Quiz-9 - QUIZ PDF

Title Quiz-9 - QUIZ
Author Harper Luu
Course Philosophy of Science
Institution San José State University
Pages 21
File Size 138.2 KB
File Type PDF
Total Downloads 89
Total Views 144

Summary

QUIZ...


Description

Business Data Networks and Security, 11e (Panko) Chapter 9 TCP/IP Internetworking II 1) If your subnet part is 8 bits long, you can have ________ subnets. A) 64 B) 128 C) 256 D) 254 Answer: D Difficulty: Basic Question: 1a Objective: Explain IPv4 subnetting. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 2) If your subnet part is 7 bits long, how many subnets can you have? A) 128 B) 256 C) 512 D) none of the above Answer: D Difficulty: Deeper Question: 1b Objective: Explain IPv4 subnetting. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 3) Your subnet part is 8 bits long. How many hosts can you have per subnet? A) 8 B) 14 C) 254 D) none of the above Answer: C Difficulty: Basic Question: 2d Objective: Explain IPv4 subnetting. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 4) In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be? A) 6 B) 7 C) 8 D) none of the above Answer: C Difficulty: Deeper Question: 2a Objective: Explain IPv4 subnetting.

AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 5) Your firm has an 8-bit network part. If you need at least 200 subnets, what must your subnet part size be? A) 5 B) 6 C) 7 D) 8 Answer: D Difficulty: Deeper Question: 2b Objective: Explain IPv4 subnetting. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 6) You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet? A) 15 B) 16 C) 254 D) none of the above Answer: C Difficulty: Deeper Question: 2c Objective: Explain IPv4 subnetting. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 7) Your firm has a 22-bit network part. What subnet part would you select to give at least 10 subnets? A) 2 bits B) 3 bits C) 4 bits D) none of the above Answer: C Difficulty: Deeper Question: 2e Objective: Explain IPv4 subnetting. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge

8) Your firm has a 22-bit network part and a 6-bit subnet part. How many hosts can you have per subnet? A) 6 B) 8 C) 14 D) none of the above Answer: C Difficulty: Deeper Question: 2f Objective: Explain IPv4 subnetting. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 9) Which is NOT one of the three parts of a public IPv6 unicast address? A) subnet ID B) routing prefix C) host part D) All of the above are parts in a public IPv6 unicast address. Answer: C Difficulty: Basic Question: 3a Objective: Explain IPv6 subnetting. AACSB: Applying Information Technology, Application of Knowledge 10) The routing prefix in IPv6 is like the ________ part in an IPv4 address. A) network B) subnet C) host D) both A and B Answer: A Difficulty: Basic Question: 3a Objective: Explain IPv6 subnetting. AACSB: Applying Information Technology, Application of Knowledge 11) What field in an IPv6 global unicast address corresponds to the subnet part of an IPv4 address? A) global routing prefix B) subnet ID C) interface ID D) none of the above Answer: B Difficulty: Basic Question: 3b Objective: Explain IPv6 subnetting. AACSB: Applying Information Technology, Application of Knowledge 12) a in an IPv6 address is 32 bits, how long is the routing prefix?

A) 16 bits B) 32 bits C) 64 bits D) none of the above Answer: B Difficulty: Basic Question: 3c Objective: Explain IPv6 subnetting. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 13) In a large company, you want ________. A) as big a routing prefix as you can have B) a medium-size routing prefix C) as small a routing prefix as you can have D) The size of the routing prefix is of no importance. Answer: C Difficulty: Deeper Question: 3d Objective: Explain IPv6 subnetting. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 14) If your routing prefix is 16 bits, how long is your subnet ID? A) 16 bits B) 32 bits C) 48 bits D) not possible to caculate Answer: C Difficulty: Basic Question: 3e Objective: Explain IPv6 subnetting. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 15) The part of an IPv6 global unicast address that designates the host is called the ________. A) host part B) interface ID C) routing prefix D) none of the above Answer: B Difficulty: Basic Question: 4a Objective: Explain IPv6 subnetting. AACSB: Applying Information Technology, Application of Knowledge 16) in global unicast address, the interface ID is ________ bits long. A) 8 B) 16 C) 64

