Internet Engineering 2 Midterm

80 Questions

Settings
Please wait...
Internet Quizzes & Trivia

.


Questions and Answers
  • 1. 
    What version of IP supports 128 bit addresses
    • A. 

      IPv1

    • B. 

      IPv2

    • C. 

      IPv4

    • D. 

      IPv6

  • 2. 
    According to the text, what is the protocol most commonly used by ISP's to link their customers to the Internet
    • A. 

      Ethernet

    • B. 

      Frame relay

    • C. 

      Point to Point (PPP)

    • D. 

      Token ring

  • 3. 
    Which of the following organizations develops and maintains RFCs?
    • A. 

      ISOC

    • B. 

      IAB

    • C. 

      IRTF

    • D. 

      IETF

  • 4. 
    Which of the following organizations manages Internet domain names and network addresses?
    • A. 

      ICANN

    • B. 

      IETF

    • C. 

      IRTF

    • D. 

      ISOC

  • 5. 
    What is the title of RFC 5000? 
    • A. 

      Index of official protocols

    • B. 

      Index of internet official protocols

    • C. 

      Internet official protocol standards

    • D. 

      The Internet standards Process

  • 6. 
    Which of the following is a TCP/IP Transport layer protocol?
    • A. 

      IP

    • B. 

      DNS

    • C. 

      TCP

    • D. 

      Frame Relay

  • 7. 
    Which OSI model layer handles the conversion of outgoing data from bits that computers use in the signals that network use
    • A. 

      Network

    • B. 

      Presentation

    • C. 

      Physical

    • D. 

      Data Link

  • 8. 
    • A. 

      Sessions

    • B. 

      Sockets

    • C. 

      Alarms

    • D. 

      Ports

  • 9. 
    • A. 

      Frames

    • B. 

      Packets

    • C. 

      Segments

    • D. 

      Data Link PDUs

    • E. 

      All of the above

  • 10. 
    • A. 

      Segmentation and reassembly

    • B. 

      Session set up, maintenance and teardown

    • C. 

      Check point controls

    • D. 

      Data format converions

  • 11. 
    • A. 

      TCP/IPNetwork Access Layer

    • B. 

      TCP/IP Internet Layer

    • C. 

      TCP/IP Transport Layer

    • D. 

      TCP/IP Application layer

  • 12. 
    Which of the following statements represents benefits of a layered approach to networking?
    • A. 

      Takes a big problem and breaks it into a series of smaller interrelated probelms

    • B. 

      Allows individual layer to be insulated from one another

    • C. 

      Permits expertise to be applied from different disciplines for different layers

    • D. 

      Permits hardware issues to be kept separate from software issues

  • 13. 
    Which of the following terms represent parts of a PDU that are alway present in any PDU
    • A. 

      Header

    • B. 

      Payload

    • C. 

      Checksum

    • D. 

      Trailer

  • 14. 
    Which of the following components operate at the physical layer?
    • A. 

      Network interface controllers (NIC)

    • B. 

      Segmentation and reassembly

    • C. 

      Connectors

    • D. 

      Cables

  • 15. 
    Which of the following protocols operate at the TCP/IP Transport layer?
    • A. 

      ARP

    • B. 

      PPP

    • C. 

      TCP

    • D. 

      UDP

    • E. 

      Xnet

  • 16. 
    In UNIX terminology, a listener process that operates on a service to handle incoming requests for service is called ?
    • A. 

      Listener

    • B. 

      Monitor

    • C. 

      Daemon

    • D. 

      Service

  • 17. 
    The process of combining multiple outgoing protocol streams at the Transport layer and the Network layers in TCP/IP is called?
    • A. 

      Folding

    • B. 

      Multiplexing

    • C. 

      Unfolding

    • D. 

      Demulitplexing

  • 18. 
    On any system, only those protocol numbers for protocols that are actually in use must be defined on that system.
    • A. 

      True

    • B. 

      False

  • 19. 
    The purpose of a TCP/IP port numbe is to identify which aspect of a systems oepration for incoming and out going protocol data?
    • A. 

      Network layer Protocol in use

    • B. 

      Transport layer protocol in use

    • C. 

      Sending or receiving application process

    • D. 

      None of the above

  • 20. 
    • A. 

