Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Inter quiz

  • Login to see the comments

Inter quiz

  1. 1. Chapter 6 Quiz1In _______ delivery, both the deliverer of the IP packet and the destination are on the same network.A) a connectionlessB) a directC) an indirectD) none of the above2In _______ delivery, the deliverer of the IP packet and the destination are on different networks.A) a connection-orientedB) a directC) an indirectD) none of the above3In _______ delivery, packets of a message are logically connected to one another.A) a connectionlessB) a connection-orientedC) a directD) none of the above4In _______ delivery, a packet is not connected to any other packet.A) a connectionlessB) a connection-orientedC) a directD) none of the above5In classful addressing, when a direct delivery is made, both the deliverer and receiver have the same_______.A) IP addressB) hostidC) netidD) none of the above6In classful addressing, when an indirect delivery is made, the deliverer and receiver have _______.A) the same IP addressB) different netidsC) the same netidD) none of the above7In _______ forwarding, the full IP address of a destination is given in the routing table.A) next-hopB) network-specificC) host-specificD) default8In _______ forwarding, the mask and destination addresses are both 0.0.0.0 in the routing table.A) next-hop
  2. 2. B) network-specificC) host-specificD) default9 In _______ forwarding, the destination address is a network address in the routing table.A) next-hopB) network-specificC) host-specificD) default10 In _______ forwarding, the routing table holds the address of just the next hop instead of complete routeinformation.A) next-hopB) network-specificC) host-specificD) default11 In ________ addressing, a typical forwarding module can be designed using three tables, one for eachunicastclass (A, B, C).A) classfulB) classlessC) both a and bD) none of the above12 In classful addressing, the class of the address can be found by shifting the copy of the address ____ bitsto the right.A) 32B) 16C) 28D) none of the above13In classful addressing we need a routing table with at least ______ columns.A) 4B) 3C) 8D) none of the above14In classless addressing, we need a routing table with at least _______ columns.A) 4B) 3C) 8D) none of the above15The idea of address aggregation was designed to alleviate the increase in routing table entries whenusing _______.
  3. 3. A) classful addressingB) classless addressingC) both a and bD) none of the above16The principle of ________ states that the routing table is sorted from the longest mask to the shortestmask.A) first mask matchingB) shortest mask matchingC) longest mask matchingD) none of the above17 The use of hierarchy in routing tables can ________ the size of the routing tables.A) reduceB) increaseC) both a and bD) none of the above18_______ deals with the issues of creating and maintaining routing tables.A) ForwardingB) RoutingC) DirectingD) none of the above19 A _______ routing table contains information entered manually.A) staticB) dynamicC) hierarchical
  4. 4. Chapter 7 Quiz1 ) A _______ address is an internetwork address with universal jurisdiction.A) physicalB) logicalC) a and bD) none of the above2 ) The logical addresses in the TCP/IP protocol suite are called _______ addresses.A) portB) IPC) EmailD) none of the above3 ) A ________ is a local address. Its jurisdiction is over a local network.A) physicalB) logicalC) a and bD) none of the above4 )If the sender is a host and wants to send a packet to another host on the same network, the logicaladdress that must be mapped to a physical address is ______.A) the destination IP address in the datagram headerB) the IP address of the router found in the routing tableC) either a or bD) none of the above5 ) If the sender is a host and wants to send a packet to another host on another network, the logicaladdress that must be mapped to a physical address is ______.A) the destination IP address in the datagram headerB) the IP address of the router found in the routing tableC) either a or bD) none of the above6 ) The sender is a router that has received a datagram destined for a host on another network. Thelogical address that must be mapped to a physical address is ______.A) the destination IP address in the datagram headerB) the IP address of the router found in the routing tableC) either a or bD) none of the above7 ) The sender is a router that has received a datagram destined for a host in the same network. Thelogical address that must be mapped to a physical address is ______.A) the destination IP address in the datagram headerB) the IP address of the router found in the routing tableC) either a or bD) none of the above8 ) In _______, a table associating a logical address with a physical address is updated manually.A) static mappingB) dynamic mappingC) physical mappingD) none of the above
  5. 5. 9 ) _______ is a dynamic mapping protocol in which a logical address is found for a given physicaladdress.A) ARPB) RARPC) both a and bD) none of the above10) _______ is a dynamic mapping protocol in which a physical address is found for a given logicaladdress.A) ARPB) RARPC) both a and bD) none of the above11 ) The target hardware address on an Ethernet is _______ in an ARP request.A) 0x000000000000B) 0.0.0.0C) variableD) class dependent12 )An ARP reply is normally _______.A) broadcastB) multicastC) unicastD) none of the above13 ) An ARP request is normally _______.A) broadcastB) multicastC) unicastD) none of the above14 ) A technique called ______ is used to create a subnetting effect.A) ARPB) RARPC) proxy ARPD) none of the above15 ) A _______ is an ARP that acts on behalf of a set of hosts.A) ARPB) RARPC) proxy ARPD) none of the above16 ) A sender usually has more than one IP datagram to send to the same destination. It is inefficient touse the ARP protocol for each datagram destined for the same host or router. The solution is the_________.A) routing tableB) cache tableC) ARP tableD) none of the above17 ) The RARP request packets are normally _________.A) broadcast
  6. 6. B) unicastC) multicastD) none of the above18 )The RARP reply packets are normally____ _____ .A) broadcastB) unicastC) multicastD) none of the above19 ) The ARP component that sends an ARP reply to the data link layer is the _______.A) cache controllerB) input moduleC) output moduleD) none of the above20 ) The ARP component that sends an IP packet to a queue is the _______.A) cache controllerB) input moduleC) output moduleD) none of the above
  7. 7. Chapter 8 Quiz1 ) The ________ protocol is the transmission mechanism used by the TCP/IP suite.A) ARPB) IPC) RARPD) none of the above2 ) IP is _________ datagram protocol.A) unreliableB) connectionlessC) both a and bD) none of the above3 ) The term ________ means that IP provides no error checking or tracking. IP assumes theunreliability of the underlying layers and does its best to get a transmission through to its destination,but with no guarantees.A) reliable deliveryB) connection-oriented deliveryC) best-effort deliveryD) none of the above4 ) A best-effort delivery service such as IP includes _______.A) error checkingB) error correctionC) datagram acknowledgmentD) none of the above5 )An HLEN value of decimal 10 means _______.A) there are 10 bytes of optionsB) there are 40 bytes of optionsC) there are 40 bytes in the headerD) none of the above6 ) A datagram is fragmented into three smaller datagrams. Which of the following is true?A) The do not fragment bit is set to 1 for all three datagrams.B) The more fragment bit is set to 0 for all three datagrams.C) The identification field is the same for all three datagrams.D) none of the above7 ) Which field or bit value unambiguously identifies the datagram as a fragment?A) Donfiltered= 0B) More Fragment bit = 0C) Fragment offset = 1000D) none of the above8 ) If the fragment offset has a value of 100, it means that _______.A) the datagram has not been fragmentedB) the datagram is 100 bytes in sizeC) the first byte of the datagram is byte 800D) none of the above9 ) What is needed to determine the number of the last byte of a fragment?A) offset numberB) total length
  8. 8. C) b and cD) none of the above10 ) The IP header size _______.A) is 20 to 60 bytes longB) is 20 bytes longC) is 60 bytes longD) none of the above11 ) Packets in the IP layer are called _________ .A) segmentsB) datagramsC) framesD) none of the above12 ) The total length field defines the total length of the datagram _________.A) including the headerB) excluding the headerC) header and option lengthD) none of the above13 ) When a datagram is encapsulated in a frame, the total size of the datagram must be less than the_______.A) MUTB) MATC) MTUD) none of the above14 ) Which IP option is used if exactly four specific routers are to be visited by the datagram?A) record routeB) strict source routeC) loose source routeD) none of the above15 ) For the timestamp option, a flag value of _______ means that each visited router adds only thetimestamp in the provided field.A) 0B) 1C) 2D) none of the above16 ) The IP header field formerly known as the service type field is now called the _______ field.A) IETFB) checksumC) differentiated servicesD) none of the above17 ) The _______ module takes fragments of a message and puts them back in order.A) processingB) fragmentationC) reassemblyD) none of the above18 )The _______ module sends out an IP packet, the next-hop address, and interface information.A) processing
  9. 9. B) forwardingC) fragmentationD) none of the above19 ) The _______ module discards datagrams with a TTL value of zero.A) processingB) forwardingC) fragmentationD) none of the above20 ) The output of the _______ module is an IP packet destined for an upper-layer protocol.A) processingB) forwardingC) reassemblyD) none of the above21 )The _______ module consults the MTU table to determine the packet size necessary for transmission.A) processingB) forwardingC) fragmentationD) none of the above22 ) The value of the ________ subfield in an option controls the presence of the option in fragmentation.A) copyB) classC) numberD) none of the above23 ) The value of the ________ subfield defines the general purpose of an option.A) copyB) classC) numberD) none of the above24 )The value of the ________ subfield defines the types of an option.A) copyB) classC) numberD) none of the above25 )Only ______ end of option option can be used in a datagram.A) twoB) threeC) oneD) none of the above
  10. 10. Chapter 9 Quiz1) ICMP is a _________ layer protocol.A) data linkB) transportC) networkD) none of the above2 ) ICMP messages are divided into two broad categories:A) query and error reporting messagesB) request and response messagesC) request and reply messagesD) none of the above3 ) An ICMP message has _____ header and a variable-size data section.A) a 16-byteB) a 32-byteC) an 8-byteD) none of the above4 ) Which of the following is true about ICMP messages?A) An ICMP error message may be generated for an ICMP error message.B) An ICMP error message may be generated for each fragment.C) An ICMP error message may be generated for a multicast datagram.D) none is true5 ) Which of the following is true about ICMP messages?A) An ICMP error message may be generated for an ICMP error message.B) An ICMP error message may be generated only for the first fragment.C) An ICMP error message may be generated for a multicast datagram.D) none is true6 ) Which of the following is true about ICMP messages?A) An ICMP error message may be generated for an ICMP error message.B) An ICMP error message may be generated only for each fragment.C) No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0or 0.0.0.0.D) none is true7 ) If a host needs to synchronize its clock with another host, it sends a _______ message.A) timestamp-requestB) source-quenchC) router-advertisemen tD) none of the above8 ) The purpose of echo request and echo reply is to _______.A) report errorsB) check node-to-node communicationC) check packet lifetimeD) none of the above9 ) In error reporting the encapsulated ICMP packet goes to _______.A) the original senderB) the receiverC) a router
