You are on page 1of 84

1

Marks: 1

The ____ is where ongoing communications between a sender and a receiver,


somewhat like a telephone conversation, are set up, maintained, and then
terminated, or torn down,as needed.

Choose one answer.

a. Session layer

b. Physical layer

c. Network layer
d. Presentation

layer
Correct

Marks for this submission: 1/1.

Question 2

Marks: 1

Many analyzers have configurable ____ that indicate unusual network events or
errors.

Choose one answer.

a. ports
b. alarms

c. sockets

d. sessions

Correct

Marks for this submission: 1/1.

Question 3
Marks: 1

A(n) ____ is holding area for packets copied off the network.

Choose one answer.

a. trace

buffer

b. payload

c. packet

d. layer
Correct

Marks for this submission: 1/1.

Question 4

Marks: 1

TCP/IP application processes are sometimes called ____ and are identified by port
numbers.

Choose one answer.

a. well-known

protocols

b. hosts
c. network services

d. display filters
Correct

Marks for this submission: 1/1.

Question 5

Marks: 1
It is the job of the ____ to enable reliable transmission of data through the Physical
layer at the sending end, and to check such reliability upon reception at the
receiving end.

Choose one answer.

a. Data link

layer
b. Physical layer

c. Network layer

d. Transport

layer
Correct

Marks for this submission: 1/1.

Question 6

Marks: 1

The ____ manages the way data is presented to the network (on its way down the
protocol stack), and to a specific machine/application combination (on its way up
the protocol stack).

Choose one answer.

a. Session layer

b. Physical layer

c. Network layer
d. Presentation

layer
Correct

Marks for this submission: 1/1.

Question 7

Marks: 1
The ____ is where notions of network location are addressed and where the
intricacies involved in directing a PDU from sender to receiver are handled.

Choose one answer.

a. Data link layer

b. Application

layer
c. Network layer

d. Transport layer

Correct

Marks for this submission: 1/1.

Question 8

Marks: 1

The TCP/IP Application layer also is known as the ____ layer because this is where
the protocol stack interfaces with applications or processes on a host machine.

Choose one answer.

a. Session

b. Network

c. Process

d. Transport

Correct

Marks for this submission: 1/1.

Question 9

Marks: 1
Combining the various sources of outgoing data into a single output data stream is
called ____.

Choose one answer.

a. segmentation

b. demultiplexing

c. protocol

analysis

d. multiplexing
Correct

Marks for this submission: 1/1.

Question 10

Marks: 1

____ assign a series of numbers to represent a sizable collection of TCP/IP-based


network services, such as file transfer (FTP), terminal emulation (Telnet), and e-
mail.

Choose one answer.

a. Well-known

protocols

b. Daemons

c. Data frames

d. Datagrams
Correct

Marks for this submission: 1/1.

Question 11

Marks: 1
The ____ includes the physical transmission medium (cables or wireless media) that
any network must use to send and receive the signals that constitute the physical
expression of networked communications.

Choose one answer.

a. Data link

layer
b. Physical layer

c. Network layer

d. Transport

layer
Correct

Marks for this submission: 1/1.

Question 12

Marks: 1

The ____ is the parent organization for all the various Internet boards and task
forces.

Choose one answer.

a. ICANN
b. Internet Engineering Task

Force
c. Internet Architecture Board

d. Internet Society
Correct

Marks for this submission: 1/1.

Question 13

Marks: 1
Remote Monitoring (RMON) uses the ____ to collect traffic data at a remote switch
and send the data to a management device.

Choose one answer.

a. Simple Network Management

Protocol

b. User Datagram Protocol

c. Virtual Private Network

d. Wide Area Information Service


Correct

Marks for this submission: 1/1.

Question 14

Marks: 1

Many PDUs include a characteristic closing component called ____ that provides
data integrity checks for the data portion of the PDU, known as the payload.

Choose one answer.

a. well-known

protocol

b. trailer

c. network service

d. host
Correct

Marks for this submission: 1/1.

Question 15

Marks: 1

The term ____ refers to a single logical network composed of multiple physical
networks, which may all be at a single physical location, or spread among multiple
physical locations.
Choose one answer.

a. internetwork

b. session
c. connection-

oriented

d. checksum
Correct

Marks for this submission: 1/1.

Question 16

Marks: 1

The ____ is the group responsible for drafting, testing, proposing, and maintaining
official Internet Standards, in the form of RFCs, through the agencies of multiple
working groups under its purview.

Choose one answer.

a. ICANN
b. Internet Engineering Task

Force
c. Internet Architecture Board

d. Internet Society
Correct

Marks for this submission: 1/1.

Question 17

Marks: 1

____ are applied to the packets that are captured into the trace buffer.

Choose one answer.


a. Ports

b. Runts

c. Filters
d. Decodes

Correct

Marks for this submission: 1/1.

Question 18

Marks: 1

The ____ is responsible for the more forward-looking activities of the ISOC, and
handles research and development work for topics too far-out or impractical for
immediate implementation, but which may (or may not) have a role to play on the
Internet some day.

Choose one answer.

a. ICANN
b. Internet Engineering Task

Force
c. Internet Research Task

Force

d. Internet Society
Correct

Marks for this submission: 1/1.

Question 19

Marks: 1

The ____ is ultimately responsible for managing all Internet domain names, network
addresses, and protocol parameters and behaviors.

Choose one answer.


a. ICANN
b. Internet Engineering Task

Force
c. Internet Research Task

Force

d. Internet Society
Correct

Marks for this submission: 1/1.

Question 20

Marks: 1

The ____ defines an interface that applications can use to request network services,
rather than referring directly to applications themselves.

Choose one answer.

a. Application layer

b. Physical layer

c. Session layer
d. Presentation

layer
Correct

OSPF and ____are two examples of routing protocols that support multiple types of
services.
Choose one answer.

a. Border Gateway

Protocol

b. T-carrier
c. TOS

d. IPCONFIG
Correct
Marks for this submission: 1/1.

Question 2
Marks: 1
____ specifies how IP traffic should be encapsulated in 802.2 LLC frames that include the
Sub-Network Access Protocol (SNAP) portion.
Choose one answer.

a. RFC 144

b. RFC 1032

c. RFC 1035

d. RFC 1042

Correct
Marks for this submission: 1/1.

Question 3
Marks: 1
ARP is used only to find the hardware address of local IP hosts.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 4
Marks: 1
All IP packets have a pre-defined lifetime indicated in each packet’s ____ field.
Choose one answer.

a. Time To Live
b. Frame Check

Sequence
c. Protocol Identifier

d. Flag
Correct
Marks for this submission: 1/1.

Question 5
Marks: 1
____ is a method that allows an IP host to use a simplifiedsubnetting.
Choose one answer.

a. Proxy ARP

b. Link Control

c. IPCP
d. IPCONFIG

Correct
Marks for this submission: 1/1.

Question 6
Marks: 1
____ is a protocol used by many Internet service providers (including telecommunications
companies and cable TV operators) to authenticate and manage broadband subscribers.
Choose one answer.

a. X.25

b. ATM

c. PPPoE
d. Frame relay

Correct
Marks for this submission: 1/1.

