Test 3 Computer Networking

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Dudenstein727
D
Dudenstein727
Community Contributor
Quizzes Created: 1 | Total Attempts: 66
Questions: 55 | Attempts: 66

SettingsSettingsSettings
Test 3 Computer Networking - Quiz


cgs test


Questions and Answers
  • 1. 

    A host with a public address can initiate a connection to a host with a private NAT address.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    A host with a public address cannot initiate a connection to a host with a private NAT address. This is because private NAT addresses are not routable on the public internet. NAT (Network Address Translation) is a technique used to translate private IP addresses to public IP addresses and vice versa. It allows multiple devices on a private network to share a single public IP address. However, the translation is one-way, meaning that a host with a private NAT address can initiate a connection to a host with a public address, but not the other way around.

    Rate this question:

  • 2. 

    Does a box working as a NAT router need to keep record of the state of each connection that passes through it?

    • A.

      No but it does need to create state tables

    • B.

      Yes but it doesn't need to create state tables

    • C.

      Yes and it creates state tables

    • D.

      No and it doesn't need to create state tables

    • E.

      None of the above

    Correct Answer
    C. Yes and it creates state tables
    Explanation
    Yes, a box working as a NAT router needs to keep a record of the state of each connection that passes through it. This is because NAT routers perform network address translation, which involves mapping the private IP addresses of devices on a local network to a public IP address. In order to correctly translate the source and destination IP addresses in network packets, the NAT router needs to maintain state information about each connection. This information is stored in state tables, which keep track of the source and destination IP addresses, ports, and other relevant data for each connection.

    Rate this question:

  • 3. 

    A layer 3 firewall is a router.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A layer 3 firewall is a router because a router operates at the network layer (layer 3) of the OSI model and is capable of filtering and controlling network traffic based on IP addresses, ports, and protocols. A layer 3 firewall uses these capabilities to enforce security policies by allowing or blocking specific types of traffic between different networks. Therefore, it is correct to say that a layer 3 firewall is a router.

    Rate this question:

  • 4. 

    Can firewall rules be applied only to one of a firewalls interfaces or must they be applied to all of them?

    • A.

      No it must be applied to all

    • B.

      Yes it can be applied to only one

    • C.

      None of the above

    Correct Answer
    B. Yes it can be applied to only one
    Explanation
    Firewall rules can be applied to only one of the firewall's interfaces. This means that it is not necessary to apply the rules to all interfaces. By selectively applying rules to specific interfaces, organizations can have more control over the traffic that enters or leaves a particular interface. This allows for more granular security configurations and helps in protecting specific network segments or devices.

    Rate this question:

  • 5. 

    Different interfaces on a firewall can't have different firewall rules.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    This statement is false because different interfaces on a firewall can indeed have different firewall rules. Firewall rules are typically applied based on the source and destination IP addresses, ports, and protocols. Each interface on a firewall can be configured with its own set of rules to control the traffic that is allowed or denied. This allows for more granular control and customization based on the specific requirements and security policies of each network segment or interface.

    Rate this question:

  • 6. 

    What are some examples of information in a datagram that might be used to decide weather to pass or drop a packet?

    • A.

      Source IP address Destination IP address

    • B.

      IP protocol (ICMP, TCP or UDP)

    • C.

      Source TCP or UDP port

    • D.

      Destination TCP or UDP port

    • E.

      All of the above

    Correct Answer
    E. All of the above
    Explanation
    The information mentioned in the options - source IP address, destination IP address, IP protocol, source TCP or UDP port, and destination TCP or UDP port - can all be used to make a decision on whether to pass or drop a packet. The source and destination IP addresses help identify the source and destination of the packet, while the IP protocol helps determine the type of protocol being used (ICMP, TCP, or UDP). The source and destination TCP or UDP ports provide additional information about the specific application or service the packet is intended for. Considering all of this information together allows for a more informed decision on whether to allow the packet to pass or drop it.

    Rate this question:

  • 7. 

