Deck 9: Tcpip Internetworking 2

Full screen (f)
exit full mode
Question
NAT works automatically with all protocols.
Use Space or
up arrow
down arrow
to flip the card.
Question
In NAT,the ________ creates new external source IP addresses and port numbers.

A)router
B)firewall
C)source host
D)destination host
Question
Which of the following can be used within a firm?

A)private IP addresses
B)public IP addresses
C)both A and B
D)neither A nor B
Question
When the subnet part is made larger,the host part must be smaller.
Question
________ is the processing of presenting external IP addresses that are different from internal IP addresses used within the firm.

A)DNS
B)NAT
C)DHCP
D)None of the above
Question
NAT can multiply the number of IP addresses available to the firm by over a thousand.
Question
In DNS,a group of resources under the control of an organization is called a ________.

A)network
B)subnet
C)scope
D)domain
Question
________ is a general naming system for the Internet.

A)NAT
B)DNS
C)Both A and B
D)Neither A nor B
Question
In IP subnet planning,having a large subnet part allows more hosts per subnet.
Question
NAT operates transparently to the two hosts.
Question
The domain name system ________.

A)is a way to find a host's IP addresses if your computer only knows the host's host name
B)is a general naming system for the Internet
C)both A and B
D)neither A nor B
Question
If your subnet part is 8 bits long,you can have ________ subnets.

A)64
B)128
C)256
D)none of the above
Question
NAT provides security.
Question
You have a 20-bit network part and a 4-bit subnet part.How many hosts can you have per subnet?

A)14
B)16
C)254
D)none of the above
Question
Which of the following is a private IP address range?

A)10.x.x.x
B)128.171.x.x
C)both A and B
D)neither A nor B
Question
NAT enhances security by preventing ________.

A)sniffers from learning internal IP addresses
B)encryption
C)both A and B
D)neither A nor B
Question
Private IP address ranges are only used within a firm.
Question
Which of the following is true about NAT?

A)it can enhance security
B)it presents problems for some protocols
C)both A and B
D)neither A nor B
Question
Your firm has an 8-bit network part and an 8-bit subnet part.How many hosts can you have?

A)8
B)16
C)254
D)65,534
Question
In IP subnet planning,you need to have at least 130 subnets.How large should your subnet part be?

A)6
B)7
C)8
D)none of the above
Question
".edu" is a ________.

A)root domain
B)top-level domain
C)second-level domain
D)none of the above
Question
Clients can send a DHCP request message to multiple DHCP servers.
Question
Servers have static IP addresses so that clients can find them.
Question
Corporations most wish to have ________ domain names.

A)top-level
B)second-level
C)third-level
D)none of the above
Question
Which of the following are usually given dynamic IP addresses?

A)clients
B)servers
C)both A and B
D)neither A nor B
Question
Clients normally get their IP addresses from ________.

A)DNS servers
B)DHCP servers
C)directory servers
D)identity servers
Question
".com" is a ________.

A)root domain
B)top-level domain
C)second-level domain
D)none of the above
Question
The highest-level DNS servers are called ________.

A)root servers
B)top-level servers
C)both A and B
D)neither A nor B
Question
Which of the above is NOT an element in a network management system?

A)the manager
B)agents
C)objects
D)All of the above ARE elements in network management systems.
Question
In the Domain Name System,there is a single root server.
Question
________ servers provide ________ IP addresses to clients.

A)DNS, static
B)DNS, dynamic
C)DHCP, static
D)DHCP, dynamic
Question
In SNMP,the manager communicates directly with the managed device.
Question
In SNMP,the manager communicates directly with a(n)________.

A)managed device
B)agent
C)both A and B
D)neither A nor B
Question
Servers are normally given dynamic IP addresses.
Question
".edu" is a generic top-level domain.
Question
A company receives its domain name from ________.

A)the IETF
B)its ISP
C)a domain registrar
D)none of the above
Question
DHCP ________ are configurable parameters that determine which subnets the DHCP server will serve.

A)ranges
B)scopes
C)spans
D)domains
Question
".UK" is a generic top-level domain.
Question
Servers are normally given ________ IP addresses.

