Test Bank – Ch7 IP Autoconfiguration | 4th Edition - Test Bank | Guide to TCPIP 4e by Jeffrey Carrell by Jeffrey L. Carrell, Laura Chappell, Ed Tittel. DOCX document preview.

Test Bank – Ch7 IP Autoconfiguration | 4th Edition

View Product website:

https://selldocx.com/docx/test-bank-ch7-ip-autoconfiguration-4th-edition-1325

Chapter 4: Data Link and Network Layer TCP/IP Protocols

Student: ___________________________________________________________________________

1. ARP is used to obtain the hardware address of the destination IP hosts. 
True    False

 

2. If a packet with TTL=1 arrives at a router, the router must discard the packet because it cannot decrement the TTL to 0 and forward the packet. 
True    False

 

3. When a packet is fragmented, all fragments are given different TTL values. 
True    False

 

4. Routed protocols are Layer 1 protocols that are used to get packets through an internetwork. 
True    False

 

5. A network is usually said to be converged when all the routers know a loop-free path to get to all other networks. 
True    False

 

6. ____ is a general-purpose protocol that provides WAN data link encapsulation services similar to those available for LAN encapsulations. 
A. Border Gateway Protocol
B. Point-to-Point Protocol
C. Link Control Protocol
D. Token ring

 

7. A ____ is required to get the packet from one IP host to another IP host on a single network. 
A. frame
B. hardware address
C. delimiter
D. data link

 

8. ____ is a method that allows an IP host to use a simplified subnetting design. 
A. Proxy ARP
B. Link Control
C. IPCP
D. IPCONFIG

 

9. ____ is used to obtain an IP address for an associated data link address. 
A. Proxy ARP
B. IEEE
C. Network Control
D. RARP

 

10. The primary function of ____ layer protocols is to move datagrams through an internetwork connected by routers. 
A. Data link
B. Application
C. Network
D. Transport

 

11. All IPv4 packets have a predefined lifetime indicated in each packet’s ____ field. 
A. Time To Live
B. Frame Check Sequence
C. Protocol Identifier
D. Flag

 

12. The recommended starting TTL value is ____. 
A. 64
B. 72
C. 112
D. 128

 

13. The default TTL in Windows Server 2008, Windows Vista, and Windows 7 is ____. 
A. 64
B. 72
C. 112
D. 128

 

14. IP fragmentation enables a larger packet to be automatically fragmented by a ____ into smaller packets to cross a link that supports a smaller MTU, such as an Ethernet link. 
A. token
B. router
C. repeater
D. cable modem

 

15. On a network that is low on available bandwidth, the ____ processcauses more traffic on the wire. 
A. data encapsulation
B. error-detection
C. circuit switching
D. fragmentation retransmission

 

16. A router uses ____ to determine what packet to send when several packets are queued for transmission from a single-output interface. 
A. proxy ARP
B. precedence
C. preamble
D. frames

 

17. Routers use ____ to select a routing path when there are multiple paths available. 
A. tokens
B. precedence
C. Type of Service
D. repeaters

 

18. OSPF and ____are two examples of routing protocols that support multiple types of services. 
A. Border Gateway Protocol
B. T-carrier
C. TOS
D. IPCONFIG

 

19. A(n) ____ is a compilation of information about all the networks that the router can reach. 
A. host
B. routing table
C. black hole
D. agent

 

20. A ____ routing protocol shares information about how far away all networks are to the destination. 
A. triggered
B. link-state
C. distance vector
D. split horizon

 

21. ____ simply prevents a router from advertising a network on the same interface from which it learned that network. 
A. System routing
B. Link state routing
C. On-demand routing
D. Split horizon

 

22. A(n) ____ occurs on a network when ICMP is turned off and a router discards packets without sending any notification about its actions. 
A. black hole
B. agent
C. link state
D. distance vector

 

23. ____ can summarize routing information before sending link-state packets to other networks. 
A. Split horizons
B. Distance vectors
C. Backbone areas
D. Area border routers

 

24. To connect autonomous systems, routers use ____. 
A. distance vectors
B. exterior gateway protocols
C. agents
D. host routes

 

25. In a RIPv2 packet, the ____ field contains a plain text password. 
A. Authentication
B. Route Tag
C. Next Hop
D. Address Family

 

26. When a router is configured with ____, it watches for traffic on its LAN that does not match its own IP address. 
A. link-state
B. Local Area Mobility
C. intra-domain routing
D. external route entry

 

27. The ____________________ field is a two-byte field that provides bit-level integrity checks for data as sent. 
________________________________________

 

28. At the Data Link layer, protocol data units are called ____________________. 
________________________________________

 

29. The method distance vector protocols use to prevent packets from endlessly circulating around a routing loop is called ____________________. 
________________________________________

 

30. ____________________ is a technique for assigning costs to routes designed to prevent routing loops. 
________________________________________

 

31. ____________________ system routingenables BGP peer routers to exchange routing information across an AS that does not support BGP. 
________________________________________

 

32. Match each item with a statement below. 

 

33. What are the two most important jobs of the Data Link layer? 


 


 


 


 

 

34. WAN encapsulation of frames at the Data Link layer involves one or more services. Briefly discuss four of these services. 


 


 


 


 

 

35. Briefly describe the following fields in the PPP header and trailer: Flag, protocol identifier, and Frame Check Sequence. 


 


 


 


 

 

36. Briefly discuss the following Ethernet II frame type fields and structures: Preamble, Destination Address Field, Source Address Field, and Type Field. 


 


 


 


 

 

37. Provide a brief description of the two types of route table entries. 


 


 


 


 

 

38. Discuss the difference between the following ARP packet fields: Opcode field and the Protocol Type field. 


 


 


 


 

 

39. The Target Hardware Address field indicates the desired target’s hardware address, if known. In ARP requests, this field is typically filled with all 0s. In ARP replies, what should this field contain? 


 


 


 


 

 

40. Briefly describe each of the eight levels of precedence. 


 


 


 


 

 

41. Discuss three ways in which a router entry can be placed in a routing table. 


 


 


 


 

 

42. How do link-state routing protocols differ from distance vector routing protocols? 


 


 


 


 

 

Chapter 4: Data Link and Network Layer TCP/IP Protocols

Document Information

Document Type:
DOCX
Chapter Number:
7
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 7 IP Address Autoconfiguration
Author:
Jeffrey L. Carrell, Laura Chappell, Ed Tittel

Connected Book

Test Bank | Guide to TCPIP 4e by Jeffrey Carrell

By Jeffrey L. Carrell, Laura Chappell, Ed Tittel

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party