Deck 4: Network Protocols and Routing

ملء الشاشة (f)
exit full mode
سؤال
 In general, a Layer 3 or Layer 4 switch is still optimized for fast Layer 2 data handling.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
 What utility is the equivalent to the pathping command on a Linux system?

A) mtr
B) tracepath
C) traceroute
D) hping
سؤال
 The Border Gateway Protocol is considered to be a hybrid routing protocol.
سؤال
 The pathping utility sends 10 pings per hop by default.
سؤال
 What command will list only current connections, including IP addresses and port numbers?

A) show ip stats
B) netstat -n
C) netstat -s
D) portstat
سؤال
 IPv4 and IPv6 use the same packet format.
سؤال
 The IP connectionless protocol relies on what other protocol to guarantee delivery of data?

A) UDP
B) ICMP
C) TCP
D) ARP
سؤال
 What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?

A) Connection-oriented Protocol
B) Sequencing and checksums
C) Framing
D) Flow Control
سؤال
 Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm.
سؤال
 TCP uses a four-step process called a four-way handshake to establish a TCP connection.
سؤال
 You are connected to your network's Cisco router, and need to verify the route table. What command should you enter?

A) route print
B) show ip route
C) route -a
D) show route-table
سؤال
 In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received?

A) urgent pointer
B) sliding-window
C) URG flag
D) PSH flag
سؤال
 UDP provides error checking, but not sequencing.
سؤال
 Which of the following is not a task handled by a router?

A) A router forwards broadcasts over the network.
B) A router can reroute traffic if the path of first choice is down but a second path is available.
C) A router can interpret Layer 3 and often Layer 4 addressing.
D) A router can connect dissimilar networks.
سؤال
 The cost of upgrading infrastructure has been a major factor in the slow adoption of IPv6.
سؤال
 Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com?

A) traceroute -i srv1.mycompany.com
B) traceroute -w srv1.mycompany.com
C) traceroute -o ICMP srv1.mycompany.com
D) traceroute -I srv1.mycompany.com
سؤال
 IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets.
سؤال
 Which statement regarding the Border Gateway Protocol (BGP) is accurate?

A) BGP is limited to a single autonomous system.
B) BGP is exclusively a distance-vector protocol.
C) BGP utilizes TCP for communicating updates.
D) BGP is a more advanced version of OSPF.
سؤال
 The CTRL + S key combination can be used to stop an actively running command.
سؤال
 What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet?

A) Differentiated Services (DiffServ)
B) Internet header length (IHL)
C) Time to Live (TTL)
D) Padding
سؤال
 If the VLAN tag is present in an Ethernet frame, what is the maximum frame size?

A) 1492 bytes
B) 1500 bytes
C) 1518 bytes
D) 1522 bytes
سؤال
 What IPv6 field is similar to the TTL field in IPv4 packets?

A) flow label
B) next header
C) hop limit
D) distance vector
سؤال
 What happens when a router receives a packet with a TTL of 0?

A) The router drops the packet and sends an ICMP TTL expired message back to the host.
B) The router attempts to forward the traffic on a local network.
C) The router resets the TTL to 128.
D) The router marks the packet as corrupted and forwards it to the next hop.
سؤال
 What occurs when a collision happens on a network?

A) The collision goes undetected, and data transmission continues.
B) The collision will create an error in the network switch, but otherwise, no issues will occur as a result.
C) Each node on the network stops transmitting, until manually told to reconnect and transmit.
D) Each node on the network waits a random amount of time and then resends the transmission.
سؤال
 You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?

A) The MTU for the network can be as high as 9198 bytes.
B) The network is not based on the Ethernet standard.
C) Fragmented frames will be consolidated into whole frames before being sent.
D) The MTU for the network is set at 65,535 bytes.
سؤال
 When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable?

A) 8
B) 15
C) 20
D) 32
سؤال
 What routing metric affects a path's potential performance due to delay?

A) theoretical bandwidth
B) MTU
C) latency
D) load
سؤال
 What is routing protocol convergence time defined as?

A) It is the time it takes for the protocol to recognize the best path in the event of a network change.
B) It is the time it takes for the protocol to recognize that a change has occurred.
C) It is the amount of time it takes after initial configuration of the protocol for all routes to become known.
D) It is the amount of time involved in configuration of the routing protocol.
سؤال
 What is the purpose of the checksum TCP field?

A) It specifies special options, such as the maximum segment size a network can handle.
B) It allows the receiving node to determine whether the TCP segment became corrupted during transmission.
C) It identifies the data segment's position in the stream of data segments being sent.
D) It confirms receipt of data via a return message to the sender.
سؤال
 Which routing protocol started as a Cisco proprietary protocol and combines some of the features of a link-state protocol with that of distance-vector protocols?

A) IS-IS
B) BGP
C) OSPF
D) EIGRP
سؤال
 By default, what is the MTU size on a typical Ethernet network?

A) 1492 bytes
B) 1500 bytes
C) 1518 bytes
D) 1522 bytes
سؤال
 In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate?