A)well-known
B)static
C)dynamic
D)none of the above
Question
How many DNS root servers are there?

A)1
B)2
C)10
D)13
Question
In SNMP,Set commands tell the agent to change a parameter on the managed device.
Question
SNMPv3 uses ________ for authentication.

A)community names
B)digital certificates and digital signatures
C)a different password for each manager-agent pair
D)all of the above
Question
Which of the following would be an SNMP object?

A)number of rows in routing table
B)system uptime (since last reboot)
C)both A and B
D)neither A nor B
Question
In SNMP,the manager creates both commands and responses.
Question
In SNMP,"object" is another name for "managed device."
Question
SNMPv1 uses ________ for authentication.

A)community names
B)digital certificates and digital signatures
C)a different password for each manager-agent pair
D)all of the above
Question
In MPLS,the packet travels along the ________.

A)route
B)data link
C)label-switched path
D)MPLS path
Question
In MPLS,the interface to send the packet back out will be decided ________.

A)during the router's routing process
B)before the packet arrives
C)by a dynamic routing protocol
D)none of the above
Question
In SNMP,the agent can create commands.
Question
A(n)________ is a message sent by an agent to let the manager know about a condition the agent has detected.Select the name used in the SNMP standard.

A)command
B)trap
C)alarm
D)all of the above
Question
In SNMP,the time-to-live value for a router interface is the value for an object.
Question
In SNMP,the ________ creates commands.

A)manager
B)agent
C)both A and B
D)neither A nor B
Question
Human interface functionality is defined by the SNMP standard.
Question
MPLS routers base their decisions on a packet's ________.

A)destination IP address
B)label number
C)both A and B
D)neither A nor B
Question
In SNMP,the ________ creates responses.

A)manager
B)agent
C)both A and B
D)neither A nor B
Question
In SNMP,companies are often reluctant to use ________ commands because of security dangers.

A)Get
B)Set
C)trap
D)request
Question
Label-switching routers do NOT look at the IP address of an arriving packet.
Question
In SNMP,the ________ creates traps.

A)manager
B)agent
C)both A and B
D)neither A nor B
Question
The management information base (MI
B)is a(n)________.

A)database schema
B)actual database
C)Either A or B
D)neither A nor B
Question
In SNMP,the manager creates ________.

A)traps
B)GET commands
C)both A and B
D)neither A nor B
Question
Which is less expensive to implement?

A)SSL/TLS
B)IPsec
C)Both cost about the same to implement.
Question
In tunnel mode,IPsec provides protection ________.

A)all the way between the two hosts
B)only between the IPsec servers
C)both A and B
D)neither A nor B
Question
IPsec is used for site-to-site VPNs.
Question
In MPLS,the ________ adds the label to the packet.

A)source host
B)first label-switching router
C)both A and B
D)neither A nor B
Question
IPsec operates at the data link layer.
Question
In transport mode,IPsec provides security over the internal networks.
Question
In tunnel mode,IPsec provides protection all the way between the two hosts.
Question
In tunnel mode,IPsec provides protection ________.

A)all the way between the two hosts
B)only between the IPsec servers
C)both A and B
D)neither A nor B
Question
To be protected by IPsec,applications must be IPsec-aware.
Question
Which of the following standards permits central management?

A)IPsec
B)SSL/TLS
C)both A and B
D)neither A nor B
Question
Label-switching routers bring ________.

A)lower cost
B)the ability to do traffic engineering
C)both A and B
D)neither A nor B
Question
IPsec protects all layers above the internet layer.
Question
Client PCs must have digital certificates in ________.

A)transport mode
B)tunnel mode
C)both A and B
D)neither A nor B
Question
Which mode of IPsec is more expensive?

A)transport mode
B)tunnel mode
C)Both A and B are equally expensive.
Question
IPsec is used for ________ VPNs.

A)remote-access
B)site-to-site
C)both A and B
D)neither A nor B
Question
IPsec is a(n)________ layer standard.

A)physical
B)data link
C)internet
D)all of the above
Question
The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is ________.

