Business Data Networks and Security, 11e (Panko)
Chapter 9 TCP/IP Internetworking II
1) If your subnet part is 8 bits long, you can have ________ subnets.
A) 64
B) 128
C) 256
D) 254
Answer: D
Difficulty: Basic
Question: 1a
Objective: Explain IPv4 subnetting.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
2) If your subnet part is 7 bits long, how many subnets can you have?
A) 128
B) 256
C) 512
D) none of the above
Answer: D
Difficulty: Deeper
Question: 1b
Objective: Explain IPv4 subnetting.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
3) Your subnet part is 8 bits long. How many hosts can you have per subnet?
A) 8
B) 14
C) 254
D) none of the above
Answer: C
Difficulty: Basic
Question: 2d
Objective: Explain IPv4 subnetting.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
4) In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be?
A) 6
B) 7
C) 8
D) none of the above
Answer: C
Difficulty: Deeper
Question: 2a
Objective: Explain IPv4 subnetting.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
5) Your firm has an 8-bit network part. If you need at least 200 subnets, what must your subnet part size be?
A) 5
B) 6
C) 7
D) 8
Answer: D
Difficulty: Deeper
Question: 2b
Objective: Explain IPv4 subnetting.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
6) You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?
A) 15
B) 16
C) 254
D) none of the above
Answer: C
Difficulty: Deeper
Question: 2c
Objective: Explain IPv4 subnetting.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
7) Your firm has a 22-bit network part. What subnet part would you select to give at least 10 subnets?
A) 2 bits
B) 3 bits
C) 4 bits
D) none of the above
Answer: C
Difficulty: Deeper
Question: 2e
Objective: Explain IPv4 subnetting.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
8) Your firm has a 22-bit network part and a 6-bit subnet part. How many hosts can you have per subnet?
A) 6
B) 8
C) 14
D) none of the above
Answer: C
Difficulty: Deeper
Question: 2f
Objective: Explain IPv4 subnetting.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
9) Which is NOT one of the three parts of a public IPv6 unicast address?
A) subnet ID
B) routing prefix
C) host part
D) All of the above are parts in a public IPv6 unicast address.
Answer: C
Difficulty: Basic
Question: 3a
Objective: Explain IPv6 subnetting.
AACSB: Applying Information Technology, Application of Knowledge
10) The routing prefix in IPv6 is like the ________ part in an IPv4 address.
A) network
B) subnet
C) host
D) both A and B
Answer: A
Difficulty: Basic
Question: 3a
Objective: Explain IPv6 subnetting.
AACSB: Applying Information Technology, Application of Knowledge
11) What field in an IPv6 global unicast address corresponds to the subnet part of an IPv4 address?
A) global routing prefix
B) subnet ID
C) interface ID
D) none of the above
Answer: B
Difficulty: Basic
Question: 3b
Objective: Explain IPv6 subnetting.
AACSB: Applying Information Technology, Application of Knowledge
12) If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?
A) 16 bits
B) 32 bits
C) 64 bits
D) none of the above
Answer: B
Difficulty: Basic
Question: 3c
Objective: Explain IPv6 subnetting.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
13) In a large company, you want ________.
A) as big a routing prefix as you can have
B) a medium-size routing prefix
C) as small a routing prefix as you can have
D) The size of the routing prefix is of no importance.
Answer: C
Difficulty: Deeper
Question: 3d
Objective: Explain IPv6 subnetting.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
14) If your routing prefix is 16 bits, how long is your subnet ID?
A) 16 bits
B) 32 bits
C) 48 bits
D) not possible to caculate
Answer: C
Difficulty: Basic
Question: 3e
Objective: Explain IPv6 subnetting.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
15) The part of an IPv6 global unicast address that designates the host is called the ________.
A) host part
B) interface ID
C) routing prefix
D) none of the above
Answer: B
Difficulty: Basic
Question: 4a
Objective: Explain IPv6 subnetting.
AACSB: Applying Information Technology, Application of Knowledge
16) In an IPv6 global unicast address, the interface ID is ________ bits long.
A) 8
B) 16
C) 64
D) Its size varies.
Answer: C
Difficulty: Basic
Question: 4b
Objective: Explain IPv6 subnetting.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
17) The IEEE calls a 64-bit interface addresses that it designed a(n) ________ address.
