Chapter 8 And 9

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rebullman
R
Rebullman
Community Contributor
Quizzes Created: 2 | Total Attempts: 224
Questions: 25 | Attempts: 117

SettingsSettingsSettings
Chapter 8 And 9 - Quiz

WIRELESS NETWORKS 2 CHAPT 8
TCP/IP INTERNETWORKING CHAPT 9


Questions and Answers
  • 1. 

    802.11i is attractive compared with WPA because?

    • A.

      Many older devices can be upgraded to 802.11i

    • B.

      802.11i offers stronger security

    • C.

      802.11i was standardized by the Wi-Fi Alliance

    • D.

      802.11i offers quality of service

    • E.

      All of the above

    Correct Answer
    B. 802.11i offers stronger security
    Explanation
    802.11i is more attractive compared to WPA because it offers stronger security. This means that it provides better protection against unauthorized access and ensures the confidentiality and integrity of the data being transmitted over the wireless network. This is crucial in today's digital age where cybersecurity threats are prevalent. Upgrading to 802.11i would enhance the overall security posture of the network, making it a preferred choice over WPA. Additionally, the fact that 802.11i was standardized by the Wi-Fi Alliance further adds to its credibility and trustworthiness.

    Rate this question:

  • 2. 

    What is the strongest security protocol for 802.11 today?

    • A.

      802.11s

    • B.

      802.11i

    • C.

      WPA

    • D.

      802.11X

    • E.

      WEP

    Correct Answer
    B. 802.11i
    Explanation
    802.11i is the strongest security protocol for 802.11 today. It is also known as WPA2 (Wi-Fi Protected Access 2) and provides enhanced security features compared to its predecessor, WPA (Wi-Fi Protected Access). 802.11i uses the Advanced Encryption Standard (AES) algorithm, which is considered highly secure. It also supports mutual authentication, data integrity checks, and dynamic encryption key management, making it more resistant to attacks and ensuring a higher level of security for wireless networks.

    Rate this question:

  • 3. 

    What damage can an evil twin access point do?

    • A.

      Eavesdrop on communication

    • B.

      Steal important keys or other information transmitted by the client.

    • C.

      Launch attacks against corporate servers.

    • D.

      All of the above

    • E.

      Only A and B

    Correct Answer
    D. All of the above
    Explanation
    An evil twin access point can cause various damages. It can eavesdrop on communication, meaning it can intercept and listen to the data being transmitted between the client and the network. It can also steal important keys or other sensitive information that is being transmitted by the client, such as passwords or credit card details. Additionally, it can launch attacks against corporate servers, potentially causing disruption or unauthorized access to sensitive data. Therefore, all of the given options are correct, making "All of the above" the correct answer.

    Rate this question:

  • 4. 

    Which of the folowing secures communication between the wireless computer and the server it wishes to use against evil twin attacks?

    • A.

      IPsec.

    • B.

      VPNs

    • C.

      VLANs

    • D.

      PEAP

    • E.

      SSL/TLS

    Correct Answer
    B. VPNs
    Explanation
    VPNs (Virtual Private Networks) secure communication between a wireless computer and the server against evil twin attacks. Evil twin attacks involve creating a malicious network that appears to be legitimate, tricking users into connecting to it. By using a VPN, all data transmitted between the computer and the server is encrypted, ensuring that even if an attacker intercepts the communication, they won't be able to decipher it. VPNs create a private and secure tunnel for data transmission, protecting against potential threats and ensuring the confidentiality and integrity of the communication.

    Rate this question:

  • 5. 

    What security protocol originally came with 802.11 equipment?

    • A.

      802.11i

    • B.

      802.11e

    • C.

      WEP

    • D.

      WPA

    Correct Answer
    C. WEP
    Explanation
    WEP (Wired Equivalent Privacy) was the original security protocol that came with 802.11 equipment. It was introduced in 1997 as a way to provide basic security for wireless networks. However, WEP has been widely criticized for its vulnerabilities and is no longer considered secure. It has been replaced by more advanced protocols such as WPA and WPA2.

    Rate this question:

  • 6. 

    The Network part of an IP address is ____________ bits long?

    • A.

      8

    • B.

      32

    • C.

      16

    • D.

      24

    • E.

      The size of the network part varies.

    Correct Answer
    E. The size of the network part varies.
    Explanation
    The network part of an IP address refers to the portion of the address that identifies the network to which the device belongs. The size of the network part can vary depending on the subnet mask used. A subnet mask is used to divide an IP address into network and host portions. It determines the number of bits used for the network part. Therefore, the size of the network part can vary depending on the specific network configuration.

    Rate this question:

  • 7. 

    A mask has __________ bits?

    • A.

      8

    • B.

      24

    • C.

      16

    • D.

      32

    • E.

      The number of bits varies.

    Correct Answer
    E. The number of bits varies.
  • 8. 

