Deck 14: The Internet Protocol

Full screen (f)
exit full mode
Question
________ is the foundation on which all of the internet based protocols and internetworking is based.

A)Datagram
B)IP
C)TCP
D)VPN
Use Space or
up arrow
down arrow
to flip the card.
Question
A static table is more flexible than a dynamic table in responding to both error and congestion conditions.
Question
Priority could be assigned on a message basis or on a connection basis.
Question
A next generation IP,known as ________,provides longer address fields and more functionality than the current IP.

A)IPv6
B)IPv5
C)IPv3
D)IPv4
Question
The driving motivation for the adoption of a new version of IP was the limitation imposed by the 32-bit address field in IPv4.
Question
If dynamic or alternate routing is used the potential exists for a datagram to loop indefinitely through the internet.
Question
In 1994 the Internet Architecture Board issued a report titled "Security in the Internet Architecture" that stated that the general consensus was that the Internet was secure and there were no areas of security concern.
Question
Time to Live is similar to a hop count.
Question
A connectionless internet service is not good for connectionless transport protocols because it imposes unnecessary overhead.
Question
Data are transmitted over an internet in packets from a source system to a destination across a path involving a single network and routers.
Question
IP does not guarantee that all data will be delivered or that the data that are delivered will arrive in the proper order.
Question
In IPv6 fragmentation may only be performed by routers along a packet's delivery path.
Question
Flow control allows routers and receiving stations to limit the rate at which they receive data.
Question
The process in which a protocol may need to divide a block received from a higher layer into multiple blocks of some smaller bounded size is called ________.

A)reassembly
B)subnetting
C)fragmentation
D)downsizing
Question
The format of the Destination Options Header is the same as that of the Hop-by-Hop Options Header.
Question
A Class C network is defined as few networks,each with many hosts.
Question
IP attaches a header to upper layer data to form an IP ________.

A)layer
B)packet
C)subnet
D)datagram
Question
The counterpart of fragmentation is reassembly.
Question
A protocol is concerned with exchanging data between two entities.
Question
For virtually all protocols data are transferred in blocks called ________.

A)PDUs
B)segments
C)NSAPs
D)datagrams
Question
A ________ operates at layer 3 of the OSI architecture and routes packets between potentially different networks..
Question
The most widely used protocol for internetworking is the ________.
Question
Although it is intended to ultimately be replaced,________ is currently the standard IP used in TCP/IP networks.
Question
An IS used to connect two LANs that use similar LAN protocols and acts as an address filter,picking up packets from one LAN that are intended for a destination on another LAN and passing those packets on,is a ________.

A)router
B)bridge
C)broadcast
D)end system
Question
The effect of the ________ is to erase the portion of the host field that refers to an actual host on a subnet,leaving the network number and the subnet number.

A)echo reply
B)checksum
C)subnet mask
D)address mask
Question
Which of the following is NOT an enhancement of IPv6 over IPv4?

A)improved error recovery
B)address autoconfiguration
C)support for resource allocation
D)expanded address space
Question
A function performed by a receiving entity to limit the amount or rate of data that is sent by a transmitting entity is ________.

A)flow control
B)error control
C)transmission control
D)data control
Question
Starting with a 32-bit block consisting of four 8-bit fields,the ________ contains a list of one or more intermediate nodes to be visited on the way to a packet's destination.
Question
In the IPv4 Header ________ specifies how long,in seconds,a datagram is allowed to remain in the internet.
Question
An internet consists of multiple separate networks that are interconnected by ________.
Question
The ________ is a means of uniquely identifying an end-system-originated datagram.

A)protocol layer number
B)source address
C)Data Unit Identifier
D)protocol identifier
Question
IPv6 allows three types of addresses: unicast,anycast,and ________.
Question
The ________ primitive is used to request transmission of a data unit.

A)Send
B)Source Routing
C)Transmit
D)Request
Question
A device used to provide a communications path and perform the necessary relaying and routing functions so that data can be exchanged between devices attached to different networks in the internet is an ________.
Question
An entity may transmit data to another entity in such a way that each PDU is treated independently of all prior PDUs.This is known as ________ data transfer.
Question
A device attached to one of the networks of an internet that is used to support end user applications or services is ________.

A)an end system
B)a router
C)a subnet
D)an intermediate system
Question
The principal feature of ________ is that it can encrypt and/or authenticate all traffic at the IP level.

A)TCP/UDP
B)IAB
C)VPN
D)IPSec
Question
A hop-by-hop option that is used to send IPv6 packets with payloads longer than 65,535 octets is ________.

A)PAD1
B)fragmentation
C)jumbo payload
D)PADN
Question
A ________ consists of a set of computers that interconnect by means of a relatively unsecure network and makes use of encryption and special protocols to provide security.
Question
In IPv6 ________ may only be performed by source nodes,not by routers,along a packet's delivery path.

A)bridging
B)reassembly
C)fragmentation
D)ordered delivery
Question
The IP standard specifies that a compliant implementation must also implement ________,which provides a means for transferring messages from routers and other hosts to a host.Because these messages are transmitted in IP datagrams, their delivery is not guaranteed and their use cannot be considered reliable.
Question
IP addresses are usually written in ________ notation,with a decimal number representing each of the octets of the 32-bit address.
Question
The services to be provided across adjacent protocol layers are expressed in terms of ________ and parameters.
Question
IPv6 addresses are ________ bits in length.
Question
The source and destination address fields in the IP header each contain a 32-bit global internet address,generally consisting of a network identifier and a _______.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: The Internet Protocol
1
________ is the foundation on which all of the internet based protocols and internetworking is based.

