Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Design
Q:
Companies use carriers for WAN transmission because ________.
A) companies lack rights of way
B) carriers have extremely strong security
C) both A and B
D) neither A nor B
Q:
A WAN is the network that ________.
A) links different sites together
B) provides service within about a mile
C) provides service within a site
D) all of the above
Q:
A LAN is the network that ________.
A) links different sites together
B) provides service within a company
C) provides service within a site
D) all of the above
Q:
A network that runs on the customer premises is a ________.
A) LAN
B) WAN
C) both A and B
D) neither A nor B
Q:
Pinging is to send ICMP ________ messages to the target host.
A) echo request
B) error advisement
C) ping
D) echo
Q:
To see if a target host can be reached, you normally would send it an ICMP ________ message.
A) echo request
B) error advisement
C) either A or B
D) neither A nor B
Q:
IP is reliable because of ________.
A) echo and echo reply messages
B) error advisement messages
C) both A and B
D) neither A nor B
Q:
________ is used for supervisory messages at the internet layer.
A) TCP
B) DNS
C) DHCP
D) ICMP
Q:
________ is an interior dynamic routing protocol.
A) OSPF
B) BGP
C) both A and B
D) neither A nor B
Q:
Which of the following can route non-IP packets?
A) OSPF
B) EIGRP
C) both A and B
D) neither A nor B
Q:
A company is free to select whatever ________ dynamic routing protocol it wishes.
A) interior
B) exterior
C) both A and B
D) neither A nor B
Q:
Dynamic ________ protocols allow routers to transmit routing table information to one another.
A) routing
B) transport
C) synchronization
D) none of the above
Q:
A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center.
A) the interface ID
B) the subnet ID
C) fffe
D) 0000
Q:
The IEEE calls 64-bit interface addresses ________.
A) Extended Unique Identifiers
B) Interface IDs
C) MAC addresses
D) half-IP
Q:
In an IPv6 global unicast address, the interface ID is ________ bits long.
A) 32
B) 64
C) 128
D) It varies.
Q:
The part of an IPv6 global unicast address that designates the host is called the ________.
A) host part
B) interface ID
C) routing prefix
D) none of the above
Q:
If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?
A) 16 bits
B) 32 bits
C) 64 bits
D) none of the above
Q:
The routing prefix in IPv6 is like the ________ part in an IPv4 address.
A) network
B) subnet
C) host
D) both A and B
Q:
Which is NOT one of the three parts of a public IPv6 unicast address?
A) subnet ID
B) routing prefix
C) host part
D) All of the above are parts in a public IPv6 unicast address.
Q:
Today, it can be problematic to have only a single IPv6 stack because ________.
A) a single IPv4 stack is out of date
B) a single IPv6 stack could not communicate with a single IPv4 stack
C) a dual stack has become a common solution
D) all of the above
Q:
If a host is to be able to communicate via IPv4 and IPv6, it is said to ________.
A) be bilingual
B) have a dual-stack
C) be IPv6-ready
D) be IP-agile
Q:
Which has stronger security?
A) SSL/TLS
B) IPsec
C) Both have about equal security.
Q:
Which is less expensive to implement?
A) SSL/TLS
B) IPsec
C) Both cost about the same to implement.
Q:
Which of the following standards permits central management?
A) IPsec
B) SSL/TLS
C) both A and B
D) neither A nor B
Q:
In IPsec, agreements about how security will be done are called ________.
A) tranches
B) security contracts
C) service-level agreements
D) security associations
Q:
IPsec is used for ________ VPNs.
A) remote-access
B) site-to-site
C) both A and B
D) neither A nor B
Q:
Client PCs must have digital certificates in ________.
A) transport mode
B) tunnel mode
C) both A and B
D) neither A nor B
Q:
The main disadvantage of transport mode protection compared to tunnel mode protection in IP is ________.
A) that it provides protection over only part of the route
B) higher cost
C) both A and B
D) neither A nor B
Q:
Which mode of IPsec may be more expensive if a company has a large number of computers?
A) transport mode
B) tunnel mode
C) Both A and B are equally expensive.
Q:
The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is ________.
A) protection over only part of the route
B) higher cost
C) both A and B
D) neither A nor B
Q:
IPsec provides protection in two modes of operation; one of these two modes is ________.
A) transport mode
B) data link mode
C) network mode
D) 802.1X mode
Q:
In tunnel mode, IPsec provides protection ________.
A) all the way between the two hosts
B) only between the IPsec servers
C) both A and B
D) neither A nor B
Q:
IPsec protects ________ layer messages.
A) data link
B) application
C) both A and B
D) neither A nor B
Q:
SNMPv3 uses ________ for authentication.
A) community names
B) digital certificates and digital signatures
C) a different password for each manager-agent pair
D) all of the above
Q:
SNMPv1 uses ________ for authentication.
A) community names
B) digital certificates and digital signatures
C) a different password for each manager-agent pair
D) all of the above
Q:
In SNMP, companies are often reluctant to use ________ commands because of security dangers.
A) Get
B) Set
C) trap
D) request
Q:
Which of the following would be an SNMP object?
A) number of rows in routing table
B) system uptime (since last reboot)
C) both A and B
D) neither A nor B
Q:
Which of the following would be an SNMP object?
A) number of rows in routing table
B) a managed switch
C) both A and B
D) neither A nor B
Q:
In SNMP, the manager communicates directly with a(n) ________.