Question 7
Marks: 1
____ is considered a premium service connection, offering a service that appears as a
“virtual lease line” between end points.
Choose one answer.

a. Expedited Forwarding
b. High Drop Precedence

c. Medium Drop

Precedence
d. Low Drop Precedence

Incorrect
Marks for this submission: 0/1.

Question 8
Marks: 1
A ____ is required to get the packet from one IP host to another IP host on a single
network.
Choose one answer.

a. frame
b. hardware address

c. delimiter

d. data link
Incorrect
Marks for this submission: 0/1.

Question 9
Marks: 1
____ is a general-purpose protocol that overcomes SLIP’s deficiencies and provides WAN
data link encapsulation services similar to those available for LAN encapsulations.
Choose one answer.

a. Border Gateway

Protocol
b. Point-to-Point Protocol

c. Link Control Protocol


d. Token ring
Correct
Marks for this submission: 1/1.

Question 10
Marks: 1
The ____ field provides error detection on the contents of the IP header only.
Choose one answer.

a. Protocol

b. Time To Live

c. Fragment Offset
d. IP Header

Checksum
Correct
Marks for this submission: 1/1.

Question 11
Marks: 1
Routers use ____ to select a routing path when there are multiple paths available.
Choose one answer.

a. tokens

b. precedence
c. Type of Service

d. repeaters
Correct
Marks for this submission: 1/1.

Question 12
Marks: 1
IP fragmentation enables a larger packet (for example, a token ring 4,096-byte packet) to be
automatically fragmented by a ____ into smaller packets to cross a link that supports a
smaller MTU, such as an Ethernet link.
Choose one answer.
a. token

b. router

c. repeater
d. cable modem

Correct
Marks for this submission: 1/1.

Question 13
Marks: 1
When any particular switched technologies, such as X.25, frame relay, or ATM, are used to
link together PPP peers, additional control and addressing information must be included in
PPP headers to manage the connection.
Answer:

True False
Incorrect
Marks for this submission: 0/1.

Question 14
Marks: 1
The default TTL in Windows 2000, Windows 2003, and Windows XP is ____.
Choose one answer.

a. 64

b. 72
c. 112

d. 128

Correct
Marks for this submission: 1/1.

Question 15
Marks: 1
When a packet is fragmented, all fragments are given different TTL values.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 16
Marks: 1
On a network that is low on available bandwidth, the ____ processcauses more traffic on
the wire.
Choose one answer.

a. data encapsulation

b. error-detection

c. circuit switching
d. fragmentation

retransmission
Correct
Marks for this submission: 1/1.

Question 17
Marks: 1
____ is a standard set of protocols defined in the 1970s by the International
Telecommunications Union (ITU), and it is designed to send datagrams across a public
packet-switched data network using noisy, narrow bandwidth, copper telephone lines.
Choose one answer.

a. X.25
b. Frame relay

c. ATM

d. PPPoE
Incorrect
Marks for this submission: 0/1.

Question 18
Marks: 1
Border Gateway Protocol is the original point-to-point protocol for encapsulating TCP/IP
traffic over a WAN link and is still used for connecting to some ISPs today (mostly for
access to older UNIX hosts).
Answer:
True False
Correct
Marks for this submission: 1/1.

Question 19
Marks: 1
If a packet with TTL=1 arrives at a router, the router must discard the packet because it
cannot decrement the TTL to 0 and forward the packet.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 20
Marks: 1
____ assumes that digital-quality transmission lines are available for creating WAN links.
Choose one answer.

a. X.25

b. ATM

c. PPPoE
d. Frame relay

Correct
Marks for this submission: 1/1.

Question 21
Marks: 1
____ defines a method for differentiating services for network traffic using the six high-order
bits of the byte that was formerly the three-bit Precedence field and the first bit of the TOS
field.
Choose one answer.

a. RFC 1044

b. RFC 2034

c. RFC 2474
d. RFC 2700

Correct
Marks for this submission: 1/1.

Question 22
Marks: 1
A router uses ____ to determine what packet to send when several packets are queued for
transmission from a single-output interface.
Choose one answer.

a. proxy ARP

b. precedence

c. preamble

d. frames
Correct
Marks for this submission: 1/1.

Question 23
Marks: 1
____ was designed to provide devices with a method for notifying each other that a link is
experiencing congestion before the routers start to drop packets.
Choose one answer.

a. ARP cache
b. Explicit Congestion

Notification

c. Circuit switching

d. Fragmentation
Incorrect
Marks for this submission: 0/1.

Question 24
Marks: 1
____ is used to obtain an IP address for an associated data link address.
Choose one answer.
a. Proxy ARP

b. IEEE
c. Network Control

d. RARP
Correct
Marks for this submission: 1/1.

Question 25
Marks: 1
The primary function of ____ layer protocols is to move datagrams through an internetwork
connected by routers.
Choose one answer.

a. Data link
b. Application

c. Network
d. Transport

Correct
Marks for this submission: 1/1.

Question 26
Marks: 1
The recommended starting TTL value is ____.
Choose one answer.

a. 64

b. 72
c. 112

d. 128

Correct
Marks for this submission: 1/1.
Using ICMP ____ and some manipulation of the TTL value in the IP header,
TRACEROUTE results provide a list of routers along a path, as well as the round-trip
latency time to each router.
Choose one answer.

a. Echo Requests

b. paths

c. metrics
d. query messages

Correct
Marks for this submission: 1/1.

Question 2
Marks: 1
____ defines a method for discovering a Path MTU (PMTU) using ICMP.
Choose one answer.

a. RFC 1191

b. RFC 1241

c. RFC 1542

d. RFC 1577

Correct
Marks for this submission: 1/1.

Question 3
Marks: 1
Routers send ICMP Redirect messages to hosts to indicate that a preferable route exists.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 4
Marks: 1
The value 0 in the IP header Protocol field denotes that an ICMP header follows the IP
header.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 5
Marks: 1
If configured to do so, routers periodically send unsolicitedICMP Router Advertisements to
the all-hosts multicast address ____.
Choose one answer.

a. 224.0.0.1

b. 255.255.0.0

c. 224.255.0.1

d. 255.224.0.1

Correct
Marks for this submission: 1/1.

Question 6
Marks: 1
A host or router can send the ____ error message to indicate that the protocol defined in the
IP header cannot be processed.
Choose one answer.

a. Code 2: Protocol Unreachable

b. Code 3:Port Unreachable


c. Code 4: Fragmentation Needed and Don’t Fragment

Was Set

d. Code 5: Source Route Failed


Correct
Marks for this submission: 1/1.

Question 7
Marks: 1
The ____ utility uses route tracingto identify a pathfrom the sender to the target host.
Choose one answer.

a. gateway
b. TRACEROUTE

c. firewalking
d. auto-recovery

Correct
Marks for this submission: 1/1.

