Docstoc

Chapter 4 Questions – Panko

Document Sample
Chapter 4 Questions – Panko Powered By Docstoc
					Chapter 8 Questions – TCP/IP Internet Working
1.      Rank the types of routers based on their location from most peripheral to most
central from the viewpoint of the Internet.
        a.     Edge router, core router, internal router
        b.     Internal router, core router, edge router
        c.     Core router, internal router, edge router
        d.     Edge router, internal router, core router
        e.     Internal router, edge router, core router

       Reference: p. 244

2.     Routers are capable of connecting networks that use dissimilar _____ layer
standards.
       a.     Physical
       b.     Data link
       c.     Physical and data link
       d.     Physical data link and internet

       Reference: p. 244

3.     Which statement is INCORRECT regarding routers.
       a.    Routers can connect LANs that use different types of media.
       b.    Routers are less complicated devices to use than switches.
       c.    Routers can connect LANs that use different Data Link Layer standards.
       d.    Routers can be connected so that more than one path exists between any
             two points on a network.
       e.    Routers have the ability to reroute packets around trunk line failures.

       Reference: p. 244

4.     Multiprotocol routers receive their name because they handle multiple TCP/IP
protocols.
       a.     True
       b.     False

       Reference: p. 247

5.     An IP address is 64.7.12.6. The network plus subnet parts are _____.
       a.     64
       b.     64.7
       c.     64.7.12
       d.     64.7.12.6
       e.     Cannot say.



                                                                                         1
      Reference: p. 249

6.    Which part of the IP address of servers at your school/company will be the same?
      a.    Subnet
      b.    PPP
      c.    Host
      d.    POP
      e.    Network

      Reference: p. 249

7.    The first 16 bits of an IP address identifies the network portion of the address.
      a.      True
      b.      False

      Reference: p. 249

8.    Select the MOST correct statement about IP addresses.
      a.      The host portion must appear first.
      b.      The host portion must appear last.
      c.      The host portion must appear first and must contain 16 bits.
      d.      The host portion must appear last and must contain 16 bits.
      e.      The host portion is optional.

      Reference: p. 249

9.    Select the incorrect statement.
      a.      MAC addresses within a network are unrelated to each other.
      b.      MAC addresses are meaningless when divided up into separate parts.
      c.      IP addresses are longer than MAC addresses.
      d.      IP addresses within a network are hierarchical.
      e.      IP addresses can be thought of as being made up of three separate parts.

      Reference: p. 249

10.   If a mask of 255.0.0.0 is applied to network address 134.126.50.10 the result will
be:
      a.     134.0.0.0.
      b.     134.26.0.0.
      c.     134.126.50.0.
      d.     134.126.50.10.
      e.     255.0.0.0.

      Reference: p. 252




                                                                                           2
11.    What must be done to allow IP addresses to be useful to make routing decisions?
       a.    The IP addresses must be filtered.
       b.    The IP addresses must be masked.
       c.    The IP address must be broken down into its subparts.
       d.    The IP address must be mapped to a specific MAC address.
       e.    The IP address must be converted to a MAC address.

       Reference: p. 251

12.    IP routing tables contain information that allows a router to:
       a.      decide alternative paths for packets that have been blocked due to
               congestion.
       b.      decide alternative paths for packets that have been blocked due to
               inoperable portions of the network.
       c.      decide which router or local network to send the packet to.
       d.      discard multiple occurrences of packets which have arrived from multiple
               sources.

       Reference: p. 251

13.    Routers on a network use _____ to share routing information with each other.
       a.     IP packets
       b.     routing protocols
       c.     masks
       d.     masking protocols
       e.     subnets

       Reference: p. 253

14.    How often does a router make routing decisions?
       a.    Once for each and every packet that it receives.
       b.    Once for each group of packets that it receives with the same source and
             destination addresses.
       c.    Once for each group of packets it receives with the same source address.
       d.    Once for each group of packets it receives with the same destination
             address.

       Reference: p.253

15.     Routing tables must be carefully constructed so that only one potential route
exists between a router and a destination host.
        a.     True
        b.     False

       Reference: p. 255



                                                                                         3
16.     The default row contained in a routing table usually is the best match for an
arriving packet.
        a.     True
        b.     False

       Reference: p. 256

17.   The default row in a routing table is the row that a router selects when no other
row matches an IP packet.
      a.     True
      b.     False

       Reference: p. 256

18.    If two rows of the routing table match an IP address, the router:
       a.      picks the default row.
       b.      sends the packet to the address in the row with the longest match.
       c.      discards the packet as an error.
       d.      sends half of all such packets as guided by each row.

       Reference: p. 256

19.    When using a metric value in a routing table the router:
       a.    selects the matching row with the highest metric.
       b.    selects the matching row with the lowest metric.
       c.    selects the matching row with either the highest or lowest metric based
             upon the packet’s contents.
       d.    selects the matching row with either the highest or lowest metric based
             upon how the router is programmed.
       e.    selects the matching row whose metric has the lowest absolute value.

       Reference: p. 257

20.    An important distinction between switching tables and routing tables is that:
       a.    multiple matches in switching tables represent equal alternatives; multiple
             matches in routing tables are differentiated by metrics.
       b.    switching tables can have at most one match; routing tables can have
             many.
       c.    switching tables are constantly changing; routing tables are static.
       d.    the switching decision requires that all entries in the switching table be
             examined; the routing decision is made once a match is found in a routing
             table.