  11. 11. D) none of the above10 ) What field uniquely identifies the kind of ICMP message (for example, echo reply versus echorequest)?A) typeB) codeC) option IDD) none of the above11 ) When the hop-count field reaches zero and the destination has not been reached, a _______ errormessage is sent.A) destination- unreachableB) time-exceededC) parameter-problemD) none of the above12 ) When all fragments of a message have not been received within the designated amount of time, a_______ error message is sent.A) source-quenchB) time-exceededC) parameter-problemD) none of the above13 ) Errors in the header or option fields of an IP datagram require a _______ error message.A) parameter-problemB) source-quenchC) router-solicitationD) none of the above14 ) A _______ can learn about network _______ by sending out a router-solicitation packet.A) router, routersB) router, hostsC) host, routersD) none of the above15 ) Who can send ICMP error-reporting messages?A) routersB) destination hostsC) a and bD) none of the above16 ) One method to alert a source host of congestion is the _______ message.A) redirectionB) echo-requestC) source-quenchD) none of the above17 ) A time-exceeded message is generated if _______.A) the round-trip time between hosts is close to zeroB) fragments of a message do not arrive within a set timeC) a and bD) none of the above18 ) To determine whether or not a node is reachable, _______ message can be sent.A) an echo-replyB) an echo-request
  12. 12. C) a redirectionD) none of the above19 ) In calculating the time difference between two clocks, a negative value indicates _______.A) an invalid calculationB) the source clock lags behind the destination clockC) the destination clock lags behind the source clockD) none of the above20 ) An IP datagram (datagram A) cannot reach its destination. An ICMP error message is sent to thesource. The data field of the IP datagram (datagram B) that encapsulates the ICMP packet contains_______.A) only the ICMP headerB) the ICMP header plus 8 bytes of datagram AC) only datagram AD) none of the above21 ) In the ICMP package, ICMP packets are the output of _______.A) only the input moduleB) only the output moduleC) both the input and the output moduleD) none of the above22 ) ICMP packets are the input to _______.A) only the input moduleB) only the output moduleC) both the input and the output moduleD) none of the above
  13. 13. Chapter 10 Quiz1 ) IGMP is a companion to the ______ protocol.A) UDPB) TCPC) ICMD) none of the above2 ) IGMP is _______ protocol.A) an error reportingB) a group managementC) a transmissionD) none of the above3 ) IGMP helps a ________ router create and update a list of loyal members related to each routerinterface.A) broadcastB) unicastC) multicastD) none of the above4 ) IGMP operates __________.A) locallyB) globallyC) both a and bD) none of the above5 ) An IGMP query is sent from a _______ to a _______.A) host; hostB) host; routerC) router; host or routerD) none of the above6 ) The _______ is used by a router in response to a received leave report.A) general query messageB) special query messageC) membership reportD) none of the above7 ) The least significant 23 bits in a 48-bit Ethernet address identify a ________.A) multicast routerB) hostC) multicast groupD) none of the above8 ) The _______ field of the IGMP message is all zeros in a query message.A) versionB) typeC) group addressD) none of the above9 ) The _______ field of the IGMP message is 17 for a query message.A) maximum response timeB) typeC) checksum
  14. 14. D) none of the above10 ) A multicast message is sent from _______ to _______.A) one source; one destinationB) one source; multiple destinationsC) multiple sources; one destinationD) none of the above11 ) In networks that do not support physical multicast addressing, multicasting can be accomplishedthrough _______.A) mappingB) queriesC) tunnelingD) none of the above12 ) If four hosts on a network belong to the same group, a total of _______ sent in response to a generalquery message.A) one membership report isB) two membership reports areC) three membership reports areD) none of the above13 ) A process called _______ sends a multicast packet through WANs that do not support physicalmulticast addressing.A) tunnelingB) delayed responseC) jammingD) none of the above14 ) A group table entry is in the _______ state if there is no corresponding timer running.A) FREEB) DELAYINGC) IDLED) none of the above15 ) A group table entry in the _______ state sends a request when its timer expires.A) FREEB) DELAYINGC) IDLED) none of the above16 ) The _______ module receives an IGMP report or query.A) inputB) outputC) group-joiningD) none of the above17 ) The _______ module sends out an IGMP report.A) inputB) outputC) group-joiningD) none of the above18 ) The _______ module can create a new entry in the group table and start a timer.A) input
  15. 15. B) outputC) group-joiningD) none of the above19 ) The _______ module can decrement the reference count in the group table.A) inputB) outputC) group-leavingD) none of the above20 ) In IGMP, a membership report is sent _______.A) onceB) twiceC) three timesD) none of the above21 ) In IGMP, the general query message ____________ _______ group.A) does not define a particularB) explicitly defines aC) can define more than oneD) none of the above22 ) To prevent unnecessary traffic, IGMP uses ____________ __ strategy.A) a quick responseB) an all-host responseC) a delayed responseD) none of the above23 )To prevent unnecessary traffic, IGMP designates one router as the __________ for each network.A) query routerB) designated routerC) multicast routerD) none of the above24 ) An IGMP packet is carried in an __________ packet.A) UDPB) IPC) Ethernet frameD) none of the above25 ) The IP packet that carries an IGMP packet has a value of _______ in its protocol field.A) 3B) 2C) 1D) none of the above
  16. 16. Chapter 12 Quiz1 ) TCP is a __________protocol.A) stream-orientedB) message-orientedC) block-orientedD) none of the above2 ) TCP allows the sending process to deliver data as a _______of bytes and allows the receiving processto obtain data as a _________ of bytes..A) message; messageB) stream; streamC) block; blockD) none of the above3 ) Because the sending and the receiving processes may not write or read data at the same speed, TCP______.A) speeds up the slower processB) slows down the faster processC) uses buffersD) none of the above4 ) TCP groups a number of bytes together into a packet called a ___________.A) user datagramB) segmentC) datagramD) none of the above5 ) TCP is a ___________ protocol..A) connection-orientedB) connectionlessC) both a and bD) none of the above6 ) TCP is a(n) _______ transport protocol.A) unreliableB) best-effort deliveryC) reliableD) none of the above7 ) TCP uses ____________ _____ to check the safe and sound arrival of data.A) an acknowledgment mechanismB) out-of-band signallingC) the services of another protocolD) none of the above8 ) The bytes of data being transferred in each connection are numbered by TCP. The numbering startswith a ____________ ______.A) 0B) 1C) randomly generated numberD) none of the above
  17. 17. 9 ) TCP assigns a sequence number to each segment that is being sent. The sequence number for eachsegment is the number of the _______ byte carried in that segment.A) firstB) lastC) middleD) none of the above10 ) Communication in TCP is ___________.A) simplexB) half-duplexC) full-duplexD) none of the above11 ) The value of the acknowledgment field in a segment defines the number of the ______byte a partyexpects to receive.A) firstB) lastC) nextD) none of the above12 ) The acknowledgment number is ________.A) independentB) randomly generatedC) cumulativeD) none of the above13 ) The value of window size is determined by _________.A) the senderB) the receiverC) both the sender and receiverD) none of the above14 ) The inclusion of the checksum in the TCP segment is ________.A) optionalB) mandatoryC) at the discretion of the application programD) none of the above15 ) A TCP segment is encapsulated in __________.A) an IP datagramB) an Ethernet frameC) a UDP user datagramD) none of the above16 ) Connection establishment in TCP is called __________ handshaking.A) two-wayB) four-wayC) one-wayD) none of the above17 ) A SYN segment cannot carry data; it consumes _____ sequence number(s).A) noB) oneC) two
  18. 18. D) none of the above18 ) A SYN + ACK segment cannot carry data; it consumes _____ sequence numbers.A) noB) threeC) twoD) none of the above19 ) An ACK segment, if carrying no data, consumes ______ sequence number(s).A) noB) oneC) twoD) none of the above20 ) The connection establishment procedure in TCP is susceptible to a serious security problem calledthe _________ attack.A) ACK floodingB) FIN floodingC) SYN floodingD) none of the above21 ) The SYN flooding attack belongs to a group of security attacks known as a _____ attack.A) denial of serviceB) replayC) man-in-the middleD) none of the above22 ) The FIN segment consumes ____ sequence numbers if it does not carry data.A) twoB) threeC) noD) none of the above23 ) The FIN + ACK segment consumes _____ sequence number(s) if it does not carry data.A) twoB) threeC) oneD) none of the above24 ) In TCP, one end can stop sending data while still receiving data. This is called a ______ .A) half-closeB) half-openC) one-way terminationD) none of the above25 ) A(n) _________ machine is a machine that goes through a limited number of states.A) infinite stateB) finite stateC) both a and bD) none of the above26 ) A common value for MSL is between___ seconds and ___ minute(s).A) 30: 2B) 30; 1C) 50; 1
  19. 19. D) none of the above27 ) _________ control regulates the amount of data a source can send before receiving anacknowledgment from the destination. .A) ErrorB) FlowC) CongestionD) none of the above28 )To accomplish flow control, TCP uses a ___________ window protocol.A) limited-sizeB) slidingC) fixed-sizeD) none of the above29 )TCP sliding windows are __________ oriented.A) packetB) segmentC) byteD) none of the above30 )In TCP, the size of the window is the ________ of rwnd and cwnd.A) maximumB) sum ofC) minimumD) none of the above31 )In TCP, the window should not be _________.A) openedB) closedC) shrunkD) none of the above32 )In TCP, the receiver can temporarily shut down the window; the sender, however, can always send asegment of _____ byte(s) after the window is shut down.A) tenB) zeroC) oneD) none of the above33 )A serious problem can arise in the sliding window operation when either the sending applicationprogram creates data slowly or the receiving application program consumes data slowly, or both. Thisproblem is called the ______.A) silly window syndromeB) unexpected syndromeC) window bugD) none of the above34 )Nagles algorithm can solve the silly window syndrome created by the _________.A) senderB) receiverC) both sender and receiverD) none of the above
  20. 20. 35 )Clarks solution can solve the silly window syndrome created by the _________.A) senderB) receiverC) both sender and receiverD) none of the above36 )Delayed acknowledgment can solve the silly window syndrome created by the _________.A) senderB) receiverC) both sender and receiverD) none of the above37 ) CK segments consume _______ sequence number(s) and _______ acknowledged.A) no; are notB) one; are notC) no; areD) none of the above38 )In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or_______ duplicate ACK segments have arrived.A) oneB) twoC) threeD) none of the above39 )In TCP, ________ retransmission timer is set for an ACK segment.A) oneB) a previousC) noD) none of the above40 )TCP delivers _______ out-of-order segments to the process.A) allB) noC) someD) none of the above41 )Lost acknowledgments may create a _______ if they are not handled properly.A) livelockB) deadlockC) retransmissionD) none of the above42 0In the ________ algorithm the size of the congestion window increases exponentially until it reaches athreshold.A) congestion avoidanceB) congestion detectionC) slow startD) none of the above43 )In the __________ algorithm the size of the congestion window increases additively until congestion isdetected.A) congestion avoidanceB) congestion detectionC) slow start