    In a network mask, the 1's correspond to the ____________?

    • A.

      Subnet part

    • B.

      Network part

    • C.

      Host part

    • D.

      None of the above

    Correct Answer
    B. Network part
    Explanation
    The 1's in a network mask correspond to the network part. The network part of an IP address is used to identify the network to which the IP address belongs. It is a portion of the IP address that remains constant within a particular network. The network mask is used to determine which part of an IP address represents the network part and which part represents the host part.

    Rate this question:

  • 9. 

    In the subnet mask the 1's correspond to the ____________?

    • A.

      Subnet part

    • B.

      Network part

    • C.

      Host part

    • D.

      None of the above.

    Correct Answer
    D. None of the above.
    Explanation
    In the subnet mask, the 1's correspond to the network part. The subnet part and host part are represented by 0's in the subnet mask.

    Rate this question:

  • 10. 

    If /14 is the network mask, how many bits are there in the subnet part?

    • A.

      18

    • B.

      16

    • C.

      14

    • D.

      8

    • E.

      We cannot say.

    Correct Answer
    E. We cannot say.
    Explanation
    The question provides the network mask "/14" but does not specify the subnet part. Therefore, it is not possible to determine the number of bits in the subnet part based on the given information.

    Rate this question:

  • 11. 

    If /14 is the network mask, how many bits are there in the host part?

    • A.

      18

    • B.

      8

    • C.

      14

    • D.

      16

    • E.

      We cannot say.

    Correct Answer
    E. We cannot say.
    Explanation
    The correct answer is "we cannot say." The reason for this is that the given network mask "/14" does not provide enough information to determine the number of bits in the host part. The network mask only specifies the number of bits in the network part, but the host part can vary depending on the specific network configuration. Therefore, without additional information, it is not possible to determine the number of bits in the host part.

    Rate this question:

  • 12. 

    If /14 is a subnet mask, how many bits are there in the host part?

    • A.

      14

    • B.

      16

    • C.

      18

    • D.

      8

    • E.

      We cannot say.

    Correct Answer
    C. 18
  • 13. 

    The default row ___________?

    • A.

      Always has the mask /16

    • B.

      Will always match the IP address of an incoming packet

    • C.

      Both A and B

    • D.

      Neither A nor B

    Correct Answer
    B. Will always match the IP address of an incoming packet
    Explanation
    The default row in a routing table will always match the IP address of an incoming packet. This is because the default row is used when there is no specific match found for the destination IP address in the routing table. The default row acts as a catch-all and is used when no other more specific routes are available. Therefore, any incoming packet that does not have a matching entry in the routing table will be matched by the default row.

    Rate this question:

  • 14. 

    Row 2707 has the mask /16 and the reliability metric 20.  Row 4400 has the mask /14 and the cost metric 10.  Which row will the router choose if both are matches?

    • A.

      2707

    • B.

      4400

    • C.

      Either A or B

    • D.

      The router will choose the default row.

    Correct Answer
    A. 2707
    Explanation
    The router will choose row 2707 because it has a higher reliability metric of 20 compared to row 4400 which has a cost metric of 10.

    Rate this question:

  • 15. 

    Row 2707 has the mask /16 and the speed metric 20.  Row 4400 has the mask /16 and the speed metric 10.  Which row with the router choose if both are matches?

    • A.

      2707

    • B.

      4400

    • C.

      Either A or B

    • D.

      The router will choose the default row.

    Correct Answer
    A. 2707
    Explanation
    The router will choose row 2707 because it has a higher speed metric of 20 compared to row 4400 which has a speed metric of 10.

    Rate this question:

  • 16. 

    Routers send packets out ________?

    • A.

      Plugs

    • B.

      Connections

    • C.

      Ports

    • D.

      Interfaces

    Correct Answer
    D. Interfaces
    Explanation
    Routers send packets out through interfaces. Interfaces are the physical or virtual connections that allow a router to connect to other devices or networks. They serve as the entry and exit points for data packets, enabling the router to transmit and receive information across different networks. By using interfaces, routers can effectively direct packets to their intended destinations, ensuring efficient communication between devices.

    Rate this question:

  • 17. 

    To deliver an arriving packet to a destination host on a subnet connected to router, the router needs to know the destination host's __________?

    • A.

      IP address

    • B.

      Data link layer address

    • C.

      Both A and B

    • D.

      Neither A and B

    Correct Answer
    C. Both A and B
    Explanation
    To deliver an arriving packet to a destination host on a subnet connected to a router, the router needs to know both the destination host's IP address and data link layer address. The IP address is required for routing the packet to the correct subnet, while the data link layer address is necessary for delivering the packet directly to the intended host on that subnet.

    Rate this question:

  • 18. 

    Fragmentation is __________?

    • A.

      Suspicious because it is often used by hackers

    • B.