A)protection over only part of the route
B)higher cost
C)both A and B
D)neither A nor B
Question
The main disadvantage of transport mode protection compared to tunnel mode protection in IP is ________.

A)that it provides protection over only part of the route
B)higher cost
C)both A and B
D)neither A nor B
Question
In IPsec,agreements about how security will be done are called ________.

A)tranches
B)security contracts
C)service-level agreements
D)security associations
Question
IPsec protects ________ layer messages.

A)data link
B)application
C)both A and B
D)neither A nor B
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/104
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Tcpip Internetworking 2
1
NAT works automatically with all protocols.
False
2
In NAT,the ________ creates new external source IP addresses and port numbers.

A)router
B)firewall
C)source host
D)destination host
B
3
Which of the following can be used within a firm?

A)private IP addresses
B)public IP addresses
C)both A and B
D)neither A nor B
C
4
When the subnet part is made larger,the host part must be smaller.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
5
________ is the processing of presenting external IP addresses that are different from internal IP addresses used within the firm.

A)DNS
B)NAT
C)DHCP
D)None of the above
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
6
NAT can multiply the number of IP addresses available to the firm by over a thousand.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
7
In DNS,a group of resources under the control of an organization is called a ________.

A)network
B)subnet
C)scope
D)domain
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
8
________ is a general naming system for the Internet.

A)NAT
B)DNS
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
9
In IP subnet planning,having a large subnet part allows more hosts per subnet.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
10
NAT operates transparently to the two hosts.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
11
The domain name system ________.

A)is a way to find a host's IP addresses if your computer only knows the host's host name
B)is a general naming system for the Internet
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
12
If your subnet part is 8 bits long,you can have ________ subnets.

A)64
B)128
C)256
D)none of the above
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
13
NAT provides security.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
14
You have a 20-bit network part and a 4-bit subnet part.How many hosts can you have per subnet?

A)14
B)16
C)254
D)none of the above
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is a private IP address range?

A)10.x.x.x
B)128.171.x.x
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
16
NAT enhances security by preventing ________.

A)sniffers from learning internal IP addresses
B)encryption
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
17
Private IP address ranges are only used within a firm.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is true about NAT?

A)it can enhance security
B)it presents problems for some protocols
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
19
Your firm has an 8-bit network part and an 8-bit subnet part.How many hosts can you have?

A)8
B)16
C)254
D)65,534
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
20
In IP subnet planning,you need to have at least 130 subnets.How large should your subnet part be?

A)6
B)7
C)8
D)none of the above
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
21
".edu" is a ________.

A)root domain
B)top-level domain
C)second-level domain
D)none of the above
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
22
Clients can send a DHCP request message to multiple DHCP servers.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
23
Servers have static IP addresses so that clients can find them.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
24
Corporations most wish to have ________ domain names.

A)top-level
B)second-level
C)third-level
D)none of the above
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following are usually given dynamic IP addresses?

A)clients
B)servers
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
26
Clients normally get their IP addresses from ________.

A)DNS servers
B)DHCP servers
C)directory servers
D)identity servers
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
27
".com" is a ________.

A)root domain
B)top-level domain
C)second-level domain
D)none of the above
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
28
The highest-level DNS servers are called ________.

A)root servers
B)top-level servers
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the above is NOT an element in a network management system?

A)the manager
B)agents
C)objects
D)All of the above ARE elements in network management systems.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
30
In the Domain Name System,there is a single root server.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
31
________ servers provide ________ IP addresses to clients.

A)DNS, static
B)DNS, dynamic
C)DHCP, static
D)DHCP, dynamic
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
32
In SNMP,the manager communicates directly with the managed device.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
33
In SNMP,the manager communicates directly with a(n)________.

A)managed device
B)agent
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
34
Servers are normally given dynamic IP addresses.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
35
".edu" is a generic top-level domain.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
36
A company receives its domain name from ________.

A)the IETF
B)its ISP
C)a domain registrar
D)none of the above
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
37
DHCP ________ are configurable parameters that determine which subnets the DHCP server will serve.