  21. 21. D) none of the above44 )In the congestion detection algorithm, if detection is by a time-out, a new _______ phase starts.A) slow startB) congestion avoidanceC) congestion detectionD) none of the above45 )In the congestion detection algorithm, if detection is by three ACKs, a new _______ phase starts.A) slow startB) congestion avoidanceC) congestion detectionD) none of the above46 )In TCP, there can be ______ RTT measurement( s) in progress at any time.A) twoB) only oneC) severalD) none of the above47 )The value of the window scale factor can be determined during __________.A) data transmissionB) connection establishmentC) connection terminationD) none of the above48 )IP is responsible for _______ communication while TCP is responsible for _______ communication.A) host-to-host; process-to-processB) process-to-process; host-to-hostC) process-to-process; network-to-networkD) none of the above49 )If a segment carries data along with an acknowledgment, this is called _______.A) backpackingB) piggybackingC) piggypackingD) none of the above50 )Multiply the header length field by _______ to find the total number of bytes in the TCP header.A) 2B) 4C) 6D) none of the above51 )Urgent data requires the urgent pointer field as well as the URG bit in the _______ field.A) controlB) offsetC) sequence numberD) none of the above52 )Which of the following is not a valid acknowledgment number?A) 0B) 1C) 232D) none of the above
  22. 22. 53 )The options field of the TCP header ranges from 0 to _______ bytes.A) 10B) 20C) 40D) none of the above54 )Which option defines the maximum number of bytes in a TCP segment?A) maximum segment sizeB) window scale factorC) timestampD) none of the above55 )If the ACK value is 200, then byte _______ has been received successfully.A) 199B) 200C) 201D) none of the above56 )The _______ timer prevents a long idle connection between two TCPs.A) retransmissionB) persistenceC) keepaliveD) none of the above57 )The _______ timer is needed to handle the zero window-size advertisement.A) retransmissionB) persistenceC) keepaliveD) none of the above58 )Karns algorithm is used in calculations by the _______ timer.A) retransmissionB) persistenceC) keepaliveD) none of the above59 )In the _______ state, the client TCP has closed its connection to the server.A) CLOSEDB) FIN-WAIT-1C) FIN-WAIT-2D) none of the above60 )A special segment called a probe is sent by a sending TCP when the _______ timer goes off.A) transmissionB) persistenceC) keepaliveD) none of the above
  23. 23. Chapter 13 Quiz1 )Stream Control Transmission Protocol (SCTP) is a new ____________ _protocol.A) reliable, character-orientedB) reliable, message-orientedC) unreliable, message-orientedD) none of the above2 )SCTP allows __________ service in each association.A) single streamB) multistreamC) double streamD) none of the above3 )SCTP association allows ____________ _ for each end.A) only one IP addressB) multiple IP addressesC) only two IP addressD) none of the above4 )In SCTP, a data chunk is numbered using ________.A) a TSNB) an SIC) an SSND) none of the above5 )To distinguish between different streams, SCTP uses ___________.A) a TSNB) an SIC) an SSND) none of the above6 )To distinguish between different data chunks belonging to the samestream, SCTP uses ___________.A) TSNsB) SIsC) SSNsD) none of the above7 )TCP has ____________ ; SCTP has ____________ .A) packets; segmentsB) segments; packetsC) segments; framesD) none of the above8 )The control information in SCTP is included in the ________.A) header control fieldB) control chunksC) data chunksD) none of the above9 )An SCTP packet can carry __________.A) only one data chunkB) several data chunks
  24. 24. C) no data chunksD) none of the above10) Options in SCTP ____________ _________ _______.A) are handled by defining new chunk typesB) are included in the base header of a packetC) are handled by the data chunksD) none of the above11 )The general header in SCTP is _______ bytes.A) 20B) 8C) 12D) none of the above12 )An SCTP sequence number (TSN) is located in the _______.A) general headerB) data chunk headerC) control chunk headerD) none of the above13 )In SCTP, the acknowledgment number and window size are part of each ________.A) data chunkB) control chunkC) a or bD) none of the above14 )There is no need for a header length field in SCTP because ____________ ____.A) there are no options in the general headerB) the size of the header is fixedC) both a and bD) none of the above15 )The checksum in SCTP is ________ bits.A) 16B) 32C) 64D) none of the above16 )The association identifier in SCTP is ____________ ______ .A) a unique verification tagB) a combination of logical and port addressesC) either a or bD) none of the above17 )The association identifier in SCTP cannot be a combination of logical and port addresses because of____________ ____.A) multistream servicesB) multihoming serviceC) both a and bD) none of the above18 )In SCTP, control information and data information are carried in _______ chunks.A) the same chunkB) different chunksC) either a or b
  25. 25. D) none of the above19 )Control chunks in SCTP ____________ _______.A) never use a TSN, IS, or SSN numberB) use a TSN, but no IS or SSN numberC) use a TSN or IS, but no SSN numberD) none of the above20 )In SCTP, TSN is a cumulative number identifying the _______; SI defines the _______; SSN definesthe ________.A) association; chunks in a stream; streamB) association; stream; chunks in a streamC) chunk; stream; associationD) none of the above21 )In SCTP, acknowledgment numbers are used to acknowledge ____________ _.A) both data chunks and control chunksB) only control chunksC) only data chunksD) none of the above22 )In an SCTP packet, control chunks come ___________ data chunks.A) afterB) beforeC) a or bD) none of the above23 )In SCTP, chunks need to terminate on a _______boundary.A) 16-bitB) 32-bitC) 64-bitD) none of the above24 )In SCTP, the number of padding bytes are _________ in the value of the length field.A) includedB) not includedC) a or bD) none of the above25 )In SCTP, a DATA chunk ______carry data belonging to more than one message.A) canB) cannotC) either a or bD) none of the above26 )In SCTP, a message ________ split into several chunks.A) can beB) cannot beC) either a or bD) none of the above27 )In SCTP, the data field of the DATA chunk must carry at least _________ byte of data, which meansthe value of length field cannot be less than ___________.A) 8; 24B) 1; 17
  26. 26. C) 40; 56D) none of the above28 )In SCTP, ___________ can be carried in a packet that carries an INIT chunk.A) only data chunksB) only control chunksC) no other chunkD) none of the above29 )A connection in SCTP is called an ____________ .A) negotiationB) associationC) transmissionD) none of the above30 )The acknowledgment in SCTP defines the cumulative TSN, the TSN of the ____________ .A) last data chunk received in orderB) next data chunk to be receivedC) last data chunk received out of orderD) none of the above31 )A DATA chunk arrives with its B/E bits equal to 00. It is ___________.A) the first fragmentB) the last fragmentC) the middle fragmentD) not fragmented32 )A DATA chunk arrives with its B/E bits equal to 01. It is ___________.A) the first fragmentB) the last fragmentC) the middle fragmentD) not fragmented33 )A DATA chunk arrives with its B/E bits equal to 10. It is ___________.A) the first fragmentB) the last fragmentC) the middle fragmentD) not fragmented34 )A DATA chunk arrives with its B/E bits equal to 11. It is ___________.A) the first fragmentB) the last fragmentC) the middle fragmentD) not fragmented35 )The number of states in the state transition diagram of SCTP is __________ the number of states inthe state transition diagram of TCP.A) less thanB) greater thanC) equalD) can be any of the above cases36 )Which chunk is not involved in association establishment?A) INIT chunkB) COOKIE ECHO chunk
  27. 27. C) SACK chunkD) all are involved37 )Which chunk probes the condition of an association?A) ERROR chunkB) HEARTBEAT chunkC) SACK chunkD) none of the above38 )The _______ chunk is sent when an end point finds an error in a received packet.A) ERRORB) ABORTC) SHUTDOWND) none of the above39 )In SCTP, duplicate messages are _______.A) discardedB) trackedC) b and cD) none of the above40 )SCTP strategies for congestion control include _______.A) exponential increaseB) additive increaseC) multiplicative decreaseD) all of the above
  28. 28. Chapter 14 Quiz1 )A static table is one _______.A) with manual entriesB) which is updated automaticallyC) either a or bD) none of the above2 )A dynamic table is one _______.A) with manual entriesB) which is updated automaticallyC) either a or bD) none of the above3 )For purposes of routing, the Internet is divided into ___________.A) wide area networksB) autonomous networksC) autonomous systemsD) none of the above4 )____________ is a group of networks and routers under the authority of a single administration.A) An autonomous systemB) An areaC) a and bD) none of the above5 )Routing inside an autonomous system is referred to as ____________ ___.A) interdomain routingB) intradomain routingC) both a and bD) none of the above6 )Routing between autonomous systems is referred to as ____________ .A) interdomain routingB) intradomain routingC) both a and bD) none of the above7 )In _______ routing, the least cost route between any two nodes is the route with the minimumdistance.A) path vectorB) distance vectorC) link stateD) none of the above8 )In ________, each node maintains a vector (table) of minimum distances to every node.A) path vectorB) distance vectorC) link stateD) none of the above9 )In distance vector routing, each node periodically shares its routing table with _________ andwhenever there is a change.A) every other node
  29. 29. B) its immediate neighborsC) one neighborD) none of the above10 )The Routing Information Protocol (RIP) is an intradomain routing based on _________ routing.A) distance vectorB) link stateC) path vectorD) none of the above11 )The metric used by _______ is the hop count.A) OSPFB) RIPC) BGPD) none of the above12 )In RIP, the ________ timer controls the advertising of regular update messages.A) garbage collectionB) expirationC) periodicD) none of the above13 )In RIP, the ________ timer is used to purge invalid routes from the table.A) garbage collectionB) expirationC) periodicD) none of the above14 )In RIP, the ________ timer controls the validity of the route.A) garbage collectionB) expirationC) periodicD) none of the above15 )RIP uses the services of _______.A) TCPB) UDPC) IPD) none of the above16 )The _________ routing uses the Dijkstra algorithm to build a routing table.A) distance vectorB) link stateC) path vectorD) none of the above17 )The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _______routing.A) distance vectorB) link stateC) path vectorD) none of the above18 )The _______ protocol allows the administrator to assign a cost, called the metric, to each route.A) OSPFB) RIP
  30. 30. C) BGPD) none of the above19 )In OSPF, a ________ link connects two routers without any other host or router in between.A) point-to-pointB) transientC) stubD) none of the above20 )In OSPF, a _______ link is a network with several routers attached to it.A) point-to-pointB) transientC) stubD) none of the above21 )In OSPF, a ________ link is a network is connected to only one router.A) point-to-pointB) transientC) stubD) none of the above22 )In OSPF, when the link between two routers is broken, the administration may create a _________link between them using a longer path that probably goes through several routers.A) point-to-pointB) transientC) stubD) none of the above23 )In OSPF, a ________ defines the links of a true router.A) network linkB) router linkC) summary link to networkD) none of the above24 )In OSPF, a ________ defines the links of a network.A) network linkB) router linkC) summary link to networkD) none of the above25 )In OSPF, an area border router advertises a ____________ LSA.A) network linkB) router linkC) summary link to networkD) none of the above26 )OSPF uses the _______ message to create neighborhood relationships and to test the reachability ofneighbors.A) link state requestB) database descriptionC) link state updateD) none of the above27 )In OSPF, the ________ message does not contain complete database information; it only gives anoutline, the title of each line in the database.