A) Extended Unique Identifier-64
B) Interface ID
C) MAC address
D) IP address
Answer: A
Difficulty: Basic
Question: 4c
Objective: Explain IPv6 subnetting.
AACSB: Applying Information Technology
18) A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center.
A) the interface ID
B) the subnet ID
C) fffe
D) 0000
Answer: C
Difficulty: Deeper
Question: 4c
Objective: Explain IPv6 subnetting.
AACSB: Applying Information Technology, Application of Knowledge
19) Convert the following EUI-48 address to a modified EUI-64 address: AA-00-00-FF-FF-00.
A) aa00:ff:feff:ff0
B) ae00:ff:feff:ff0
C) aa00:00ff:feff:ff0
D) ae00:00ff:feff:ff0
Answer: D
Difficulty: Deeper
Question: 4c
Objective: Explain IPv6 subnetting.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
20) ________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm.
A) DNS
B) NAT
C) DHCP
D) none of the above
Answer: B
Difficulty: Basic
Question: 6a
Objective: Explain Network Address Translation (NAT).
AACSB: Applying Information Technology
21) In NAT, the ________ creates new external source IP addresses and port numbers.
A) router
B) firewall
C) source host
D) destination host
Answer: B
Difficulty: Basic
Question: 6a
Objective: Explain Network Address Translation (NAT).
AACSB: Applying Information Technology, Application of Knowledge
22) NAT ________.
A) allows a firm to have more internal IP addresses
B) provides some security
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 6b
Objective: Explain Network Address Translation (NAT).
AACSB: Applying Information Technology, Application of Knowledge
23) NAT ________.
A) allows a firm to have more internal IP addresses
B) reduces cost
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 6b
Objective: Explain Network Address Translation (NAT).
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
24) NAT enhances security by ________.
A) preventing sniffers from learning internal IP addresses
B) encryption
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 6c
Objective: Explain Network Address Translation (NAT).
AACSB: Applying Information Technology, Application of Knowledge
25) Which of the following is a private IP address range?
A) 10.x.x.x
B) 128.171.x.x
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Deeper
Question: 6e
Objective: Explain Network Address Translation (NAT).
AACSB: Applying Information Technology, Application of Knowledge
26) Which of the following IPv4 addresses would be used for Internet transmission?
A) 10.x.x.x
B) 128.171.x.x
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Deeper
Question: 6e
Objective: Explain Network Address Translation (NAT).
AACSB: Applying Information Technology, Application of Knowledge
27) For an internal client to use NAT to communicate with an external webserver, the client must be configured to do so.
Answer: FALSE
Difficulty: Basic
Question: 6f
Objective: Explain Network Address Translation (NAT).
AACSB: Applying Information Technology, Application of Knowledge
28) NAT is transparent to all applications.
Answer: FALSE
Difficulty: Basic
Question: 6g
Objective: Explain Network Address Translation (NAT).
AACSB: Applying Information Technology, Application of Knowledge
29) If your local DNS server does not know the host name of an IP address, it will get the address from a(n) ________.
A) root DNS server
B) proxy DNS server
C) authoritative DNS server
D) none of the above
Answer: C
Difficulty: Basic
Question: 7a
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
30) If the local DNS server does not know an IP address and must contact a remote DNS server, which DNS server will return the response to the client?
A) the local DNS server
B) the remote DNS server
C) either A or B
D) No IP address will be returned to the client.
Answer: A
Difficulty: Deeper
Question: 7b
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
31) The domain name system ________.
A) is a way to find a host’s IP addresses if your computer only knows the host’s host name
B) is a general naming system for the Internet
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 8a
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
32) ________ is a general naming system for the Internet.
A) NAT
B) DNS
C) DHCP
D) Dotted decimal notation
Answer: B
Difficulty: Basic
Question: 8a
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
33) In DNS, a group of resources under the control of an organization is called a ________.
A) network
B) subnet
C) scope
D) domain
Answer: D
Difficulty: Basic
Question: 8b
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology
34) “.com” is a ________.
A) root domain
B) top-level domain
C) second-level domain
D) none of the above
Answer: B
Difficulty: Basic
Question: 8c
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
35) “.edu” is a ________.
A) root domain
B) top-level domain
C) second-level domain
D) none of the above
Answer: B
Difficulty: Basic
Question: 8c
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
36) Which is a type of top-level domain?
A) generic TLD
B) specific TLD
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 8d
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
37) Corporations wish to have ________ domain names.
