2.
What is the protocol used to exchange routing information between organizations (autonomous systems) on the Internet today?
Explanation
BGP (Border Gateway Protocol) is the protocol used to exchange routing information between organizations or autonomous systems on the Internet. It is responsible for maintaining a table of IP networks and determining the best path for data packets to be forwarded. BGP allows different networks to communicate and exchange routing information, ensuring efficient and reliable data transmission across the Internet.
3.
What is the standard most cable modems use now?
Explanation
DOCSIS stands for Data Over Cable Service Interface Specification. It is a standard that most cable modems use to provide high-speed internet access over cable television networks. This standard allows for the transmission of data, voice, and video signals over the same coaxial cable line. It ensures compatibility and interoperability between different cable modems and cable network providers, allowing users to connect to the internet reliably and efficiently.
4.
Frame relay and ATM build virtual circuits on top of what underlying physical topology?
Explanation
Frame relay and ATM build virtual circuits on top of a star or multiple star topology. This means that the physical connections between the devices form a star-shaped network, where all devices are connected to a central hub. This topology allows for efficient communication between devices by providing a centralized point for data transmission.
5.
ATM cells are how many octets long?
Explanation
ATM cells are 53 octets long. Octets are units of digital information that consist of 8 bits. In the context of ATM (Asynchronous Transfer Mode) cells, each cell is composed of a fixed size of 53 octets, which is equivalent to 424 bits. These cells are used for transferring data in telecommunications networks and have a specific format that includes a 5-byte header and a 48-byte payload. The fixed size of 53 octets allows for efficient and predictable transmission of data in ATM networks.
6.
OC3 is what data rate?
Explanation
The correct answer is (~155 Mbits). OC3 refers to Optical Carrier 3, which is a type of network transmission speed commonly used in telecommunications. It has a data rate of approximately 155 Mbits, which means it can transmit data at a speed of around 155 megabits per second.
7.
OC12 is what data rate?
Explanation
The correct answer is "~622 Mbits", "~622Mbits", or "~622 Mbits". These options indicate that OC12 operates at a data rate of approximately 622 Mbits per second. The "~" symbol is used to represent "approximately" or "around," indicating that the exact data rate may vary slightly but is close to 622 Mbits.
8.
What is the data rate for OC48?
Explanation
The data rate for OC48 is approximately 2.4 Gbits.
9.
What is the data rate for OC 192
Explanation
The correct answer is (~9.6 Gbits), ~9.6 Gbits, (~9.6Gbits). These options all represent the data rate for OC 192, which is approximately 9.6 Gbits.
10.
Wireless uses CSMA/CA what does this stand for?
Explanation
CSMA/CA stands for Carrier Sense Multiple Access with Collision Avoidance. In wireless networks, multiple devices share the same channel to transmit data. CSMA/CA is a protocol used to avoid collisions that may occur when multiple devices try to transmit data simultaneously. It works by having devices listen to the channel before transmitting, and if the channel is busy, they wait for a random amount of time before attempting to transmit again. This helps to minimize collisions and improve the overall efficiency of wireless communication.
11.
When wireless stations talk to an access point they are operating in what mode?
Explanation
When wireless stations communicate with an access point, they operate in infrastructure mode. This mode refers to a network setup where the access point acts as a central hub, connecting multiple wireless devices to a wired network. In infrastructure mode, the access point manages the communication between the wireless stations and facilitates their connection to the internet or other network resources. This mode is commonly used in homes, offices, and public spaces to provide wireless connectivity to multiple devices simultaneously.
12.
When wireless stations talk directly to each other they are operating in what mode?
Explanation
When wireless stations communicate directly with each other, without the need for a centralized access point or infrastructure, they are operating in ad hoc mode. In this mode, devices can form a temporary network and communicate with each other on a peer-to-peer basis. This mode is commonly used in situations where a traditional infrastructure network is not available or practical, such as in emergency situations or in temporary setups.
13.
How many bits is a wireless Ethernet address?
