Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Chapter 2 - TCP/IP

TRUE/FALSE

1. The Transport layer of the OSI model includes the RIP protocol.

ANS: F PTS: 1 REF: 36

2. The IP address 172.20.1.5 is a private IP address.

ANS: T PTS: 1 REF: 39

3. Fragmentation of IP packets is normal and doesn’t present any networking problems.

ANS: F PTS: 1 REF: 50

4. The TCP protocol uses a three-way handshake to create a connection.

ANS: T PTS: 1 REF: 51

5. IPv4 and IPv6 headers are interoperable.

ANS: F PTS: 1 REF: 58

MULTIPLE CHOICE

1. In which OSI model layer will you find the OSPF protocol?
a. Application c. Transport
b. Session d. Network
ANS: D PTS: 1 REF: 36

2. Which protocol is responsible for automatic assignment of IP addresses?


a. DNS c. FTP
b. DHCP d. SNMP
ANS: B PTS: 1 REF: 37

3. How are the two parts of an IP address determined?


a. network identifier c. host identifier
b. subnet mask d. routing table
ANS: B PTS: 1 REF: 37

4. Which of the following addresses is a Class B IP address?


a. 126.14.1.7 c. 189.77.101.6
b. 224.14.9.11 d. 211.55.119.7
ANS: C PTS: 1 REF: 38

5. Which of the following is NOT a reason for subnetting a network?


a. controlling network traffic c. planning for growth
b. increasing network security d. making larger groups of computers
ANS: D PTS: 1 REF: 39

6. If you are subnetting a class B network, what subnet mask will yield 64 subnets?
a. 255.255.252.0 c. 255.255.224.0
b. 255.255.64.0 d. 255.255.192.0
ANS: A PTS: 1 REF: 40

7. Which of the following is the broadcast address for subnet 192.168.10.32 with subnet mask
255.255.255.240
a. 192.168.10.63 c. 192.168.10.23
b. 192.168.10.47 d. 192.168.10.95
ANS: B PTS: 1 REF: 42

8. Which of the following is considered a flooded broadcast IP address?


a. 200.15.6.255 c. 255.255.255.255
b. 10.255.255.255 d. FFFF.FFFF.FFFF
ANS: C PTS: 1 REF: 43

9. Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet
can remain in the network before it is dropped?
a. TTL c. ECN
b. Fragment Offset d. Options
ANS: A PTS: 1 REF: 45

10. What is the TCP portion of a packet called?


a. frame c. segment
b. data d. header
ANS: C PTS: 1 REF: 47

11. Which of the following is a reason that UDP is faster than TCP?
a. it doesn’t use port numbers c. the header is smaller
b. it has a higher priority on the network d. it doesn’t guarantee delivery
ANS: D PTS: 1 REF: 48

12. Which of the following is the first packet sent in the TCP three-way handshake?
a. RST c. ACK
b. SYN d. PSH
ANS: B PTS: 1 REF: 51

13. What does a sliding window do in a TCP packet?


a. ensures all packets are delivered c. provides flow control
b. provides packet security d. ensures transmission reliability
ANS: C PTS: 1 REF: 52

14. What should you do when configuring DNS servers that are connected to the Internet in order to
improve security?
a. disable zone transfers c. disable DNS buffers
b. delete the DNS cache d. setup DNS proxy
ANS: A PTS: 1 REF: 54

15. How large is the IPv6 address space?


a. 32 bits c. 64 bits
b. 128 bits d. 168 bits
ANS: B PTS: 1 REF: 54

16. Which of the following is NOT an advantage of IPv6 versus IPv4?


a. larger address space c. supports static configuration
b. built-in security d. NAT is unnecessary
ANS: C PTS: 1 REF: 55

17. Which IPv6 header field is known as the priority field?


a. Version c. Hop Limit
b. Flow Label d. Traffic Class
ANS: D PTS: 1 REF: 56

18. What feature in ICMPv6 replaces ARP in IPv4?


a. Multicast Listener Discovery c. Echo Request
b. Neighbor Discovery d. Authentication Header
ANS: B PTS: 1 REF: 59