    The order is not important in firewall rules applied to an interface.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because the order of firewall rules applied to an interface is important. Firewall rules are typically evaluated in a sequential manner, and the order in which they are applied can determine the outcome. If a rule that allows certain traffic is placed before a rule that blocks the same traffic, the traffic will be allowed. However, if the order is reversed, the blocking rule will take precedence and the traffic will be blocked. Thus, the order of firewall rules can significantly impact the effectiveness of the firewall configuration.

    Rate this question:

  • 8. 

    What is the well known port for SMTP (email)?

    • A.

      Mail= port 7/tcp

    • B.

      Mail= port 27/tcp

    • C.

      Mail= port 25/tcp

    • D.

      Mail= port 30/tcp

    • E.

      Mail= port 25/udp

    Correct Answer
    C. Mail= port 25/tcp
    Explanation
    The well-known port for SMTP (email) is port 25/tcp. SMTP (Simple Mail Transfer Protocol) is a protocol used for sending and receiving email messages between servers. Port 25 is the standard port used for SMTP communication, and it is widely recognized and supported by email servers and clients.

    Rate this question:

  • 9. 

    Ports < X are used for administrative/root services? X=?

    Correct Answer
    1024
    Explanation
    Ports below 1024 are commonly known as well-known ports or privileged ports. These ports are reserved for specific services that require administrative or root access to operate. These services include commonly used protocols such as HTTP (port 80), HTTPS (port 443), FTP (port 21), SSH (port 22), and many others. By reserving these ports for administrative/root services, it helps ensure that only authorized processes can access and utilize them, enhancing security and preventing unauthorized access to critical system functions.

    Rate this question:

  • 10. 

    What are the basic types of routing protocols?

    • A.

      IGP - Internal routing - within an organization (Autonomous System)

    • B.

      BGP4

    • C.

      EGP - Exterior routing - used between organizations.

    • D.

      OGP- Outer routing - used between organizations

    • E.

      A and C

    Correct Answer
    E. A and C
    Explanation
    The basic types of routing protocols are IGP (Internal routing) and EGP (Exterior routing). IGP is used within an organization (Autonomous System) to route traffic within the network. EGP, on the other hand, is used between organizations to route traffic between different networks. Therefore, the correct answer is A and C, as both IGP and EGP are mentioned as the basic types of routing protocols.

    Rate this question:

  • 11. 

    What are the types of Internal routing protocols?

    • A.

      Distance Vector - RIP, RIP v2, EIGRP

    • B.

      Vector State - RIP, RIP v2, EIGRP

    • C.

      Link State - OSPF, ISIS

    • D.

      A and C

    • E.

      B and C

    Correct Answer
    D. A and C
    Explanation
    The correct answer is A and C. The types of internal routing protocols are Distance Vector and Link State. Distance Vector protocols include RIP, RIP v2, and EIGRP. Link State protocols include OSPF and ISIS.

    Rate this question:

  • 12. 

    What are examples of Internal routing protocols?

    • A.

      RIP Version 3 - RFC1723 - understands modern classless networks

    • B.

      RIP - RFC1058 - Only understands old class a/b/c style networks

    • C.

      RIP Version 2 - RFC1723 - understands modern classless networks

    • D.

      All

    • E.

      Only B and C

    Correct Answer
    E. Only B and C
    Explanation
    RIP Version 3 and RIP Version 2 are examples of internal routing protocols because they both understand modern classless networks, as stated in their respective RFCs (RFC1723). On the other hand, RIP (RFC1058) only understands old class a/b/c style networks, so it is not an example of an internal routing protocol. Therefore, the correct answer is "Only B and C," as they are the only options that meet the criteria of being internal routing protocols that understand modern classless networks.

    Rate this question:

  • 13. 

    What IP protocol does RIP use to exchange information?

    • A.

      TCP

    • B.

      ICMP

    • C.

      ARP

    • D.

      UDP

    • E.

      None of the above

    Correct Answer
    D. UDP
    Explanation
    RIP (Routing Information Protocol) uses UDP (User Datagram Protocol) to exchange information. UDP is a connectionless protocol that allows for the transmission of data packets without establishing a formal connection between the sender and receiver. RIP utilizes UDP to send routing information updates and exchange routing tables between routers in a network. Unlike TCP, UDP does not provide error checking or reliable delivery of packets, making it suitable for RIP's purpose of exchanging routing information in a less complex and faster manner. ICMP is not the correct answer as it is a different protocol used for network troubleshooting. ARP is also not the correct answer as it is used for mapping IP addresses to MAC addresses.