Explanation
A wireless Ethernet address is typically 48 bits long. This address, also known as a MAC address, is a unique identifier assigned to each network interface card (NIC) in a wireless device. The 48-bit address is divided into two parts: the first 24 bits represent the organizationally unique identifier (OUI), which identifies the manufacturer or vendor of the NIC, and the remaining 24 bits represent the unique serial number assigned by the manufacturer.
14.
What are the two types of radio wireless transmission?
Explanation
DSSS (Direct Sequence Spread Spectrum) and FHSS (Frequency Hopping Spread Spectrum) are both types of radio wireless transmission. DSSS divides the data into small pieces and spreads it across a wide frequency band, while FHSS rapidly switches frequencies during transmission. Both techniques are used to improve the reliability and security of wireless communication by reducing interference and increasing resistance to jamming.
15.
802.11g provides what data rate at what frequency band?
Explanation
The correct answer is 2.4Ghz 54Mbps. 802.11g is a wireless networking standard that operates in the 2.4GHz frequency band and provides a maximum data rate of 54Mbps. The repetition of the frequency band and data rate in the answer options confirms this information.
16.
802.11b provides what data rate at what frequency band?
Explanation
The correct answer is 2.4Ghz 11 MBPS. 802.11b is a wireless networking standard that operates in the 2.4GHz frequency band and provides a data rate of 11 Mbps. This frequency band is commonly used for Wi-Fi networks and allows for decent range and penetration through walls and obstacles. The data rate of 11 Mbps is sufficient for basic internet browsing, email, and streaming of standard-definition videos.
17.
What is the IPSEC mode used to provide a true VPN tunnel?
Explanation
The correct answer is ESP tunnel or esp tunnel. ESP (Encapsulating Security Payload) is a protocol used in IPSEC (Internet Protocol Security) to provide confidentiality, integrity, and authenticity of data in a VPN tunnel. It encrypts the entire IP packet, including the original IP header, and encapsulates it within a new IP packet. This ensures that the data transmitted over the VPN tunnel is secure and protected from unauthorized access or tampering.
18.
What would the protocol type in the GRE header be for a IPv4 packet encapsulated in a GRE packet?
Explanation
The protocol type in the GRE header for an IPv4 packet encapsulated in a GRE packet would be 0800. The value 0800 represents the protocol type for IPv4 in hexadecimal format. This indicates that the payload of the GRE packet is an IPv4 packet.
19.
What is the IP protocol of a GRE packet?
Explanation
The IP protocol of a GRE (Generic Routing Encapsulation) packet is 47. GRE is a tunneling protocol that encapsulates packets from one network protocol within packets of another network protocol, allowing them to be transmitted over an intermediate network. The IP protocol number 47 is assigned specifically for GRE packets, indicating that it is the protocol used for encapsulation and transmission of GRE packets over IP networks.
20.
What are the two major packet encapsulation VPN standards in use today?
Explanation
The two major packet encapsulation VPN standards in use today are GRE and IPsec. GRE (Generic Routing Encapsulation) is a tunneling protocol that encapsulates packets inside IP packets, allowing them to be transmitted over an IP network. IPsec (Internet Protocol Security) is a suite of protocols that provides secure communication over IP networks by encrypting and authenticating IP packets. Both GRE and IPsec are widely used in VPN implementations to ensure secure and private communication between networks.
21.
What would be the Ethernet destination address of a multicast packet with an IP destination of 226.2.2.2?
Explanation
The Ethernet destination address of a multicast packet with an IP destination of 226.2.2.2 would be 01-00-5E-02-02-02. In Ethernet, multicast packets are identified by the least significant bit of the first octet set to 1. The least significant bit of 01 in hexadecimal is 1, indicating a multicast address. The remaining octets are derived from the last 23 bits of the IP multicast address, which in this case is 02-02-02.
22.
Which routing protocol is used predominantly today?
Explanation
PIM-SM (Protocol Independent Multicast-Sparse Mode) is the correct answer. It is a widely used routing protocol for multicast communication in modern networks. PIM-SM enables efficient and scalable multicast routing by dynamically creating distribution trees. It is designed to work in a sparse mode network where only a subset of routers are interested in receiving multicast traffic. PIM-SM allows for adaptive and flexible multicast routing, making it the predominant choice for multicast communication in today's networks.