D) Its size varies. Answer: C Difficulty: Basic Question: 4b Objective: Explain IPv6 subnetting. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 17) The IEEE calls a 64-bit interface addresses that it designed a(n) ________ address. A) Extended Unique Identifier-64 B) Interface ID C) MAC address D) IP address Answer: A Difficulty: Basic Question: 4c Objective: Explain IPv6 subnetting. AACSB: Applying Information Technology 18) A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center. A) the interface ID B) the subnet ID C) fffe D) 0000 Answer: C Difficulty: Deeper Question: 4c Objective: Explain IPv6 subnetting. AACSB: Applying Information Technology, Application of Knowledge 19) Convert the following EUI-48 address to a modified EUI-64 address: AA-00-00-FF-FF-00. A) aa00:ff:feff:ff0 B) ae00:ff:feff:ff0 C) aa00:00ff:feff:ff0 D) ae00:00ff:feff:ff0 Answer: D Difficulty: Deeper Question: 4c Objective: Explain IPv6 subnetting. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 20) ________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm. A) DNS B) NAT C) DHCP D) none of the above

Answer: B Difficulty: Basic Question: 6a Objective: Explain Network Address Translation (NAT). AACSB: Applying Information Technology 21) In NAT, the ________ creates new external source IP addresses and port numbers. A) router B) firewall C) source host D) destination host Answer: B Difficulty: Basic Question: 6a Objective: Explain Network Address Translation (NAT). AACSB: Applying Information Technology, Application of Knowledge 22) NAT ________. A) allows a firm to have more internal IP addresses B) provides some security C) both A and B D) neither A nor B Answer: C Difficulty: Basic Question: 6b Objective: Explain Network Address Translation (NAT). AACSB: Applying Information Technology, Application of Knowledge 23) NAT ________. A) allows a firm to have more internal IP addresses B) reduces cost C) both A and B D) neither A nor B Answer: A Difficulty: Basic Question: 6b Objective: Explain Network Address Translation (NAT). AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 24) NAT enhances security by ________. A) preventing sniffers from learning internal IP addresses B) encryption C) both A and B D) neither A nor B Answer: A Difficulty: Basic Question: 6c

Objective: Explain Network Address Translation (NAT). AACSB: Applying Information Technology, Application of Knowledge 25) Which of the following is a private IP address range? A) 10.x.x.x B) 128.171.x.x C) both A and B D) neither A nor B Answer: A Difficulty: Deeper Question: 6e Objective: Explain Network Address Translation (NAT). AACSB: Applying Information Technology, Application of Knowledge 26) Which of the following IPv4 addresses would be used for Internet transmission? A) 10.x.x.x B) 128.171.x.x C) both A and B D) neither A nor B Answer: B Difficulty: Deeper Question: 6e Objective: Explain Network Address Translation (NAT). AACSB: Applying Information Technology, Application of Knowledge 27) For an internal client to use NAT to communicate with an external webserver, the client must be configured to do so. Answer: FALSE Difficulty: Basic Question: 6f Objective: Explain Network Address Translation (NAT). AACSB: Applying Information Technology, Application of Knowledge 28) NAT is transparent to all applications. Answer: FALSE Difficulty: Basic Question: 6g Objective: Explain Network Address Translation (NAT). AACSB: Applying Information Technology, Application of Knowledge 29) If your local DNS server does not know the host name of an IP address, it will get the address from a(n) ________. A) root DNS server B) proxy DNS server C) authoritative DNS server D) none of the above Answer: C

Difficulty: Basic Question: 7a Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology, Application of Knowledge 30) If the local DNS server does not know an IP address and must contact a remote DNS server, which DNS server will return the response to the client? A) the local DNS server B) the remote DNS server C) either A or B D) No IP address will be returned to the client. Answer: A Difficulty: Deeper Question: 7b Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 31) The domain name system ________. A) is a way to find a host's IP addresses if your computer only knows the host's host name B) is a general naming system for the Internet C) both A and B D) neither A nor B Answer: C Difficulty: Basic Question: 8a Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology, Application of Knowledge 32) ________ is a general naming system for the Internet. A) NAT B) DNS C) DHCP D) Dotted decimal notation Answer: B Difficulty: Basic Question: 8a Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology, Application of Knowledge 33) In DNS, a group of resources under the control of an organization is called a ________. A) network B) subnet C) scope D) domain Answer: D Difficulty: Basic Question: 8b

Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology 34) ".com" is a ________. A) root domain B) top-level domain C) second-level domain D) none of the above Answer: B Difficulty: Basic Question: 8c Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology, Application of Knowledge 35) ".edu" is a ________. A) root domain B) top-level domain C) second-level domain D) none of the above Answer: B Difficulty: Basic Question: 8c Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology, Application of Knowledge 36) Which is a type of top-level domain? A) generic TLD B) specific TLD C) both A and B D) neither A nor B Answer: A Difficulty: Basic Question: 8d Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology, Application of Knowledge

37) Corporations wish to have ________ domain names. A) top-level B) second-level C) third-level D) none of the above Answer: B Difficulty: Basic Question: 8e Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 38) The highest-level DNS servers are called ________. A) root servers B) top-level domain servers C) both A and B D) neither A nor B Answer: A Difficulty: Basic Question: 8f Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology, Application of Knowledge 39) Companies get second-level domains from ________. A) the IETF B) domain registrars C) the Internet Society D) the United States Government Answer: B Difficulty: Basic Question: 8g Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology 40) A company has a domain name. What else must it have before it can make a website available to the public? A) a DNS server to host its domain name B) the website itself C) both A and B D) neither A nor B Answer: C Difficulty: Basic Question: 8h Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology, Application of Knowledge

41) For a particular domain name, a DNS server will have ________. A) a single record B) multiple records C) two records—one for IPv4 and one for IPv6. D) all of the above Answer: B Difficulty: Deeper Question: 9a Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology, Application of Knowledge 42) The DNS ________ record is for the host name's ________ address A) A; IPv4 B) A; IPv6 C) AAAA; IPv4 D) none of the above Answer: A Difficulty: Basic Question: 9b Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 43) The DNS ________ record is for the host name's ________ address A) AAAA; IPv4 B) AAAA; IPv6 C) both A and B D) neither A nor B Answer: B Difficulty: Basic Question: 9c Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 44) A DHCP server provides a client with ________. A) one or more IP addresses for it to use B) the IP address of one or more DNS servers C) both A and B D) neither A nor B Answer: C Difficulty: Deeper Question: 10a Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology, Application of Knowledge

45) An advantage of using DHCP to configure clients is that ________. A) the configuration information will be up-to-date B) the configuration will be done securely C) both A and B D) neither A nor B Answer: A Difficulty: Basic Question: 10b Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2. AACSB: Applying Information Technology, Application of Knowledge 46) In SNMP, the manager communicates directly with a(n) ________. A) managed device B) agent C) object D) access point Answer: B Difficulty: Basic Question: 11a Objective: Describe the SMTP object model. AACSB: Applying Information Technology 47) Which of the following would be an SNMP object? A) number of rows in routing table B) a managed switch C) both A and B D) neither A nor B Answer: A Difficulty: Deeper Question: 11a Objective: Describe the SMTP object model. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 48) Which of the following would be an SNMP object? A) number of rows in routing table B) system uptime (since last reboot) C) both A and B D) neither A nor B Answer: C Difficulty: Basic Question: 11a Objective: Describe the SMTP object model. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge

49) Which of the following would be an SNMP interface object? A) number of rows in routing table B) whether the interface is undergoing testing C) both A and B D) neither A nor B Answer: B Difficulty: Deeper Question: 11a Objective: Describe the SMTP object model. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 50) In SNMP, companies are often reluctant to use ________ commands because of security dangers. A) Get B) Set C) Trap D) Request Answer: B Difficulty: Basic Question: 11c Objective: Describe the SMTP object model. AACSB: Applying Information Technology 51) Good security is an enabler if a company wishes to use SNMP ________ commands. A) Get B) Set C) Trap D) Reset Answer: A Difficulty: Basic Question: 11d Objective: Describe the SMTP object model. AACSB: Applying Information Technology, Application of Knowledge 52) Dynamic ________ protocols allow routers to transmit routing table information to one another. A) routing B) transport C) synchronization D) none of the above Answer: A Difficulty: Basic Question: 12a Objective: Describe Dynamic Routing Protocols. AACSB: Applying Information Technology