    Rate this question:

  • 14. 

    What IP protocol does OSPF use to exchange information?

    • A.

      ITS OWN IP PROTOCOL (LIKE UDP OR TCP AT LAYER 4) IT USES IP PROTOCOL 89

    • B.

      ITS OWN IP PROTOCOL (LIKE UDP OR TCP AT LAYER 4) IT USES IP PROTOCOL 98

    • C.

      ITS OWN IP PROTOCOL (LIKE UDP OR TCP AT LAYER 4) IT USES IP PROTOCOL 25

    • D.

      ITS OWN IP PROTOCOL (LIKE UDP OR TCP AT LAYER 4) IT USES IP PROTOCOL 7

    • E.

      ITS OWN IP PROTOCOL (LIKE UDP OR TCP AT LAYER 4) IT USES IP PROTOCOL 11

    Correct Answer
    A. ITS OWN IP PROTOCOL (LIKE UDP OR TCP AT LAYER 4) IT USES IP PROTOCOL 89
    Explanation
    OSPF (Open Shortest Path First) uses its own IP protocol to exchange information. This means that it does not use UDP or TCP at layer 4, but instead has its own protocol. In the case of OSPF, it uses IP protocol 89 for communication.

    Rate this question:

  • 15. 

    What IP protocol does BGP use to exchange information?

    • A.

      UDP

    • B.

      TCP

    • C.

      ICMP

    • D.

      ARP

    Correct Answer
    B. TCP
    Explanation
    BGP (Border Gateway Protocol) uses TCP (Transmission Control Protocol) to exchange information. TCP is a reliable, connection-oriented protocol that ensures the delivery of data packets in the correct order and provides error-checking mechanisms. BGP requires a reliable and secure communication channel for exchanging routing information between routers, making TCP the appropriate choice. UDP (User Datagram Protocol) is a connectionless protocol that does not guarantee reliable delivery, ICMP (Internet Control Message Protocol) is used for network troubleshooting, and ARP (Address Resolution Protocol) is used for mapping IP addresses to MAC addresses on a local network.

    Rate this question:

  • 16. 

    Is BGP4 an example of a exterior routing protocol?  

    • A.

      No

    • B.

      Yes

    Correct Answer
    B. Yes
    Explanation
    BGP4 is an example of an exterior routing protocol because it is designed to exchange routing information between different autonomous systems (AS) on the internet. It is used to determine the best path for data packets to travel across different networks, making it an essential protocol for interconnecting multiple networks.

    Rate this question:

  • 17. 

    Does a host running RIP periodically send its entire routing table to its neighbor?

    • A.

      Yes

    • B.

      No

    Correct Answer
    A. Yes
    Explanation
    Yes, a host running RIP periodically sends its entire routing table to its neighbor. This is known as a routing update and it allows the neighbor to have an up-to-date view of the network topology. By sharing the entire routing table, the neighbor can make informed routing decisions and update its own routing table accordingly. This periodic exchange of routing information helps in maintaining a consistent and accurate routing infrastructure throughout the network.

    Rate this question:

  • 18. 

    Does a host running OSPF periodically send its entire routing table to its neighbors?

    • A.

      Yes

    • B.

      No

    Correct Answer
    B. No
    Explanation
    A host running OSPF does not periodically send its entire routing table to its neighbors. OSPF routers exchange information about their directly connected networks, known as link-state advertisements (LSAs), rather than sharing their entire routing tables. This allows routers to have a more efficient and scalable way of exchanging routing information. By sharing LSAs, routers can build a complete and accurate representation of the network topology and calculate the best paths to reach different destinations.

    Rate this question:

  • 19. 

    Can you use RIPv1 on modern classless networks?

    • A.

      YES, IT UNDERSTANDS CLASSLESS NETWORKS

    • B.

