Chapter 8 Questions – TCP/IP Internet Working

gazecummingNetworking and Communications

Oct 26, 2013 (3 years and 7 months ago)

51 views


1

Chapter 8 Questions


TCP/IP Internet Working

1.

Rank the types of routers based on their location from most peripheral to most
central from the viewpoint of the Internet.

a.

Edge router, core router, internal router

b.

Internal router, core router, edge
router

c.

Core router, internal router, edge router

d.

Edge router, internal router, core router

e.

Internal router, edge router, core router


Reference: p. 244

2.

Routers are capable of connecting networks that use dissimilar _____ layer
standards.

a.

Physi
cal

b.

Data link

c.

Physical and data link

d.

Physical data link and internet


Reference: p. 244

3.

Which statement is
INCORRECT

regarding routers.

a.

Routers can connect LANs that use different types of media.

b.

Routers are less complicated devices to us
e than switches.

c.

Routers can connect LANs that use different Data Link Layer standards.

d.

Routers can be connected so that more than one path exists between any
two points on a network.

e.

Routers have the ability to reroute packets around trunk line fa
ilures.


Reference: p. 244

4.

Multiprotocol routers receive their name because they handle multiple TCP/IP
protocols.

a.

True

b.

False


Reference: p. 247

5.

An IP address is 64.7.12.6. The network plus subnet parts are _____.

a.

64

b.

64.7

c.

64.7.12

d.

64.
7.12.6

e.

Cannot say.



2

Reference: p. 249

6.

Which part of the IP address of servers at your school/company will be the same?

a.

Subnet

b.

PPP

c.

Host

d.

POP

e.

Network


Reference: p. 249

7.

The first 16 bits of an IP address identifies the network portio
n of the address.

a.

True

b.

False


Reference: p. 249

8.

Select the MOST correct statement about IP addresses.

a.

The host portion must appear first.

b.

The host portion must appear last.

c.

The host portion must appear first and must contain 16 bits.

d.

T
he host portion must appear last and must contain 16 bits.

e.

The host portion is optional.


Reference: p. 249

9.

Select the incorrect statement.

a.

MAC addresses within a network are unrelated to each other.

b.

MAC addresses are meaningless when divided

up into separate parts.

c.

IP addresses are longer than MAC addresses.

d.

IP addresses within a network are hierarchical.

e.

IP addresses can be thought of as being made up of three separate parts.


Reference: p. 249

10.

If a mask of 255.0.0.0 is appli
ed to network address 134.126.50.10 the result will
be:

a.

134.0.0.0.

b.

134.26.0.0.

c.

134.126.50.0.

d.

134.126.50.10.

e.

255.0.0.0.


Reference: p. 252



3

11.

What must be done to allow IP addresses to be useful to make routing decisions?

a.

The IP addre
sses must be filtered.

b.

The IP addresses must be masked.

c.

The IP address must be broken down into its subparts.

d.

The IP address must be mapped to a specific MAC address.

e.

The IP address must be converted to a MAC address.


Reference: p. 251

12.

I
P routing tables contain information that allows a router to:

a.

decide alternative paths for packets that have been blocked due to
congestion.

b.

decide alternative paths for packets that have been blocked due to
inoperable portions of the network.

c.

de
cide which router or local network to send the packet to.

d.

discard multiple occurrences of packets which have arrived from multiple
sources.


Reference: p. 251

13.

Routers on a network use _____ to share routing information with each other.

a.

IP packet
s

b.

routing protocols

c.

masks

d.

masking protocols

e.

subnets


Reference: p. 253

14.

How often does a router make routing decisions?

a.

Once for each and every packet that it receives.

b.

Once for each group of packets that it receives with the same
source and
destination addresses.

c.

Once for each group of packets it receives with the same source address.

d.

Once for each group of packets it receives with the same destination
address.


Reference: p.253

15.

Routing tables must be carefully constructe
d so that only one potential route
exists between a router and a destination host.

a.

True

b.

False


Reference: p. 255


4

16.

The default row contained in a routing table usually is the best match for an
arriving packet.

a.

True

b.

False


Reference: p. 256

17.

The default row in a routing table is the row that a router selects when no other
row matches an IP packet.

a.

True

b.

False


Reference: p. 256

18.

If two rows of the routing table match an IP address, the router:

a.

picks the default row.

b.

sends the p
acket to the address in the row with the longest match.

c.

discards the packet as an error.

d.

sends half of all such packets as guided by each row.


Reference: p. 256

19.

When using a metric value in a routing table the router:

a.

selects the matching
row with the highest metric.

b.

selects the matching row with the lowest metric.

c.

selects the matching row with either the highest or lowest metric based
upon the packet’s contents.

d.

selects the matching row with either the highest or lowest metric bas
ed
upon how the router is programmed.

e.

selects the matching row whose metric has the lowest absolute value.


Reference: p. 257

20.

An important distinction between switching tables and routing tables is that:

a.

multiple matches in switching tables rep
resent equal alternatives; multiple
matches in routing tables are differentiated by metrics.

b.

switching tables can have at most one match; routing tables can have
many.

c.

switching tables are constantly changing; routing tables are static.

d.

the switc
hing decision requires that all entries in the switching table be
examined; the routing decision is made once a match is found in a routing
table.