      Protocol number

    • B. 

      Well-known port address

    • C. 

      Registered port address

    • D. 

      Socket address

  • 21. 
    • A. 

      Tapping into network connections

    • B. 

      Capturing packets " of the wire"

    • C. 

      Gathering statistics

    • D. 

      Decoding packets into readable form

    • E. 

      Retransmitting captured packets for testing

  • 22. 
    A packet filter that's applied to incoming data in a protocol analyzer may be called a:
    • A. 

      Capture filter

    • B. 

      Data filter

    • C. 

      Pre filter

    • D. 

      Post-filter

  • 23. 
    Which of the following items represent design goals that motivated the development of TCP/IP?
    • A. 

      Robust network architecture

    • B. 

      Reliable delivery mechanisms

    • C. 

      Ability of dissimilar systems to exchange data

    • D. 

      Support for long haul connections

    • E. 

      High performance

  • 24. 
    • A. 

      Domain name

    • B. 

      Symbolic name

    • C. 

      Numeric IP

    • D. 

      Return

  • 25. 
    • A. 

      Byte

    • B. 

      Dotted decimal

    • C. 

      Octet

    • D. 

      Bit string

  • 26. 
    • A. 

      ICMP

    • B. 

      IP

    • C. 

      ARP

    • D. 

      RARP

  • 27. 
    • A. 

      Class A

    • B. 

      Class B

    • C. 

      Class C

    • D. 

      Class D

    • E. 

      Class E

  • 28. 
    which of the following address types are supported by IPv6? 
    • A. 

      Anycast

    • B. 

      Broadcast

    • C. 

      Multicast

    • D. 

      Unicast

  • 29. 
    • A. 

      32 bit

    • B. 

      64 bits

    • C. 

      128 bits

    • D. 

      256 bits

  • 30. 
    A class A network address of 12.0.0.0 is written as 12.0.0.0/8 in prefix notation?
    • A. 

      True

    • B. 

      False

  • 31. 
    Zero compression is a method that allows a word containing contiguous zeros in an IPv6 address to be replaced by double colons>
    • A. 

      True

    • B. 

      False

  • 32. 
    Which of the following address types are used for local network communications in IPv6
    • A. 

      Link-layer

    • B. 

      Link-local

    • C. 

      Local use

    • D. 

      Site-local

  • 33. 
    Which of the following IPv6 addresses are the same based on the correct use of zero compression
    • A. 

      Fe80::2d57:c4f8::80d7

    • B. 

      Fe80:0000:2d57:c4f8:0000:80d7

    • C. 

      Fe8::2df7:c4f8::8d7

    • D. 

      Fe80:0:2d57:c4f8:0:80d7

  • 34. 
    Which of the following represents an improvement of IPv6 over IPv4
    • A. 

      Larger address space

    • B. 

      Better security

    • C. 

      Improved broadcast support

    • D. 

      Better support for mobile IP

  • 35. 
    A default gateway is :
    • A. 

      Any IP router

    • B. 

      An IP router attached to the Internet

    • C. 

      An IP configuration element that names the router/gateway for a particular subnet

    • D. 

      An IP configuration element that names the boundary router to the Internet

  • 36. 
    Native IP addresses in a URL use which of the following characters to ebcolose the literal IPv6 address, according to RFC 2732 and later by 3986
    • A. 

      Two colons

    • B. 

      Two braces

    • C. 

      Two brackets

    • D. 

      Two forward slashes

  • 37. 
    • A. 

      1519

    • B. 

      1878

    • C. 

      1918

    • D. 

      2700

  • 38. 
    The loopback address for a network interface using  IPv4 is 127.0.0.1 and lets the computer user test the interface. What is the loopback address using IPv6?
    • A. 

      1

    • B. 

      ::1

    • C. 

      ::1::1

    • D. 

      :1:

  • 39. 
    The first byte or 8 bits of an IPv6 multicast address must be set to the following?
    • A. 

      0000

    • B. 

      1111

    • C. 

      1010

    • D. 

      Ffff

  • 40. 
    An IPv6 unicast address is made up of which of the following?
    • A. 

      A 32 bit interface ID and a 96 bit network ID

    • B. 

