Test 3 Computer Networking

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Dudenstein727
D
Dudenstein727
Community Contributor
Quizzes Created: 1 | Total Attempts: 77
| Attempts: 77 | Questions: 55
Please wait...
Question 1 / 55
0 %
0/100
Score 0/100
1. 802.11g provides what data rate at what frequency band?

Explanation

The correct answer is 2.4Ghz 54Mbps. 802.11g is a wireless networking standard that operates in the 2.4GHz frequency band and provides a maximum data rate of 54Mbps. The repetition of the frequency band and data rate in the answer options confirms this information.

Submit
Please wait...
About This Quiz
Test 3 Computer Networking - Quiz

Explore key aspects of computer networking in 'test 3 computer networking', focusing on NAT functionalities, firewall operations, and packet filtering. This quiz assesses understanding of network security protocols and their practical applications, enhancing skills in managing secure networks.

Personalize your quiz and earn a certificate with your name on it!
2. 802.11b provides what data rate at what frequency band?

Explanation

The correct answer is 2.4Ghz 11 MBPS. 802.11b is a wireless networking standard that operates in the 2.4GHz frequency band and provides a data rate of 11 Mbps. This frequency band is commonly used for Wi-Fi networks and allows for decent range and penetration through walls and obstacles. The data rate of 11 Mbps is sufficient for basic internet browsing, email, and streaming of standard-definition videos.

Submit
3. What is the IPSEC mode used to provide a true VPN tunnel?

Explanation

The correct answer is ESP tunnel or esp tunnel. ESP (Encapsulating Security Payload) is a protocol used in IPSEC (Internet Protocol Security) to provide confidentiality, integrity, and authenticity of data in a VPN tunnel. It encrypts the entire IP packet, including the original IP header, and encapsulates it within a new IP packet. This ensures that the data transmitted over the VPN tunnel is secure and protected from unauthorized access or tampering.

Submit
4. What would the protocol type in the GRE header be for a IPv4 packet encapsulated in a GRE packet?

Explanation

The protocol type in the GRE header for an IPv4 packet encapsulated in a GRE packet would be 0800. The value 0800 represents the protocol type for IPv4 in hexadecimal format. This indicates that the payload of the GRE packet is an IPv4 packet.

Submit
5. What is the IP protocol of a GRE packet?

Explanation

The IP protocol of a GRE (Generic Routing Encapsulation) packet is 47. GRE is a tunneling protocol that encapsulates packets from one network protocol within packets of another network protocol, allowing them to be transmitted over an intermediate network. The IP protocol number 47 is assigned specifically for GRE packets, indicating that it is the protocol used for encapsulation and transmission of GRE packets over IP networks.

Submit
6. What are the two major packet encapsulation VPN standards in use today?

Explanation

The two major packet encapsulation VPN standards in use today are GRE and IPsec. GRE (Generic Routing Encapsulation) is a tunneling protocol that encapsulates packets inside IP packets, allowing them to be transmitted over an IP network. IPsec (Internet Protocol Security) is a suite of protocols that provides secure communication over IP networks by encrypting and authenticating IP packets. Both GRE and IPsec are widely used in VPN implementations to ensure secure and private communication between networks.

Submit
7. What would be the Ethernet destination address of a multicast packet with an IP destination of 226.2.2.2?

Explanation

The Ethernet destination address of a multicast packet with an IP destination of 226.2.2.2 would be 01-00-5E-02-02-02. In Ethernet, multicast packets are identified by the least significant bit of the first octet set to 1. The least significant bit of 01 in hexadecimal is 1, indicating a multicast address. The remaining octets are derived from the last 23 bits of the IP multicast address, which in this case is 02-02-02.

Submit
8. Which routing protocol is used predominantly today?

Explanation

PIM-SM (Protocol Independent Multicast-Sparse Mode) is the correct answer. It is a widely used routing protocol for multicast communication in modern networks. PIM-SM enables efficient and scalable multicast routing by dynamically creating distribution trees. It is designed to work in a sparse mode network where only a subset of routers are interested in receiving multicast traffic. PIM-SM allows for adaptive and flexible multicast routing, making it the predominant choice for multicast communication in today's networks.

Submit
9. What are the two major multicast routing protocols?