  31. 31. A) link state requestB) database descriptionC) link state updateD) none of the above28 )In OSPF, a _________ message is sent by a router that needs information about a specific route orroutes.A) link state requestB) database descriptionC) link state updateD) none of the above29 )In ________ routing, we assume that there is one node (or more) in each autonomous system that actson behalf of the entire autonomoussystem.A) distant vectorB) path vectorC) link stateD) none of the above30 )___________ is an interdomain routing protocol using path vector routing.A) BGPB) RIPC) OSPFD) none of the above31 )BGP can have two types of sessions: _______ and ________ sessions.A) E-BGP; A-BGPB) I-BGP; C-BGPC) E-BGP; I-BGPD) none of the above32 )To create a neighborhood relationship, a router running BGP sends an ________ message.A) openB) updateC) keepaliveD) none of the above33 )In BGP, the _______ message is used by a router to withdraw destinations that have been advertisedpreviously, or to announce a route to a new destination, or both.A) openB) updateC) keepaliveD) none of the above34 )The routers running the BGP protocols exchange _______ messages regularly to tell each other thatthey are alive.A) openB) updateC) keepaliveD) none of the above35 )In BGP, a _______ message is sent by a router whenever an error condition is detected or a routerwants to close the connection.A) open
  32. 32. B) updateC) keepaliveD) none of the above36 )BGP messages are encapsulated in _______.A) TCP segmentsB) UDP user datagramsC) IP datagramsD) none of the above37 )An area is _______.A) part of an ASB) composed of at least two ASsC) another term for an ASD) none of the above
  33. 33. Chapter 15 Quiz1 )A one-to-all communication between one source and all hosts on a network is classified as a _______communication.A) unicastB) multicastC) broadcastD) none of the above2 ) one-to-many communication between one source and a specific group of hosts is classified as a_______ communication.A) unicastB) multicastC) broadcastD) none of the above3 )A one-to-one communication between one source and one destination is classified as a _______ommunication.A) unicastB) multicastC) broadcastD) none of the above4 )In ______, the router forwards the received packet through only one of its interfaces.A) unicastingB) multicastingC) broadcastingD) none of the above5 )In _______, the router may forward the received packet through several of its interfaces.A) unicastingB) multicastingC) broadcastingD) none of the above6 )Emulation of ________ through ___________ is not efficient and may create long delays.A) unicasting; multiple unicastingB) multicasting; multiple unicastingC) broadcasting; multicastingD) none of the above7 )In unicast routing, each router in the domain has a table that defines a ______ path tree to possibledestinations.A) averageB) longestC) shortestD) none of the above8 )In multicast routing, each involved router needs to construct a ________ path tree for each group.A) averageB) longestC) shortestD) none of the above
  34. 34. 9 )In the _______ tree approach, each router needs to have one shortest path tree for each group.A) group-sharedB) source-basedC) a or bD) none of the above10 )In the group-shared tree approach, _________ involved in multicasting.A) only the core router isB) all routers areC) only some routers areD) none of the above11 )Multicast link state routing uses the _______ tree approach.A) source-basedB) group-sharedC) a or bD) none of the above12 )The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the OSPF protocol thatuses multicast routing to create source-based trees. The protocol is based on _______ routing.A) distance vectorB) link stateC) path vectorD) none of the above13 )MOSPF is a _______ protocol.A) data-drivenB) command-drivenC) both a and bD) none of the above14 )_________ broadcasts packets, but creates loops in the systems.A) ForwardingB) FloodingC) BackwardingD) none of the above15 )In RPF, a router forwards only the copy that has traveled the _______ path from the source to therouter.A) shortestB) longestC) averageD) none of the above16 )RPF eliminates the ________ in the flooding process.A) forwardingB) backwardingC) floodingD) none of the above17 )RPF guarantees that each network receives only ____ of the multicast packet.A) one copyB) two copies
  35. 35. C) a or bD) none of the above18 )RPB creates a shortest path _______ tree from the source to each destination.A) unicastB) multicastC) broadcastD) none of the above19 )RPB guarantees that each destination receives _________ of the packet.A) one copyB) no copiesC) multiple copiesD) none of the above20 )In ________, the multicast packet must reach only those networks that have active members for thatparticular group.A) RPFB) RPBC) RPMD) none of the above21 )_______ adds pruning and grafting to _______ to create a multicast shortest path tree that supportsdynamic membership changes.A) RPM; RPBB) RPB; RPMC) RPF: RPMD) none of the above22 )__________ is an implementation of multicast distance vector routing. It is a source-based routingprotocol, based on RIP.A) MOSPFB) DVMRPC) CBTD) none of the above23 )DVMRP is a ________routing protocol, based on RIP.A) source-basedB) group-sharedC) both a and bD) none of the above24 )Pruning and grafting are strategies used in _______.A) RPFB) RPBC) RPMD) none of the above25 )A _______ message tells an upstream router to stop sending multicast messages for a specific groupthrough a specific router.A) weedB) graftC) pruneD) none of the above
  36. 36. 26 )A _______ message tells an upstream router to start sending multicast messages for a specific groupthrough a specific router.A) weedB) graftC) pruneD) none of the above27 )CBT is a ________ protocol that uses a core as the root of the tree.A) source-basedB) group-sharedC) a or bD) none of the above28 )PIM-DM is used in a _______ multicast environment, such as a LAN.A) denseB) sparseC) a or bD) none of the above29 )PIM-SM is used in a _______multicast environment such as a WAN.A) denseB) sparseC) a or bD) none of the above30 )In _______, a logical tunnel is established by encapsulating the multicast packet inside a unicastpacket.A) UNIBONEB) MULTBONEC) MBONED) none of the above
  37. 37. Chapter 16 Quiz1 )The Bootstrap Protocol (BOOTP) is a client/server protocol designed to provide ________ ofinformation for a diskless computer or a computer that is booted for the first time.A) one pieceB) two piecesC) four piecesD) none of the above2 )The BOOTP client and server can be on _______.A) the same networkB) different networksC) both a and bD) none of the above3 )If BOOTP client and server are on different networks, there is a need for an intermediary called a_______.A) second clientB) second serverC) relay agentD) none of the above4 )In BOOTP, the client uses ________ port and the server uses _________port.A) an ephemeral; a well-knownB) a well-known; a well-knownC) a well-known; an ephemeralD) none of the above5 )In BOOTP, the server uses the well-known port _______; the client uses the well-known port _______.A) 67; 68B) 68; 67C) 67; 67D) none of the above6 )In BOOTP, the client often needs to use ________ to obtain the complete information it needs.A) FTPB) TFTPC) SMTPD) none of the above7 )BOOTP uses the services of _______.A) UDPB) TCPC) IPD) none of the above8 )BOOTP is a ________ configuration protocol.A) dynamicB) staticC) both a and bD) none of the above9 )DHCP is a _______ configuration protocol.A) dynamicB) static
  38. 38. C) both a and bD) none of the above10 )DHCP can be configured ___________.A) manuallyB) automaticallyC) both a and bD) none of the above11 )DHCP client can be in one of ___________ states.A) 5B) 6C) 3D) none of the above12 )When the DHCP client first starts, it is in the _______ state.A) selectingB) initializingC) requestingD) none of the above13 )After sending the DHCPDISCOVER message, the client goes to the _______ state.A) selectingB) initializingC) requestingD) none of the above14 )The default lease time of an IP address offer is ________.A) 30 minutesB) 1 hourC) 2 hoursD) none of the above15 )After sending the DHCPDISCOVER message, the client goes to the _______ state.A) selectingB) initializingC) requestingD) none of the above16 )_______ is backward compatible with __________.A) DHCP; BOOTPB) BOOTP; DHCPC) neither a nor bD) none of the above17 )After the selecting state, a DHCP client can go to the ________state.A) requestingB) renewingC) rebindingD) none of the above18 )After the rebinding state, a DHCP client can go to the __________ state.A) initializingB) boundC) both and b
  39. 39. D) none of the above19 )After the bound state, a DHCP client can go to the __________ state.A) requestingB) renewingC) rebindingD) none of the above20 )After the renewing state, a DHCP client can go to the __________ state.A) requestingB) selectingC) rebindingD) none of the above
  40. 40. Chapter 17 Quiz1 )In a _______ name space, a name is assigned to an address. A name in this space is a sequence ofcharacters without structure.A) flatB) hierarchicalC) organizedD) none of the above2 )In a _________name space, each name is made of several parts.A) flatB) hierarchicalC) organizedD) none of the above3 )To have a hierarchical name space, a ____________ __ was designed.A) domain spaceB) domain nameC) domain name spaceD) none of the above4 )In the DNS, the names are defined in ___________ structure.A) a linear listB) an inverted-treeC) a graphD) none of the above5 )Each node in the tree has a _______, which is a string with a maximum of ___ characters.A) label; 127B) name; 255C) label; 63D) none of the above6 )The root of the DNS tree is _______.A) a string of charactersB) a string of 63 charactersC) an empty stringD) none of the above7 )A full domain name is a sequence of labels separated by ________.A) semicolonsB) dotsC) colonsD) none of the above8 )If a label is terminated by a null string, it is called a __________.A) PQDNB) FQDNC) SQDND) none of the above9 )If a label is not terminated by a null string, it is called a __________.A) PQDNB) FQDNC) SQDN