A) managed device
B) agent
C) object
D) access point
Q:
A company receives its domain name from ________.
A) IETF
B) its ISP
C) a domain registrar
D) its parents
Q:
How many DNS root servers are there?
A) 1
B) 2
C) 10
D) 13
Q:
The highest-level DNS servers are called ________.
A) root servers
B) top-level servers
C) both A and B
D) neither A nor B
Q:
Most corporations wish to have ________ domain names.
A) top-level
B) second-level
C) third-level
D) none of the above
Q:
".edu" is a ________.
A) root domain
B) top-level domain
C) second-level domain
D) none of the above
Q:
".com" is a ________.
A) root domain
B) top-level domain
C) second-level domain
D) none of the above
Q:
In DNS, a group of resources under the control of an organization is called a ________.
A) network
B) subnet
C) scope
D) domain
Q:
________ is a general naming system for the Internet.
A) NAT
B) DNS
C) DHCP
D) Dotted decimal notation
Q:
The domain name system ________.
A) is a way to find a host's IP addresses if your computer only knows the host's host name
B) is a general naming system for the Internet
C) both A and B
D) neither A nor B
Q:
Which of the following is true about NAT?
A) It can enhance security.
B) It presents problems for some protocols.
C) both A and B
D) neither A nor B
Q:
Which of the following is a private IP address range?
A) 10.x.x.x
B) 128.171.x.x
C) both A and B
D) neither A nor B
Q:
Which of the following can be used within a firm?
A) private IP addresses
B) public IP addresses
C) both A and B
D) neither A nor B
Q:
NAT enhances security by ________.
A) preventing sniffers from learning internal IP addresses
B) encryption
C) both A and B
D) neither A nor B
Q:
In NAT, the ________ creates new external source IP addresses and port numbers.
A) router
B) firewall
C) source host
D) destination host
Q:
________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm.
A) DNS
B) NAT
C) DHCP
D) none of the above
Q:
You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?
A) 14
B) 16
C) 254
D) none of the above
Q:
Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have per subnet?
A) 126
B) 254
C) 534
D) 65,534
Q:
Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet part size be?
A) 5
B) 6
C) 7
D) 8
Q:
If you have a subnet part of 7 bits, how many subnets can you have?
A) 126
B) 254
C) 510
D) none of the above
Q:
In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be?
A) 6
B) 7
C) 8
D) none of the above
Q:
If your subnet part is 8 bits long, you can have ________ subnets.
A) 64
B) 128
C) 256
D) 254
Q:
Which of the following can handle an application message that is one megabyte in size?
A) TCP
B) UDP
C) both A and B
D) neither A nor B
Q:
Which of the following segments is not acknowledged?
A) FIN
B) RST
C) Both of the above are acknowledged.
D) Neither A nor B is acknowledged.
Q:
An abrupt close uses a(n) ________ segment.
A) FIN
B) RST
C) either A or B
D) neither A nor B
Q:
Four-way closes use ________ segments.
A) FIN
B) RST
C) either A or B
D) neither A nor B
Q:
A TCP ________ segment is a request to close a connection.
A) FIN
B) ACK
C) Close
D) Disconnect
Q:
If someone says that a 1-bit flag is not set, this means that its value is ________.
A) 0
B) 1
C) blank
D) We cannot say.
Q:
One-bit fields are called ________ fields.
A) SYN
B) flag
C) ACK
D) none of the above
Q:
TCP messages are called ________.
A) frames
B) packets
C) segments
D) fragments
Q:
The encapsulating security protocol offers ________.
A) confidentiality
B) authentication
C) both A and B
D) neither A nor B
Q:
Which of the following allows routers to check for errors in the header when a packet arrives?
A) IPv4
B) IPv6
C) both A and B
D) neither A nor B
Q:
In IPv6, the payload length gives the number of octets in the ________.
A) entire packet
B) entire packet minus the main header
C) entire packet minus the main and extension headers
D) entire packet minus the extension headers
Q:
The version number field in IPv6 has the value ________.
A) 0001
B) 0100
C) 0101
D) 0110
Q:
If I simplify the address 2001:0000:0000:00fe:0000:0000:abcd:13ef, I get ________.
A) 2001:::fe:::abcd:13ef
B) 2001::fe:::abcd:13ef
C) 2001:::fe::abcd:13ef
D) 2001::fe::abcd:13ef
Q:
If I simplify the address 2001:0ed2:056b:00d3:000c:abcd:0bcd:0fe0, I get ________.
A) 2001:ed2:56b:d3:c:abcd:bcd:fe0
B) 2001:ed2:56b:d3:c:abcd:bcd:fe
C) either A or B
D) neither A nor B
Q:
If I simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef, I get ________.
A) 2001:::fe::::cdef
B) 2001::fe::::cdef
C) 2001:::fe::cdef
D) 2001::00fe:::cdef
Q:
How many fields are there in an IPv6 address written for human reading?
A) 8
B) 16
C) 32
D) 128
Q:
For human reading, IPv6 fields are separated by ________.
A) dashes
B) slashes
C) colons
D) none of the above
Q:
For human reading, symbols in IPv6 addresses are written in fields of ________ symbols.
A) 1
B) 2
C) 4
D) 16
Q:
For human reading, IPv6 address is written in ________ notation.
A) decimal
B) hexadecimal
C) binary
D) runic
Q:
What is pushing IPv6 adoption now?
A) pressure from ISPs
B) pressure from the IETF
C) pressure from ISO
D) none of the above