19. Which of the following is a valid IPv6 address?


a. 5BA4:2391:0:0:4C3E c. 24::5B1A::346C
b. 1080::8:800:200C:417A d. 5510:ABCD::34:1::2
ANS: B PTS: 1 REF: 62

20. Which of the following is the IPv6 loopback address?


a. 000:000:: c. ::1
b. 1000:127:0:0:1 d. ::FFFF
ANS: C PTS: 1 REF: 62

COMPLETION

1. DNS operates at the _________________ layer of the OSI model.

ANS: Application

PTS: 1 REF: 36

2. The ______________________ is the part of the IP address that is the same among computers in a
network segment.

ANS:
network identifier
network ID

PTS: 1 REF: 37
3. The _____________ field in an IP header is a 3-bit value indicating whether a datagram is a fragment.

ANS: flags

PTS: 1 REF: 45

4. ________________ IPv6 addresses are used for one-to-one or one-to-many communication.

ANS: Anycast

PTS: 1 REF: 63

5. The ____________ command shows current sessions with associated port numbers.

ANS:
netstat
netstat -n

PTS: 1 REF: 65

MATCHING

a. broadcast f. unicast
b. datagram g. stateless autoconfiguration
c. fragmentation h. network identifier
d. multicast i. Multicast Listener Discovery
e. scopes j. Network Address Translation
1. a discrete chunk of information; each datagram contains source and destination
addresses, control settings, and data
2. unicast addresses used in IPv6 to identify the application suitable for the address
3. the part of an IP address that a computer has in common with other computers in its subnet
4. a process by which internal hosts are assigned private IP addresses and communicate with the Internet
using a public address
5. a transmission used for one-to-many communication, in which a single host can
send packets to a group of recipients
6. a transmission in which one packet is sent from a server to each client that
requests a file or application
7. enables IPv6 routers to discover multicast listeners on a directly connected link and to decide which
multicast addresses are of interest to those nodes
8. a communication sent to all hosts on a specific network
9. a feature of IPv6 in which a computer can connect to a network by determining its own IP address
based on the addressing of neighboring nodes
10. the division of packets into smaller sizes to accommodate routers with frame size limitations

1. ANS: B PTS: 1 REF: 43


2. ANS: E PTS: 1 REF: 62
3. ANS: H PTS: 1 REF: 37
4. ANS: J PTS: 1 REF: 38
5. ANS: D PTS: 1 REF: 43
6. ANS: F PTS: 1 REF: 43
7. ANS: I PTS: 1 REF: 59
8. ANS: A PTS: 1 REF: 43
9. ANS: G PTS: 1 REF: 55
10. ANS: C PTS: 1 REF: 49

SHORT ANSWER

1. List the seven layers of the OSI model.

ANS:
Application
Presentation
Session
Transport
Network
Data Link
Physical

PTS: 1 REF: 36

2. Briefly describe Network Address Translation and how it makes a network more secure.

ANS:
IP addresses are valuable commodities. If attackers can find a computer’s IP address, they can run a
port scan to look for open ports they can exploit. By hiding IP addresses, you can
prevent certain attacks. To hide the addresses of computers on your network, you can use
Network Address Translation (NAT) to translate your private network’s internal addresses
into the address of the NAT server’s external interface connected to the Internet. A private
network’s internal addresses are not routable on the Internet.

PTS: 1 REF: 38

3. List the three classes of IP address that can be assigned to network devices and their corresponding
first octet range of values.

ANS:
Class A: 1-126
Class B: 128-191
Class C: 192-223

PTS: 1 REF: 38

4. What are the three private IP address ranges and their associated subnet masks?

ANS:
10.0.0.0 255.0.0.0
172.16.0.0 255.240.0.0
192.168.0.0 255.255.0.0

PTS: 1 REF: 39

5. List three reasons an administrator would want to use subnetting.


ANS:
Mirroring the organization’s physical layout
Mirroring the organization’s administrative structure
Planning for future growth
Reducing and controlling network traffic
Increasing network security
Logically segment a network

PTS: 1 REF: 39

6. Discuss variable length subnet masking.

ANS:
Networks that do not have a large number of available IP addresses can use variable length subnet
masking (VLSM), which involves applying masks of varying sizes to the same network. If an
organization has a limited number of IP addresses and subnets of varying lengths, VLSM can help it
use address space more efficiently. VLSM is a means of allocating IP addressing according to the
network’s needs. This allocation method creates subnets within subnets and multiple divisions of an IP
network.

