 Home Self-Assessment Multiple Choice Quiz Chapter 5
1
2
Self-Assessment Multiple Choice Quiz
Chapter 5: The Network Layer: Control Plane
The link-state algorithm in Section 4.5 has the following properties:
Suppose that c(E,F) = 6 instead of 2 in Figure 4.27. Then the link state algorithm nds
the shortest path to F in
In routing among ASs which of the following issues dominants:
Computer Networking: a Top-Down
Approach, 7th Edition
Kurose • Ross
COMPANION WEBSITE Help  Sign out
it requires the source node to know the costs between every pair of adjacentit requires the source node to know the costs between every pair of adjacent
nodes in the graphnodes in the graph
after theafter the kkth iteration, the least-cost paths are known toth iteration, the least-cost paths are known to kk nodesnodes
it determines the shortest path from the source node to all other nodesit determines the shortest path from the source node to all other nodes
all of the aboveall of the above
step 6step 6
step 5step 5
step 3step 3
step 4step 4
3
4
5
In routing among ASs, which of the following issues dominants:
The ICMP protocol
As part of hierarchical routing, hot-potato routing does the following:
number of ASs traversednumber of ASs traversed
geographical distance between ASsgeographical distance between ASs
current congestion levels in the ASscurrent congestion levels in the ASs
policypolicy
runs on top of UDPruns on top of UDP
runs on top of TCPruns on top of TCP
runs directly on top of IPruns directly on top of IP
none of the abovenone of the above
Provides information to a router about the existence of external networks.Provides information to a router about the existence of external networks.
Determines the number of ASes in the shortest AS path from router toDetermines the number of ASes in the shortest AS path from router to
destination.destination.
Chooses the gateway that has the smallest cost.Chooses the gateway that has the smallest cost.
Labels suspicious packets as “hot”.Labels suspicious packets as “hot”.
6
7
8
Which of the following statements best describes the purpose of the SNMP protocol:
What is the purpose of the SNMP SetRequest message?
Suppose a network manager wanted to query the value of the number of TCP
segments received by a host running the Microsoft Windows 2000 operating system
in a US-based company. What would be the pre x (leading digits) of the MIB variable
that should be queried:
What is the maximum number of received UDP datagrams that can be counted
The SNMP protocol specifies the actions a network manager should take inThe SNMP protocol specifies the actions a network manager should take in
response to a specific set of network fault conditions.response to a specific set of network fault conditions.
The SNMP protocol is a tool for gathering data about network conditions andThe SNMP protocol is a tool for gathering data about network conditions and
executing remote actions at remote managed devicesexecuting remote actions at remote managed devices
The SNMP protocol is used by the network manager to provision resources,The SNMP protocol is used by the network manager to provision resources,
such as bandwidth, server capacity and other computational/communicationsuch as bandwidth, server capacity and other computational/communication
resources needed to meet the mission-specific needs of an enterpriseresources needed to meet the mission-specific needs of an enterprise
To allow a managing entity to query the value of a set of MIB object values in aTo allow a managing entity to query the value of a set of MIB object values in a
managed device.managed device.
To allow a managing entity to set the value of one or more MIB objects in aTo allow a managing entity to set the value of one or more MIB objects in a
managed device.managed device.
To allow a managed device to request and receive a set of initial values for MIBTo allow a managed device to request and receive a set of initial values for MIB
objects in the managed deviceobjects in the managed device
1.2.8401.2.840
1.3.6.1.2.1.11.3.6.1.2.1.1
1.2.840.113561.2.840.11356
9
Pearson Higher Education
About Us
Educators
Academic Executives
Students
Other Customers
Browse our Catalog
Pearson Higher Education
Contact a Rep
Find your Pearson rep
Technical Help
Pearson Technical Support
What is the maximum number of received UDP datagrams that can be counted
(without over ow) in the MIB-2 UDP module?
Copyright © 2018 Pearson Education. All rights reserved.   Terms of Use |  Privacy Policy |  Permissions |  Report Piracy |  Accessibility
See Results
Reset / Start Over
2**16 - 12**16 - 1
2**31 - 12**31 - 1
2**32 - 12**32 - 1
2**64 -12**64 -1

Chapter 5 - The Network Layer: Control Plane

  • 1.