      A 64 bit interface ID and a 64 but network portion

    • C. 

      A 96 bit interface and a 32 bit network portion

    • D. 

      A 64 bit interface ID, a 32 bit network portions and a 32 bit broadcast address

  • 41. 
    For an IPv6 aggregatable global unicast address, the FP or Format Prefix field contains how many bits in the identifier
    • A. 

      3

    • B. 

      8

    • C. 

      13

    • D. 

      24

  • 42. 
    For IPv6 multicast address, how bits are assigned to the group ID?
    • A. 

      32

    • B. 

      64

    • C. 

      96

    • D. 

      112

  • 43. 
    To which of the following limitations are private IP address subject to?
    • A. 

      May not be routed on the internet

    • B. 

      May not be used without permission from ICANN or an ISP

    • C. 

      Will not work with NAT software

    • D. 

      May not work with protocols that require secure end to end connections

  • 44. 
    which of the following service perform address hiding
    • A. 

      Email

    • B. 

      FTP

    • C. 

      NAT

    • D. 

      Proxy

  • 45. 
    • A. 

      Any device attached to directly to the Internet

    • B. 

      Any server whose service should be available to the Internet

    • C. 

      Every client on the internal network

    • D. 

      Every server on the internal network

  • 46. 
    In an IPv4 packet header, what does the value in the Internet Header Length signify?
    • A. 

      The length of the IPv4 packet

    • B. 

      The length of the IPv4 header

    • C. 

      The length of the IPv4 header minus options

    • D. 

      The length of the IPv4 packet minus the options

  • 47. 
    • A. 

      Precedence is used by routers to prioritize traffic through router queues

    • B. 

      Precedence is used by MTU Discovery to adjust packet size for link MTU's

    • C. 

      Precedence is used by routers to follow a specified path type

    • D. 

      Precedence is used by upper layer protocols for error checking

  • 48. 
    Using the DSCP identifier, IPv4 traffic can be prioritized by an end node or boundary device, such as a router, and queued and forwarded according to this value DSCP EF ensures that routers expedite the packet forwarding and don't lower the priority value. Of the following, which service most requires DSCP EF?
    • A. 

      E-mail

    • B. 

      Instant messaging

    • C. 

      VoIP

    • D. 

      Web Browsing

  • 49. 
    In an IPv4 Packet Header, the identification field contains a unique identifier for each packet; however, packet are sometimes fragmented further by routers to transverse a network that supports a smaller packet size. What happens to the value of the identification field  in a packet header if the packet is further fragmented 
    • A. 

      The unique ID for the packet is maintained, but for each fragment a suffix is added to the original value.

    • B. 

      The unique ID for the packet is maintained, but for each fragment a prefix is added to the original value

    • C. 

      The unique ID is discarded , and completely new IDs are inserted in the identification field for each of the fragments of the the original packet

    • D. 

      Each fragment of the original packet maintains the original ID value in the header identification field.

  • 50. 
    The Flags field in an IPv4 header can be set to different values, depending on fragmentation requirements. Of the following, which is correct about the options that can be set in this field?
    • A. 

      The values can be set to allow more fragmentation but not prohibit fragmentation

    • B. 

      The values can be set to prohibit more fragmentation but not allow further fragmentation

    • C. 

      The values can be set to allow more fragmentation or prohibit more fragmentation, depending on the networks requirements

    • D. 

      The value can only be set to Reserved (bit 0), with no other available options

  • 51. 
    The IPv4 header's Fragment Offset field is used, if the packet is a fragment, to show where to place the packets data when the fragments are reconstructed
    • A. 

      True

    • B. 

      False

  • 52. 
    The IPv4 TTL field indicated the remaining lifetime of the packet defined as distance or as in hops through routers.
    • A. 

      True

    • B. 

      False

  • 53. 
    The IPv4 PRotcol field contain the value of the protocol that is coming next Of the following , which are valid protocols for this field
    • A. 

      EGP

    • B. 

      ICMP

    • C. 

      NAND

    • D. 

      OSPF

  • 54. 
    • A. 

      It provides error detection on the IP header only, minus the checksum field

    • B. 

      It provides error detection on the contents of the entire IP packet , including the header

    • C. 

      It provides error detection on the contents of the IP header, including the checksum field

    • D. 