PTS: 1 REF: 42

7. What is CIDR? Give an example.

ANS:
CIDR is Classless Interdomain Routing which is an address notation scheme that specifies the
number of masked bits in an IP address/subnet mask combination. Instead of using standard notation
for subnet masks, with CIDR you can simply list the number of masked binary bits. The subnet mask
255.255.255.224, for example, has a total of 27 masked bits (eight in each of the first three octets and
three in the last octet). In CIDR notation, you would write the network address 192.168.6.0 with a
subnet mask of 255.255.255.224 as 192.168.6.0/27.

PTS: 1 REF: 42

8. Describe the TTL field in an IP packet header.

ANS:
Time to Live (TTL)—This 8-bit value identifies the maximum amount of time the packet can remain
in a network before it is dropped. Each router or device through which the packet passes (hops)
reduces the TTL by a value of one. The TTL avoids congestion that results from corrupted packets
infinitely looping through the network.

PTS: 1 REF: 45

9. Describe the three-way handshake.

ANS:
To establish connection-oriented communication, each computer needs a way to know that the other
computer received the packets sent. Sequence and acknowledgement numbers perform
this function, as demonstrated in the way that two hosts first establish the TCP connection: the TCP
three-way handshake.
Host A includes a randomly generated initial sequence number in its first packet to Host B. This
packet is called a SYN packet because the TCP SYN flag is set. The acknowledgement number is zero
because the SYN packet is the first in the session and there is no previous packet for Host A to
acknowledge.

Host B receives the SYN packet and responds with a SYN ACK packet. This packet includes a
randomly generated initial sequence number for Host B. As a way of proving that Host B received the
SYN packet from Host A, the acknowledgement number is set to the number that Host B expects to
receive in the second packet from Host A. The first packet’s sequence number is incremented by one
and placed as the acknowledgement number.

The final packet in the three-way handshake is the ACK packet that Host A sends in response to the
SYN ACK from Host B. Now Host A increments its initial sequence number by one and sets the
acknowledgement number to be one more than the initial sequence number that Host B sent in the
SYN ACK

PTS: 1 REF: 51-52

10. Discuss two drawbacks of IPv4 and how IPv6 addresses those drawbacks.

ANS:
IPv4 has serious drawbacks. IP addresses are now in short supply, so Internet Protocol version 6
(IPv6), which has a larger address space of 128 bits, is being deployed to allow an almost endless
supply of IP addresses. Because an IPv4 address is 32 bits long, IPv4 permits a total of 232 addresses,
which is more than 4 billion. With 128 bits, IPv6 offers 2128 addresses, which is 340 undecillion. An
undecillion is a 1 followed by 39 zeros.

IPv4 also presents problems with the routing system. Routers on the Internet backbone have
routing tables with about 90,000 entries. Routers get the job done, but because most computers are not
connected directly to the Internet backbone, a packet must traverse several extra hops along the route
to its destination. In IPv6, backbone routing tables need only the entries of other routers that are
connected directly to them. The information in an IPv6 header
contains the rest of the information needed to get a packet to its destination, so the process is
streamlined.

Security is another concern with IPv4. Although it does support IPsec (an industry standard
set of encryption and authentication protocols), IPv4 has no native encryption methods. Plenty
of encryption methods are available, but the lack of standardization can create compatibility
problems, and encryption can increase overhead on the network. IPv6, on the other hand,
has integrated support for IPsec.

Another advantage of IPv6 is that Network Address Translation (NAT) is not needed because of the
vast number of IP addresses provided. While NAT has worked well enough to deal with the decreasing
number of IP addresses in IPv4, NAT has security problems. In short, because NAT devices need to
read encapsulated IP headers, it is difficult to maintain data confidentiality for end-to-end
transmissions; typically, the packets are unencrypted by the NAT firewall and sent through the internal
network unencrypted. IPv6 obviates this problem.

Another major advantage of IPv6 is its autoconfiguration capabilities. Instead of relying


solely on Dynamic Host Configuration Protocol (DHCP) or manual configuration, IPv6
can determine its own settings based on two different models

PTS: 1 REF: 54-55

You might also like