  41. 41. D) none of the above10 )A _________ is a subtree of the domain name space.A) labelB) nameC) domainD) none of the above11 )What a server is responsible for or has authority over is called a _________.A) domainB) labelC) zoneD) none of the above12 )A _______ is a server whose zone consists of the whole tree.A) domain serverB) zone serverC) root serverD) none of the above13 )A ________ server loads all information from the disk file.A) primaryB) secondaryC) zoneD) none of the above14 )A ________ server loads all information from the primary server.A) primaryB) secondaryC) zoneD) none of the above15 )When the secondary downloads information from the primary, it is called ______ transfer.A) domainB) zoneC) labelD) none of the above16 )In the Internet, the domain name space (tree) is divided into _______ different sections:A) threeB) twoC) fourD) none of the above17 )The _______ domains define registered hosts according to their generic behavior.A) genericB) countryC) inverseD) none of the above18 0The first level in the generic domains section allows ______ possible labels.A) 10B) 12C) 16D) none of the above
  42. 42. 19 )The ____________ domain section uses two-character country abbreviations.A) genericB) countryC) inverseD) none of the above20 )The _________ domain is used to map an address to a name.A) genericB) countryC) inverseD) none of the above21 )In __________ resolution, the resolver expects the server to supply the final answer.A) iterativeB) recursiveC) straightD) none of the above22 )In __________ resolution, the server returns the IP address of the server that it thinks can resolve thequery.A) iterativeB) recursiveC) straightD) none of the above23 )In the domain name chal.atc.fhda. edu, _______ is the least specific label.A) chalB) atcC) eduD) none of the above24 )In the domain name chal.atc.fhda. edu, _______ is the most specific label.A) chalB) atcC) fhdaD) none of the above25 0A host with the domain name pit.arc.nasa. gov. is on the _______ level of the DNS hierarchical tree.(The root is level one.)A) thirdB) fourthC) fifthD) none of the above26 )A pointer query involves the _______ domain.A) inverseB) reverseC) rootD) none of the above27 )DNS can use the services of ________ using the well-known port 53.A) UDPB) TCPC) either a or bD) none of the above
  43. 43. Chapter 18 Quiz1 )TELNET is an abbreviation for ____________ .A) terminal networkB) telephone networkC) telecommunication networkD) none of the above2 )TELNET is a ________ client-server application program.A) specific-purposeB) general-purposeC) both a and bD) none of the above3 )When a user logs into a local time-sharing system, it is called ________ login.A) localB) remoteC) temporaryD) none of the above4 )When a user wants to access an application program or utility located on a remote machine, he or sheperforms ___________ login.A) localB) remoteC) temporaryD) none of the above5 )NVT uses two sets of characters, one for _____and one for __________.A) sending; receivingB) request; replyC) data; controlD) none of the above6 )For data, NVT uses US ASCII characters with the highest order bit set to ______.A) 1B) 0C) a or bD) none of the above7 )For control, NVT uses US ASCII characters with the highest order bit set to ______.A) 1B) 0C) a or bD) none of the above8 )TELNET uses only one TCP connection. The server uses ________ port and the client uses ________port.A) a well-known; another well-knownB) an ephemeral; another ephemeralC) a well-known; an ephemeralD) none of the above9 )To distinguish data from control characters, each sequence of control characters is preceded by aspecial control character called ________.A) ICA
  44. 44. B) IACC) AICD) none of the above10 )To make control characters effective in special situations, TELNET uses ______ signaling.A) out-of-bandB) in-bandC) either a or bD) none of the above11 )In the _______ mode, the echoing is done by the client.A) defaultB) characterC) lineD) none of the above12 )In the _______ mode, each character typed is sent by the client to the server.A) defaultB) characterC) lineD) none of the above13 )In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by theclient.A) defaultB) characterC) lineD) none of the above14 )The _______ is software residing on the remote system that allows the remote system to receivecharacters from a TELNET server.A) terminal driverB) pseudoterminal driverC) TELNET clientD) none of the above15 )The _______ translates local characters into NVT form.A) terminal driverB) TELNET clientC) TELNET serverD) none of the above16 )The _______ translates NVT characters into a form acceptable by the remote operating system.A) terminal driverB) TELNET clientC) TELNET serverD) none of the above17 )If the sender wants to disable an option, it sends a _______ command.A) WILLB) DOC) WONTD) none of the above18 )If the sender wants to enable an option, it sends a _______ command.
  45. 45. A) WILLB) DOC) WONTD) none of the above19 )If the sender wants an option disabled by the receiver, it sends a _______ command.A) WILLB) DOC) DONTD) none of the above20 )If the sender wants an option enabled by the receiver, it sends a _______ command.A) WILLB) DOC) WONTD) none of the above
  46. 46. Chapter 19 Quiz1 )_______ is the standard mechanism provided by TCP/IP for copying a file from one host to another.A) TELNETB) SMTPC) TFTPD) none of the above2 )FTP uses the services of ________.A) UDPB) IPC) TCPD) none of the above3 )In FTP, the well-known port ____ is used for the control connection and the well-known port________ for the data connection.A) 21; 22B) 21; 20C) 20; 21D) none of the above4 )In FTP, _______ is the service type used by the IP protocol because this is an interactive connectionbetween a user (human) and a server.A) maximize throughputB) minimize delayC) minimize errorD) none of the above5 )For control connection, FTP uses the __________ character setA) regular ASCIIB) EBCDICC) NVT ASCIID) none of the above6 )During an FTP session the control connection is opened _______.A) exactly onceB) exactly twiceC) as many times as necessaryD) none of the above7 )During an FTP session the data connection is opened _______.A) exactly onceB) exactly twiceC) as many times as necessaryD) none of the above8 )In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of anattribute called _______.A) file typesB) data structuresC) transmission modesD) none of the above
  47. 47. 9 )In FTP, there are three types of _______: stream, block, and compressed.A) file typesB) data structuresC) transmission modesD) none of the above10 )In FTP, ASCII, EBCDIC, and image define an attribute called _______.A) file typeB) data structureC) transmission modeD) none of the above11 )In FTP, which category of commands is used to store and retrieve files?A) file transfer commandsB) access commandsC) file management commandsD) none of the above12 )In FTP, which category of commands defines the port number for the data connection on the clientsite?A) file transfer commandsB) access commandsC) port defining commandsD) none of the above13 )In FTP, which category of commands sets the attributes (file type, data structure, and transmissionmodes) of a file to be transferred?A) file transfer commandsB) access commandsC) data formatting commandsD) none of the above14 )In FTP, which category of commands lets a user switch directories and create or delete directories?A) file transfer commandsB) access commandsC) file management commandsD) none of the above15 )In FTP, when we _______, it is copied from the server to the client.A) retrieve a fileB) retrieve a listC) a and cD) none of the above16 )In FTP, when we _______, it is copied from the client to the server.A) retrieve a fileB) store a fileC) retrieve a listD) none of the above17 )TFTP uses the services of ________.A) TCPB) UDPC) IPD) none of the above
  48. 48. 18 )In TFTP, what type of message is sent in response to an RRQ that fails to establish a connection?A) WRQB) DATAC) ERRORD) none of the above19 )In TFTP, what type of message is sent to establish a connection to retrieve a file?A) RRQB) WRQC) DATAD) none of the above20 )In TFTP, which type of message is always a set number of bytes?A) RRQB) WRQC) ACKD) none of the above21 )In TFTP, A DATA block is sent in response to a _______ message.A) RRQB) ACKC) a or bD) none of the above22 )In TFTP, a connection is terminated with a _______ block.A) DATAB) ACKC) ERRORD) none of the above23 )An unauthorized user tries to send a file to a server using TFTP. What should be the response of theserver?A) ACKB) ERRORC) DATAD) none of the above24 )In TFTP, the block number on a DATA message is 22. This always means _______.A) there were 21 previous blocksB) there were 20 previous blocksC) this is the last blockD) none of the above25 )Which TFTP message contains a block number field?A) DATAB) ACKC) a and bD) none of the above26 )In TFTP, connection termination is signaled by a DATA message with _______ bytes.A) any positive number ofB) 512C) 0 to 511D) all of the above
  49. 49. 27 )The flow-control mechanism in TFTP _______.A) requires an ACK for every DATA messageB) is called sliding windowC) is nonexistentD) none of the above28 )In TFTP, if a message is _______, it is resent.A) damagedB) lostC) a and bD) none of the above29 )In TFTP, if a duplicate DATA message is received, _______.A) the sender sends an error messageB) the connection is terminatedC) the receiver discards the duplicateD) none of the above30 )In TFTP, one symptom of the sorcerer‫ي‬s apprentice bug is that _______.A) ACKS are duplicatedB) DATA messages are duplicatedC) a and bD) none of the above
  50. 50. Chapter 20 Quiz1 )A ________ is part of a local hard drive, a special file with permission restrictions.A) messageB) responseC) an agentD) none of the above2 )When the sender and the receiver of an email are on the same system, we need only ___________.A) one UAB) two UAsC) one UA and one MTAD) none of the above3 )When the sender and the receiver of an email are on different systems, we need only ____________ _.A) one MTAB) two UAsC) two UAs and one pair of MTAsD) none of the above4 )When the sender is connected to the mail server via a LAN or a WAN, we need only ____________ __.A) two MTAB) two UAs and two pairs of MTAsC) two UAs and a pair of MTAsD) none of the above5 )When both sender and receiver are connected to a mail server via a LAN or a WAN, we need____________A) two UAs, two pairs of MTAs, and a pair of MAAsB) two UAs, and two pairs of MTAsC) two UAs, two pairs of MTAs, and two pairs of MAAsD) none of the above6 )________ provides service to the user to make the process of sending and receiving a message easier.A) An MTAB) An MAAC) A UAD) none of the above7 )Which of the following services is not provided by a UA?A) composing messagesB) reading messagesC) replying messagesD) all are8 )There are two types of user agents: _________ and ___________.A) command-driven; data-drivenB) command-driven and GUI-basedC) command-based and data-basedD) none of the above9 )The ________ usually contains the sender address, the receiver address, and other information.A) messageB) envelopeC) both a and b