Explanation

The two major multicast routing protocols are DVMRP and PIM-SM. DVMRP (Distance Vector Multicast Routing Protocol) is a protocol that uses a distance-vector algorithm to determine the best path for multicast traffic. PIM-SM (Protocol Independent Multicast-Sparse Mode) is a protocol that allows for efficient distribution of multicast traffic in a sparse network topology. DVRMP is not a recognized multicast routing protocol, so it is not one of the major protocols.

Submit
10. What is the IP protocol used for IPSEC ESP?

Explanation

The IP protocol used for IPSEC ESP is 50. The number 50 represents the protocol number assigned to ESP (Encapsulating Security Payload) in the IP protocol suite. ESP is a protocol used in IPSEC (Internet Protocol Security) to provide confidentiality, integrity, and authentication of data packets. It is responsible for encrypting the payload of the IP packet, ensuring the secure transmission of data over IP networks.

Submit
11. What is the protocol that hosts use to tell routers that they wish to receive a multicast group (IE packets destined to a specific multicast address)?

Explanation

IGMP V2 (Internet Group Management Protocol Version 2) is the protocol that hosts use to inform routers that they want to receive packets destined for a specific multicast address. This protocol allows hosts to join or leave multicast groups dynamically. IGMP V2 is an enhancement over the previous version, IGMP V1, and provides improved functionality and efficiency in managing multicast group membership.

Submit
12. F a multicast packet arrices on an interface, but according to the routing table you would use a different interface to reach the source, will the router forward that packet at all?

Explanation

If a multicast packet arrives on an interface, but according to the routing table, a different interface would be used to reach the source, the router will not forward that packet at all.

Submit
13. If a host has an IP address of 10.0.1.1/24 and a default NAT gateway of 10.0.1.254, and the host 10.0.1.1 sends a ping to the host 131.94.1.1 on the public internet, what will the source IP of the ping be when it arrives at 131.94.1.1?

Explanation

When the host with the IP address 10.0.1.1/24 sends a ping to the host 131.94.1.1 on the public internet, the source IP of the ping will be 10.0.1.254 when it arrives at 131.94.1.1. This is because the default NAT gateway, which is 10.0.1.254 in this case, performs network address translation (NAT) and replaces the source IP address of the ping packet with its own IP address before forwarding it to the public internet.

Submit
14. Ports < X are used for administrative/root services? X=?

Explanation

Ports below 1024 are commonly known as well-known ports or privileged ports. These ports are reserved for specific services that require administrative or root access to operate. These services include commonly used protocols such as HTTP (port 80), HTTPS (port 443), FTP (port 21), SSH (port 22), and many others. By reserving these ports for administrative/root services, it helps ensure that only authorized processes can access and utilize them, enhancing security and preventing unauthorized access to critical system functions.

Submit
15. What is the protocol used to exchange routing information between organizations (autonomous systems) on the Internet today?

Explanation

BGP (Border Gateway Protocol) is the protocol used to exchange routing information between organizations or autonomous systems on the Internet. It is responsible for maintaining a table of IP networks and determining the best path for data packets to be forwarded. BGP allows different networks to communicate and exchange routing information, ensuring efficient and reliable data transmission across the Internet.

Submit
16. What is the standard most cable modems use now?

Explanation

DOCSIS stands for Data Over Cable Service Interface Specification. It is a standard that most cable modems use to provide high-speed internet access over cable television networks. This standard allows for the transmission of data, voice, and video signals over the same coaxial cable line. It ensures compatibility and interoperability between different cable modems and cable network providers, allowing users to connect to the internet reliably and efficiently.

Submit
17. Frame relay and ATM build virtual circuits on top of what underlying physical topology?

Explanation

Frame relay and ATM build virtual circuits on top of a star or multiple star topology. This means that the physical connections between the devices form a star-shaped network, where all devices are connected to a central hub. This topology allows for efficient communication between devices by providing a centralized point for data transmission.

Submit
18. ATM cells are how many octets long?

Explanation

ATM cells are 53 octets long. Octets are units of digital information that consist of 8 bits. In the context of ATM (Asynchronous Transfer Mode) cells, each cell is composed of a fixed size of 53 octets, which is equivalent to 424 bits. These cells are used for transferring data in telecommunications networks and have a specific format that includes a 5-byte header and a 48-byte payload. The fixed size of 53 octets allows for efficient and predictable transmission of data in ATM networks.

Submit
19. OC3 is what data rate?