      It provides error detection on the contents of the entire IP packet, minus the checksum field

  • 55. 
    • A. 

      Anycast

    • B. 

      Broadcast

    • C. 

      Multicast

    • D. 

      Unicast

  • 56. 
    The IPv4 header's options field provides additional IP routing controls. What is the boundary where the options must end?
    • A. 

      2 byte boundary

    • B. 

      4 byte boundary

    • C. 

      8 byte boundary

    • D. 

      16 byte boundary

  • 57. 
    For the IPv6 header traffic class field, what function does the precedence field serve?
    • A. 

      It allows an application to differentiate traffic types based on priorities.

    • B. 

      It allows forwarding routers to distinguish different flows of packets .

    • C. 

      It allows upper-layer protocols to insert a value in the Traffic Class field

    • D. 

      It reserves the last 4 bits of Traffic Class field for DS

  • 58. 
    • A. 

      Destination Address

    • B. 

      Flow Label

    • C. 

      Hop Limit

    • D. 

      Source Address

  • 59. 
    The Next Header Field in the IPv6 header points to the first extension header for the packet if the packet possesses one or more extension headers. If more that one extension header exists, how is the extension header identified?
    • A. 

      The nest header field points to the first extension header and , if others exist, points to the subsequent headers.

    • B. 

      The next header field points to the first extension header and if other exists, the first extension header uses its own next header field to point to the next extension header

    • C. 

      The Next header field points to the first extension header and, if others exist, they announce themselves using values in their own next header fields

    • D. 

      The next header field points to the first extension and , if others exist, the encapsulated higher-layer protocol contains a reference to all subsequent extension headers

  • 60. 
    RFC 2460 defines the recommended order in which extension headers should appear. Which extension header should appear first?
    • A. 

      Authentication

    • B. 

      Destination Options

    • C. 

      Hop-by-Hop Options

    • D. 

      Routing

  • 61. 
    • A. 

      Authentication

    • B. 

      Destination options

    • C. 

      Hop-by-hop options

    • D. 

      Routing

  • 62. 
    • A. 

      Jumbogram large payload options

    • B. 

      Intermediary address options

    • C. 

      Hop limit options

    • D. 

      Minimum fragment size options

  • 63. 
    When is the destination options extension header encrypted?
    • A. 

      When it appears earlier in the packet

    • B. 

      When it appears later in the packet

    • C. 

      When its value is more than 0

    • D. 

      When it appears before the hop-by-hop option fields

  • 64. 
    When is the fragmentation extension header used? 
    • A. 

      When the transmitting device needs to send packets smaller then the PMTU

    • B. 

      When the transmitting device needs to send packets larger then the PMTU

    • C. 

      When the transmitting device needs to send packets consistent with the PMTU

    • D. 

      When the transmitting device needs to send a "Do Not Fragment" message to the forwarding routers

  • 65. 
    • A. 

      By containing an encrypted copy of the sending host's username and password

    • B. 

      By preventing address spoofing and connection theft

    • C. 

      By possessing a trudgen's copy of the IPv6 host address in binary format

    • D. 

      By inhibiting data corruption of the ESP extension header

  • 66. 
    A network node that understands Jumbo Payload option will process a packet as a jumbo gram under what condition?
    • A. 

      The packet header payload length field is set to greater than 0

    • B. 

      The next header field is set to greater than 0

    • C. 

      The link layer framing indicates that additional octets exist beyond the IPv6 header

    • D. 

      The fragment extension header is present

  • 67. 
    Once PMTU Discovery sets the MTU size for IPv6 packets and begins sending how do forwarding nodes manage packets if a link MTU in the path reduces or becomes too small for the packet MTU size?
    • A. 

      The forwarding node drops the packet snaps send and ICMPv6 packet too big message to the sending node.

    • B. 

      The forwarding node drops the packet and sends an ICMPv6 Resend packet message to the sending node

    • C. 

      The forwarding node performs PMTU discovery to locate a path that will accommodate the current MTU size, and then forwards the packet along that path.

    • D. 