      NO, IT ONLY UNDERSTANDS OLD CLASS a/b/c STYLE NETWORKS

    Correct Answer
    B. NO, IT ONLY UNDERSTANDS OLD CLASS a/b/c STYLE NETWORKS
    Explanation
    RIPv1 is an older routing protocol that only understands the old class a/b/c style networks. It does not support classless networks, which are more commonly used in modern networks. Therefore, RIPv1 cannot be used on modern classless networks.

    Rate this question:

  • 20. 

    Can you use RIPv2 on modern classless networks?

    • A.

      NO

    • B.

      YES

    Correct Answer
    B. YES
    Explanation
    Yes, RIPv2 can be used on modern classless networks. RIPv2 is an enhanced version of the Routing Information Protocol (RIP) that supports classless routing, which means it can advertise and route to networks with variable length subnet masks (VLSM). This allows for more efficient and flexible network addressing. Therefore, RIPv2 is compatible with modern classless networks and can be used to exchange routing information between routers.

    Rate this question:

  • 21. 

    What is the protocol used to exchange routing information between organizations (autonomous systems) on the Internet today?

    Correct Answer
    BGP
    bgp
    Explanation
    BGP (Border Gateway Protocol) is the protocol used to exchange routing information between organizations or autonomous systems on the Internet. It is responsible for maintaining a table of IP networks and determining the best path for data packets to be forwarded. BGP allows different networks to communicate and exchange routing information, ensuring efficient and reliable data transmission across the Internet.

    Rate this question:

  • 22. 

    What are two WAN technologies that use PPP for framing?

    • A.

      Serial links - including dial-ups DOCSIS

    • B.

      Serial links - including dial-ups POS - Packet over sonet (fiber optic)

    • C.

      None of the above

    Correct Answer
    B. Serial links - including dial-ups POS - Packet over sonet (fiber optic)
    Explanation
    The two WAN technologies that use PPP for framing are serial links, including dial-ups, and POS (Packet over SONET) which uses fiber optic connections.

    Rate this question:

  • 23. 

    What is the standard most cable modems use now?

    Correct Answer
    DOCSIS
    docsis
    Explanation
    DOCSIS stands for Data Over Cable Service Interface Specification. It is a standard that most cable modems use to provide high-speed internet access over cable television networks. This standard allows for the transmission of data, voice, and video signals over the same coaxial cable line. It ensures compatibility and interoperability between different cable modems and cable network providers, allowing users to connect to the internet reliably and efficiently.

    Rate this question:

  • 24. 

    Frame relay and ATM build virtual circuits on top of what underlying physical topology?

    Correct Answer
    STAR OR MULTIPLE STAR TOPOLOGY
    star or multiple star topology
    star or multiple star
    Explanation
    Frame relay and ATM build virtual circuits on top of a star or multiple star topology. This means that the physical connections between the devices form a star-shaped network, where all devices are connected to a central hub. This topology allows for efficient communication between devices by providing a centralized point for data transmission.

    Rate this question:

  • 25. 

    The highest speed data connections over sonet are done with what framing?

    Correct Answer
    pos because it uses fiber optic connection
    POS because it uses fiber optic connection
    Explanation
    The correct answer is POS because it uses a fiber optic connection. POS stands for Packet over SONET, which is a protocol that allows for the transmission of packetized data over a SONET network. Since it utilizes fiber optic connections, which have a higher bandwidth and faster speeds compared to other types of connections, it is capable of achieving the highest speed data connections over SONET.

    Rate this question:

  • 26. 

    ADSL speeds are limited by distance

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    ADSL speeds are limited by distance because the farther away a user is from the telephone exchange, the weaker the signal becomes. This results in slower speeds as the signal has to travel a longer distance. The attenuation of the signal over distance is a limitation of ADSL technology, and it affects the overall performance and speed of the internet connection. Therefore, it is true that ADSL speeds are limited by distance.

    Rate this question:

  • 27. 

    ATM cells are how many octets long?