Explanation

The correct answer is (~155 Mbits). OC3 refers to Optical Carrier 3, which is a type of network transmission speed commonly used in telecommunications. It has a data rate of approximately 155 Mbits, which means it can transmit data at a speed of around 155 megabits per second.

Submit
20. OC12 is what data rate?

Explanation

The correct answer is "~622 Mbits", "~622Mbits", or "~622 Mbits". These options indicate that OC12 operates at a data rate of approximately 622 Mbits per second. The "~" symbol is used to represent "approximately" or "around," indicating that the exact data rate may vary slightly but is close to 622 Mbits.

Submit
21. What is the data rate for OC48?

Explanation

The data rate for OC48 is approximately 2.4 Gbits.

Submit
22. What is the data rate for OC 192

Explanation

The correct answer is (~9.6 Gbits), ~9.6 Gbits, (~9.6Gbits). These options all represent the data rate for OC 192, which is approximately 9.6 Gbits.

Submit
23.
Wireless uses CSMA/CA what does this stand for? 

Explanation

CSMA/CA stands for Carrier Sense Multiple Access with Collision Avoidance. In wireless networks, multiple devices share the same channel to transmit data. CSMA/CA is a protocol used to avoid collisions that may occur when multiple devices try to transmit data simultaneously. It works by having devices listen to the channel before transmitting, and if the channel is busy, they wait for a random amount of time before attempting to transmit again. This helps to minimize collisions and improve the overall efficiency of wireless communication.

Submit
24. When wireless stations talk to an access point they are operating in what mode?

Explanation

When wireless stations communicate with an access point, they operate in infrastructure mode. This mode refers to a network setup where the access point acts as a central hub, connecting multiple wireless devices to a wired network. In infrastructure mode, the access point manages the communication between the wireless stations and facilitates their connection to the internet or other network resources. This mode is commonly used in homes, offices, and public spaces to provide wireless connectivity to multiple devices simultaneously.

Submit
25. When wireless stations talk directly to each other they are operating in what mode?

Explanation

When wireless stations communicate directly with each other, without the need for a centralized access point or infrastructure, they are operating in ad hoc mode. In this mode, devices can form a temporary network and communicate with each other on a peer-to-peer basis. This mode is commonly used in situations where a traditional infrastructure network is not available or practical, such as in emergency situations or in temporary setups.

Submit
26. How many bits is a wireless Ethernet address?

Explanation

A wireless Ethernet address is typically 48 bits long. This address, also known as a MAC address, is a unique identifier assigned to each network interface card (NIC) in a wireless device. The 48-bit address is divided into two parts: the first 24 bits represent the organizationally unique identifier (OUI), which identifies the manufacturer or vendor of the NIC, and the remaining 24 bits represent the unique serial number assigned by the manufacturer.

Submit
27. What are the two types of radio wireless transmission?

Explanation

DSSS (Direct Sequence Spread Spectrum) and FHSS (Frequency Hopping Spread Spectrum) are both types of radio wireless transmission. DSSS divides the data into small pieces and spreads it across a wide frequency band, while FHSS rapidly switches frequencies during transmission. Both techniques are used to improve the reliability and security of wireless communication by reducing interference and increasing resistance to jamming.

Submit
28. ADSL and cable modems are used primarily for what type of customer?

Explanation

ADSL and cable modems are primarily used for personal use and small businesses. These types of customers require internet connectivity for their daily activities such as browsing, email, and streaming, but do not require the high bandwidth and dedicated lines that large businesses typically need. ADSL (Asymmetric Digital Subscriber Line) and cable modems provide a cost-effective solution for these customers, as they leverage existing telephone lines or cable TV infrastructure to deliver internet access at relatively high speeds. Therefore, personal use and small businesses are the main target customers for ADSL and cable modem services.

Submit
29. Weak space key space for the session encryption is the weakness of PPTPv2 session encryption.

Explanation

The statement is true because the weak space key space for the session encryption is indeed a weakness of PPTPv2 session encryption. This means that the available keys used for encrypting the session are limited and can be easily guessed or cracked by attackers, making the encryption vulnerable to unauthorized access and data breaches.

Submit
30. What are the basic types of routing protocols?

Explanation

The basic types of routing protocols are IGP (Internal routing) and EGP (Exterior routing). IGP is used within an organization (Autonomous System) to route traffic within the network. EGP, on the other hand, is used between organizations to route traffic between different networks. Therefore, the correct answer is A and C, as both IGP and EGP are mentioned as the basic types of routing protocols.