Question 8
Marks: 1
For any network node to communicate and exchange data with another network node,
some way of forwarding packets from the sender to receiver must exist. This concept is
called ____.
Choose one answer.

a. response time

b. route tracing

c. reachability
d. network congestion

Correct
Marks for this submission: 1/1.

Question 9
Marks: 1
____ enables a source to learn the currently supported MTU across an entire path, without
requiring fragmentation.
Choose one answer.

a. Firewalking
b. TRACEROUTE
c. PATHPING
d. PMTU Discovery

Correct
Marks for this submission: 1/1.

Question 10
Marks: 1
With router advertising, the default Lifetime value for route entries is 10 minutes.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 11
Marks: 1
____ typically learn about routes through manual configuration of the default gateway
parameter and redirection messages.
Choose one answer.

a. Packets

b. Firewalls

c. Ports
d. IP hosts

Correct
Marks for this submission: 1/1.

Question 12
Marks: 1
The ____ utility is a command-line utility that uses ICMP Echo packets to test router and
link latency, as well as packet loss.
Choose one answer.

a. NTP

b. PATHPING
c. Path MTU
d. TRACEROUTE

Correct
Marks for this submission: 1/1.

Question 13
Marks: 1
A(n) ____ process is one method of obtaining a list of the active hosts on a network.
Choose one answer.

a. ICMP query

b. query
c. IP address scanning

d. firewalking
Incorrect
Marks for this submission: 0/1.

Question 14
Marks: 1
ICMP packets contain only three required fields after the IP header: Type, Code, and
Checksum.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 15
Marks: 1
The message type ____ permits a gateway (router) on a nonoptimal route between sender
and receiver to redirect traffic to a more optimal path.
Choose one answer.

a. ICMP Echo/Echo Reply

b. ICMP Source Quench

c. ICMP Redirect
d. ICMP Destination

Unreachable
Correct
Marks for this submission: 1/1.

Question 16
Marks: 1
There are two versions of the ____ ICMP reply - the standard version that simply states the
packet had the Don’t Fragment bit set when it reached a router that needed to fragment it,
and the PMTU version that includes information about the restricting link.
Choose one answer.

a. Code 2: Protocol Unreachable

b. Code 3:Port Unreachable


c. Code 4: Fragmentation Needed and Don’t Fragment

Was Set

d. Code 5: Source Route Failed


Correct
Marks for this submission: 1/1.

Question 17
Marks: 1
The message type ____ documents when routing or delivery errors prevent IP datagrams
from reaching their destinations.
Choose one answer.

a. ICMP Echo/Echo Reply

b. ICMP Source Quench

c. ICMP Time Exceeded


d. ICMP Destination

Unreachable
Correct
Marks for this submission: 1/1.

Question 18
Marks: 1
ICMP Type ____ is used for Echo Request packets.
Choose one answer.
a. 2

b. 4

c. 6

d. 8

Correct
Marks for this submission: 1/1.

Question 19
Marks: 1
Hackers can use ____ as part of a reconnaissance processto learn about active network
addresses and active processes.
Choose one answer.

a. availability

b. ICMP
c. auto recovery

d. presence
Correct
Marks for this submission: 1/1.

Question 20
Marks: 1
Routers can use ICMP to provide a default gateway setting to a host (if the host requests
assistance).
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 21
Marks: 1
The message type ____ supports functionality for reachability utilities like PING and
TRACERT; essential when installing, configuring, and troubleshooting IP networks.
Choose one answer.
a. ICMP Echo/Echo Reply

b. ICMP Source Quench

c. ICMP Time Exceeded


d. ICMP Destination

Unreachable
Correct
Marks for this submission: 1/1.

Question 22
Marks: 1
A router or host may use ____ as a way to indicate that it is becoming congested or
overloaded.
Choose one answer.

a. Checksum
b. Source Quench

c. GMT

d. PMTU
Correct
Marks for this submission: 1/1.

Question 23
Marks: 1
Although RFC ____ dictates that IP routers“must support the router part of the ICMP Router
Discovery protocol on all connected networks on which the router supports either IP
multicast or IP broadcast addressing,” many do not.
Choose one answer.

a. 1812

b. 1900

c. 1955

d. 1972
Correct
Marks for this submission: 1/1.

Question 24
Marks: 1
The ICMP packet field____ provides error detection for the ICMP header only.
Choose one answer.

a. Checksum

b. Type

c. Host

d. Code
Correct
Marks for this submission: 1/1.

Question 25
Marks: 1
____ messages serve to keep hosts apprised of networking conditions and problems, and
equipped to use best paths around the network.
Choose one answer.

a. NTP
b. Path MTU

c. ICMP

d. GMT
Correct
Marks for this submission: 1/1.

Question 26
Marks: 1
A router sends the ____ ICMP reply to indicate that the router cannot use the strict or loose
source routing path specified in the original packet.
Choose one answer.

a. Code 2: Protocol Unreachable


b. Code 3:Port Unreachable
c. Code 4: Fragmentation Needed and Don’t Fragment

Was Set

d. Code 5: Source Route Failed


Correct
Marks for this submission: 1/1.

____ is a simple protocol that is used by applications that contain their own connection-
oriented timeout values and retry counters, similar to those provided by TCP.
Choose one answer.

a. UDP

b. DoS

c. RTO

d. MSS

Incorrect
Marks for this submission: 0/1.

Question 2
Marks: 1
____ is detected whenever three or more duplicate ACK packets (known as a triple-ACK) or
timeout events occur, and timeout events are considered more serious than duplicate
acknowledgements.
Choose one answer.

a. Logical connection

b. Congestion

c. Retransmission

d. Windowing
Incorrect
Marks for this submission: 0/1.
Question 3
Marks: 1
Overloading a receiver occurs when the number of data bytes is greater than the ____.
Choose one answer.

a. advertised window

b. bandwidth

c. sliding window

d. ephemeral port
Correct
Marks for this submission: 1/1.

Question 4
Marks: 1
The ____ field value defines the destination application or process that uses the IP and
UDP headers.
Choose one answer.

a. Checksum
b. Dynamic Port Number

c. Length
d. Destination Port

Number
Correct
Marks for this submission: 1/1.

Question 5
Marks: 1
TCP supports ____ - the process of sending numerous data packets in sequence without
waiting for an intervening acknowledgment.
Choose one answer.

a. retries
b. sequence number

tracking
c. windowing

d. error recovery
Correct
Marks for this submission: 1/1.

Question 6
Marks: 1
The Fast Recovery process dictates that when a host receives three duplicate ACKs, it
must immediately start retransmitting the ____, without waiting for the retransmission timer
to expire.
Choose one answer.

a. duplicate ACKs

b. core services

c. byte streams
d. lost segments

Correct
Marks for this submission: 1/1.

Question 7
Marks: 1
TCP keep-alives are enabled by default on Windows 2000, Windows Server 2003, and
Windows XP, although any application may disable TCP keep-alives, if desired by its
programmer.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 8
Marks: 1
By default, Windows 2000 and Windows XP support up to ____ ports.
Choose one answer.

a. 200
b. 500

c. 2000

d. 5000

Correct
Marks for this submission: 1/1.