      The forwarding node changes the value in the fragment extension header from "do not fragment" to Fragment Type=0" and then changes the MTU size to fit the reduced link MTU size to fit the reduced link MTU

  • 68. 
    When running UDP over IPv6, the checksum is mandatory and a pseudo-header is used to imitate the actual lIPv6 header. IF the routing extension header is present, what is the result in the pseudo-header?
    • A. 

      The address in the Destination header field is the final destination address.

    • B. 

      The address in the destination address field is the one in the IPv6 packet

    • C. 

      The next header field contain the value of the upper layer protocol

    • D. 

      The upper layer packet length field contain the length of the upper-layer header plus the associated data

  • 69. 
    IPv6 packet headers are much larger in size than IPv4 packet headers, even though the IPv6 header structure us less complex. What is the main cause of the size of the increase?
    • A. 

      The larger IPv6 address space

    • B. 

      The addition of the extension headers

    • C. 

      Mandatory checksum calculation for IPv6 packet headers using the UDP upper layer protocol

    • D. 

      The hop limit field's measurement of hops as a distance rather than time.

  • 70. 
    If a packet with TTL=1 arrives at a router, the router must discard the packet because it cannot decrement the TTL to 0 and forward the packet.
    • A. 

      True

    • B. 

      False

  • 71. 
    IPv6 requires each device on the network to have its own unique address or identifier, with one exception:
    • A. 

      Mobile devices may use multiple identifiers because they frequently move from one network zone to the next

    • B. 

      A host with multiple interfaces providing dynamic load balancing can use a single identifier for all interfaces

    • C. 

      Network devices in a multicast group all use a single, unique identifier for the interfaces

    • D. 

      Multiple devices on a local network may share the same any cast identifier

  • 72. 
    An IPv6 node uses NDP to discover the link-layer address of the next hop router by sending a router Router Solicitation message as what kind of network message?
    • A. 

      Anycast

    • B. 

      Broadcast

    • C. 

      Mulitcast

    • D. 

      Unicast

  • 73. 
    • A. 

      Routing database

    • B. 

      Routing table

    • C. 

      Routing directory

    • D. 

      Route look up cache

  • 74. 
    At the command prompt on a Windows 7 computer, what command is used to show the routing table for the IPv6 interface?
    • A. 

      Netsh interface IPv6 show all routes

    • B. 

      Netsh interface IPv6 show route

    • C. 

      Netsh interface IPv6 show routes

    • D. 

      Netsh interface IPv6 show routing table

  • 75. 
    If an IPv6 router has multiple routes that lead to the correct destination address for a packet, how does it choose a route for the packet
    • A. 

      It chooses one of the correct routes in its routing table, using a round-robin algorithm

    • B. 

      It chooses the route with the largest link-MTU value

    • C. 

      IT choose the route with the largest prefix length

    • D. 

      It choses the route with the route that matches the least number of high-order bits in the destination address

  • 76. 
    Configuring hosts to be weak or strong can be performed on both IPv4 and IPv6 network nosed
    • A. 

      True

    • B. 

      False

  • 77. 
    Upon receiving a packet sent by a source node, what is the first task an IPv6 router performs?
    • A. 

      Checking the router's destination cache

    • B. 

      Checking the routers routing table

    • C. 

      Reducing the value of the Hop limit field by 1

    • D. 

      Running error checks on the packet header fields

  • 78. 
    When an IPv6 host receives a packet that is addressed to it , if the packet does not us UDP or TCP as its upper layer protocol, how does the host respond?
    • A. 

      The destination host will check the destination port for the packet, and if it does no match a protocol running on the node it will drop the packet and send an IPV6 error message "Protocol Corrupted or Missing"

    • B. 

      The destination host will check the packets Next Header field, and if no matching application is found, it will send the ICMPv6error message " parameter Problem No Protocol Found and then drop the packet.

    • C. 

      The destination host will drop the packet and send to the sender the ICMPv6 error message "Protocol Corrupt or missing"

    • D. 

      The destination host will pass the data to the appropriate protocol running on the host

  • 79. 
    • A. 

      OSPF

    • B. 

      IGRP

    • C. 

      BGP

    • D. 

      RIP

  • 80. 
    Of the following, which routing table types can an IPv6 routing table store
    • A. 

      Default route

    • B. 

      Directly attached routes

    • C. 

      Next hop routes

    • D. 

      Remote routes