Submit
31. ADSL speeds are limited by distance

Explanation

ADSL speeds are limited by distance because the farther away a user is from the telephone exchange, the weaker the signal becomes. This results in slower speeds as the signal has to travel a longer distance. The attenuation of the signal over distance is a limitation of ADSL technology, and it affects the overall performance and speed of the internet connection. Therefore, it is true that ADSL speeds are limited by distance.

Submit
32. Does a host running OSPF periodically send its entire routing table to its neighbors?

Explanation

A host running OSPF does not periodically send its entire routing table to its neighbors. OSPF routers exchange information about their directly connected networks, known as link-state advertisements (LSAs), rather than sharing their entire routing tables. This allows routers to have a more efficient and scalable way of exchanging routing information. By sharing LSAs, routers can build a complete and accurate representation of the network topology and calculate the best paths to reach different destinations.

Submit
33. Different interfaces on a firewall can't have different firewall rules.

Explanation

This statement is false because different interfaces on a firewall can indeed have different firewall rules. Firewall rules are typically applied based on the source and destination IP addresses, ports, and protocols. Each interface on a firewall can be configured with its own set of rules to control the traffic that is allowed or denied. This allows for more granular control and customization based on the specific requirements and security policies of each network segment or interface.

Submit
34. What are some examples of information in a datagram that might be used to decide weather to pass or drop a packet?

Explanation

The information mentioned in the options - source IP address, destination IP address, IP protocol, source TCP or UDP port, and destination TCP or UDP port - can all be used to make a decision on whether to pass or drop a packet. The source and destination IP addresses help identify the source and destination of the packet, while the IP protocol helps determine the type of protocol being used (ICMP, TCP, or UDP). The source and destination TCP or UDP ports provide additional information about the specific application or service the packet is intended for. Considering all of this information together allows for a more informed decision on whether to allow the packet to pass or drop it.

Submit
35. A layer 3 firewall is a router.

Explanation

A layer 3 firewall is a router because a router operates at the network layer (layer 3) of the OSI model and is capable of filtering and controlling network traffic based on IP addresses, ports, and protocols. A layer 3 firewall uses these capabilities to enforce security policies by allowing or blocking specific types of traffic between different networks. Therefore, it is correct to say that a layer 3 firewall is a router.

Submit
36. Does a host running RIP periodically send its entire routing table to its neighbor?

Explanation

Yes, a host running RIP periodically sends its entire routing table to its neighbor. This is known as a routing update and it allows the neighbor to have an up-to-date view of the network topology. By sharing the entire routing table, the neighbor can make informed routing decisions and update its own routing table accordingly. This periodic exchange of routing information helps in maintaining a consistent and accurate routing infrastructure throughout the network.

Submit
37. Can you use RIPv1 on modern classless networks?

Explanation

RIPv1 is an older routing protocol that only understands the old class a/b/c style networks. It does not support classless networks, which are more commonly used in modern networks. Therefore, RIPv1 cannot be used on modern classless networks.

Submit
38. Can you use RIPv2 on modern classless networks?

Explanation

Yes, RIPv2 can be used on modern classless networks. RIPv2 is an enhanced version of the Routing Information Protocol (RIP) that supports classless routing, which means it can advertise and route to networks with variable length subnet masks (VLSM). This allows for more efficient and flexible network addressing. Therefore, RIPv2 is compatible with modern classless networks and can be used to exchange routing information between routers.

Submit
39. Can firewall rules be applied only to one of a firewalls interfaces or must they be applied to all of them?

Explanation

Firewall rules can be applied to only one of the firewall's interfaces. This means that it is not necessary to apply the rules to all interfaces. By selectively applying rules to specific interfaces, organizations can have more control over the traffic that enters or leaves a particular interface. This allows for more granular security configurations and helps in protecting specific network segments or devices.

Submit
40. What are the types of Internal routing protocols?

Explanation

The correct answer is A and C. The types of internal routing protocols are Distance Vector and Link State. Distance Vector protocols include RIP, RIP v2, and EIGRP. Link State protocols include OSPF and ISIS.

Submit
41. A host with a public address can initiate a connection to a host with a private NAT address.