23.
What are the two major multicast routing protocols?
Explanation
The two major multicast routing protocols are DVMRP and PIM-SM. DVMRP (Distance Vector Multicast Routing Protocol) is a protocol that uses a distance-vector algorithm to determine the best path for multicast traffic. PIM-SM (Protocol Independent Multicast-Sparse Mode) is a protocol that allows for efficient distribution of multicast traffic in a sparse network topology. DVRMP is not a recognized multicast routing protocol, so it is not one of the major protocols.
24.
What is the IP protocol used for IPSEC ESP?
Explanation
The IP protocol used for IPSEC ESP is 50. The number 50 represents the protocol number assigned to ESP (Encapsulating Security Payload) in the IP protocol suite. ESP is a protocol used in IPSEC (Internet Protocol Security) to provide confidentiality, integrity, and authentication of data packets. It is responsible for encrypting the payload of the IP packet, ensuring the secure transmission of data over IP networks.
25.
What is the protocol that hosts use to tell routers that they wish to receive a multicast group (IE packets destined to a specific multicast address)?
Explanation
IGMP V2 (Internet Group Management Protocol Version 2) is the protocol that hosts use to inform routers that they want to receive packets destined for a specific multicast address. This protocol allows hosts to join or leave multicast groups dynamically. IGMP V2 is an enhancement over the previous version, IGMP V1, and provides improved functionality and efficiency in managing multicast group membership.
26.
F a multicast packet arrices on an interface, but according to the routing table you would use a different interface to reach the source, will the router forward that packet at all?
Explanation
If a multicast packet arrives on an interface, but according to the routing table, a different interface would be used to reach the source, the router will not forward that packet at all.
27.
If a host has an IP address of 10.0.1.1/24 and a default NAT gateway of 10.0.1.254, and the host 10.0.1.1 sends a ping to the host 131.94.1.1 on the public internet, what will the source IP of the ping be when it arrives at 131.94.1.1?
Explanation
When the host with the IP address 10.0.1.1/24 sends a ping to the host 131.94.1.1 on the public internet, the source IP of the ping will be 10.0.1.254 when it arrives at 131.94.1.1. This is because the default NAT gateway, which is 10.0.1.254 in this case, performs network address translation (NAT) and replaces the source IP address of the ping packet with its own IP address before forwarding it to the public internet.
28.
ADSL and cable modems are used primarily for what type of customer?
Correct Answer
A. Personal use and small businesses
Explanation
ADSL and cable modems are primarily used for personal use and small businesses. These types of customers require internet connectivity for their daily activities such as browsing, email, and streaming, but do not require the high bandwidth and dedicated lines that large businesses typically need. ADSL (Asymmetric Digital Subscriber Line) and cable modems provide a cost-effective solution for these customers, as they leverage existing telephone lines or cable TV infrastructure to deliver internet access at relatively high speeds. Therefore, personal use and small businesses are the main target customers for ADSL and cable modem services.
29.
What are the basic types of routing protocols?
Correct Answer
A. A and C
Explanation
The basic types of routing protocols are IGP (Internal routing) and EGP (Exterior routing). IGP is used within an organization (Autonomous System) to route traffic within the network. EGP, on the other hand, is used between organizations to route traffic between different networks. Therefore, the correct answer is A and C, as both IGP and EGP are mentioned as the basic types of routing protocols.
30.
ADSL speeds are limited by distance
Explanation
ADSL speeds are limited by distance because the farther away a user is from the telephone exchange, the weaker the signal becomes. This results in slower speeds as the signal has to travel a longer distance. The attenuation of the signal over distance is a limitation of ADSL technology, and it affects the overall performance and speed of the internet connection. Therefore, it is true that ADSL speeds are limited by distance.
31.
Weak space key space for the session encryption is the weakness of PPTPv2 session encryption.
Explanation
The statement is true because the weak space key space for the session encryption is indeed a weakness of PPTPv2 session encryption. This means that the available keys used for encrypting the session are limited and can be easily guessed or cracked by attackers, making the encryption vulnerable to unauthorized access and data breaches.