     Home Self-AssessmentMultiple Choice Quiz Chapter 5 1 2 Self-Assessment Multiple Choice Quiz Chapter 5: The Network Layer: Control Plane The link-state algorithm in Section 4.5 has the following properties: Suppose that c(E,F) = 6 instead of 2 in Figure 4.27. Then the link state algorithm nds the shortest path to F in In routing among ASs which of the following issues dominants: Computer Networking: a Top-Down Approach, 7th Edition Kurose • Ross COMPANION WEBSITE Help  Sign out it requires the source node to know the costs between every pair of adjacentit requires the source node to know the costs between every pair of adjacent nodes in the graphnodes in the graph after theafter the kkth iteration, the least-cost paths are known toth iteration, the least-cost paths are known to kk nodesnodes it determines the shortest path from the source node to all other nodesit determines the shortest path from the source node to all other nodes all of the aboveall of the above step 6step 6 step 5step 5 step 3step 3 step 4step 4
  • 2.
    3 4 5 In routing amongASs, which of the following issues dominants: The ICMP protocol As part of hierarchical routing, hot-potato routing does the following: number of ASs traversednumber of ASs traversed geographical distance between ASsgeographical distance between ASs current congestion levels in the ASscurrent congestion levels in the ASs policypolicy runs on top of UDPruns on top of UDP runs on top of TCPruns on top of TCP runs directly on top of IPruns directly on top of IP none of the abovenone of the above Provides information to a router about the existence of external networks.Provides information to a router about the existence of external networks. Determines the number of ASes in the shortest AS path from router toDetermines the number of ASes in the shortest AS path from router to destination.destination. Chooses the gateway that has the smallest cost.Chooses the gateway that has the smallest cost. Labels suspicious packets as “hot”.Labels suspicious packets as “hot”.
  • 3.
    6 7 8 Which of thefollowing statements best describes the purpose of the SNMP protocol: What is the purpose of the SNMP SetRequest message? Suppose a network manager wanted to query the value of the number of TCP segments received by a host running the Microsoft Windows 2000 operating system in a US-based company. What would be the pre x (leading digits) of the MIB variable that should be queried: What is the maximum number of received UDP datagrams that can be counted The SNMP protocol specifies the actions a network manager should take inThe SNMP protocol specifies the actions a network manager should take in response to a specific set of network fault conditions.response to a specific set of network fault conditions. The SNMP protocol is a tool for gathering data about network conditions andThe SNMP protocol is a tool for gathering data about network conditions and executing remote actions at remote managed devicesexecuting remote actions at remote managed devices The SNMP protocol is used by the network manager to provision resources,The SNMP protocol is used by the network manager to provision resources, such as bandwidth, server capacity and other computational/communicationsuch as bandwidth, server capacity and other computational/communication resources needed to meet the mission-specific needs of an enterpriseresources needed to meet the mission-specific needs of an enterprise To allow a managing entity to query the value of a set of MIB object values in aTo allow a managing entity to query the value of a set of MIB object values in a managed device.managed device. To allow a managing entity to set the value of one or more MIB objects in aTo allow a managing entity to set the value of one or more MIB objects in a managed device.managed device. To allow a managed device to request and receive a set of initial values for MIBTo allow a managed device to request and receive a set of initial values for MIB objects in the managed deviceobjects in the managed device 1.2.8401.2.840 1.3.6.1.2.1.11.3.6.1.2.1.1 1.2.840.113561.2.840.11356
  • 4.
    9 Pearson Higher Education AboutUs Educators Academic Executives Students Other Customers Browse our Catalog Pearson Higher Education Contact a Rep Find your Pearson rep Technical Help Pearson Technical Support What is the maximum number of received UDP datagrams that can be counted (without over ow) in the MIB-2 UDP module? Copyright © 2018 Pearson Education. All rights reserved.   Terms of Use |  Privacy Policy |  Permissions |  Report Piracy |  Accessibility See Results Reset / Start Over 2**16 - 12**16 - 1 2**31 - 12**31 - 1 2**32 - 12**32 - 1 2**64 -12**64 -1