Explanation

A host with a public address cannot initiate a connection to a host with a private NAT address. This is because private NAT addresses are not routable on the public internet. NAT (Network Address Translation) is a technique used to translate private IP addresses to public IP addresses and vice versa. It allows multiple devices on a private network to share a single public IP address. However, the translation is one-way, meaning that a host with a private NAT address can initiate a connection to a host with a public address, but not the other way around.

Submit
42. What are the 2 broad categories for software based VPN's

Explanation

The correct answer is B and C. VPNs can be built by encapsulating each packet or by using TCP streams of bytes. Encapsulating each packet involves adding an additional header to the original packet, while using TCP streams of bytes involves encapsulating the entire packet within a TCP stream. Both methods allow for secure and private communication over a network.

Submit
43. If you see an Ethernet multicast frame with a destination Ethernet address of 01-00-5e-10-10-10 what do you know about the IP address of the IP multicast packet within?

Explanation

The given correct answer suggests that the first three octets of the IP address of the IP multicast packet within the Ethernet multicast frame fall within the standard range of 224-239. The last octet is specified as 16.16.16. Therefore, the IP address of the IP multicast packet is 224.16.16.16.

Submit
44. What are two WAN technologies that use PPP for framing?

Explanation

The two WAN technologies that use PPP for framing are serial links, including dial-ups, and POS (Packet over SONET) which uses fiber optic connections.

Submit
45. Does a box working as a NAT router need to keep record of the state of each connection that passes through it?

Explanation

Yes, a box working as a NAT router needs to keep a record of the state of each connection that passes through it. This is because NAT routers perform network address translation, which involves mapping the private IP addresses of devices on a local network to a public IP address. In order to correctly translate the source and destination IP addresses in network packets, the NAT router needs to maintain state information about each connection. This information is stored in state tables, which keep track of the source and destination IP addresses, ports, and other relevant data for each connection.

Submit
46. What is the well known port for SMTP (email)?

Explanation

The well-known port for SMTP (email) is port 25/tcp. SMTP (Simple Mail Transfer Protocol) is a protocol used for sending and receiving email messages between servers. Port 25 is the standard port used for SMTP communication, and it is widely recognized and supported by email servers and clients.

Submit
47. What IP protocol does BGP use to exchange information?

Explanation

BGP (Border Gateway Protocol) uses TCP (Transmission Control Protocol) to exchange information. TCP is a reliable, connection-oriented protocol that ensures the delivery of data packets in the correct order and provides error-checking mechanisms. BGP requires a reliable and secure communication channel for exchanging routing information between routers, making TCP the appropriate choice. UDP (User Datagram Protocol) is a connectionless protocol that does not guarantee reliable delivery, ICMP (Internet Control Message Protocol) is used for network troubleshooting, and ARP (Address Resolution Protocol) is used for mapping IP addresses to MAC addresses on a local network.

Submit
48. What are examples of Internal routing protocols?

Explanation

RIP Version 3 and RIP Version 2 are examples of internal routing protocols because they both understand modern classless networks, as stated in their respective RFCs (RFC1723). On the other hand, RIP (RFC1058) only understands old class a/b/c style networks, so it is not an example of an internal routing protocol. Therefore, the correct answer is "Only B and C," as they are the only options that meet the criteria of being internal routing protocols that understand modern classless networks.

Submit
49. The order is not important in firewall rules applied to an interface.

Explanation

The statement is false because the order of firewall rules applied to an interface is important. Firewall rules are typically evaluated in a sequential manner, and the order in which they are applied can determine the outcome. If a rule that allows certain traffic is placed before a rule that blocks the same traffic, the traffic will be allowed. However, if the order is reversed, the blocking rule will take precedence and the traffic will be blocked. Thus, the order of firewall rules can significantly impact the effectiveness of the firewall configuration.

Submit
50. What IP protocol does RIP use to exchange information?

Explanation

RIP (Routing Information Protocol) uses UDP (User Datagram Protocol) to exchange information. UDP is a connectionless protocol that allows for the transmission of data packets without establishing a formal connection between the sender and receiver. RIP utilizes UDP to send routing information updates and exchange routing tables between routers in a network. Unlike TCP, UDP does not provide error checking or reliable delivery of packets, making it suitable for RIP's purpose of exchanging routing information in a less complex and faster manner. ICMP is not the correct answer as it is a different protocol used for network troubleshooting. ARP is also not the correct answer as it is used for mapping IP addresses to MAC addresses.