       Reference: p. 250




                                                                                          4
21.    Domain Name System servers organize domain information using a hierarchy.
       a.    True
       b.    False

       Reference: p. 259

22.    An example of a second-level domain name is:
       a.    134.126.
       b.    134.126.15.11.
       c.    whitehouse.gov.
       d.    .com.
       e.    info.whitehouse.gov.

       Reference: p. 259

23.   If you send a DNS server a request message, it will return the corresponding
_________.
      a.      IP address
      b.      host name
      c.      IP address or host name
      d.      IP address, number of hops needed for a packet to reach the site
      e.      Host name, number of hops needed for a packet to reach the site

       Reference: p. 259

24.    When a router encounters an error in an IP header it:
       a.    returns the packet to the sending router.
       b.    returns the packet to the sending router with an error advisement.
       c.    discards the packet.
       d.    discards the packet and returns an error advisement.
       e.    discards the packet, returns an error advisement, and requests a
             retransmission.

       Reference: p. 261

25.    To diagnose which router has failed in a network, a network administrator might
send ICMP _____ messages.
       a.     error advisement
       b.     echo
       c.     flow control
       d.     Get
       e.     RSVP

       Reference: p. 261




                                                                                         5
26.    The most important improvement of IPv6 over IPv4 is support for:
       a.    error detection and correction.
       b.    longer domain names.
       c.    more possible IP addresses.
       d.    faster network transmission speeds.

       Reference: p. 262

27.    IPv6 represents the _____ operational generation of the IP standard.
       a.     first
       b.     second
       c.     fourth
       d.     sixth

       Reference: p. 262

28.    IPv6 addresses will be used more heavily in _____.
       a.     the United States
       b.     Asia

       Reference: p. 262

29.    _____ and ____ are both unreliable.
       a.     IP, UDP
       b.     IP, TCP
       c.     UDP, TCP

       Reference: p. 265, 269

30.    IP is an unreliable protocol. This is _____.
       a.      good
       b.      bad

       Reference: p. 265

31.    TCP is an unreliable protocol.
       a.     True
       b.     False

       Reference: p. 265

32.    Host A sends to Host B. There is an error in the transmission. Which transport
process decides to retransmit the damaged TCP segment?
       a. The transport process on Host A
       b. The transport process on Host B



                                                                                        6
      Reference: p. 267

33.   When does TCP decide to retransmit a segment?
      a.    When it does not receive an acknowledgement from the receiver.
      b.    Never; TCP is not capable of retransmitting segments.
      c.    When the receiver requests a retransmission due to a lost segment.
      d.    When it does not receive an acknowledgment from the corresponding TCP
            router process.
      e.    When a TCP connection is not properly closed.

      Reference: p. 267

34.   ______ is an application that would most likely use UDP.
      a.    E-mail
      b.    Web surfing
      c.    Credit card authorization
      d.    Data file transfers
      e.    Voice communications

      Reference: p. 269

35.   UDP is an unreliable protocol.
      a.    True
      b.    False

      Reference: p. 269

36.   Which of the following protocols does NOT operate at the Transport layer?
      a.    IP
      b.    TCP
      c.    UDP

      Reference: p. 268

37.   TCP messages are called ________; UDP messages are called _________.
      a.   packets, frames
      b.   frames, packets
      c.   segments, datagrams
      d.   datagrams, segments
      e.   packets, packets

      Reference: p. 268

38.   Port numbers exist in:
      a.     IP.
      b.     UDP.


                                                                                  7
      c.     TCP.
      d.     TCP and UDP.
      e.     IP, UDP, and TCP.

      Reference: p. 269

39.   When a client transmits, the source port number is a(n) _____ number.
      a.    well-known
      b.    ephemeral
      c.    private
      d.    public

      Reference: p. 269

40.   Incoming TCP port numbers are used by servers to:
      a.    prioritize service requests based upon who the requestor is.
      b.    route service requests to specific applications.
      c.    identify and make decisions based upon the requestor’s actual IP address.
      d.    map or translate domain names to domain addresses.
      e.    identify and make decisions based upon the requestor’s actual MAC
            address.

      Reference: p. 269

41.   Sockets are:
      a.     groups of ports providing similar services.
      b.     used to reference a range of ports on a server.
      c.     notations for a combined IP address and port number.
      d.     a way to allow multiple users to access a particular port at the same time.

      Reference: p. 269

42.   Layer 3 switches are a special type of switch because they:
      a.     operate in physical environments that will not allow routers.
      b.     only handle voice traffic.
      c.     perform switching based upon IP addresses instead of MAC addresses.
      d.     perform MAC-IP address translation.

      Reference: p. 270

43.   Layer 3 switches are limited because of their:
      a.     inability to match routers in speed.
      b.     inability to handle many protocols.
      c.     high purchase cost when compared to routers.
      d.     All of the above.



                                                                                           8
      Reference: p. 271

44.   What added capabilities do Layer 4 switches have over Layer 3 switches?
      a.    They can make decisions based upon port information contained in the
            incoming packet.
      b.    They can prioritize decisions based upon the MAC address of the
            incoming packet.
      c.    They offer switching speeds that are roughly twice those offered by Level
            3 switches.
      d.    They offer redundant switching tables that they exchange with
            neighboring Level 4 switches to minimize problems caused by power or
            hardware outages.
      e.    They provide network monitoring devices with updated traffic information
            in a standardized format.

      Reference: p. 272




                                                                                    9

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:12
posted:9/4/2012
language:English
pages:9