  51. 51. D) none of the above10 )The message contains the ________ and the __________.A) header; envelopB) header; bodyC) envelop; bodyD) none of the above11 )In the Internet, the email address consists of two parts: a _______ and a _______.A) local part; domain nameB) global part; domain nameC) label; domain nameD) none of the above12 )_________ is a supplementary protocol that allows non-ASCII data to be sent through email.A) JPEGB) MPEGC) MIMED) none of the above13 )The actual mail transfer is done through ____________ .A) UAsB) MTAsC) MAAsD) none of the above14 )The formal protocol that defines the MTA client and server in the Internet is called ___________.A) SMTPB) SNMPC) TELNETD) none of the above15 )The process of transferring a mail message occurs in ________ phases.A) twoB) fourC) fiveD) none of the above16 )SMTP is a __________protocol.A) pullB) pushC) both a and bD) none of the above17 )The third stage in an email transfer needs a ________ protocol.A) pullB) pushC) both a and bD) none of the above18 )The third stage in an email transfer uses a(n) ________ protocol.A) UAB) MTAC) MAAD) none of the above
  52. 52. 19 )Currently two message access protocols are available: _______ and _________.A) POP3; IMAP2B) POP4; IMAP1C) POP3; IMAP4D) none of the above20 )Which part of the mail created by the UA contains the sender and receiver names?A) envelopeB) addressC) headerD) none of the above21 )In the _______ encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits.A) 8bitB) binaryC) base64D) none of the above22 )In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.A) 8bitB) base64C) quoted-printableD) none of the above23 )This command identifies the recipient of the mail.A) HELOB) MAIL FROMC) RCPT TOD) none of the above24 )This command identifies the sender of the message.A) HELOB) MAIL FROMC) RCPT TOD) none of the above25 )The MIME _______ header uses text to describe the type of data inthe body of the message.A) content-typeB) content-transfer- encodingC) content-descriptionD) none of the above26 )_______ is more powerful and complex than _______.A) POP3; IMAP4B) IMAP4; POP3C) SMTP; POP3D) none of the above
  53. 53. Chapter 22 Quiz1 )_________ is a repository of information linked together from points all over the world.A) The WWWB) HTTPC) HTMLD) none of the above2 )The WWW today is a _______ client-server service, in which a client using a browser can access aservice using a server.A) limitedB) vastC) distributedD) none of the above3 )The _________ is a standard for specifying any kind of information on the Internet.A) URLB) ULRC) RLUD) none of the above4 )In a URL, the _______ is the client-server program used to retrieve the document.A) pathB) protocolC) hostD) none of the above5 )In a URL, the ______ is the computer on which the information is located.A) pathB) protocolC) hostD) none of the above6 )In a URL, an optional ________ can be inserted between the host and the path, and it is separatedfrom the host by a colon.A) pathB) protocolC) hostD) none of the above7 )In a URL, the _______ is the full name of the file where the information is located.A) pathB) protocolC) hostD) none of the above8 )A cookie is made by the ________ and eaten by the _________.A) client; clientB) client; serverC) server; serverD) none of the above9 )The documents in the WWW can be grouped into ______ broad categories.
  54. 54. A) twoB) threeC) fourD) none of the above10 )A _______ document is a fixed-content document that is created and stored in a server. The client canget a copy of the document only.A) staticB) dynamicC) activeD) none of the above11 )____________ _ is a language for creating Web pages.A) HTTPB) HTMLC) FTTPD) none of the above12 )A _______ document is created by a Web server whenever a browser requests the document.A) staticB) dynamicC) activeD) none of the above13 )___________ is a technology that creates and handles dynamic documents.A) GICB) CGIC) GCID) none of the above14 )Dynamic documents are sometimes referred to as _________ dynamic documents.A) client-siteB) server-siteC) both a and bD) none of the above15 )For many applications, we need a program or a script to be run at the client site. These are called____________ ___ documents.A) staticB) dynamicC) activeD) none of the above16 )One way to create an active document is to use __________.A) CGIB) Java stand-alone programsC) Java applets.D) none of the above17 )Active documents are sometimes referred to as _________ dynamic documents.A) client-siteB) server-siteC) both a and bD) none of the above
  55. 55. 18 )HTTP uses the services of _________ on well-known port 80.A) UDPB) IPC) TCPD) none of the above19 )In HTTP, the first line in a request message is called a _______ line; the first line in the responsemessage is called the ________ line.A) request; responseB) response; requestC) response; statusD) none of the above20 )In a ___________ connection, one TCP connection is made for each request/response.A) persistentB) nonpersistentC) both a and bD) none of the above21 )In a ________connecti on, the server leaves the connection open for more requests after sending aresponse.A) persistentB) nonpersistentC) both a and bD) none of the above22 )HTTP version 1.1 specifies a _________connection by default.A) persistentB) nonpersistentC) both a and bD) none of the above23 )In HTTP, a _______ server is a computer that keeps copies of responses to recent requests.A) regularB) proxyC) both a and bD) none of the above24 )An HTTP request message always contains _______.A) a header and a bodyB) a request line and a headerC) a status line, a header, and a bodyD) none of the above25 )Which of the following is present in both an HTTP request line and a status line?A) HTTP version numberB) URLC) status codeD) none of the above26 )The HTTP request line contains a _______ method to request a document from the server.A) GETB) POST
  56. 56. C) COPYD) none of the above27 )A user needs to send the server some information. The request line method is _______.A) OPTIONB) PATCHC) POSTD) none of the above28 )The HTTP request line contains a _______ method to get information about a document withoutretrieving the document itself.A) HEADB) POSTC) COPYD) none of the above29 )A response message always contains _______.A) a header and a bodyB) a request line and a headerC) a status line and a headerD) none of the above30 )An applet is _______ document application program.A) a staticB) an activeC) a passiveD) a dynamic
  57. 57. Chapter 23 Quiz1 )In ATM, end devices such as routers use all _____ layers, while switches inside the ATM network useonly the bottom ______layers.A) two; threeB) three; twoC) one; twoD) none of the above2 )The only AAL used by the Internet is __________.A) AAL1B) ALL3/4C) AAL5D) none of the above3 )AAL5 is sometimes called the _________.A) SALB) SEALC) SELD) none of the above4 )AAL5 accepts an IP packet of no more than 65,536 bytes and adds _________ in addition to padding.A) one trailerB) one headerC) both a and bD) none of the above5 )The ________ layer provides routing, traffic management, switching, and multiplexing services.A) AALB) ATMC) both a and bD) none of the above6 )When we use IP over ATM, only the ________ cell carries the 8-byte trailer added to the IP datagram.A) lastB) firstC) both a and bD) none of the above7 )When we use IP over ATM, padding can be added only to the _____ or the _______.A) first cell; last cellB) last two cells; last three cellsC) last cell; last two cellsD) none of the above8 )To find the physical address of the exiting-point router, ATM uses the services of _________.A) ARPB) IPC) ATMARPD) none of the above
  58. 58. 9 )The inverse request and inverse reply messages can bind the physical address to an IP address in a(n)_______ situation.A) SVCB) PVCC) both a and bD) none of the above10 )The request and reply message can be used to bind a physical address to an IP address in a(n)_______ situation.A) SVCB) PVCC) both a and bD) none of the above11 )The inverse request and inverse reply can also be used to build the server _______ table.A) mappingB) routingC) both a and bD) none of the above12 )__________ allows an ATM network to be divided into several logical subnets.A) LASB) LANC) LISD) none of the above13 )A router connected to an ATM network uses the _______ layers.A) AAL and ATMB) AAL and physicalC) AAL, ATM, and physicalD) none of the above14 )A switch inside an ATM network uses the _______ layers.A) AAL and ATMB) AAL and physicalC) ATM and physicalD) none of the above15 )Which ATM layer adds an 8-byte trailer to an IP packet?A) AAL5B) ATMC) physicalD) none of the above16 )Which ATM layer has a 53-byte cell as an end product?A) physicalB) ATMC) AAL5D) none of the above17 )The VPI of a UNI is _______ bits in length.A) 8B) 12C) 16
  59. 59. D) none of the above18 )The VPI of an NNI is _______ bits in length.A) 8B) 12C) 16D) none of the above19 )The _______ field of the ATM header provides error control.A) CLPB) HECC) VPCD) none of the above20 )A datagram of 1010 bytes needs _______ bytes of padding.A) 0B) 38C) 46D) 4821 )A datagram of 402 bytes is divided into _______ cells.A) 6B) 7C) 9D) none of the above22 )The maximum amount of padding that can be added is _______ bytes.A) 0B) 47C) 48D) none of the above23 )When a _______ exists between two routers on an ATM network, an ATMARP server is not needed.A) permanent virtual circuitB) switched virtual circuitC) logical IP subnetD) none of the above24 )What is the first step in establishing a virtual connection on an ATM network?A) connecting to an ATMARP serverB) connecting to the exiting-point routerC) formation of a logical IP subnetD) none of the above25 )How can two routers be connected on an ATM network?A) through a PVCB) through an SVCC) a and bD) none of the above
  60. 60. Chapter 24 Quiz1 )The main problem that must be solved in providing mobile communication using the IP protocol is_______A) connectingB) forwardingC) addressingD) none of the above2 )The original IP addressing was based on the assumption that a host is ________.A) stationaryB) mobileC) movingD) none of the above3 )The IP addresses are designed to work with ________ hosts because part of the address defines thenetwork to which the host is attached.A) stationaryB) mobileC) movingD) none of the above4 )A mobile host normally uses two addresses. The host has its original address, called the _______address and a temporary address, called the _________address.A) care-of; homeB) home; care-ofC) home; foreignerD) none of the above5 )The home address is ______.A) temporaryB) permanentC) both a and bD) none of the above6 )The care-of address is _______.A) temporaryB) permanentC) both a and bD) none of the above7 )The ___________ is usually a router attached to the home network of the mobile host.A) foreign agentB) home agentC) both a and bD) none of the above8 )The _________ acts on behalf of the mobile host when a remote host sends a packet to the mobile host.A) home agentB) foreign agentC) either a or bD) none of the above