    Correct Answer
    53 octets
    53 OCTETS
    53
    Explanation
    ATM cells are 53 octets long. Octets are units of digital information that consist of 8 bits. In the context of ATM (Asynchronous Transfer Mode) cells, each cell is composed of a fixed size of 53 octets, which is equivalent to 424 bits. These cells are used for transferring data in telecommunications networks and have a specific format that includes a 5-byte header and a 48-byte payload. The fixed size of 53 octets allows for efficient and predictable transmission of data in ATM networks.

    Rate this question:

  • 28. 

    ADSL and cable modems are used primarily for what type of customer?

    • A.

      Large businesses

    • B.

      Personal use and small businesses

    Correct Answer
    B. Personal use and small businesses
    Explanation
    ADSL and cable modems are primarily used for personal use and small businesses. These types of customers require internet connectivity for their daily activities such as browsing, email, and streaming, but do not require the high bandwidth and dedicated lines that large businesses typically need. ADSL (Asymmetric Digital Subscriber Line) and cable modems provide a cost-effective solution for these customers, as they leverage existing telephone lines or cable TV infrastructure to deliver internet access at relatively high speeds. Therefore, personal use and small businesses are the main target customers for ADSL and cable modem services.

    Rate this question:

  • 29. 

    OC3 is what data rate?

    Correct Answer
    (~155 Mbits)
    ~155Mbits
    (~155Mbits)
    Explanation
    The correct answer is (~155 Mbits). OC3 refers to Optical Carrier 3, which is a type of network transmission speed commonly used in telecommunications. It has a data rate of approximately 155 Mbits, which means it can transmit data at a speed of around 155 megabits per second.

    Rate this question:

  • 30. 

    OC12 is what data rate?

    Correct Answer
    (~622 Mbits)
    ~622 Mbits
    (~622Mbits)
    Explanation
    The correct answer is "~622 Mbits", "~622Mbits", or "~622 Mbits". These options indicate that OC12 operates at a data rate of approximately 622 Mbits per second. The "~" symbol is used to represent "approximately" or "around," indicating that the exact data rate may vary slightly but is close to 622 Mbits.

    Rate this question:

  • 31. 

    What is the data rate for OC48?

    Correct Answer
    (~2.4 Gbits)
    ~2.4 Gbits
    (~2.4Gbits)
    Explanation
    The data rate for OC48 is approximately 2.4 Gbits.

    Rate this question:

  • 32. 

    What is the data rate for OC 192

    Correct Answer
    (~9.6 Gbits)
    ~9.6 Gbits
    (~9.6Gbits)
    Explanation
    The correct answer is (~9.6 Gbits), ~9.6 Gbits, (~9.6Gbits). These options all represent the data rate for OC 192, which is approximately 9.6 Gbits.

    Rate this question:

  • 33. 

    Wireless uses CSMA/CA what does this stand for?

    Correct Answer
    Carrier Sense Multiple Access with Collision Avoidance
    Explanation
    CSMA/CA stands for Carrier Sense Multiple Access with Collision Avoidance. In wireless networks, multiple devices share the same channel to transmit data. CSMA/CA is a protocol used to avoid collisions that may occur when multiple devices try to transmit data simultaneously. It works by having devices listen to the channel before transmitting, and if the channel is busy, they wait for a random amount of time before attempting to transmit again. This helps to minimize collisions and improve the overall efficiency of wireless communication.

    Rate this question:

  • 34. 

    When wireless stations talk to an access point they are operating in what mode?

    Correct Answer
    infrastructure
    Explanation
    When wireless stations communicate with an access point, they operate in infrastructure mode. This mode refers to a network setup where the access point acts as a central hub, connecting multiple wireless devices to a wired network. In infrastructure mode, the access point manages the communication between the wireless stations and facilitates their connection to the internet or other network resources. This mode is commonly used in homes, offices, and public spaces to provide wireless connectivity to multiple devices simultaneously.

    Rate this question:

  • 35. 

    When wireless stations talk directly to each other they are operating in what mode?

    Correct Answer
    ADHOC
    adhoc
    Explanation
    When wireless stations communicate directly with each other, without the need for a centralized access point or infrastructure, they are operating in ad hoc mode. In this mode, devices can form a temporary network and communicate with each other on a peer-to-peer basis. This mode is commonly used in situations where a traditional infrastructure network is not available or practical, such as in emergency situations or in temporary setups.