A)ranges
B)scopes
C)spans
D)domains
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
38
".UK" is a generic top-level domain.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
39
Servers are normally given ________ IP addresses.

A)well-known
B)static
C)dynamic
D)none of the above
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
40
How many DNS root servers are there?

A)1
B)2
C)10
D)13
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
41
In SNMP,Set commands tell the agent to change a parameter on the managed device.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
42
SNMPv3 uses ________ for authentication.

A)community names
B)digital certificates and digital signatures
C)a different password for each manager-agent pair
D)all of the above
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following would be an SNMP object?

A)number of rows in routing table
B)system uptime (since last reboot)
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
44
In SNMP,the manager creates both commands and responses.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
45
In SNMP,"object" is another name for "managed device."
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
46
SNMPv1 uses ________ for authentication.

A)community names
B)digital certificates and digital signatures
C)a different password for each manager-agent pair
D)all of the above
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
47
In MPLS,the packet travels along the ________.

A)route
B)data link
C)label-switched path
D)MPLS path
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
48
In MPLS,the interface to send the packet back out will be decided ________.

A)during the router's routing process
B)before the packet arrives
C)by a dynamic routing protocol
D)none of the above
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
49
In SNMP,the agent can create commands.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
50
A(n)________ is a message sent by an agent to let the manager know about a condition the agent has detected.Select the name used in the SNMP standard.

A)command
B)trap
C)alarm
D)all of the above
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
51
In SNMP,the time-to-live value for a router interface is the value for an object.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
52
In SNMP,the ________ creates commands.

A)manager
B)agent
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
53
Human interface functionality is defined by the SNMP standard.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
54
MPLS routers base their decisions on a packet's ________.

A)destination IP address
B)label number
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
55
In SNMP,the ________ creates responses.

A)manager
B)agent
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
56
In SNMP,companies are often reluctant to use ________ commands because of security dangers.

A)Get
B)Set
C)trap
D)request
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
57
Label-switching routers do NOT look at the IP address of an arriving packet.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
58
In SNMP,the ________ creates traps.

A)manager
B)agent
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
59
The management information base (MI
B)is a(n)________.

A)database schema
B)actual database
C)Either A or B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
60
In SNMP,the manager creates ________.

A)traps
B)GET commands
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
61
Which is less expensive to implement?

A)SSL/TLS
B)IPsec
C)Both cost about the same to implement.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
62
In tunnel mode,IPsec provides protection ________.

A)all the way between the two hosts
B)only between the IPsec servers
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
63
IPsec is used for site-to-site VPNs.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
64
In MPLS,the ________ adds the label to the packet.

A)source host
B)first label-switching router
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
65
IPsec operates at the data link layer.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
66
In transport mode,IPsec provides security over the internal networks.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
67
In tunnel mode,IPsec provides protection all the way between the two hosts.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
68
In tunnel mode,IPsec provides protection ________.

A)all the way between the two hosts
B)only between the IPsec servers
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
69
To be protected by IPsec,applications must be IPsec-aware.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
70
Which of the following standards permits central management?

A)IPsec
B)SSL/TLS
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
71
Label-switching routers bring ________.

A)lower cost
B)the ability to do traffic engineering
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
72
IPsec protects all layers above the internet layer.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
73
Client PCs must have digital certificates in ________.

A)transport mode
B)tunnel mode
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
74
Which mode of IPsec is more expensive?

A)transport mode
B)tunnel mode
C)Both A and B are equally expensive.
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
75
IPsec is used for ________ VPNs.

A)remote-access
B)site-to-site
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
76
IPsec is a(n)________ layer standard.

A)physical
B)data link
C)internet
D)all of the above
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
77
The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is ________.

A)protection over only part of the route
B)higher cost
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
78
The main disadvantage of transport mode protection compared to tunnel mode protection in IP is ________.

A)that it provides protection over only part of the route
B)higher cost
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
79
In IPsec,agreements about how security will be done are called ________.

A)tranches
B)security contracts
C)service-level agreements
D)security associations
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
80
IPsec protects ________ layer messages.

A)data link
B)application
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 104 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 104 flashcards in this deck.