  61. 61. 9 )When the mobile host acts as a foreign agent, the care-of address is called a _______ care-of address.A) commonB) sharedC) co-locatedD) none of the above10 )To communicate with a remote host, a mobile host goes through ________ phases.A) threeB) twoC) fourD) none of the above11 )The first phase in mobile communication is called _________.A) registrationB) agent discoveryC) data transferD) none of the above12 )The second phase in mobile communication is called _________.A) registrationB) agent discoveryC) data transferD) none of the above13 )The third phase in mobile communication is called _________.A) registrationB) agent discoveryC) data transferD) none of the above14 )Mobile IP uses the router advertisement packet of _______ and appends an agent advertisementmessage.A) IGMPB) IPC) ICMPD) none of the above15 )A registration request or reply is sent by ________ using the well-known port 434.A) TCPB) IPC) UDPD) none of the above16 )_________ occurs when a remote host communicates with a mobile host that has moved to the samenetwork (or site) as the remote host.A) Triple crossingB) Double crossingC) Triangle routingD) none of the above17 )_______ occurs when the remote host communicates with a mobile host that is not attached to thesame network (or site) as the mobile host.A) Triple crossingB) Double crossing
  62. 62. C) Triangle routingD) none of the above18 )In the _______ phase, a mobile host must learn the address of its home agent.A) agent discoveryB) registrationC) data transferD) none of the above19 )In the _______ phase, a mobile host must learn the address of its foreign agent.A) agent discoveryB) registrationC) data transferD) none of the above20 )If a router acts as an agent, it advertises its presence in a network by appending an agent _______message to an ICMP router advertisement.A) solicitationB) advertisementC) discoveryD) none of the above21 )A mobile host can send an agent _______ message if it has not received any agent advertisements.A) solicitationB) discoveryC) registrationD) none of the above22 )When a mobile host wants to register with its foreign agent, it sends _______ message.A) an agent solicitationB) an agent advertisementC) a registration requestD) none of the above23 )The registration reply is sent by the _______ agent to the foreign agent.A) homeB) care-ofC) discoveryD) none of the above24 )The _______ uses a registry table to find the care-of address of the mobile host.A) home agentB) foreign agentC) remote hostD) none of the above
  63. 63. Chapter 25 Quiz1 )We can divide audio and video services into _______ broad categories.A) threeB) twoC) fourD) none of the above2 )________ audio/video refers to on-demand requests for compressed audio/video files.A) Streaming liveB) Streaming storedC) InteractiveD) none of the above3 )___________ audio/video refers to the broadcasting of radio and TV programs through the Internet.A) InteractiveB) Streaming liveC) Streaming storedD) none of the above4 )_________ audio/video refers to the use of the Internet for interactive audio/video applications.A) InteractiveB) Streaming liveC) Streaming storedD) none of the above5 )According to the Nyquist theorem, we need to sample an analog signal _______times the highestfrequency.A) threeB) twoC) fourD) none of the above6 )In __ encoding, the differences between the samples are encoded instead of encoding all the sampledvalues.A) predictiveB) perceptualC) both a and bD) none of the above7 )____ encoding is based on the science of psychoacoustics, which is the study of how people perceivesound.A) PredictiveB) PerceptualC) both a and bD) none of the above8 )____________ is used to compress images.A) MPEGB) JPEGC) either a or bD) none of the above
  64. 64. 9 )____________ is used to compress video.A) MPEGB) JPEGC) either a or bD) none of the above10 )The first phase of JPEG is ___________.A) DCT transformationB) quantizationC) data compressionD) none of the above11 )The second phase of JPEG is ___________.A) DCT transformationB) quantizationC) data compressionD) none of the above12 )The third phase of JPEG is ___________.A) DCT transformationB) quantizationC) data compressionD) none of the above13 )Jitter is introduced in real-time data by the ____________ ___.A) error caused during transmissionB) delay between packetsC) both a and bD) none of the above14 )To prevent _________, we can timestamp the packets and separate the arrival time from theplayback time.A) errorB) jitterC) either a or bD) none of the above15 )A ________buffer is required for real-time traffic.A) playbackB) reorderingC) sortingD) none of the above16 )A __________on each packet is required for real-time traffic.A) timestampB) sequence numberC) both a and bD) none of the above17 )Real-time traffic needs the support of ____________ .A) broadcastingB) multicastingC) both a and bD) none of the above
  65. 65. 18 )__________ means changing the encoding of a payload to a lower quality to match the bandwidth ofthe receiving network.A) TranslationB) MixingC) both a and bD) none of the above19 )__________ means combining several streams of traffic into one stream.A) TranslationB) MixingC) both a and bD) none of the above20 )_________ is not suitable for interactive multimedia traffic because it retransmits packets in case oferrors.A) UDPB) TCPC) both a and bD) none of the above21 )__________ is the protocol designed to handle real-time traffic on the Internet.A) TCPB) UDPC) RTPD) none of the above22 )RTP uses a temporary even-numbered _______ port.A) UDPB) TCPC) both a and bD) none of the above23 )___________ is a protocol for controlling the flow and quality of data.A) RTPB) RTCPC) UDPD) none of the above24 )RTCP uses an odd-numbered _______ port number that follows the port number selected for RTP.A) UDPB) TCPC) both a and bD) none of the above25 )___________ is an application protocol that establishes, manages, and terminates a multimediasessionA) RIPB) SIPC) DIPD) none of the above26 )_______ is a standard to allow telephones on the public telephone network to talk to computersconnected to the Internet.A) SIPB) H.323
  66. 66. C) Q.991D) none of the above27 )A real-time video performance lasts 10 min. If there is jitter in the system, the viewer spends _______minutes watching the performance.A) less than 10B) more than 10C) exactly 10D) none of the above28 )A _______ shows the time a packet was produced relative to the first or previous packet.A) timestampB) playback bufferC) sequence numberD) none of the above29 )_______ are used to number the packets of a real-time transmission.A) TimestampsB) Playback buffersC) Sequence numbersD) none of the above30 )In a real-time video conference, data from the server is _______ to the client sites.A) unicastB) multicastC) broadcastD) none of the above31 )A _______ adds signals from different sources to create a single signal.A) timestampB) sequence numberC) mixerD) none of the above32 )A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidthsignal.A) timestampB) sequence numberC) translatorD) none of the above33 )An RTP packet is encapsulated in _______.A) a UDP user datagramB) a TCP segmentC) an IP datagramD) none of the above34 )When there is more than one source, the _______ identifier defines the mixer.A) synchronization sourceB) contributorC) timestampD) none of the above
  67. 67. Chapter 26 Quiz1 )Private networks, hybrid networks, and virtual private networks can provide _________ fororganizationsA) efficiencyB) privacyC) a and bD) none of the above2 )Both private and hybrid networks have a major drawback: _________.A) lack of privacyB) costC) both a and bD) none of the above3 )A _______ network allows an organization to have its own private internet and, at the same time,access the global Internet.A) privateB) publicC) hybridD) none of the above4 )When an organization uses a private network, it ____________ ___.A) needs to obtain a block of addresses from the Internet authoritiesB) can use a block of addresses without permission from the Internet authoritiesC) needs to register the block of addresses being used.D) none of the above5 )VPN is a network that is _______ but ________.A) private; publicB) private; virtualC) public; virtualD) none of the above6 )A VPN is physically ________ but virtually ________.A) public; privateB) private; publicC) public; hybridD) none of the above7 )VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________and ________.A) SSL; tunnelingB) IPSec; SSLC) IPSec; tunnelingD) none of the above8 )____________ means that each IP datagram destined for private use in the organization must beencapsulated in another datagram.A) MulticastingB) BroadcastingC) TunnelingD) none of the above
  68. 68. 9 )__________ technology allows a site to use a set of private addresses for internal communication and aset of global Internet addresses for communication with another site.A) VPNB) NATC) both a and bD) none of the above10 )Using _______, all of the outgoing packets go through the corresponding router, which replaces thesource address in the packet with the appropriate global address.A) VPNB) NATC) both a and bD) none of the above11 )An _______ is a private network with no external access that uses the TCP/IP protocol suite.A) extranetB) internetC) intranetD) none of the above12 )An _______ is a private network with limited external access that uses the TCP/IP protocol suite.A) extranetB) internetC) intranetD) none of the above13 )A _______ network is totally isolated from the global Internet.A) privateB) hybridC) virtual privateD) none of the above14 )A _______ network can use a leased line for intraorganization communication and the Internet forinterorganization communication.A) privateB) hybridC) virtual privateD) none of the above15 )A VPN can use _______ to guarantee privacy.A) IPSecB) tunnelingC) both a and bD) none of the above16 )Tunneling is a technique in which the IP datagram is first _______ and then _______.A) encapsulated in another datagram; encryptedB) encrypted; encapsulated in another datagramC) authenticated; encryptedD) encrypted; authenticated17 )_______ is a technology using a set of global Internet addresses and a set of private addresses.