    Rate this question:

  • 36. 

    How many bits is a wireless Ethernet address?

    Correct Answer
    48 bits
    48bits
    Explanation
    A wireless Ethernet address is typically 48 bits long. This address, also known as a MAC address, is a unique identifier assigned to each network interface card (NIC) in a wireless device. The 48-bit address is divided into two parts: the first 24 bits represent the organizationally unique identifier (OUI), which identifies the manufacturer or vendor of the NIC, and the remaining 24 bits represent the unique serial number assigned by the manufacturer.

    Rate this question:

  • 37. 

    What are the two types of radio wireless transmission?

    Correct Answer
    DSSS and FHSS
    FHSS and DSSS
    Explanation
    DSSS (Direct Sequence Spread Spectrum) and FHSS (Frequency Hopping Spread Spectrum) are both types of radio wireless transmission. DSSS divides the data into small pieces and spreads it across a wide frequency band, while FHSS rapidly switches frequencies during transmission. Both techniques are used to improve the reliability and security of wireless communication by reducing interference and increasing resistance to jamming.

    Rate this question:

  • 38. 

    802.11g provides what data rate at what frequency band?

    Correct Answer
    2.4Ghz 54Mbps
    2.4 Ghz 54 Mbps
    Explanation
    The correct answer is 2.4Ghz 54Mbps. 802.11g is a wireless networking standard that operates in the 2.4GHz frequency band and provides a maximum data rate of 54Mbps. The repetition of the frequency band and data rate in the answer options confirms this information.

    Rate this question:

  • 39. 

    802.11a provides what data rate at what frequency band?

    Correct Answer
    5.0Ghz 54Mbps
    5.0 Ghz 54 Mbps
    Explanation
    802.11a is a Wi-Fi standard that operates in the 5.0 GHz frequency band and provides a data rate of 54 Mbps.

    Rate this question:

  • 40. 

    802.11b provides what data rate at what frequency band?

    Correct Answer
    2.4Ghz 11 MBPS
    2.4 Ghz 11 MBPS
    Explanation
    The correct answer is 2.4Ghz 11 MBPS. 802.11b is a wireless networking standard that operates in the 2.4GHz frequency band and provides a data rate of 11 Mbps. This frequency band is commonly used for Wi-Fi networks and allows for decent range and penetration through walls and obstacles. The data rate of 11 Mbps is sufficient for basic internet browsing, email, and streaming of standard-definition videos.

    Rate this question:

  • 41. 

    What is the IPSEC mode used to provide a true VPN tunnel?

    Correct Answer
    ESP tunnel
    esp tunnel
    Explanation
    The correct answer is ESP tunnel or esp tunnel. ESP (Encapsulating Security Payload) is a protocol used in IPSEC (Internet Protocol Security) to provide confidentiality, integrity, and authenticity of data in a VPN tunnel. It encrypts the entire IP packet, including the original IP header, and encapsulates it within a new IP packet. This ensures that the data transmitted over the VPN tunnel is secure and protected from unauthorized access or tampering.

    Rate this question:

  • 42. 

    Weak space key space for the session encryption is the weakness of PPTPv2 session encryption.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement is true because the weak space key space for the session encryption is indeed a weakness of PPTPv2 session encryption. This means that the available keys used for encrypting the session are limited and can be easily guessed or cracked by attackers, making the encryption vulnerable to unauthorized access and data breaches.

    Rate this question:

  • 43. 

    What would the protocol type in the GRE header be for a IPv4 packet encapsulated in a GRE packet?

    Correct Answer
    0800
    Explanation
    The protocol type in the GRE header for an IPv4 packet encapsulated in a GRE packet would be 0800. The value 0800 represents the protocol type for IPv4 in hexadecimal format. This indicates that the payload of the GRE packet is an IPv4 packet.

    Rate this question:

  • 44. 

    What is the IP protocol of a GRE packet?