Reference: p. 250



5

21.

Domain Name System servers organize domain information using a hierarchy.

a.

True

b.

F
alse


Reference: p. 259

22.

An example of a second
-
level domain name is:

a.

134.126.

b.

134.126.15.11.

c.

whitehouse.gov.

d.

.com.

e.

info.whitehouse.gov.


Reference: p. 259

23.

If you send a DNS server a request message, it will return the correspondi
ng
_________.

a.

IP address

b.

host name

c.

IP address or host name

d.

IP address, number of hops needed for a packet to reach the site

e.

Host name, number of hops needed for a packet to reach the site


Reference: p. 259

24.

When a router encounters
an error in an IP header it:

a.

returns the packet to the sending router.

b.

returns the packet to the sending router with an error advisement.

c.

discards the packet.

d.

discards the packet and returns an error advisement.

e.

discards the packet, return
s an error advisement, and requests a
retransmission.


Reference: p. 261

25.

To diagnose which router has failed in a network, a network administrator might
send ICMP _____ messages.

a.

error advisement

b.

echo

c.

flow control

d.

Get

e.

RSVP


Reference: p
. 261



6

26.

The most important improvement of IPv6 over IPv4 is support for:

a.

error detection and correction.

b.

longer domain names.

c.

more possible IP addresses.

d.

faster network transmission speeds.


Reference: p. 262

27.

IPv6 represents the _____ o
perational generation of the IP standard.

a.

first

b.

second

c.

fourth

d.

sixth


Reference: p. 262

28.

IPv6 addresses will be used more heavily in _____.

a.

the United States

b.

Asia


Reference: p. 262

29.

_____ and ____ are both unreliable.

a.

IP, UDP

b.

IP, TCP

c.

UDP, TCP


Reference: p. 265, 269

30.

IP is an unreliable protocol. This is _____.

a.

good

b.

bad


Reference: p. 265

31.

TCP is an unreliable protocol.

a.

True

b.

False


Reference: p. 265

32.

Host A sends to Host B. There is an error in the transmission.

Which transport
process decides to retransmit the damaged TCP segment?

a. The transport process on Host A

b.

The transport process on Host B



7

Reference: p. 267

33.

When does TCP decide to retransmit a segment?

a.

When it does not receive an acknowledgeme
nt from the receiver.

b.

Never; TCP is not capable of retransmitting segments.

c.

When the receiver requests a retransmission due to a lost segment.

d.

When it does not receive an acknowledgment from the corresponding TCP
router process.

e.

When a TCP con
nection is not properly closed.


Reference: p. 267

34.

______ is an application that would most likely use UDP.

a.

E
-
mail

b.

Web surfing

c.

Credit card authorization

d.

Data file transfers

e.

Voice communications


Reference: p. 269

35.

UDP is an unrelia
ble protocol.

a.

True

b.

False


Reference: p. 269

36.

Which of the following protocols does NOT operate at the Transport layer?

a.

IP

b.

TCP

c.

UDP


Reference: p. 268

37.

TCP messages are called ________; UDP messages are called _________.

a.

packets, frame
s

b.

frames, packets

c.

segments, datagrams

d.

datagrams, segments

e.

packets, packets


Reference: p. 268

38.

Port numbers exist in:

a.

IP.

b.

UDP.


8

c.

TCP.

d.

TCP and UDP.

e.

IP, UDP, and TCP.


Reference: p. 269

39.

When a client transmits, the source
port number is a(n) _____ number.

a.

well
-
known

b.

ephemeral

c.

private

d.

public


Reference: p. 269

40.

Incoming TCP port numbers are used by servers to:

a.

prioritize service requests based upon who the requestor is.

b.

route service requests to specific a
pplications.

c.

identify and make decisions based upon the requestor’s actual IP address.

d.

map or translate domain names to domain addresses.

e.

identify and make decisions based upon the requestor’s actual MAC
address.


Reference: p. 269

41.

Sockets are:

a.

groups of ports providing similar services.

b.

used to reference a range of ports on a server.

c.

notations for a combined IP address and port number.

d.

a way to allow multiple users to access a particular port at the same time.


Reference: p. 269

42
.

Layer 3 switches are a special type of switch because they:

a.

operate in physical environments that will not allow routers.

b.

only handle voice traffic.

c.

perform switching based upon IP addresses instead of MAC addresses.

d.

perform MAC
-
IP address t
ranslation.


Reference: p. 270

43.

Layer 3 switches are limited because of their:

a.

inability to match routers in speed.

b.

inability to handle many protocols.

c.

high purchase cost when compared to routers.

d.

All of the above.



9

Reference: p. 271

44.

What added capabilities do Layer 4 switches have over Layer 3 switches?

a.

They can make decisions based upon port information contained in the
incoming packet.

b.

They can prioritize decisions based upon the MAC address of the
incoming packet.

c.

They o
ffer switching speeds that are roughly twice those offered by Level
3 switches.

d.

They offer redundant switching tables that they exchange with
neighboring Level 4 switches to minimize problems caused by power or
hardware outages.

e.

They provide network

monitoring devices with updated traffic information
in a standardized format.


Reference: p. 272