  69. 69. A) VPNB) ISPC) NATD) none of the above18 )On a network that uses NAT, the _______ has a translation table.A) bridgeB) routerC) serverD) none of the above19 )On a network that uses NAT, _______ initiates the communication.A) an external hostB) an internal hostC) the routerD) none of the above20 )On a network that uses NAT, the router can use _______ global address(es).A) 1B) 2C) a pool ofD) none of the above
  70. 70. Chapter 27 Quiz1 )An IPv6 address is _________ bits long.A) 32B) 64C) 128D) none of the above2 )In IPv6, options are inserted between the _________ and the ___________ data.A) base header; extension headerB) base header; upper-layer dataC) base header; frame headerD) none of the above3 )IPv6 allows _________ security provisions than IPv4.A) moreB) lessC) the same levelD) none of the above4 )An IPv6 address consists of ________ bytes (octets);A) 4B) 8C) 16D) none of the above5 )To make addresses more readable, IPv6 specifies ____________ notation.A) dotted decimalB) hexadecimal colonC) both a and bD) none of the above6 )In hexadecimal colon notation, a 128-bit address is divided into _______ sections, each _____hexadecimal digits in length.A) 8: 2B) 8: 3C) 8: 4D) none of the above7 )An IPv6 address can have up to __________ colons.A) 8B) 7C) 4D) none of the above8 )An IPv6 address can have up to __________ hexadecimal digits.A) 16B) 32C) 8D) none of the above9 )If an IPv6 address has digits of ________, we can abbreviate the address.A) 1sB) Fs
  71. 71. C) 0sD) none of the above10 )In IPv6, _______ address defines a single computer.A) a unicastB) a multicastC) an anycastD) none of the above11 )In IPv6, ____ address defines a group of computers with addresses that have the same prefix.A) a unicastB) a multicastC) an anycastD) none of the above12 )_________ address defines a group of computers.A) A unicastB) A multicastC) An anycastD) none of the above13 )In IPv6, the ________ prefix defines the purpose of the address.A) typeB) purposeC) both a and bD) none of the above14 )In IPv6, the_________ __ address is generally used by a normal host as a unicast address.A) provider-based unicastB) link localC) site localD) none of the above15 )A _________ address comprises 80 bits of zero, followed by 16 bits of one, followed by the 32-bit IPv4address.A) link localB) site localC) mappedD) none of the above16 )A ___________ address is an address of 96 bits of zero followed by 32 bits of IPv4 address.A) link localB) site localC) mappedD) none of the above17 )A _______ address is used if a LAN uses the Internet protocols but is not connected to the Internetfor security reasons.A) link localB) site localC) mappedD) none of the above18 )The ______ address is used if a site with several networks uses the Internet protocols but is notconnected to the Internet for security reasons.A) link local
  72. 72. B) site localC) mappedD) none of the above19 )Which of the following is a necessary part of the IPv6 datagram?A) base headerB) data packet from the upper layerC) a and bD) none of the above20 )The _______ field in the base header restricts the lifetime of a datagram.A) versionB) priorityC) hop limitD) none of the above21 )When a datagram needs to be discarded in a congested network, the decision is based on the _______field in the base header.A) hop limitB) priorityC) next headerD) none of the above22 )The _______ field in the base header and the sender IP address combine to indicate a unique pathidentifier for a specific flow ofdata.A) flow labelB) next headerC) hop limitD) none of the above23 )In the _______ extension header, the destination address changes from router to router.A) source routingB) fragmentationC) authenticationD) payload24 )To request the physical address of a host whose IP address is known, a _______ message is sent.A) membership-queryB) router-solicitationC) neighbor-solicitati onD) neighbor-advertisem ent25 )If a host needs information about routers on the network, it sends a _______ message.A) membership-reportB) router-solicitationC) neighbor-solicitati onD) neighbor-advertisem ent26 )The ARP function in version 4 is part of _______ in version 6.A) echo request and replyB) router solicitation and advertisementC) neighbor solicitation and advertisementD) none of the above
  73. 73. 27 )The IGMP functions in version 4 are part of _______ in version 6.A) echo request and replyB) router solicitation and advertisementC) group membershipD) none of the above28 )To join a group, a host sends a _______.A) group-membership reportB) group-membership queryC) group-membership terminationD) none of the above29 )The purpose of echo request and echo reply is to _______.A) report errorsB) check node-to-node communicationC) check group membershipsD) none of the above30 )A router sends a _______ message to the host to monitor group membership.A) reportB) queryC) terminationD) none of the above31 )In error reporting the encapsulated ICMP packet goes to _______.A) the sourceB) the destinationC) a routerD) none of the above32 )In error reporting, a destination can send a _______ message if an option is not recognized.A) parameter-problemB) packet-too-bigC) time-exceededD) none of the above33 )An MTU field is found on the _______ error message to inform the sender about packet size.A) destination- unreachableB) time-exceededC) parameter-problemD) none of the above34 )When the hop count field reaches zero and the destination has not been reached, a _______ errormessage is sent.A) destination- unreachableB) time-exceededC) parameter-problemD) none of the above35 )When all fragments of a message have not been received within the designated amount of time, a_______ error message is sent.A) destination- unreachable
  74. 74. B) time-exceededC) parameter-problemD) none of the above36 )Errors in the header or option fields of an IP datagram require a _______ error message.A) destination- unreachableB) time-exceededC) parameter-problemD) none of the above37 )If a member of a group wishes to terminate membership, it can _______ in response to a groupmembership query.A) send a group membership reportB) send a group membership terminationC) send a group membership queryD) none of the above38 )In version 6, an independent protocol called _______ is eliminated.A) ICMPB) IPC) IGMPD) none of the above39 )The _______ packet contains information about a router.A) router solicitationB) router informationC) router advertisementD) none of the above40 )When a host has the _______ address of a host but needs the _______ address, it uses a neighborsolicitation packet.A) physical; protocol portB) physical; data link layerC) IP; physicalD) none of the above41 )A router can send a _______ message to a host to inform it of a more efficient path.A) neighbor-solicitati onB) router-solicitationC) redirectionD) none of the above42 )Which version 4 protocols are still viable and known by their same names in version 6?A) IGMPB) ARPC) RARPD) none of the above43 )Which error-reporting message from version 4 has been eliminated in version 6?A) packet too bigB) destination unreachableC) source quenchD) none of the above44 )Which error-reporting message is found in version 6 but not in version 4?
  75. 75. A) packet too bigB) destination unreachable C) parameter problemD) none of the aboveChapter 28 Quiz1 )In cryptography, the encryption/decrypti on algorithms are ________; the keys are ________.A) secret; publicB) public; secretC) secret; secretD) none of the above2 )In __________cryptogra phy, the same key is used by the sender (for encryption) and the receiver (fordecryption).A) symmetric-keyB) asymmetric-keyC) public-keyD) none of the above3 )In _________ cryptography, the same key is used in both directions.A) symmetric-keyB) asymmetric-keyC) public-keyD) none of the above4 )The DES cipher uses the same concept as the _________ cipher, but the encryption/ decryptionalgorithm is much more complex.A) RSAB) AESC) CaesarD) none of the above5 )_________ cryptography is often used for long messages.A) Symmetric-keyB) Asymmetric-keyC) Public-keyD) none of the above6 )___________ algorithms are more efficient for short messages.A) Symmetric-keyB) Asymmetric-keyC) Public-keyD) none of the above7 )__________means that the sender and the receiver expect confidentiality.A) Non-repudiationB) IntegrityC) AuthenticationD) none of the above8 )___________ means that the data must arrive at the receiver exactly as they were sent.A) Non-repudiationB) Message integrityC) AuthenticationD) none of the above
  76. 76. 9 )________ __ means that the receiver needs to be sure of the sender identity and that an imposter hasnot sent the message.A) Non-repudiationB) Message integrityC) Message authenticationD) none of the above10 )____________ __ can provide authentication, integrity, and nonrepudiation for a message.A) Encryption/decrypti onB) Digital signatureC) CompressionD) none of the above11 )Digital signature does not provide _________.A) non-repudiationB) privacyC) authenticationD) provides all of the above12 )In ___________, the entity identity is verified once for the entire duration of system access.A) entity authenticationB) message integrityC) message authenticationD) none of the above13 )The symmetric (shared) key in the Diffie-Hellman protocol is ____________ .A) K = Gxy mod NB) K = Gx mod NC) K = Gy mod ND) none of the above14 )In __________ cryptography, everyone has access to everyone‫ي‬s public key.A) symmetric-keyB) asymmetric-keyC) both a and bD) none of the above15 )___________servers are involved in the Kerberos protocol.A) TwoB) ThreeC) FourD) none of the above16 )n Kerberos, the _______ is the KDC.A) ASB) TGSC) real serverD) none of the above17 )In Kerberos, the _______ issues the ticket for the real server.A) ASB) TGSC) real serverD) none of the above
  77. 77. 18 ) In Kerberos, the ___________ provides services for the entity.A) ASB) TGSC) real serverD) none of the above19 ) Kerberos allows the global distribution of ASs and TGSs, with each system called a ________A) serverB) realmC) clientD) none of the above20 )IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering TaskForce) to provide security for a packet at the _________ level.A) data linkB) networkC) transportD) none of the above21 ) IPSec requires a logical connection between two hosts using a signaling protocol called ____________.A) ASB) SAC) ASD) none of the above22 ) IPSec operates at two different modes: _________ mode and _________mode.A) transport; networkB) transport; tunnelC) tunnel; surfaceD) none of the above23 ) In the _________ mode, the IPSec header is added between the IP header and the rest of the packet.A) transportB) tunnelC) both a and bD) none of the above24 )In the ________ mode, the IPSec header is placed in front of the original IP header.A) transportB) tunnelC) both a and bD) none of the above25 ) IPSec defines two protocols: _________ and __________.A) AH: SSPB) ESP; SSPC) AH: EHD) none of the above26 ) The ________ protocol is designed to authenticate the source host and to ensure the integrity of thepayload carried by the IP packet.A) AHB) ESP
  78. 78. C) both a and bD) none of the above27 ) The _______ protocol provides message authentication and integrity, but not privacy.A) AHB) ESPC) both a and bD) none of the above28 ) The _______ protocol provides message authentication, integrity, and privacy.A) AHB) ESPC) both a and bD) none of the above29 ) The _______ was designed to provide security at the transport layer.A) AHB) ESPC) TLSD) none of the above30 ) _______ was invented by Phil Zimmermann to provide all four aspects of security in the sending ofemail.A) AHB) ESPC) TLSD) none of the above31 ) A packet-filter firewall filters at the ________ or ___________ layer.A) network; applicationB) transport; applicationC) network; transportD) none of the above32 ) A proxy firewall filters at the __________ layer.A) transportB) networkC) applicationD) none of the above33 ) Before a message is encrypted, it is called _______.A) plaintextB) ciphertextC) cryptotextD) none of the above34 )After a message is encrypted, it is called _______.A) plaintextB) ciphertextC) cryptotextD) none of the above35 ) If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are

×