      Very common

    • C.

      Both A and B

    • D.

      Neither A nor B

    Correct Answer
    A. Suspicious because it is often used by hackers
    Explanation
    Fragmentation is suspicious because it is often used by hackers. Fragmentation refers to the practice of dividing data into smaller pieces or fragments, which can make it difficult for security systems to detect and analyze. Hackers may use fragmentation techniques to bypass security measures, hide malicious code within the fragments, or evade detection. Therefore, the suspicious nature of fragmentation stems from its association with hacking activities.

    Rate this question:

  • 19. 

    A (n)_________specifies a particular application on a particular host.

    • A.

      Socket

    • B.

      IP address

    • C.

      Port number

    • D.

      None of the above

    Correct Answer
    A. Socket
    Explanation
    A socket is a communication endpoint that allows different computers to connect and exchange data with each other. It is a combination of an IP address and a port number, which together specify a particular application running on a particular host. Therefore, a socket is the correct answer as it accurately describes the concept of specifying a particular application on a particular host.

    Rate this question:

  • 20. 

    Which TCP/IP interior dynamic routing protocol is simple to manage?

    • A.

      OSPF

    • B.

      RIP

    • C.

      BGP

    • D.

      Both B and C

    Correct Answer
    B. RIP
    Explanation
    RIP (Routing Information Protocol) is a TCP/IP interior dynamic routing protocol that is considered simple to manage. It is a distance-vector protocol that uses hop count as the metric for determining the best path to a destination. RIP is relatively easy to configure and requires minimal administrative effort, making it a popular choice for small to medium-sized networks. It is not as scalable or efficient as other protocols like OSPF or BGP, but its simplicity and ease of management make it a suitable choice for certain network environments.

    Rate this question:

  • 21. 

    Which interior dynamic routing protocol is good for large internets?

    • A.

      RIP

    • B.

      OSPF

    • C.

      BGP

    • D.

      Both B and C

    Correct Answer
    B. OSPF
    Explanation
    OSPF (Open Shortest Path First) is a good interior dynamic routing protocol for large internets. This is because OSPF is designed to scale well and can handle large networks with thousands of routers. It uses a link-state routing algorithm, which allows for efficient and accurate routing table updates. OSPF also supports hierarchical routing, which further enhances scalability by dividing the network into smaller areas. Additionally, OSPF provides fast convergence and supports load balancing, making it suitable for large internets with high traffic volumes.

    Rate this question:

  • 22. 

    ___________is used for supervisory messages at the internet layer.

    • A.

      DNS

    • B.

      TCP

    • C.

      DHCP

    • D.

      ICMP

    Correct Answer
    D. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) is used for supervisory messages at the internet layer. ICMP is responsible for reporting errors and providing diagnostic information related to IP packet processing. It is commonly used by network devices to communicate error messages, such as destination unreachable or time exceeded, back to the source IP address. ICMP is also used for network troubleshooting and network management purposes.

    Rate this question:

  • 23. 

    In MPLS, the interface to send the packet back out will be decided ___________?

    • A.

      On the basis of the previous packet going to the packet's IP address.

    • B.

      Before the packet arrives

    • C.

      During the router's routing process

    • D.

      None of the above

    Correct Answer
    B. Before the packet arrives
    Explanation
    The interface to send the packet back out in MPLS is decided before the packet arrives. This means that the decision on which interface to use for forwarding the packet is made in advance, based on the information available in the MPLS header. This allows for faster and more efficient routing, as the decision is already made and the packet can be quickly forwarded without the need for further processing during the router's routing process.

    Rate this question:

  • 24. 

    Label-switching router base their decisions on a packet's__________?

    • A.

      Label number

    • B.

      IP address

    • C.

      Both A and B

    • D.

      Neither A nor b

    Correct Answer
    A. Label number
    Explanation
    Label-switching routers base their decisions on a packet's label number. This is because label switching is a technique used in MPLS (Multiprotocol Label Switching) networks, where labels are assigned to packets to determine their forwarding path. The label number serves as an identifier for the packet and allows the router to make forwarding decisions based on the label's value. IP addresses may still be used within the packet, but the primary factor for routing decisions in label-switching routers is the label number. Therefore, the correct answer is "label number."

    Rate this question:

  • 25. 

    In MPLS, the __________adds the label to the packet.

    • A.

      Source host

    • B.

      First label-switching router

    • C.

      Both A an B

    • D.

      Neither A nor B

    Correct Answer
    B. First label-switching router
    Explanation
    In MPLS, the first label-switching router adds the label to the packet. This is because MPLS uses labels to route packets through the network. The first label-switching router is responsible for assigning a label to the packet based on the destination address and forwarding it to the next hop in the network. This process allows for efficient and fast routing of packets in MPLS networks.

    Rate this question:

Related Topics

Back to Top Back to top
Advertisement