHCP server. |
|
|
Term
What is the purpose of IP reservation? (pg. 219)
A. It allows devices to keep IP address for a time without losing them if they disconnect from the network.
B. It allows authenticated devices to receive an IP address faster.
C. It allows devices that don't need DHCP to have static IP addresses.
D. It ensures that only devices that are on a specified domain can connect to the network. |
|
Definition
C. Certain devices like printers, cameras and servers should have permanent addresses to allow them to be located easily. |
|
|
Term
All DHCP clients are designed to generate an ___ address automatically if they do not receive a response to a DHCP Discover message. (pg. 223)
A. DORA
B. DARPA
C. APIPA
D. TCP/IP |
|
Definition
C. An Automatic Private IP Address (APIPA) allows clients that don't receive a response to their Discover message to communicate with each other while they are on the same network ID.
DORA (Discover, Offer, Request, Acknowlegement) is the four-step process a client takes to receive IP configuration from a DHCP server.
The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military.
TCP/IP is the protocol suite most commonly used for networking. |
|
|
Term
True or False: APIPA can issue a temporary IP address and default gateway so a client can communicate with others and get out to the Internet until it can talk to the DHCP server. |
|
Definition
False: APIPA can issue a temporary IP address, but not a default gateway. A client can communicate with other clients on the same network ID (usually 169.254.x.x), but can't get out to the Internet. |
|
|
Term
What is DHCP failover? (pg. 226)
A. If a client is unable to reach one DHCP server, it tries to reach another.
B. Two DHCP servers work together to provide failure redundancy for a network.
C. If a DHCP server goes down, another one that was on standby takes over DHCP duties.
D. A DHCP server attempts to provide IP addresses beyond its available scope. |
|
Definition
B. The DHCP failover pair shares a single scope. If either fails, the other picks up the load and the the end users never notice a thing. |
|
|
Term
What issues can a rogue DHCP server have/cause? (select all that apply, pg. 226)
A. It can intercept or capture incoming and outgoing traffic.
B. It passes out incorrect IP information to clients.
C. It goes into Stealth Mode and can't be pinged.
D. It refuses to be reconfigured by a network administrator. |
|
Definition
A. and B. It can change the default gateway to alter traffic in intentionally malicious cases, but pass out incorrect IP info in more accidental ones. |
|
|
Term
What is the numeric reservation for the loopback address in TCP/IP? (pg. 227)
A. 192.168.0.0
B. 127.0.0.1
C. 255.255.255.0
D. 169.254.x.x |
|
Definition
B. 127.0.0.1, although the entire 127.0.0.0/8 is reserved for loopback addresses.
When you tell a device to send data to these addresses, you're telling the device to send the packet to itself. |
|
|