Question 9
Marks: 1
UDP offers connection-oriented services with sequencing, error recovery, and a sliding
window mechanism.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 10
Marks: 1
TCP hosts create a virtual connection with each other using a ____.
Choose one answer.

a. sliding window
b. handshake process

c. teardown sequence

d. retry mechanism
Correct
Marks for this submission: 1/1.

Question 11
Marks: 1
The initial sequence number used in a TCP connection is defined by the ____ and, for
security purposes, should be randomly assigned.
Choose one answer.

a. host
b. packet

c. port
d. segment

Correct
Marks for this submission: 1/1.

Question 12
Marks: 1
UDP runs up to ____ percent faster than TCP, under some conditions, because it does next
to nothing!
Choose one answer.

a. 20

b. 30

c. 40

d. 50

Correct
Marks for this submission: 1/1.

Question 13
Marks: 1
____ is the overloading of the network or a receiver.
Choose one answer.

a. Sequence number

tracking

b. Buffering

c. Congestion

d. Windowing
Correct
Marks for this submission: 1/1.

Question 14
Marks: 1
The ____ field defines the length of the packet from the UDP header to the end of valid
data(not including any data link padding, if padding is required).
Choose one answer.

a. Checksum
b. Dynamic Port Number

c. Length
d. Destination Port

Number
Correct
Marks for this submission: 1/1.

Question 15
Marks: 1
The TCP connection termination process requires ____ packets.
Choose one answer.

a. 1

b. 2

c. 3

d. 4

Correct
Marks for this submission: 1/1.

Question 16
Marks: 1
____ provide the simplest kind of transport services because they simply package
messages, taken as is from the TCP/IP Application layer, into datagrams.
Choose one answer.

a. Core services

b. Port numbers
c. Logical connections
d. Connectionless protocols

Correct
Marks for this submission: 1/1.

Question 17
Marks: 1
TCP half-open connections occur when the handshake process does not end successfully
with a final ACK.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 18
Marks: 1
____ is caused when enough data is sent to a TCP host to fill its receiver buffer, thereby
putting the receiver in a zero-window state.
Choose one answer.

a. DoS
b. Silly Window Syndrome

c. Time Wait delay


d. Retransmission timeout

Correct
Marks for this submission: 1/1.

Question 19
Marks: 1
The ____ process guarantees that packets are ordered properly and protects against
missing segments.
Choose one answer.

a. watchdog

b. keep-alive
c. handshake
d. sequence and

acknowledgement
Incorrect
Marks for this submission: 0/1.

Question 20
Marks: 1
TCP supports a ____ mechanism, which is a management method for data transmission
used to determine the amount of unacknowledged data that can go out on the wire from any
sender.
Choose one answer.

a. congestion

b. retry
c. sliding window

d. watchdog
Correct
Marks for this submission: 1/1.

Question 21
Marks: 1
The ____ flag is used to indicate that the host completed a transaction.
Choose one answer.

a. Reset

b. FIN
c. SYN

d. URG

Correct
Marks for this submission: 1/1.

Question 22
Marks: 1
UDP is the only connectionless TCP/IP protocol at the Transport layer.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 23
Marks: 1
When an out-of-order data segment is received, the Fast Retransmit process requires the
receiver to immediately send ____.
Choose one answer.

a. duplicate ACKs

b. core services

c. byte streams
d. lost segments

Correct
Marks for this submission: 1/1.

Question 24
Marks: 1
When the Protocol field of an IP header contains the value 17 (0x11), the UDP header
follows the IP header.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 25
Marks: 1
Dynamic ports are used as ____ for specific communications while they are underway.
Choose one answer.

a. temporary ports

b. core services
c. byte streams
d. lost segments

Correct
Marks for this submission: 1/1.

Question 26
Marks: 1
Once the TCP connection is established, a ____ can maintain the connection when there is
no data sent across the wire.
Choose one answer.

a. watchdog process

b. core service
c. keep-alive process

d. handshake process

Correct
Marks for this submission: 1/1.

The ____ receives partially-authenticated connections from the dispatch server, and
repeats some of the protocol negotiation that occurs during that initial client-dispatch server
phase.
Choose one answer.

a. dispatch server

b. principal
c. notification server

d. switchboard server

Correct
Marks for this submission: 1/1.

Question 2
Marks: 1
The ____ arbitrates connections between recipient principals, acting something like a proxy
to bridge such conversations.
Choose one answer.

a. dispatch server

b. principal
c. notification server

d. switchboard server

Incorrect
Marks for this submission: 0/1.

Question 3
Marks: 1
____ is the necessary name-to-numbers correlation similar to the coupling between
hostnames and IP addresses.
Choose one answer.

a. Hypermedia
b. Address translation

c. Presence

d. Replication
Correct
Marks for this submission: 1/1.

Question 4
Marks: 1
TCP port 7 is assigned to the UDP Echo process.
Answer:

True False
Incorrect
Marks for this submission: 0/1.

Question 5
Marks: 1
____ is a TCP or UDP service that echoes all characters received on the port to which it
listens back to the sender.
Choose one answer.

a. Echo

b. Quote of the Day

c. Whois
d. Character

Generation
Incorrect
Marks for this submission: 0/1.

Question 6
Marks: 1
A ____ is defined as the end-point in the conversation, which can be a client interface in
executable or Web script form,or a programmed automaton called a bot (short for robot).
Choose one answer.

a. dispatch server

b. principal
c. notification server

d. switchboard server

Incorrect
Marks for this submission: 0/1.

Question 7
Marks: 1
FTP is an Application layer protocol that relies on ____.
Choose one answer.

a. FTP

b. UDP

c. HTTP
d. Chargen

Incorrect
Marks for this submission: 0/1.

Question 8
Marks: 1
HTTP methods are commands that the HTTP client issues to the HTTP server.
Answer:

True False
Incorrect
Marks for this submission: 0/1.

Question 9
Marks: 1
____ is a standard for initiating, modifying, or terminating interactive users sessions that
involve one or more multimedia elements that can include video, voice, instant messaging,
videoconferencing, or even online games.
Choose one answer.

a. MCU

b. SMTP

c. VoIP

d. SIP
Incorrect
Marks for this submission: 0/1.

Question 10
Marks: 1
A(n) ____ is typically a hardware-implemented audio chip either integrated into the endpoint
device, whether it’s a standalone handheld unit or a full-fledged server, or an external
peripheral device, such as the variety of inline VoIP adapters for standard handsets.
Choose one answer.

a. digital-to-analog

converter

b. alias
c. analog-to-digital converter

d. SNMP trap
Incorrect
Marks for this submission: 0/1.

Question 11
Marks: 6
Match each item with a statement below.

Server-specific information is replicated from one server to Server-to-server traffic


another.
Offers a method for transferring files over a connection-oriented FTP
transport, or TCP.
NVT
Each side of a Telnet communication.

Replication
Parameters or conventions used for the Telnet connection.

The most widely used protocol for sending electronic mail (e-mail) SMTP
on the Internet.
Options
Sends status replies that include a numeric reply code.

