Site MapHelpFeedbackQuizzes
Quizzes
(See related pages)

1
Packetizing at the network layer involves
A)Encapsulating the payload at the source
B)Adds a header that contains the source and destination information
C)Decapsulating the payload at the destination
D)All of the choices are correct
2
Routers in the path are not allowed to ___________________________.
A)fragment the packet they receive
B)decapsulate the packet
C)change source or destination address
D)All of the choices are correct
3
The network layer in the Internet provides _________________.
A)comprehensive error and flow control.
B)limited error control, but no flow control.
C)comprehensive error control but limited flow control.
D)All of the choices are correct
4
In a virtual-circuit approach, the forwarding decision is based on the value of the _____________ field in the packet header.
A)source address
B)destination address
C)label
D)None of the choices are correct
5
In a datagram approach, the forwarding decision is based on the value of the _____________ field in the packet header.
A)source address
B)destination address
C)label
D)None of the choices are correct
6
The performance of a network can be measured in terms of ________.
A)delay
B)throughput
C)packet loss
D)all of the choices are correct
7
Transmission delay (time) is the ratio of ______________________.
A)transmission rate to packet length
B)transmission rate to distance
C)packet length to transmission rate
D)processing time to transmission rate
8
Propagation delay (time) is the ratio of ______________________.
A)transmission rate to propagation speed
B)propagation speed to distance
C)packet length to propagation speed
D)distance to propagation speed
9
When the load in the network reaches the network capacity, the packet delay ___________ and the network throughput reaches ______________.
A)increases sharply; its minimum
B)increases sharply; its maximum
C)decreases sharply; its minimum
D)decreases sharply; its maximum
10
In open-loop congestion control, policies are applied ____________________.
A)to prevent congestion before it happens
B)to alleviate congestion after it happens
C)to either prevent congestion before it happens or to alleviate congestion after it happens
D)None of the choices are correct
11
The __________________ technique is one of the open-loop congestion policy
A)backpressure
B)choke packet
C)implicit signaling
D)None of the choices are correct
12
The __________________ technique is one of the close-loop congestion policy
A)acknowledgment policy
B)choke packet
C)discarding policy
D)None of the choices are correct
13
IP is a _________ protocol.
A)connection-oriented unreliable
B)connection-oriented reliable
C)connectionless unreliable
D)connectionless reliable
14
An HLEN value of decimal 10 means _______.
A)there are 10 bytes of options
B)there are 10 bytes in the header
C)there are 40 bytes of options
D)there are 40 bytes in the header
15
If the fragment offset has a value of 100, it means that _______.
A)the datagram has not been fragmented
B)the datagram is 100 bytes in size
C)the first byte of the datagram is byte 800
D)None of the choices are correct
16
What is needed to determine the number of the last byte of a fragment?
A)offset number
B)total length
C)both offset number and the total length
D)None of the choices are correct
17
The IP header size is _______ bytes long.
A)20 to 60
B)20
C)60
D)None of the choices are correct
18
Packets in the IP layer are called _________.
A)segments
B)datagrams
C)frames
D)None of the choices are correct
19
The total length field defines the total length of the datagram _________.
A)including the header
B)excluding the header
C)excluding the option length
D)None of the choices are correct
20
When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.
A)MUT
B)MAT
C)MTU
D)None of the choices are correct
21
An IPv4 address is normally represented in base ____ in dotted-decimal notation.
A)16
B)256
C)10
D)None of the choices are correct
22
In classful addressing, the IPv4 address space is divided into _______ classes.
A)3
B)4
C)5
D)None of the choices are correct
23
The number of addresses assigned to an organization in classless addressing _______.
A)can be any number
B)must be a multiple of 256
C)must be a power of 2
D)None of the choices are correct
24
The first address assigned to an organization in classless addressing _______.
A)must be evenly divisible by the number of addresses in the organization
B)must be divisible by 128
C)must belong to one of the A, B, or C classes
D)None of the choices are correct
25
In subnetting, the number of addresses in each subnet must _______.
A)be a power of 2
B)be a multiple of 128
C)be divisible by 128
D)None of the choices are correct
26
What is the default prefix length for class A in CIDR notation?
A)9
B)8
C)16
D)None of the choices are correct
27
What is the default prefix length for class B in CIDR notation?