    Correct Answer
    47
    Explanation
    The IP protocol of a GRE (Generic Routing Encapsulation) packet is 47. GRE is a tunneling protocol that encapsulates packets from one network protocol within packets of another network protocol, allowing them to be transmitted over an intermediate network. The IP protocol number 47 is assigned specifically for GRE packets, indicating that it is the protocol used for encapsulation and transmission of GRE packets over IP networks.

    Rate this question:

  • 45. 

    What are the two major packet encapsulation VPN standards in use today?

    Correct Answer
    GRE and IPsec
    IPsec and GRE
    ipsec gre
    gre ipsec
    Explanation
    The two major packet encapsulation VPN standards in use today are GRE and IPsec. GRE (Generic Routing Encapsulation) is a tunneling protocol that encapsulates packets inside IP packets, allowing them to be transmitted over an IP network. IPsec (Internet Protocol Security) is a suite of protocols that provides secure communication over IP networks by encrypting and authenticating IP packets. Both GRE and IPsec are widely used in VPN implementations to ensure secure and private communication between networks.

    Rate this question:

  • 46. 

    What are the 2 broad categories for software based VPN's

    • A.

      VPN's built by encapsulating each header.

    • B.

      VPN's built on TCP streams of bytes.

    • C.

      VPN's built by encapsulating each packet.

    • D.

      B and C

    • E.

      Not Here

    Correct Answer
    D. B and C
    Explanation
    The correct answer is B and C. VPNs can be built by encapsulating each packet or by using TCP streams of bytes. Encapsulating each packet involves adding an additional header to the original packet, while using TCP streams of bytes involves encapsulating the entire packet within a TCP stream. Both methods allow for secure and private communication over a network.

    Rate this question:

  • 47. 

    If you see an Ethernet multicast frame with a destination Ethernet address of 01-00-5e-10-10-10 what do you know about the IP address of the IP multicast packet within?

    • A.

      The first three is a standard number 224-239.16.16.16

    • B.

      The first three is a standard number 224-239.16.16.0

    • C.

      The first three is a standard number 225-239.16.16.16

    Correct Answer
    A. The first three is a standard number 224-239.16.16.16
    Explanation
    The given correct answer suggests that the first three octets of the IP address of the IP multicast packet within the Ethernet multicast frame fall within the standard range of 224-239. The last octet is specified as 16.16.16. Therefore, the IP address of the IP multicast packet is 224.16.16.16.

    Rate this question:

  • 48. 

    What would be the Ethernet destination address of a multicast packet with an IP destination of 226.2.2.2?

    Correct Answer
    01-00-5E-02-02-02
    Explanation
    The Ethernet destination address of a multicast packet with an IP destination of 226.2.2.2 would be 01-00-5E-02-02-02. In Ethernet, multicast packets are identified by the least significant bit of the first octet set to 1. The least significant bit of 01 in hexadecimal is 1, indicating a multicast address. The remaining octets are derived from the last 23 bits of the IP multicast address, which in this case is 02-02-02.

    Rate this question:

  • 49. 

    Which routing protocol is used predominantly today?

    Correct Answer
    PIM-sm
    PIM-SM
    Explanation
    PIM-SM (Protocol Independent Multicast-Sparse Mode) is the correct answer. It is a widely used routing protocol for multicast communication in modern networks. PIM-SM enables efficient and scalable multicast routing by dynamically creating distribution trees. It is designed to work in a sparse mode network where only a subset of routers are interested in receiving multicast traffic. PIM-SM allows for adaptive and flexible multicast routing, making it the predominant choice for multicast communication in today's networks.

    Rate this question:

  • 50. 

    What are the two major multicast routing protocols?

    Correct Answer
    DVMRP and PIM-SM
    PIM-SM and DVRMP
    Explanation
    The two major multicast routing protocols are DVMRP and PIM-SM. DVMRP (Distance Vector Multicast Routing Protocol) is a protocol that uses a distance-vector algorithm to determine the best path for multicast traffic. PIM-SM (Protocol Independent Multicast-Sparse Mode) is a protocol that allows for efficient distribution of multicast traffic in a sparse network topology. DVRMP is not a recognized multicast routing protocol, so it is not one of the major protocols.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.