Partially correct
Marks for this submission: 1/6.

Question 12
Marks: 1
A(n) ____ is a designation by which an endpoint is identified, and may be an e-mail ID in
the format of user@host.domain, or a simple numeric value.
Choose one answer.

a. digital-to-analog

converter

b. alias
c. analog-to-digital converter

d. SNMP trap
Correct
Marks for this submission: 1/1.

Question 13
Marks: 1
____ defines a programming mechanism originally developed at Sun Microsystems for
programmers to develop distributed applications easily (a procedure within a process on
one computer that communicates or invokes another procedure running within a different
process on the same computer, or on some other computer on the network).
Choose one answer.

a. SSL
b. Remote Procedure

Call

c. Replication

d. QOD
Incorrect
Marks for this submission: 0/1.

Question 14
Marks: 1
The ____ service outputs a continuing sequence of characters in response to a client
request to this service.
Choose one answer.

a. Echo

b. Quote of the Day

c. Whois
d. Character Generator

Incorrect
Marks for this submission: 0/1.

Question 15
Marks: 1
The FTP command ____ asks the server to listen on a non-default data port and wait for the
client to establish a new connection on the port number.
Choose one answer.

a. TYPE code
b. RETR
pathname/filename

c. PASV
d. STOR

pathname/filename
Incorrect
Marks for this submission: 0/1.

Question 16
Marks: 1
FTP relies on UDP to establish the underlying connection, track the order of packets, define
and adjust the data transfer window according to the rules of congestion control and
avoidance, and recover from data loss.
Answer:

True False
Incorrect
Marks for this submission: 0/1.

Question 17
Marks: 1
The ____ User Information Protocol provides a mechanism for obtaining information about
TCP/IP hosts or users.
Choose one answer.

a. Trivial File Transfer

Protocol

b. VoIP

c. SMTP

d. Finger
Incorrect
Marks for this submission: 0/1.

Question 18
Marks: 1
The ____ handles the protocol version and identification process for MSN messaging
clients and represents the first server contact for all initial client connections.
Choose one answer.

a. dispatch server
b. principal
c. notification server

d. switchboard server

Incorrect
Marks for this submission: 0/1.

Question 19
Marks: 1
____ was designed as a simple peer-to-peer protocol for lightweight file transfer between
two IP hosts.
Choose one answer.

a. Trivial File Transfer

Protocol

b. VoIP

c. SMTP

d. Finger
Incorrect
Marks for this submission: 0/1.

Question 20
Marks: 1
____ is the process of moving the data across the data connection only.
Choose one answer.

a. Data Transfer

Process

b. FTP

c. Notification

d. Load balancing
Incorrect
Marks for this submission: 0/1.

Question 21
Marks: 1
A ____ is a combination of a Uniform Resource Locator (URL) and a Uniform Resource
Name (URN).
Choose one answer.

a. NS

b. URI
c. Stelnet

d. SSL
Correct
Marks for this submission: 1/1.

Question 22
Marks: 1
____ is a suite of protocols that describes the properties and procedures for routing voice
conversations across the Internet using general-purpose packet-switching technology.
Choose one answer.

a. VoIP
b. NetBIOS

c. RPC

d. SMTP
Correct
Marks for this submission: 1/1.

Question 23
Marks: 1
____ is a service that simply sends a short message in reply to any request packet.
Choose one answer.

a. Echo

b. Quote of the Day

c. Whois
d. Character

Generation
Incorrect
Marks for this submission: 0/1.

Question 24
Marks: 1
____ is a proprietary protocol specification that provides an asynchronous communications
framework for establishing Internet presence and real-time instant messaging.
Choose one answer.

a. MCU

b. RPC

c. SNMP
d. MSN Messenger

Correct
Marks for this submission: 1/1.

Question 25
Marks: 1
By default, HTTP communications use port ____.
Choose one answer.

a. 20

b. 60

c. 80
d. 101

Correct
Marks for this submission: 1/1.

By ____ DNS data from one or more database segments on one or more DNS servers,
DNS also provides a mechanism whereby it can attempt to satisfy name resolution requests
locally before attempting them remotely, thereby greatly improving the speed of such name
resolution.
Choose one answer.

a. transferring

b. caching

c. resolving

d. spoofing
Correct
Marks for this submission: 1/1.

Question 2
Marks: 1
A(n) ____ record stores IP address-to-domain name translation data and supports the
operation known as a reverse DNS lookup.
Choose one answer.

a. well-known services

b. text

c. pointer

d. host information
Correct
Marks for this submission: 1/1.

Question 3
Marks: 1
Files that map addresses to domain names for reverse lookups are usually called ____.
Choose one answer.

a. addr.in-

addr.arpa.dns

b. domain.dns

c. tree.dn

d. clearlake.dns
Correct
Marks for this submission: 1/1.

Question 4
Marks: 1
The records in the ____file are provided to support reverse DNS lookups.
Choose one answer.

a. arpa.addr

b. db.addr
c. cname.addr

d. dns.addr
Correct
Marks for this submission: 1/1.

Question 5
Marks: 1
Domains (such as ibm.com) can be broken into subdomains(such as clearlake.ibm.com), as
needed.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 6
Marks: 1
Most DNS resolvers issue what is called a(n) ____from the client side.
Choose one answer.

a. recursive query

b. address query

c. NSLOOKUP

d. name query
Incorrect
Marks for this submission: 0/1.

Question 7
Marks: 1
When a TCP/IP client uses a resolver to send a name query to a DNS server, that client
obtains the address for the DNS server it queries from its TCP/IP configuration data.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 8
Marks: 1
A ____ record is used to create aliases.
Choose one answer.

a. canonical name

b. mail exchange

c. name server

d. pointer
Correct
Marks for this submission: 1/1.

Question 9
Marks: 1
DNS servers cache name and address pairs for addresses they resolved, and they keep
information about name requests that result in error messages. This kind of information is
called ____.
Choose one answer.

a. DNS round robin

b. name resolution

c. negative caching

d. IP spoofing
Correct
Marks for this submission: 1/1.
Question 10
Marks: 1
Not all the data in a DNS cache has an expiration value.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 11
Marks: 1
A(n) ____ record lists the IP-based services, such as Telnet, FTP, HTTP, and so forth, that
an Internet host can supply.
Choose one answer.

a. well-known services

b. text

c. name server

d. host information
Correct
Marks for this submission: 1/1.

Question 12
Marks: 1
Data associated with domain names, address records, and other specific data of interest to
the Domain Name System is stored on a DNS server in special database records called
____.
Choose one answer.

a. hosts
b. resource records

c. zones
d. primary master

Correct
Marks for this submission: 1/1.
Question 13
Marks: 1
By default, ____ queries the default name server specified in the current machine’s TCP/IP
configuration.
Choose one answer.

a. NSLOOKUP

b. mail exchange

c. multi-homed

d. IP
Correct
Marks for this submission: 1/1.

