Name Resolution on IP – Ch8 Test Bank | 4th Edition - Test Bank | Guide to TCPIP 4e by Jeffrey Carrell by Jeffrey L. Carrell, Laura Chappell, Ed Tittel. DOCX document preview.
View Product website:
https://selldocx.com/docx/name-resolution-on-ip-ch8-test-bank-4th-edition-1326
Chapter 5: Internet Control Message Protocol
Student: ___________________________________________________________________________
1. The value 0 in the IP header Protocol field denotes that an ICMP header follows the IP header.
True False
2. ICMP packets contain only three required fields after the IP header: Type, Code, and Checksum.
True False
3. Routers send ICMP Redirect messages to hosts to indicate that a preferable route exists.
True False
4. Routers can use ICMP to provide a default gateway setting to a host (if the host requests assistance).
True False
5. With router advertising, the default Lifetime value for route entries is 10 minutes.
True False
6. For any network node to communicate and exchange data with another network node, some way of forwarding packets from the sender to receiver must exist. This concept is called ____.
A. response time
B. route tracing
C. reachability
D. network congestion
7. ____ messages serve to keep hosts apprised of networking conditions and problems, and equipped to use best paths around the network.
A. NTP
B. Path MTU
C. ICMP
D. GMT
8. The message type ____ supports functionality for reachability utilities like Ping and Tracert; essential when installing, configuring, and troubleshooting IP networks.
A. ICMP Echo/Echo Reply
B. ICMP Source Quench
C. ICMP Time Exceeded
D. ICMP Destination Unreachable
9. The message type ____ documents when routing or delivery errors prevent IP datagrams from reaching their destinations.
A. ICMP Echo/Echo Reply
B. ICMP Source Quench
C. ICMP Time Exceeded
D. ICMP Destination Unreachable
10. The message type ____ permits a gateway (router) on a nonoptimal route between sender and receiver to redirect traffic to a more optimal path.
A. ICMP Echo/Echo Reply
B. ICMP Source Quench
C. ICMP Redirect
D. ICMP Destination Unreachable
11. The ICMP packet field____ provides error detection for the ICMP header only.
A. Checksum
B. Type
C. Host
D. Code
12. ICMP Type ____ is used for Echo Request packets.
A. 2
B. 4
C. 6
D. 8
13. A host or router can send the ____ error message to indicate that the protocol defined in the IP header cannot be processed.
A. Code 2: Protocol Unreachable
B. Code 3:Port Unreachable
C. Code 4: Fragmentation Needed and Don’t Fragment Was Set
D. Code 5: Source Route Failed
14. There are two versions of the ____ ICMP reply - the standard version that simply states the packet had the Don’t Fragment bit set when it reached a router that needed to fragment it, and the PMTU version that includes information about the restricting link.
A. Code 2: Protocol Unreachable
B. Code 3:Port Unreachable
C. Code 4: Fragmentation Needed and Don’t Fragment Was Set
D. Code 5: Source Route Failed
15. A router sends the ____ ICMP reply to indicate that the router cannot use the strict or loose source routing path specified in the original packet.
A. Code 2: Protocol Unreachable
B. Code 3:Port Unreachable
C. Code 4: Fragmentation Needed and Don’t Fragment Was Set
D. Code 5: Source Route Failed
16. A router or host may use ____ as a way to indicate that it is becoming congested or overloaded.
A. Checksum
B. Source Quench
C. GMT
D. PMTU
17. The ____ utility uses route tracingto identify a path from the sender to the target host.
A. gateway
B. Traceroute
C. firewalking
D. auto-recovery
18. Using ICMP ____ and some manipulation of the TTL value in the IP header, Traceroute results provide a list of routers along a path, as well as the round-trip latency time to each router.
A. Echo Requests
B. paths
C. metrics
D. query messages
19. The ____ utility is a command-line utility that uses ICMP Echo packets to test router and link latency, as well as packet loss.
A. NTP
B. Pathping
C. Path MTU
D. Traceroute
20. ____ defines a method for discovering a Path MTU (PMTU) using ICMP.
A. RFC 1191
B. RFC 1241
C. RFC 1542
D. RFC 1577
21. ____ enables a source to learn the currently supported MTU across an entire path, without requiring fragmentation.
A. Firewalking
B. Traceroute
C. Pathping
D. PMTU Discovery
22. ____ typically learn about routes through manual configuration of the default gateway parameter and redirection messages.
A. Packets
B. Firewalls
C. Ports
D. IP hosts
23. Although RFC ____ dictates that IP routers“must support the router part of the ICMP Router Discovery protocol on all connected networks on which the router supports either IP multicast or IP broadcast addressing,” many do not.
A. 1812
B. 1900
C. 1955
D. 1972
24. If configured to do so, routers periodically send unsolicitedICMP Router Advertisements to the all-hosts multicast address ____.
A. 224.0.0.1
B. 255.255.0.0
C. 224.255.0.1
D. 255.224.0.1
25. Hackers can use ____ as part of a reconnaissance processto learn about active network addresses and active processes.
A. availability
B. ICMP
C. auto recovery
D. presence
26. A(n) ____ process is one method of obtaining a list of the active hosts on a network.
A. ICMP query
B. query
C. IP address scanning
D. firewalking
27. ICMP Type ____________________ is used for Echo Reply packets.
________________________________________
28. Two of the most well-known utilities, Ping and Traceroute, rely on ICMP to perform connectivity tests and ____________________.
________________________________________
29. The PMTU specification defined in RFC 1191 requires the PMTU host to try periodically a larger MTU to see if the ____________________ has increased.
________________________________________
30. An IP ____________________ is performed by sending a ping packet (ICMP Echo Request packet) to each host within a range and noting the responses.
________________________________________
31. ____________________ describes the concept of walking a firewall ACL or ruleset to determine what it filters, and how.
________________________________________
32. Match each item with a statement below.
33. What is the purpose of the following ICMP message types: ICMP Redirect, ICMP Time Exceeded, and ICMP Parameter Problem?
34. According to RFC 792, what is the relationship between IP and ICMP?
35. What are the characteristics of the following packets: Windows 2008, Windows Vista, and Windows 7 Ping?
36. Briefly define the following codes, currently assigned to the ICMP Destination Unreachable type number: Code 2: Protocol Unreachable, Code 3:Port Unreachable, and Code 5: Source Route Failed.
37. Briefly describe the fields that are included in the ICMPv4 Router Advertisement packets (after the ICMP Checksum field).
38. Briefly describe an ICMP redirect attack.
39. Briefly describe an ICMP router discovery attack.
40. How does inverse mapping determine live targets on a network?
41. What is firewalking?
42. Describe some of the security issues for ICMPv6.
Chapter 5: Internet Control Message Protocol
Document Information
Connected Book
Test Bank | Guide to TCPIP 4e by Jeffrey Carrell
By Jeffrey L. Carrell, Laura Chappell, Ed Tittel