Submit
51. What IP protocol does OSPF use to exchange information?

Explanation

OSPF (Open Shortest Path First) uses its own IP protocol to exchange information. This means that it does not use UDP or TCP at layer 4, but instead has its own protocol. In the case of OSPF, it uses IP protocol 89 for communication.

Submit
52. Is BGP4 an example of a exterior routing protocol?  

Explanation

BGP4 is an example of an exterior routing protocol because it is designed to exchange routing information between different autonomous systems (AS) on the internet. It is used to determine the best path for data packets to travel across different networks, making it an essential protocol for interconnecting multiple networks.

Submit
53. 802.11a provides what data rate at what frequency band?

Explanation

802.11a is a Wi-Fi standard that operates in the 5.0 GHz frequency band and provides a data rate of 54 Mbps.

Submit
54. What is the "class" and range of assign addresses for multicast?

Explanation

The range of multicast addresses is from 224.0.0.0 to 239.255.255.255 and it belongs to Class D. Class D addresses are used for multicast communication, where a single packet can be sent to multiple recipients simultaneously. Multicast addresses are used in applications such as video streaming, online gaming, and IP telephony.

Submit
55. The highest speed data connections over sonet are done with what framing?

Explanation

The correct answer is POS because it uses a fiber optic connection. POS stands for Packet over SONET, which is a protocol that allows for the transmission of packetized data over a SONET network. Since it utilizes fiber optic connections, which have a higher bandwidth and faster speeds compared to other types of connections, it is capable of achieving the highest speed data connections over SONET.

Submit
View My Results

Quiz Review Timeline (Updated): Jun 27, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 27, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 16, 2010
    Quiz Created by
    Dudenstein727
Cancel
  • All
    All (55)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
802.11g provides what data rate at what frequency band?
802.11b provides what data rate at what frequency band?
What is the IPSEC mode used to provide a true VPN tunnel?
What would the protocol type in the GRE header be for a IPv4 packet...
What is the IP protocol of a GRE packet?
What are the two major packet encapsulation VPN standards in use...
What would be the Ethernet destination address of a multicast packet...
Which routing protocol is used predominantly today?
What are the two major multicast routing protocols?
What is the IP protocol used for IPSEC ESP?
What is the protocol that hosts use to tell routers that they wish to...
F a multicast packet arrices on an interface, but according to the...
If a host has an IP address of 10.0.1.1/24 and a default NAT gateway...
Ports < X are used for administrative/root services? X=?
What is the protocol used to exchange routing information between...
What is the standard most cable modems use now?
Frame relay and ATM build virtual circuits on top of what underlying...
ATM cells are how many octets long?
OC3 is what data rate?
OC12 is what data rate?
What is the data rate for OC48?
What is the data rate for OC 192
Wireless uses CSMA/CA what does this stand for?
When wireless stations talk to an access point they are operating in...
When wireless stations talk directly to each other they are operating...
How many bits is a wireless Ethernet address?
What are the two types of radio wireless transmission?
ADSL and cable modems are used primarily for what type of customer?
Weak space key space for the session encryption is the weakness...
What are the basic types of routing protocols?
ADSL speeds are limited by distance
Does a host running OSPF periodically send its entire routing table to...
Different interfaces on a firewall can't have different firewall...
What are some examples of information in a datagram that might be used...
A layer 3 firewall is a router.
Does a host running RIP periodically send its entire routing table to...
Can you use RIPv1 on modern classless networks?
Can you use RIPv2 on modern classless networks?
Can firewall rules be applied only to one of a firewalls interfaces or...
What are the types of Internal routing protocols?
A host with a public address can initiate a connection to a host...
What are the 2 broad categories for software based VPN's
If you see an Ethernet multicast frame with a destination Ethernet...
What are two WAN technologies that use PPP for framing?
Does a box working as a NAT router need to keep record of the state of...
What is the well known port for SMTP (email)?
What IP protocol does BGP use to exchange information?
What are examples of Internal routing protocols?
The order is not important in firewall rules applied to an interface.
What IP protocol does RIP use to exchange information?
What IP protocol does OSPF use to exchange information?
Is BGP4 an example of a exterior routing protocol?  
802.11a provides what data rate at what frequency band?
What is the "class" and range of assign addresses for multicast?
The highest speed data connections over sonet are done with what...
Alert!

Advertisement