Question 14
Marks: 1
Twenty-six root name servers (named A.ROOT-SERVERS.NET., B.ROOT-
SERVERS.NET., etc.) act as the top of the DNS hierarchy worldwide. They provide the
ultimate source for all name lookups that cannot be resolved through other means.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 15
Marks: 1
____ requests always go to the name server that is authoritative for the domain that
contains the requested name or address to make completely sure data is obtained directly
from the source.
Choose one answer.

a. Root server

b. Client server

c. Mail server
d. Cache server
Correct
Marks for this submission: 1/1.

Question 16
Marks: 1
The ____ command provides access to all kinds of DNS information, either from the current
default server, or from a server whose name or IP address you provide as an argument to
this command.
Choose one answer.

a. NSLOOKUP

b. mail exchange

c. multi-homed

d. IP
Correct
Marks for this submission: 1/1.

Question 17
Marks: 1
The piece of software that accesses DNS name servers on behalf of the network client is
called a(n) ____.
Choose one answer.

a. name resolver

b. subdomain
c. primary master

d. caching server

Correct
Marks for this submission: 1/1.

Question 18
Marks: 1
Configuring how a DNS server responds to requests for name-to-address resolution where
one domain name corresponds to multiple IP addresses sits at the heart of a technique
called ____.
Choose one answer.

a. IP spoofing
b. name resolution

c. FQDN
d. DNS round robin

Correct
Marks for this submission: 1/1.

Question 19
Marks: 1
When one DNS server receives a recursive request, that DNS server issues what are called
____ to the name servers in its hierarchy, or to servers provided as pointers in reply to
earlier iterative requests, until an answer is received
Choose one answer.

a. recursive queries

b. address queries

c. domain queries

d. iterative queries

Incorrect
Marks for this submission: 0/1.

Question 20
Marks: 1
A(n) ____ record may be used to add arbitrary text information to a DNS database, usually
for documentation.
Choose one answer.

a. well-known services

b. text
c. pointer

d. host information
Correct
Marks for this submission: 1/1.

Question 21
Marks: 1
The structure of the DNS database mirrors the structure of the domain namespace itself.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 22
Marks: 1
____ store recently accessed DNS records from other domains to avoid incurring the
performance overhead involved in making a remote query each time a resource outside the
local domain is accessed.
Choose one answer.

a. Name resolvers
b. Primary DNS

servers

c. Subdomains

d. Caching servers
Correct
Marks for this submission: 1/1.

Question 23
Marks: 1
A ____ record is used to route SMTP-based e-mail on the Internet and identify the IP
address for a domain’s master e-mail server.
Choose one answer.

a. canonical name

b. mail exchange
c. name server

d. pointer
Correct
Marks for this submission: 1/1.

Question 24
Marks: 1
A(n) ____ is usually some application or service that encounters a domain name for which it
needs an IP address.
Choose one answer.

a. address request

b. TCP/IP client
c. caching server

d. DNS client
Incorrect
Marks for this submission: 0/1.

Question 25
Marks: 1
A ____ is a query that keeps working until an answer of some kind is forthcoming.
Choose one answer.

a. domain query

b. reverse query

c. recursive query
d. NSLOOKUP

query
Correct
Marks for this submission: 1/1.

Question 26
Marks: 1
It is important to understand that the zone data on a secondary server always originates
from a(n) ____ server.
Choose one answer.

a. caching
b. incremental

c. name

d. primary
Correct
Marks for this submission: 1/1.

Marks: 1
____ is defined as the time that the client begins to broadcast a renewal request for an
extended lease time from another DHCP server.
Choose one answer.

a. R1

b. T2

c. T1

d. R2

Correct
Marks for this submission: 1/1.

Question 2
Marks: 1
If no DHCP server is present in some broadcast domain, a special piece of software called
a(n)____ must be present in that broadcast domain.
Choose one answer.

a. broadcast bit

b. address pool
c. DHCP relay agent

d. address scope
Correct
Marks for this submission: 1/1.

Question 3
Marks: 1
The ____ packet includes the IP address that is offered to the client and, sometimes,
answers to the requested options in the DHCP Discover packet.
Choose one answer.

a. Acknowledgement

b. Offer

c. Request

d. Discover
Incorrect
Marks for this submission: 0/1.

Question 4
Marks: 1
____ use dynamic IP addresses because they initiate the connections to the servers, and
the servers simply respond to the clients based on the clients’ IP addresses.
Choose one answer.

a. Clients

b. Routers
c. IP gateways

d. Servers
Correct
Marks for this submission: 1/1.

Question 5
Marks: 1
When a DHCP client boots up, it performs a Standard ____ to enable it to communicate on
the network.
Choose one answer.

a. Address Discovery
b. Client Discovery

c. Router Discovery

d. Packet Discovery

Correct
Marks for this submission: 1/1.

Question 6
Marks: 1
A(n) ____ is used to assign addresses to clients or other machines when fixed IP addresses
are not required.
Choose one answer.

a. dynamic address

lease
b. manual address lease

c. IP gateway
d. discovery broadcast

Correct
Marks for this submission: 1/1.

Question 7
Marks: 1
____ is defined as the time that the client tries to renew its network address by contacting
the DHCP server that sent the original address to the client.
Choose one answer.

a. R1

b. T2

c. T1

d. R2
Correct
Marks for this submission: 1/1.

Question 8
Marks: 1
DHCP servers can manage one or more ranges of IP addresses, each of which may be
called a(n) ____.
Choose one answer.

a. address pool

b. relay agent

c. release

d. local agent
Correct
Marks for this submission: 1/1.

Question 9
Marks: 1
Microsoft Windows 2000 Server and Windows Server 2003 support the creation of a DHCP
____.
Choose one answer.

a. VoIP

b. class
c. superscope

d. router
Correct
Marks for this submission: 1/1.

Question 10
Marks: 1
One good way to troubleshoot DHCP is to use a ____.
Choose one answer.

a. relay agent
b. router

c. firewall
d. protocol analyzer

Correct
Marks for this submission: 1/1.

Question 11
Marks: 1
The ____ software, or other similar software available for most other modern operating
systems, is enabled at a client machine when you select the Obtain an IP address
automatically option in the Internet Protocol (TCP/IP) Properties window.
Choose one answer.

a. DHCP relay

agent

b. DHCP server

c. DHCP client

d. DHCP router
Incorrect
Marks for this submission: 0/1.

Question 12
Marks: 1
The ____ field contains a random number selected by the client and is used to match
requests and responses between the client and server.
Choose one answer.

a. Your IP Address

b. Hops

c. Flags
d. Transaction ID

Number
Correct
Marks for this submission: 1/1.
Question 13
Marks: 1
____ have static IP addresses because their addresses are key parts of any subnet’s IP
configuration.
Choose one answer.

a. Clients
b. Relay agents

c. Broadcast bits

d. Routers
Incorrect
Marks for this submission: 0/1.

Question 14
Marks: 1
The ____ packet is sent from the server to the client to indicate the completion of the four-
packet DHCP Discovery process.
Choose one answer.

a. Acknowledgement

b. Offer

c. Request

d. Discover
Correct
Marks for this submission: 1/1.