A)9
B)8
C)16
D)None of the choices are correct
28
What is the default prefix length for class C in CIDR notation?
A)24
B)8
C)16
D)None of the choices are correct
29
DHCP is a (an) ___________ layer protocol.
A)application
B)transport
C)network
D)data-link
30
In DHCP, the client uses ________ port and the server uses _________ port.
A)an ephemeral; a well-known
B)a well-known; a well-known
C)a well-known; an ephemeral
D)None of the choices are correct
31
DHCP uses the services of _______.
A)UDP
B)TCP
C)IP
D)None of the choices are correct
32
_________ allows a site to use a set of private addresses for internal communication and a set of global Internet addresses for communication with the rest of the world.
A)DHCP
B)NAT
C)IMCP
D)None of the choices are correct
33
The idea of address aggregation was designed to alleviate the increase in routing table entries when using ________ addressing.
A)classful
B)classless
C)classful or classless
D)None of the choices are correct
34
The use of hierarchy in routing tables can ________ the size of the routing tables.
A)reduce
B)increase
C)neither reduce nor increase
D)None of the choices are correct
35
ICMP is a (an) _________ layer protocol.
A)application-layer protocol that helps TCP/IP at the network layer
B)transport-layer protocol that helps TCP/IP at the network layer
C)network-layer protocol.
D)data-link layer protocol that helps TCP/IP at the network layer
36
Which of the following is true about ICMP messages?
A)An ICMP error message may be generated for an ICMP error message.
B)An ICMP error message may be generated for a fragmented datagram.
C)An ICMP error message may be generated for a multicast datagram.
D)None of the choices are correct
37
Routing inside an autonomous system is referred to as ________ routing.
A)interdomain
B)intradomain
C)out-of-domain
D)None of the choices are correct
38
Routing between autonomous systems is referred to as ______ routing.
A)interdomain routing
B)intradomain routing
C)out-of-domain
D)None of the choices are correct
39
In _______ routing, the least cost route between any two nodes is the route with the minimum distance.
A)path vector
B)distance vector
C)link state
D)None of the choices are correct
40
In ________, each node maintains a vector (table) of minimum distances to every node.
A)path vector
B)distance vector
C)link state
D)None of the choices are correct
41
In distance vector routing, each node periodically shares its routing table with _________ and whenever there is a change.
A)every other node
B)its immediate neighbors
C)one neighbor
D)None of the choices are correct
42
The Routing Information Protocol (RIP) is an intradomain routing based on _________ routing.
A)distance vector
B)link state
C)path vector
D)None of the choices are correct
43
The metric used by _______ is the hop count.
A)OSPF
B)RIP
C)BGP
D)None of the choices are correct
44
In RIP, the ________ timer controls the advertising of regular update messages.
A)garbage collection
B)expiration
C)periodic
D)None of the choices are correct
45
In RIP, the ________ timer is used to purge invalid routes from the table.
A)garbage collection
B)expiration
C)periodic
D)None of the choices are correct
46
In RIP, the ________ timer controls the validity of the route.
A)garbage collection
B)expiration
C)periodic
D)None of the choices are correct
47
RIP uses the services of _______.
A)TCP
B)UDP
C)IP
D)None of the choices are correct
48
The _________ routing uses the Dijkstra algorithm to build a routing table.
A)distance vector
B)link state
C)path vector
D)None of the choices are correct
49
The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _______ routing.
A)distance vector
B)link state
C)path vector
D)None of the choices are correct
50
The _______ protocol allows the administrator to assign a cost, called the metric, to each route.
A)OSPF
B)RIP
C)BGP
D)None of the choices are correct
51
In OSPF, a ________ link connects two routers without any other host or router in between.
A)point-to-point
B)transient
C)stub
D)None of the choices are correct
52
In OSPF, a _______ link is a network with several routers attached to it.
A)point-to-point
B)transient
C)stub
D)None of the choices are correct
53
In OSPF, a ________ link is a network connected to only one router.
A)point-to-point
B)transient
C)stub
D)None of the choices are correct
54
In OSPF, a ________ defines the links of a network.
A)network link
B)router link
C)summary link to network
D)None of the choices are correct
55
___________ is an interdomain routing protocol using path vector routing.
A)BGP
B)RIP
C)OSPF
D)None of the choices are correct
56
A one-to-all communication between one source and all hosts on a network is classified as a _______ communication.