A)Datagram
B)IP
C)TCP
D)VPN
B
2
A static table is more flexible than a dynamic table in responding to both error and congestion conditions.
False
3
Priority could be assigned on a message basis or on a connection basis.
True
4
A next generation IP,known as ________,provides longer address fields and more functionality than the current IP.

A)IPv6
B)IPv5
C)IPv3
D)IPv4
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
The driving motivation for the adoption of a new version of IP was the limitation imposed by the 32-bit address field in IPv4.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
If dynamic or alternate routing is used the potential exists for a datagram to loop indefinitely through the internet.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
In 1994 the Internet Architecture Board issued a report titled "Security in the Internet Architecture" that stated that the general consensus was that the Internet was secure and there were no areas of security concern.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Time to Live is similar to a hop count.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
A connectionless internet service is not good for connectionless transport protocols because it imposes unnecessary overhead.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Data are transmitted over an internet in packets from a source system to a destination across a path involving a single network and routers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
IP does not guarantee that all data will be delivered or that the data that are delivered will arrive in the proper order.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
In IPv6 fragmentation may only be performed by routers along a packet's delivery path.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Flow control allows routers and receiving stations to limit the rate at which they receive data.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
The process in which a protocol may need to divide a block received from a higher layer into multiple blocks of some smaller bounded size is called ________.

A)reassembly
B)subnetting
C)fragmentation
D)downsizing
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
The format of the Destination Options Header is the same as that of the Hop-by-Hop Options Header.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
A Class C network is defined as few networks,each with many hosts.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
IP attaches a header to upper layer data to form an IP ________.

A)layer
B)packet
C)subnet
D)datagram
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
The counterpart of fragmentation is reassembly.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
A protocol is concerned with exchanging data between two entities.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
For virtually all protocols data are transferred in blocks called ________.

A)PDUs
B)segments
C)NSAPs
D)datagrams
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
A ________ operates at layer 3 of the OSI architecture and routes packets between potentially different networks..
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
The most widely used protocol for internetworking is the ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
Although it is intended to ultimately be replaced,________ is currently the standard IP used in TCP/IP networks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
An IS used to connect two LANs that use similar LAN protocols and acts as an address filter,picking up packets from one LAN that are intended for a destination on another LAN and passing those packets on,is a ________.

A)router
B)bridge
C)broadcast
D)end system
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
The effect of the ________ is to erase the portion of the host field that refers to an actual host on a subnet,leaving the network number and the subnet number.

A)echo reply
B)checksum
C)subnet mask
D)address mask
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is NOT an enhancement of IPv6 over IPv4?

A)improved error recovery
B)address autoconfiguration
C)support for resource allocation
D)expanded address space
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
A function performed by a receiving entity to limit the amount or rate of data that is sent by a transmitting entity is ________.

A)flow control
B)error control
C)transmission control
D)data control
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
Starting with a 32-bit block consisting of four 8-bit fields,the ________ contains a list of one or more intermediate nodes to be visited on the way to a packet's destination.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
In the IPv4 Header ________ specifies how long,in seconds,a datagram is allowed to remain in the internet.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
An internet consists of multiple separate networks that are interconnected by ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
The ________ is a means of uniquely identifying an end-system-originated datagram.

A)protocol layer number
B)source address
C)Data Unit Identifier
D)protocol identifier
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
IPv6 allows three types of addresses: unicast,anycast,and ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
The ________ primitive is used to request transmission of a data unit.

A)Send
B)Source Routing
C)Transmit
D)Request
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
A device used to provide a communications path and perform the necessary relaying and routing functions so that data can be exchanged between devices attached to different networks in the internet is an ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
An entity may transmit data to another entity in such a way that each PDU is treated independently of all prior PDUs.This is known as ________ data transfer.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
A device attached to one of the networks of an internet that is used to support end user applications or services is ________.

A)an end system
B)a router
C)a subnet
D)an intermediate system
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The principal feature of ________ is that it can encrypt and/or authenticate all traffic at the IP level.

A)TCP/UDP
B)IAB
C)VPN
D)IPSec
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
A hop-by-hop option that is used to send IPv6 packets with payloads longer than 65,535 octets is ________.

A)PAD1
B)fragmentation
C)jumbo payload
D)PADN
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
A ________ consists of a set of computers that interconnect by means of a relatively unsecure network and makes use of encryption and special protocols to provide security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
In IPv6 ________ may only be performed by source nodes,not by routers,along a packet's delivery path.

A)bridging
B)reassembly
C)fragmentation
D)ordered delivery
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The IP standard specifies that a compliant implementation must also implement ________,which provides a means for transferring messages from routers and other hosts to a host.Because these messages are transmitted in IP datagrams, their delivery is not guaranteed and their use cannot be considered reliable.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
IP addresses are usually written in ________ notation,with a decimal number representing each of the octets of the 32-bit address.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
The services to be provided across adjacent protocol layers are expressed in terms of ________ and parameters.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
IPv6 addresses are ________ bits in length.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The source and destination address fields in the IP header each contain a 32-bit global internet address,generally consisting of a network identifier and a _______.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.