Question 15
Marks: 1
____ is a service that provides a way for a client computer that lacks an IP address
assignment to request one from any listening DHCP server - without the help of an
administrator.
Choose one answer.

a. TCP/IP
b. DHCP

c. BOOTP

d. PING
Correct
Marks for this submission: 1/1.

Question 16
Marks: 1
The DHCP ____ process relies heavily on broadcasts, but most routers do not forward
broadcasts.
Choose one answer.

a. discovery

b. lease

c. request

d. boot up
Incorrect
Marks for this submission: 0/1.

Question 17
Marks: 1
The ____ field contains the address being offered by the DHCP server.
Choose one answer.

a. Your IP Address

b. Hops

c. Flags
d. Transaction ID

Number
Correct
Marks for this submission: 1/1.

Question 18
Marks: 1
The job of the DHCP ____ software is to intercept address requests on a local cable
segment and repackage those requests as a unicast to one or more DHCP servers.
Choose one answer.

a. relay agent

b. cluster

c. client

d. router
Correct
Marks for this submission: 1/1.

Question 19
Marks: 1
With a(n) ____ the administrator explicitly assigns an IP address manually by associating a
client’s hardware address with a specific IP address to be leased to that client.
Choose one answer.

a. dynamic address

lease
b. manual address lease

c. IP gateway
d. discovery broadcast

Correct
Marks for this submission: 1/1.

Question 20
Marks: 1
The ____ field is set to 0 by the client and may be used by relay agents as they assist a
client in obtaining an IP address and/or configuration information.
Choose one answer.

a. Hardware

b. Hops

c. Flags
d. Transaction ID

Number
Correct
Marks for this submission: 1/1.

Question 21
Marks: 1
DHCP can exclude individual addresses or address ranges from dynamic allocation to client
machines.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 22
Marks: 1
The DHCP specification, RFC 2131, defines the default value for T1 as:
0.95 * duration_of_lease
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 23
Marks: 1
Clients ordinarily attempt to renew existing releases by default, but you can instruct a DHCP
server to deny lease renewals, or even cancel leases, when necessary.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 24
Marks: 1
____ was developed in the 1970s as a way to provide sufficient network access so diskless
workstations could access startup information across the network, instead of reading it from
a local disk drive.
Choose one answer.

a. TCP/IP
b. WINS
c. DHCP

d. BOOTP

Correct
Marks for this submission: 1/1.

A(n) ____ refers to a successful attempt to compromise a system’s security.


Choose one answer.

a. discovery

b. exploit

c. break-in
d. gateway

Incorrect
Marks for this submission: 0/1.

Question 2
Marks: 1
____ is a process of borrowing identity information, such as an IP address, domain name,
NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities.
Choose one answer.

a. Ingress filtering
b. Data authentication

c. Network sniffing

d. Spoofing
Correct
Marks for this submission: 1/1.

Question 3
Marks: 1
An attempt to snoop inside traffic moving across the Internet to look for unprotected account
and password information, or to obtain other sensitive information while it’s in transit is
called ____.
Choose one answer.

a. brute force attack

b. user impersonation

c. session hijacking

d. packet sniffing
Incorrect
Marks for this submission: 0/1.

Question 4
Marks: 1
____ is the ability to verify that the data received did in fact come from the named source.
Choose one answer.

a. Access control
b. Connectionless integrity

c. Data origin authentication

d. Confidentiality
Correct
Marks for this submission: 1/1.

Question 5
Marks: 1
A ____ is a hardened computer specifically designed to resist and oppose illicit or unwanted
attempts at entry, and whose job is to guard the boundary between internal and external
networks.
Choose one answer.

a. firewall

b. bastion host
c. DMZ
d. boundary router

Correct
Marks for this submission: 1/1.

Question 6
Marks: 1
____ is a type of software that opens the door for a compromised machine to display all
kinds of unsolicited and unwanted advertising, often of an unsavory nature.
Choose one answer.

a. SA bundle

b. Spyware

c. Adware

d. Cache
Correct
Marks for this submission: 1/1.

Question 7
Marks: 1
A(n) ____ documents a vulnerability (i.e., a weakness), usually in the context of a recipe, or
by including software tools used to mount an attack.
Choose one answer.

a. router

b. exploit

c. port
d. gateway

Correct
Marks for this submission: 1/1.

Question 8
Marks: 1
Because of TCP/IP’s optimistic security model, basic fundamental protocols offer no built-in
security controls.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 9
Marks: 1
The purpose of a(n) ____ attack is not to deny service but to masquerade to be an
authorized user so as to gain access to a system.
Choose one answer.

a. egress filtering
b. session hijacking

c. data authentication

d. network sniffing
Correct
Marks for this submission: 1/1.

Question 10
Marks: 1
A ____ is a weak spot or known place of attack on any common operating system,
application, or service.
Choose one answer.

a. back door

b. hole
c. discovery

d. hash
Correct
Marks for this submission: 1/1.

Question 11
Marks: 1
A stealthy attackermay cover its tracks by deleting log files, or terminating any active direct
connections.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 12
Marks: 1
____ means restricting who may view or use certain resources, including access to
bandwidth or a computer, as well as access to information.
Choose one answer.

a. Access control
b. Connectionless integrity

c. Data origin authentication

d. Confidentiality
Correct
Marks for this submission: 1/1.

Question 13
Marks: 1
Trying every likely or possible password for an account is called a(n) ____.
Choose one answer.

a. brute force attack

b. user impersonation

c. session hijacking

d. packet sniffing
Correct
Marks for this submission: 1/1.

Question 14
Marks: 1
____ are designed to interrupt or completely disrupt operations of a network device or
network communications.
Choose one answer.

a. Trojan horse attacks

b. Dictionary attacks

c. DoS attacks

d. Worms
Correct
Marks for this submission: 1/1.

Question 15
Marks: 1
A(n) ____ is a kind of virus that eschews most activity except as it relates to self-replication.
Choose one answer.

a. Trojan horse
b. dictionary attack

c. DoS

d. worm
Correct
Marks for this submission: 1/1.

Question 16
Marks: 1
A relatively simple software program called a(n) ____ can attempt to communicate with any
IP-based system while cycling through all valid TCP and UDP port addresses.
Choose one answer.

a. agent

b. Trojan
c. port scanner
d. socket
Correct
Marks for this submission: 1/1.

Question 17
Marks: 1
In a(n) ____ attack, the attacker is able to intercept traffic from both parties and either pass
the traffic unaltered to the other end of the communication link, or the attacker can forge
replies from either side.
Choose one answer.

a. DoS

b. brute force
c. Man-in-the middle

d. IP service
Correct
Marks for this submission: 1/1.

Question 18
Marks: 1
A function that provides ____ checks the integrity of each packet individually.
Choose one answer.

a. access control
b. connectionless integrity

c. data origin authentication

d. confidentiality
Incorrect
Marks for this submission: 0/1.

