Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Question
a. broadcast f. unicastb. datagram g. stateless autoconfiguration
c. fragmentation h. network identifier
d. multicast i. Multicast Listener Discovery
e. scopes j. Network Address Translation
1. a discrete chunk of information; each datagram contains source and destination addresses, control settings, and data
2. unicast addresses used in IPv6 to identify the application suitable for the address
3. the part of an IP address that a computer has in common with other computers in its subnet
4. a process by which internal hosts are assigned private IP addresses and communicate with the Internet using a public address
5. a transmission used for one-to-many communication, in which a single host can send packets to a group of recipients
6. a transmission in which one packet is sent from a server to each client that requests a file or application
7. enables IPv6 routers to discover multicast listeners on a directly connected link and to decide which multicast addresses are of interest to those nodes
8. a communication sent to all hosts on a specific network
9. a feature of IPv6 in which a computer can connect to a network by determining its own IP address based on the addressing of neighboring nodes
10. the division of packets into smaller sizes to accommodate routers with frame size limitations
Answer
This answer is hidden. It contains 40 characters.
Related questions
Q:
Which of the following is true about encryption algorithms?a. their strength is tied to their key length b. not vulnerable to brute force attacks c. block ciphers encrypt one bit at a timed. asymmetric algorithms use a single key
Q:
Describe antispoofing logging and how you can prevent it with ACLs.
Q:
Define route summarization.
Q:
What is a distance-vector routing protocol? Give one example.
Q:
Rather than using classful routing, ________________ subnet masks allow you to divide your network into different sizes to make better use of available addresses.
Q:
An ARP broadcast is sent to the local subnet in an attempt to discover the destination computer's ______________ address.
Q:
During the routing process, the router strips off ______________________ layer header information and then examines the Network layer address.
Q:
Which of the following is true about ACLs on Cisco routers?a. there is an implicit deny any statement at the end of the ACL b. there is an explicit permit any statement at the beginning of the ACL c. ACLs are processed in reverse order so place high priority statements lastd. ACLs bound to an interface apply to inbound and outbound traffic by default
Q:
Which of the following makes routing tables more efficient?a. route summarization c. CIDRb. VLSM d. host routing
Q:
Some methods of attacking a Cisco router do not require knowledge of the IOS version, so software patching is recommended.
Q:
Describe in detail the first three packets you would see in an FTP session between client 192.168.1.132 and server 192.168.1.110; include port numbers, flags, and any other pertinent options that would be set.
Q:
What is the sequence of packets for a successful three-way handshake?a. SYN, ACK, ACK c. SYN, SYN ACK, ACKb. SYN, SYN ACK, RST d. SYN, ACK, FIN
Q:
Which TCP flag can be the default response to a probe on a closed port?a. RST c. PSHb. URG d. SYN
Q:
What is the term used when an IDPS doesn"t recognize that an attack is underway?a. false negative c. negative activityb. true positive d. positive signature
Q:
Newer Trojans listen at a predetermined port on the target computer so that detection is more difficult.
Q:
Describe the three-way handshake.
Q:
List three reasons an administrator would want to use subnetting.
Q:
What are the three private IP address ranges and their associated subnet masks?
Q:
List the three classes of IP address that can be assigned to network devices and their corresponding first octet range of values.
Q:
List the seven layers of the OSI model.
Q:
The ____________ command shows current sessions with associated port numbers.
Q:
________________ IPv6 addresses are used for one-to-one or one-to-many communication.
Q:
The ______________________ is the part of the IP address that is the same among computers in a network segment.
Q:
DNS operates at the _________________ layer of the OSI model.
Q:
Which of the following is a valid IPv6 address?a. 5BA4:2391:0:0:4C3E b. 1080::8:800:200C:417A c. 24::5B1A::346Cd. 5510:ABCD::34:1::2
Q:
How large is the IPv6 address space?a. 32 bits b. 128 bits c. 64 bitsd. 168 bits
Q:
Which of the following is the first packet sent in the TCP three-way handshake?a. RST b. SYN c. ACKd. PSH
Q:
Which of the following is a reason that UDP is faster than TCP?
a. it doesn"t use port numbers c. the header is smaller
b. it has a higher priority on the network d. it doesn"t guarantee delivery
Q:
What is the TCP portion of a packet called?a. frame b. data c. segmentd. header
Q:
Which of the following is considered a flooded broadcast IP address?a. 200.15.6.255 b. 10.255.255.255 c. 255.255.255.255d. FFFF.FFFF.FFFF