Test Bank – Ch7 IP Autoconfiguration | 4th Edition - Test Bank | Guide to TCPIP 4e by Jeffrey Carrell by Jeffrey L. Carrell, Laura Chappell, Ed Tittel. DOCX document preview.
View Product website:
https://selldocx.com/docx/test-bank-ch7-ip-autoconfiguration-4th-edition-1325
Chapter 4: Data Link and Network Layer TCP/IP Protocols
Student: ___________________________________________________________________________
1. ARP is used to obtain the hardware address of the destination IP hosts.
True False
2. If a packet with TTL=1 arrives at a router, the router must discard the packet because it cannot decrement the TTL to 0 and forward the packet.
True False
3. When a packet is fragmented, all fragments are given different TTL values.
True False
4. Routed protocols are Layer 1 protocols that are used to get packets through an internetwork.
True False
5. A network is usually said to be converged when all the routers know a loop-free path to get to all other networks.
True False
6. ____ is a general-purpose protocol that provides WAN data link encapsulation services similar to those available for LAN encapsulations.
A. Border Gateway Protocol
B. Point-to-Point Protocol
C. Link Control Protocol
D. Token ring
7. A ____ is required to get the packet from one IP host to another IP host on a single network.
A. frame
B. hardware address
C. delimiter
D. data link
8. ____ is a method that allows an IP host to use a simplified subnetting design.
A. Proxy ARP
B. Link Control
C. IPCP
D. IPCONFIG
9. ____ is used to obtain an IP address for an associated data link address.
A. Proxy ARP
B. IEEE
C. Network Control
D. RARP
10. The primary function of ____ layer protocols is to move datagrams through an internetwork connected by routers.
A. Data link
B. Application
C. Network
D. Transport
11. All IPv4 packets have a predefined lifetime indicated in each packet’s ____ field.
A. Time To Live
B. Frame Check Sequence
C. Protocol Identifier
D. Flag
12. The recommended starting TTL value is ____.
A. 64
B. 72
C. 112
D. 128
13. The default TTL in Windows Server 2008, Windows Vista, and Windows 7 is ____.
A. 64
B. 72
C. 112
D. 128
14. IP fragmentation enables a larger packet to be automatically fragmented by a ____ into smaller packets to cross a link that supports a smaller MTU, such as an Ethernet link.
A. token
B. router
C. repeater
D. cable modem
15. On a network that is low on available bandwidth, the ____ processcauses more traffic on the wire.
A. data encapsulation
B. error-detection
C. circuit switching
D. fragmentation retransmission
16. A router uses ____ to determine what packet to send when several packets are queued for transmission from a single-output interface.
A. proxy ARP
B. precedence
C. preamble
D. frames
17. Routers use ____ to select a routing path when there are multiple paths available.
A. tokens
B. precedence
C. Type of Service
D. repeaters
18. OSPF and ____are two examples of routing protocols that support multiple types of services.
A. Border Gateway Protocol
B. T-carrier
C. TOS
D. IPCONFIG
19. A(n) ____ is a compilation of information about all the networks that the router can reach.
A. host
B. routing table
C. black hole
D. agent
20. A ____ routing protocol shares information about how far away all networks are to the destination.
A. triggered
B. link-state
C. distance vector
D. split horizon
21. ____ simply prevents a router from advertising a network on the same interface from which it learned that network.
A. System routing
B. Link state routing
C. On-demand routing
D. Split horizon
22. A(n) ____ occurs on a network when ICMP is turned off and a router discards packets without sending any notification about its actions.
A. black hole
B. agent
C. link state
D. distance vector
23. ____ can summarize routing information before sending link-state packets to other networks.
A. Split horizons
B. Distance vectors
C. Backbone areas
D. Area border routers
24. To connect autonomous systems, routers use ____.
A. distance vectors
B. exterior gateway protocols
C. agents
D. host routes
25. In a RIPv2 packet, the ____ field contains a plain text password.
A. Authentication
B. Route Tag
C. Next Hop
D. Address Family
26. When a router is configured with ____, it watches for traffic on its LAN that does not match its own IP address.
A. link-state
B. Local Area Mobility
C. intra-domain routing
D. external route entry
27. The ____________________ field is a two-byte field that provides bit-level integrity checks for data as sent.
________________________________________
28. At the Data Link layer, protocol data units are called ____________________.
________________________________________
29. The method distance vector protocols use to prevent packets from endlessly circulating around a routing loop is called ____________________.
________________________________________
30. ____________________ is a technique for assigning costs to routes designed to prevent routing loops.
________________________________________
31. ____________________ system routingenables BGP peer routers to exchange routing information across an AS that does not support BGP.
________________________________________
32. Match each item with a statement below.
33. What are the two most important jobs of the Data Link layer?
34. WAN encapsulation of frames at the Data Link layer involves one or more services. Briefly discuss four of these services.
35. Briefly describe the following fields in the PPP header and trailer: Flag, protocol identifier, and Frame Check Sequence.
36. Briefly discuss the following Ethernet II frame type fields and structures: Preamble, Destination Address Field, Source Address Field, and Type Field.
37. Provide a brief description of the two types of route table entries.
38. Discuss the difference between the following ARP packet fields: Opcode field and the Protocol Type field.
39. The Target Hardware Address field indicates the desired target’s hardware address, if known. In ARP requests, this field is typically filled with all 0s. In ARP replies, what should this field contain?
40. Briefly describe each of the eight levels of precedence.
41. Discuss three ways in which a router entry can be placed in a routing table.
42. How do link-state routing protocols differ from distance vector routing protocols?
Chapter 4: Data Link and Network Layer TCP/IP Protocols
Document Information
Connected Book
Test Bank | Guide to TCPIP 4e by Jeffrey Carrell
By Jeffrey L. Carrell, Laura Chappell, Ed Tittel