Question 19
Marks: 1
Internet Security IP implementations make it possible to encrypt and protect segments at
the Transport layer, thereby protecting the contents of all communications across the
Internet at the Transport layer.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 20
Marks: 1
Default Lock-Down allows the Windows XP or Windows Server 2003 system to be used as
a router and a network address translation (NAT) system.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 21
Marks: 1
A ____ is an undocumented and illicit point of entry into an operating system or application
added by a system’s programmers to bypass normal security.
Choose one answer.

a. back door

b. hole
c. discovery

d. hash
Correct
Marks for this submission: 1/1.

Question 22
Marks: 1
In a(n) ____ attack, a service is inundated with service requests, or malformed service
requests cause a server to hang.
Choose one answer.

a. DoS

b. brute force
c. man-in-the middle
d. IP service
Correct
Marks for this submission: 1/1.

Question 23
Marks: 1
____ is unsolicited and unwanted software that takes up stealthy unauthorized and
uninvited residence on a computer.
Choose one answer.

a. SA bundle

b. Spyware

c. Adware

d. Cache
Correct
Marks for this submission: 1/1.

Question 24
Marks: 1
A ____ is a specially, “hardened” software service, or a software/hardware product, that
erects a barrier to inspect and control traffic flow between networks.
Choose one answer.

a. firewall

b. bastion host

c. DMZ
d. boundary router

Correct
Marks for this submission: 1/1.

Question 25
Marks: 1
A ____ is an area that’s accessible to both outsiders and insiders, but which establishes a
buffer area between what’s completely inside and outside a network boundary.
Choose one answer.

a. firewall

b. bastion host

c. DMZ
d. boundary router

Correct
Marks for this submission: 1/1.

In a RIPv2 packet, the ____ field is used to define the protocol that is using RIP.
Choose one answer.

a. Authentication

b. Route Tag

c. Reserved
d. Address Family

Incorrect
Marks for this submission: 0/1.

Question 2
Marks: 1
A(n) ____ occurs on a network when ICMP is turned off and a router discards packets
without sending any notification about its actions.
Choose one answer.

a. black hole

b. agent

c. link state
d. distance vector

Correct
Marks for this submission: 1/1.

Question 3
Marks: 1
As packets travel through an internetwork, routers examine the TTL value to determine
whether the packet has enough life remaining to be forwarded.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 4
Marks: 1
Routed protocols are Layer 1 protocols that are used to get packets through an
internetwork.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 5
Marks: 1
____ use routing protocols to share information about the various networks on an
internetwork.
Choose one answer.

a. Distance vectors

b. Databases

c. Routers

d. Agents
Correct
Marks for this submission: 1/1.

Question 6
Marks: 1
To connect autonomous systems, routers use ____.
Choose one answer.

a. distance vectors
b. exterior gateway

protocols

c. agents

d. host routes
Correct
Marks for this submission: 1/1.

Question 7
Marks: 1
The Border Gateway Protocol is an example of a(n) ____.
Choose one answer.

a. distance vector

b. agent
c. exterior gateway protocol

d. host route
Correct
Marks for this submission: 1/1.

Question 8
Marks: 1
Link-state routers meet their neighbor routers through a process called the ____.
Choose one answer.

a. Hello process
b. neighborhood process

c. host process
d. inter-domain process

Correct
Marks for this submission: 1/1.

Question 9
Marks: 1
____ is one of the methods devised to speed up the process of convergence and resolve
the counting-to-infinity problem, in most cases.
Choose one answer.

a. System routing

b. Link state routing


c. On-Demand Routing

d. Split horizon
Correct
Marks for this submission: 1/1.

Question 10
Marks: 1
____ simply prevents a router from advertising a network on the same interface from which
it learned that network.
Choose one answer.

a. System routing

b. Link state routing


c. On-Demand Routing

d. Split horizon
Correct
Marks for this submission: 1/1.

Question 11
Marks: 1
In a RIPv2 packet, the ____ field can be used to associate another router with a route entry.
Choose one answer.

a. Authentication

b. Route Tag

c. Next Hop
d. Address Family

Correct
Marks for this submission: 1/1.

Question 12
Marks: 1
Mobile IP allows an IP host to travel anywhere there is a Mobile IP ____ (a router
configured with the protocol), and still maintain its home IP address.
Choose one answer.

a. split horizon

b. agent

c. host
d. distance vector

Correct
Marks for this submission: 1/1.

Question 13
Marks: 1
One of the most difficult challenges in automating the routing process is preventing ____.
Choose one answer.

a. routing loops
b. triggered updates

c. slave routers

d. host routes
Correct
Marks for this submission: 1/1.

Question 14
Marks: 1
A(n) ____ is a compilation of information about all the networks that the router can reach.
Choose one answer.

a. host
b. routing table

c. black hole

d. agent
Incorrect
Marks for this submission: 0/1.

Question 15
Marks: 1
____ can summarize routing information before sending link-state packets to other
networks.
Choose one answer.

a. Split horizons

b. Distance vectors

c. Backbone areas
d. Area border routers

Correct
Marks for this submission: 1/1.

Question 16
Marks: 1
Exterior gateway protocols (EGP) are used to exchange routing information between
separate autonomous systems.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 17
Marks: 1
A ____ routing protocol shares information about how far away all networks are to the
destination.
Choose one answer.

a. triggered
b. link-state
c. distance vector

d. split horizon
Correct
Marks for this submission: 1/1.

Question 18
Marks: 1
On each local network, OSPF uses the router IDs to establish one ____.
Choose one answer.

a. master router

b. slave router
c. database router

d. client router
Correct
Marks for this submission: 1/1.

Question 19
Marks: 1
When a router is configured with ____, it watches for traffic on its LAN that does not match
its own IP address.
Choose one answer.

a. link-state
b. Local Area Mobility

c. intra-domain routing

d. external route entry

Incorrect
Marks for this submission: 0/1.

Question 20
Marks: 1
Each RIP packet can contain information for up to ____ networks.
Choose one answer.

a. 10

b. 15

c. 20

d. 25

Correct
Marks for this submission: 1/1.

Question 21
Marks: 1
Extremely large networks can be broken down into regions called ____, which are groups of
routers under a single administrative authority.
Choose one answer.

a. agents

b. vectors
c. autonomous systems

d. protocols
Correct
Marks for this submission: 1/1.

Question 22
Marks: 1
The RIPv2 IP multicast address is ____.
Choose one answer.

a. 224.0.0.9

b. 10.32.0.0
c. 10.3.99.99

d. 220.0.00

Correct
Marks for this submission: 1/1.

Question 23
Marks: 1
In a RIPv2 packet, the ____ field contains a plain text password.
Choose one answer.

a. Authentication

b. Route Tag

c. Next Hop
d. Address Family

Correct
Marks for this submission: 1/1.

Question 24
Marks: 1
Exterior gateway routers periodically multicast summaries of their link-state databases on
directly connected links.
Answer:

True False
Correct
Marks for this submission: 1/1.

Question 25
Marks: 1
In a RIPv2 packet, the ____ field can be used to indicate whether the route information that
follows is an internal route entryor an external route entry.
Choose one answer.

a. Authentication

b. Route Tag
c. Reserved
d. Address Family

Correct
Marks for this submission: 1/1.

You might also like