A) The hosts that share the same MAC addresses will be completely unable to communicate with any other devices.
B) The hosts will generate new MAC addresses until the conflict is resolved.
C) The hosts will still send and receive traffic, but traffic may not always reach the correct destination.
D) The network switch will eventually crash due to being unable to properly forward traffic.
سؤال
 In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to?

A) traffic class
B) group ID
C) flow label
D) traffic exchange
سؤال
 Which command will produce statistics about each message transmitted by a host, separated according to protocol type?

A) ipconfig -s
B) netstat -s
C) ipstat -a
D) netstat -an
سؤال
 What tcpdump command can be used to filter out all traffic except SSH traffic?

A) tcpdump port 22
B) tcpdump -p 22
C) tcpdump only ssh
D) tcpdump -f +ssh
سؤال
 Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols?

A) interior gateway protocols
B) border gateway protocols
C) distance vector protocols
D) link-state protocols
سؤال
 Originally codified by ISO, what does the "intermediate system" in IS-IS (Intermediate System to Intermediate System) stand for?

A) The autonomous systems used by an organization.
B) An entire network consisting of various network devices.
C) The administrative boundaries of an organization.
D) An IS-IS capable network router.
سؤال
 You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate?

A) EIGRP will increase CPU utilization on core routers.
B) Increased traffic will result from the switch to EIGRP.
C) EIGRP may not be available on non-Cisco routers.
D) Convergence time will be increased with EIGRP.
سؤال
 What statement regarding the differences between the Windows tracert utility and the Linux/UNIX/macOS traceroute utility is accurate?

A) Only tracert can send UDP messages for tracing a path.
B) By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages.
C) The Windows tracert utility does not place limits on the TTL of repeated trial messages.
D) The tracert utility expects an ICMP port unreachable error message as the final reply to a trace.
سؤال
 Which statement does NOT accurately describe characteristics of the OSPF protocol?

A) OSPF maintains a database of other routers' links.
B) OSPF has no hop limits on a transmission path.
C) OSPF provides low network overhead.
D) OSPF requires very little CPU or memory resources.
سؤال
 What are the different categories of routers, and how do they compare?
سؤال
 How is the TTL (Time to Live) field utilized in IPv4?
سؤال
 How can a network switch be said to operate at Layer 4 of the OSI model?
سؤال
 There are several interior gateway protocols, but only one current exterior gateway protocol. What is this protocol, and what characteristics does it have?
سؤال
 How are routing paths determined?
سؤال
 How does IPv6 utilize Neighbor Discovery Protocol to detect neighboring devices?
سؤال
 What are some examples of routing metrics that can be used to determine the best path for a network?
سؤال
 What are some of the basic functions of a network router?
سؤال
 ARP tables might contain two different types of entries. What are they, and how are they created?
سؤال
 What is MAC address spoofing?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Network Protocols and Routing
1
 In general, a Layer 3 or Layer 4 switch is still optimized for fast Layer 2 data handling.
True
2
 What utility is the equivalent to the pathping command on a Linux system?

A) mtr
B) tracepath
C) traceroute
D) hping
A
3
 The Border Gateway Protocol is considered to be a hybrid routing protocol.
True
4
 The pathping utility sends 10 pings per hop by default.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
 What command will list only current connections, including IP addresses and port numbers?

A) show ip stats
B) netstat -n
C) netstat -s
D) portstat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
 IPv4 and IPv6 use the same packet format.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
 The IP connectionless protocol relies on what other protocol to guarantee delivery of data?

A) UDP
B) ICMP
C) TCP
D) ARP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
 What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?

A) Connection-oriented Protocol
B) Sequencing and checksums
C) Framing
D) Flow Control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
 Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
 TCP uses a four-step process called a four-way handshake to establish a TCP connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
 You are connected to your network's Cisco router, and need to verify the route table. What command should you enter?

A) route print
B) show ip route
C) route -a
D) show route-table
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
 In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received?

A) urgent pointer
B) sliding-window
C) URG flag
D) PSH flag
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
 UDP provides error checking, but not sequencing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
 Which of the following is not a task handled by a router?

A) A router forwards broadcasts over the network.
B) A router can reroute traffic if the path of first choice is down but a second path is available.
C) A router can interpret Layer 3 and often Layer 4 addressing.
D) A router can connect dissimilar networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
 The cost of upgrading infrastructure has been a major factor in the slow adoption of IPv6.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
 Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com?

A) traceroute -i srv1.mycompany.com
B) traceroute -w srv1.mycompany.com
C) traceroute -o ICMP srv1.mycompany.com
D) traceroute -I srv1.mycompany.com
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
 IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
 Which statement regarding the Border Gateway Protocol (BGP) is accurate?

A) BGP is limited to a single autonomous system.
B) BGP is exclusively a distance-vector protocol.
C) BGP utilizes TCP for communicating updates.
D) BGP is a more advanced version of OSPF.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
 The CTRL + S key combination can be used to stop an actively running command.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
 What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet?