32.
Does a host running OSPF periodically send its entire routing table to its neighbors?
Explanation
A host running OSPF does not periodically send its entire routing table to its neighbors. OSPF routers exchange information about their directly connected networks, known as link-state advertisements (LSAs), rather than sharing their entire routing tables. This allows routers to have a more efficient and scalable way of exchanging routing information. By sharing LSAs, routers can build a complete and accurate representation of the network topology and calculate the best paths to reach different destinations.
33.
Different interfaces on a firewall can't have different firewall rules.
Explanation
This statement is false because different interfaces on a firewall can indeed have different firewall rules. Firewall rules are typically applied based on the source and destination IP addresses, ports, and protocols. Each interface on a firewall can be configured with its own set of rules to control the traffic that is allowed or denied. This allows for more granular control and customization based on the specific requirements and security policies of each network segment or interface.
34.
What are some examples of information in a datagram that might be used to decide weather to pass or drop a packet?
Correct Answer
A. All of the above
Explanation
The information mentioned in the options - source IP address, destination IP address, IP protocol, source TCP or UDP port, and destination TCP or UDP port - can all be used to make a decision on whether to pass or drop a packet. The source and destination IP addresses help identify the source and destination of the packet, while the IP protocol helps determine the type of protocol being used (ICMP, TCP, or UDP). The source and destination TCP or UDP ports provide additional information about the specific application or service the packet is intended for. Considering all of this information together allows for a more informed decision on whether to allow the packet to pass or drop it.
35.
A layer 3 firewall is a router.
Explanation
A layer 3 firewall is a router because a router operates at the network layer (layer 3) of the OSI model and is capable of filtering and controlling network traffic based on IP addresses, ports, and protocols. A layer 3 firewall uses these capabilities to enforce security policies by allowing or blocking specific types of traffic between different networks. Therefore, it is correct to say that a layer 3 firewall is a router.
36.
Does a host running RIP periodically send its entire routing table to its neighbor?
Explanation
Yes, a host running RIP periodically sends its entire routing table to its neighbor. This is known as a routing update and it allows the neighbor to have an up-to-date view of the network topology. By sharing the entire routing table, the neighbor can make informed routing decisions and update its own routing table accordingly. This periodic exchange of routing information helps in maintaining a consistent and accurate routing infrastructure throughout the network.
37.
Can you use RIPv1 on modern classless networks?
Correct Answer
A. NO, IT ONLY UNDERSTANDS OLD CLASS a/b/c STYLE NETWORKS
Explanation
RIPv1 is an older routing protocol that only understands the old class a/b/c style networks. It does not support classless networks, which are more commonly used in modern networks. Therefore, RIPv1 cannot be used on modern classless networks.
38.
Can you use RIPv2 on modern classless networks?
Explanation
Yes, RIPv2 can be used on modern classless networks. RIPv2 is an enhanced version of the Routing Information Protocol (RIP) that supports classless routing, which means it can advertise and route to networks with variable length subnet masks (VLSM). This allows for more efficient and flexible network addressing. Therefore, RIPv2 is compatible with modern classless networks and can be used to exchange routing information between routers.
39.
Can firewall rules be applied only to one of a firewalls interfaces or must they be applied to all of them?
Correct Answer
A. Yes it can be applied to only one
Explanation
Firewall rules can be applied to only one of the firewall's interfaces. This means that it is not necessary to apply the rules to all interfaces. By selectively applying rules to specific interfaces, organizations can have more control over the traffic that enters or leaves a particular interface. This allows for more granular security configurations and helps in protecting specific network segments or devices.
40.
What are the types of Internal routing protocols?
Correct Answer
A. A and C
Explanation
The correct answer is A and C. The types of internal routing protocols are Distance Vector and Link State. Distance Vector protocols include RIP, RIP v2, and EIGRP. Link State protocols include OSPF and ISIS.
41.
A host with a public address can initiate a connection to a host with a private NAT address.