A)unicast
B)multicast
C)broadcast
D)None of the choices are correct
57
A one-to-many communication between one source and a specific group of hosts is classified as a _______ communication.
A)unicast
B)multicast
C)broadcast
D)None of the choices are correct
58
A one-to-one communication between one source and one destination is classified as a _______ communication.
A)unicast
B)multicast
C)broadcast
D)None of the choices are correct
59
In ______, the router forwards the received packet through only one of its interfaces.
A)unicasting
B)multicasting
C)broadcasting
D)None of the choices are correct
60
In multicast routing, each involved router needs to construct a ________ path tree for each group.
A)average
B)longest
C)shortest
D)None of the choices are correct
61
In the _______ tree approach to multicasting, each router needs to create a separate tree for each source-group.
A)group-shared
B)source-based
C)destination-based
D)None of the choices are correct
62
The Multicast Open Shortest Path First (MOSPF) routing uses the _______ tree approach.
A)source-based
B)group-shared
C)destination-based
D)None of the choices are correct
63
The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is based on _______ routing.
A)distance vector
B)link state
C)path vector
D)None of the choices are correct
64
In RPF, a router forwards only the copy that has traveled the _______ path from the source to the router.
A)shortest
B)longest
C)average
D)None of the choices are correct
65
RPF eliminates the ________ in the flooding process.
A)forwarding
B)backwarding
C)flooding
D)None of the choices are correct
66
RPB creates a shortest path _______ tree from the source to each destination.
A)unicast
B)multicast
C)broadcast
D)None of the choices are correct
67
RPB guarantees that each destination receives _________ of the packet.
A)only one copy
B)no copies
C)multiple copies
D)None of the choices are correct
68
In ________, the multicast packet must reach only those networks that have active members for that particular group.
A)RPF
B)RPB
C)RPM
D)None of the choices are correct
69
_______ adds pruning and grafting to _______ to create a multicast shortest path tree that supports dynamic membership changes.
A)RPM; RPB
B)RPB; RPM
C)RPF; RPM
D)None of the choices are correct
70
__________ is an implementation of multicast distance vector routing. It is a source-based routing protocol, based on RIP.
A)MOSPF
B)DVMRP
C)CBT
D)None of the choices are correct
71
DVMRP is a ________ routing protocol, based on RIP.
A)source-based
B)group-shared
C)destination-based
D)None of the choices are correct
72
Pruning and grafting are strategies used in _______.
A)RPF
B)RPB
C)RPM
D)None of the choices are correct
73
PIM-DM is used when the number of routers with attached members is ______ relative to the number of routers in the internet.
A)large
B)small
C)moderate
D)None of the choices are correct
74
PIM-SM is used when the number of routers with attached members is ______ relative to the number of routers in the internet.
A)large
B)small
C)moderate
D)None of the choices are correct
75
An IPv6 address is _________ bits long.
A)32
B)64
C)128
D)256
76
An IPv6 address consists of ________ bytes (octets);
A)4
B)8
C)16
D)None of the choices are correct
77
In hexadecimal colon notation, a 128-bit address is divided into _______ sections, each _____ hexadecimal digits in length.
A)8; 2
B)8; 3
C)8; 4
D)None of the choices are correct
78
An IPv6 address can have up to __________ hexadecimal digits.
A)16
B)32
C)8
D)None of the choices are correct
79
In IPv6, the _______ field in the base header restricts the lifetime of a datagram.
A)version
B)priority
C)hop limit
D)None of the choices are correct
80
The _________ in IPv6 is designed to provide special handling for a particular flow of data.
A)flow label
B)next header
C)hop limit
D)None of the choices are correct
81
When two computers using IPv6 want to communicate but the packet must pass through an IPv4 region, which transition strategy should be used?
A)tunneling
B)header translation
C)either tunneling or header translation
D)None of the choices are correct
82
When the majority of the Internet has moved to the IPv6 but some still use IPv4, which transition strategy should be used?
A)tunneling
B)header translation
C)either tunneling or header translation
D)None of the choices are correct
83
The protocols __________________________ in version 4 are combined into one single protocol, ICMPv6.
A)ARP and IGMP
B)ICMP and IGMP
C)ICMP, ARP, and IGMP
D)None of the choices are correct







Computer NetworksOnline Learning Center

Home > Chapter 4 > Quizzes