A) Differentiated Services (DiffServ)
B) Internet header length (IHL)
C) Time to Live (TTL)
D) Padding
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
 If the VLAN tag is present in an Ethernet frame, what is the maximum frame size?

A) 1492 bytes
B) 1500 bytes
C) 1518 bytes
D) 1522 bytes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
 What IPv6 field is similar to the TTL field in IPv4 packets?

A) flow label
B) next header
C) hop limit
D) distance vector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
 What happens when a router receives a packet with a TTL of 0?

A) The router drops the packet and sends an ICMP TTL expired message back to the host.
B) The router attempts to forward the traffic on a local network.
C) The router resets the TTL to 128.
D) The router marks the packet as corrupted and forwards it to the next hop.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
 What occurs when a collision happens on a network?

A) The collision goes undetected, and data transmission continues.
B) The collision will create an error in the network switch, but otherwise, no issues will occur as a result.
C) Each node on the network stops transmitting, until manually told to reconnect and transmit.
D) Each node on the network waits a random amount of time and then resends the transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
 You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?

A) The MTU for the network can be as high as 9198 bytes.
B) The network is not based on the Ethernet standard.
C) Fragmented frames will be consolidated into whole frames before being sent.
D) The MTU for the network is set at 65,535 bytes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
 When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable?

A) 8
B) 15
C) 20
D) 32
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
 What routing metric affects a path's potential performance due to delay?

A) theoretical bandwidth
B) MTU
C) latency
D) load
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
 What is routing protocol convergence time defined as?

A) It is the time it takes for the protocol to recognize the best path in the event of a network change.
B) It is the time it takes for the protocol to recognize that a change has occurred.
C) It is the amount of time it takes after initial configuration of the protocol for all routes to become known.
D) It is the amount of time involved in configuration of the routing protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
 What is the purpose of the checksum TCP field?

A) It specifies special options, such as the maximum segment size a network can handle.
B) It allows the receiving node to determine whether the TCP segment became corrupted during transmission.
C) It identifies the data segment's position in the stream of data segments being sent.
D) It confirms receipt of data via a return message to the sender.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
 Which routing protocol started as a Cisco proprietary protocol and combines some of the features of a link-state protocol with that of distance-vector protocols?

A) IS-IS
B) BGP
C) OSPF
D) EIGRP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
 By default, what is the MTU size on a typical Ethernet network?

A) 1492 bytes
B) 1500 bytes
C) 1518 bytes
D) 1522 bytes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
 In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate?

A) The hosts that share the same MAC addresses will be completely unable to communicate with any other devices.
B) The hosts will generate new MAC addresses until the conflict is resolved.
C) The hosts will still send and receive traffic, but traffic may not always reach the correct destination.
D) The network switch will eventually crash due to being unable to properly forward traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
 In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to?

A) traffic class
B) group ID
C) flow label
D) traffic exchange
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
 Which command will produce statistics about each message transmitted by a host, separated according to protocol type?

A) ipconfig -s
B) netstat -s
C) ipstat -a
D) netstat -an
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
 What tcpdump command can be used to filter out all traffic except SSH traffic?

A) tcpdump port 22
B) tcpdump -p 22
C) tcpdump only ssh
D) tcpdump -f +ssh
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
 Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols?

A) interior gateway protocols
B) border gateway protocols
C) distance vector protocols
D) link-state protocols
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
 Originally codified by ISO, what does the "intermediate system" in IS-IS (Intermediate System to Intermediate System) stand for?

A) The autonomous systems used by an organization.
B) An entire network consisting of various network devices.
C) The administrative boundaries of an organization.
D) An IS-IS capable network router.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
 You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate?

A) EIGRP will increase CPU utilization on core routers.
B) Increased traffic will result from the switch to EIGRP.
C) EIGRP may not be available on non-Cisco routers.
D) Convergence time will be increased with EIGRP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
 What statement regarding the differences between the Windows tracert utility and the Linux/UNIX/macOS traceroute utility is accurate?

A) Only tracert can send UDP messages for tracing a path.
B) By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages.
C) The Windows tracert utility does not place limits on the TTL of repeated trial messages.
D) The tracert utility expects an ICMP port unreachable error message as the final reply to a trace.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
 Which statement does NOT accurately describe characteristics of the OSPF protocol?

A) OSPF maintains a database of other routers' links.
B) OSPF has no hop limits on a transmission path.
C) OSPF provides low network overhead.
D) OSPF requires very little CPU or memory resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
 What are the different categories of routers, and how do they compare?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
 How is the TTL (Time to Live) field utilized in IPv4?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
 How can a network switch be said to operate at Layer 4 of the OSI model?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
 There are several interior gateway protocols, but only one current exterior gateway protocol. What is this protocol, and what characteristics does it have?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
 How are routing paths determined?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
 How does IPv6 utilize Neighbor Discovery Protocol to detect neighboring devices?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
 What are some examples of routing metrics that can be used to determine the best path for a network?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
 What are some of the basic functions of a network router?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
 ARP tables might contain two different types of entries. What are they, and how are they created?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
 What is MAC address spoofing?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.