Explanation
A host with a public address cannot initiate a connection to a host with a private NAT address. This is because private NAT addresses are not routable on the public internet. NAT (Network Address Translation) is a technique used to translate private IP addresses to public IP addresses and vice versa. It allows multiple devices on a private network to share a single public IP address. However, the translation is one-way, meaning that a host with a private NAT address can initiate a connection to a host with a public address, but not the other way around.
42.
What are two WAN technologies that use PPP for framing?
Correct Answer
A. Serial links - including dial-ups
POS - Packet over sonet (fiber optic)
Explanation
The two WAN technologies that use PPP for framing are serial links, including dial-ups, and POS (Packet over SONET) which uses fiber optic connections.
43.
What are the 2 broad categories for software based VPN's
Correct Answer
A. B and C
Explanation
The correct answer is B and C. VPNs can be built by encapsulating each packet or by using TCP streams of bytes. Encapsulating each packet involves adding an additional header to the original packet, while using TCP streams of bytes involves encapsulating the entire packet within a TCP stream. Both methods allow for secure and private communication over a network.
44.
If you see an Ethernet multicast frame with a destination Ethernet address of 01-00-5e-10-10-10 what do you know about the IP address of the IP multicast packet within?
Correct Answer
A. The first three is a standard number
224-239.16.16.16
Explanation
The given correct answer suggests that the first three octets of the IP address of the IP multicast packet within the Ethernet multicast frame fall within the standard range of 224-239. The last octet is specified as 16.16.16. Therefore, the IP address of the IP multicast packet is 224.16.16.16.
45.
Does a box working as a NAT router need to keep record of the state of each connection that passes through it?
Correct Answer
A. Yes and it creates state tables
Explanation
Yes, a box working as a NAT router needs to keep a record of the state of each connection that passes through it. This is because NAT routers perform network address translation, which involves mapping the private IP addresses of devices on a local network to a public IP address. In order to correctly translate the source and destination IP addresses in network packets, the NAT router needs to maintain state information about each connection. This information is stored in state tables, which keep track of the source and destination IP addresses, ports, and other relevant data for each connection.
46.
What is the well known port for SMTP (email)?
Correct Answer
A. Mail= port 25/tcp
Explanation
The well-known port for SMTP (email) is port 25/tcp. SMTP (Simple Mail Transfer Protocol) is a protocol used for sending and receiving email messages between servers. Port 25 is the standard port used for SMTP communication, and it is widely recognized and supported by email servers and clients.
47.
What IP protocol does BGP use to exchange information?
Explanation
BGP (Border Gateway Protocol) uses TCP (Transmission Control Protocol) to exchange information. TCP is a reliable, connection-oriented protocol that ensures the delivery of data packets in the correct order and provides error-checking mechanisms. BGP requires a reliable and secure communication channel for exchanging routing information between routers, making TCP the appropriate choice. UDP (User Datagram Protocol) is a connectionless protocol that does not guarantee reliable delivery, ICMP (Internet Control Message Protocol) is used for network troubleshooting, and ARP (Address Resolution Protocol) is used for mapping IP addresses to MAC addresses on a local network.
48.
What are examples of Internal routing protocols?
Correct Answer
A. Only B and C
Explanation
RIP Version 3 and RIP Version 2 are examples of internal routing protocols because they both understand modern classless networks, as stated in their respective RFCs (RFC1723). On the other hand, RIP (RFC1058) only understands old class a/b/c style networks, so it is not an example of an internal routing protocol. Therefore, the correct answer is "Only B and C," as they are the only options that meet the criteria of being internal routing protocols that understand modern classless networks.
49.
The order is not important in firewall rules applied to an interface.
Explanation
The statement is false because the order of firewall rules applied to an interface is important. Firewall rules are typically evaluated in a sequential manner, and the order in which they are applied can determine the outcome. If a rule that allows certain traffic is placed before a rule that blocks the same traffic, the traffic will be allowed. However, if the order is reversed, the blocking rule will take precedence and the traffic will be blocked. Thus, the order of firewall rules can significantly impact the effectiveness of the firewall configuration.