53) ________ is an interior dynamic routing protocol. A) OSPF B) BGP C) both A and B D) neither A nor B Answer: A Difficulty: Basic Question: 12b Objective: Describe Dynamic Routing Protocols. AACSB: Applying Information Technology, Application of Knowledge 54) A company is free to select whatever ________ dynamic routing protocol it wishes. A) interior B) exterior C) both A and B D) neither A nor B Answer: A Difficulty: Basic Question: 12b Objective: Describe Dynamic Routing Protocols. AACSB: Applying Information Technology, Application of Knowledge 55) Which of the following can route non-IP packets? A) OSPF B) EIGRP C) both A and B D) neither A nor B Answer: B Difficulty: Basic Question: 12c Objective: Describe Dynamic Routing Protocols. AACSB: Applying Information Technology 56) You need to use EIGRP if ________. A) you have TCP/IP traffic exclusively B) some of your traffic is TCP/IP traffic C) both A and B Answer: B Difficulty: Basic Question: 12d Objective: Describe Dynamic Routing Protocols. AACSB: Applying Information Technology, Application of Knowledge

57) A company is free to select its ________. A) interior dynamic routing protocol B) exterior dynamic routing protocol C) both A and B D) neither A nor B Answer: A Difficulty: Basic Question: 12e Objective: Describe Dynamic Routing Protocols. AACSB: Applying Information Technology 58) The almost-universal exterior dynamic routing protocol is ________. A) EIGRP B) OSPF C) both A and B D) neither A nor B Answer: D Difficulty: Basic Question: 12f Objective: Describe Dynamic Routing Protocols. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 59) In the Border Gateway Protocol, "gateway" means ________. A) firewall B) switch C) router D) none of the above Answer: C Difficulty: Basic Question: 12g Objective: Describe Dynamic Routing Protocols. AACSB: Applying Information Technology 60) ICMP is used for ________. A) error messages B) configuration messages C) routing messages D) none of the above Answer: A Difficulty: Basic Question: 13a Objective: Describe the Internet Control Message Protocol. AACSB: Applying Information Technology, Application of Knowledge

61) Ping is for ________ messages. A) error advisory B) supervisory C) both A and B Answer: B Difficulty: Basic Question: 13b Objective: Describe the Internet Control Message Protocol. AACSB: Applying Information Technology, Application of Knowledge 62) Pinging is to send ICMP ________ messages to the target host. A) echo request B) error advisement C) ping D) echo Answer: A Difficulty: Deeper Question: 13c Objective: Describe the Internet Control Message Protocol. AACSB: Applying Information Technology, Application of Knowledge 63) What security concern do ICMP echo request messages and echo response messages bring? A) attackers can disable the other host B) attackers can learn that the other host's IP address is in use C) attackers can change the other host's IP address D) all of the above. Answer: B Difficulty: Basic Question: 13d Objective: Describe the Internet Control Message Protocol. AACSB: Applying Information Technology, Application of Knowledge 64) IPsec protects ________ layer content. A) data link B) application C) both A and B D) neither A nor B Answer: B Difficulty: Basic Question: 14a Objective: Describe basic concepts in IP security. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge

65) Which of the following is more widely used? A) ESP B) AH C) Both are about equally widely used. Answer: A Difficulty: Basic Question: 14b Objective: Describe basic concepts in IP security. AACSB: Applying Information Technology, Application of Knowledge 66) Which protects more of the original IP packet? A) transport mode B) tunnel mode C) Both provide the same protection to the IP packet. Answer: B Difficulty: Basic Question: 14d Objective: Describe basic concepts in IP security. AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 67) IPsec is used for...


Similar Free PDFs