A) top-level
B) second-level
C) third-level
D) none of the above
Answer: B
Difficulty: Basic
Question: 8e
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
38) The highest-level DNS servers are called ________.
A) root servers
B) top-level domain servers
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 8f
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
39) Companies get second-level domains from ________.
A) the IETF
B) domain registrars
C) the Internet Society
D) the United States Government
Answer: B
Difficulty: Basic
Question: 8g
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology
40) A company has a domain name. What else must it have before it can make a website available to the public?
A) a DNS server to host its domain name
B) the website itself
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 8h
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
41) For a particular domain name, a DNS server will have ________.
A) a single record
B) multiple records
C) two records—one for IPv4 and one for IPv6.
D) all of the above
Answer: B
Difficulty: Deeper
Question: 9a
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
42) The DNS ________ record is for the host name’s ________ address
A) A; IPv4
B) A; IPv6
C) AAAA; IPv4
D) none of the above
Answer: A
Difficulty: Basic
Question: 9b
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
43) The DNS ________ record is for the host name’s ________ address
A) AAAA; IPv4
B) AAAA; IPv6
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Basic
Question: 9c
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
44) A DHCP server provides a client with ________.
A) one or more IP addresses for it to use
B) the IP address of one or more DNS servers
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Deeper
Question: 10a
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
45) An advantage of using DHCP to configure clients is that ________.
A) the configuration information will be up-to-date
B) the configuration will be done securely
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 10b
Objective: Explain DNS and DHCP in more depth than you learned in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
46) In SNMP, the manager communicates directly with a(n) ________.
A) managed device
B) agent
C) object
D) access point
Answer: B
Difficulty: Basic
Question: 11a
Objective: Describe the SMTP object model.
AACSB: Applying Information Technology
47) Which of the following would be an SNMP object?
A) number of rows in routing table
B) a managed switch
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Deeper
Question: 11a
Objective: Describe the SMTP object model.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
48) Which of the following would be an SNMP object?
A) number of rows in routing table
B) system uptime (since last reboot)
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 11a
Objective: Describe the SMTP object model.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
49) Which of the following would be an SNMP interface object?
A) number of rows in routing table
B) whether the interface is undergoing testing
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Deeper
Question: 11a
Objective: Describe the SMTP object model.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
50) In SNMP, companies are often reluctant to use ________ commands because of security dangers.
A) Get
B) Set
C) Trap
D) Request
Answer: B
Difficulty: Basic
Question: 11c
Objective: Describe the SMTP object model.
AACSB: Applying Information Technology
51) Good security is an enabler if a company wishes to use SNMP ________ commands.
A) Get
B) Set
C) Trap
D) Reset
Answer: A
Difficulty: Basic
Question: 11d
Objective: Describe the SMTP object model.
AACSB: Applying Information Technology, Application of Knowledge
52) Dynamic ________ protocols allow routers to transmit routing table information to one another.
A) routing
B) transport
C) synchronization
D) none of the above
Answer: A
Difficulty: Basic
Question: 12a
Objective: Describe Dynamic Routing Protocols.
AACSB: Applying Information Technology
53) ________ is an interior dynamic routing protocol.
A) OSPF
B) BGP
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 12b
Objective: Describe Dynamic Routing Protocols.
AACSB: Applying Information Technology, Application of Knowledge
54) A company is free to select whatever ________ dynamic routing protocol it wishes.
A) interior
B) exterior
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 12b
Objective: Describe Dynamic Routing Protocols.
AACSB: Applying Information Technology, Application of Knowledge
55) Which of the following can route non-IP packets?
A) OSPF
B) EIGRP
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Basic
Question: 12c
Objective: Describe Dynamic Routing Protocols.
AACSB: Applying Information Technology
56) You need to use EIGRP if ________.
A) you have TCP/IP traffic exclusively
B) some of your traffic is TCP/IP traffic
C) both A and B
Answer: B
Difficulty: Basic
Question: 12d
Objective: Describe Dynamic Routing Protocols.
AACSB: Applying Information Technology, Application of Knowledge
57) A company is free to select its ________.
A) interior dynamic routing protocol
B) exterior dynamic routing protocol
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 12e
Objective: Describe Dynamic Routing Protocols.
AACSB: Applying Information Technology
58) The almost-universal exterior dynamic routing protocol is ________.
A) EIGRP
B) OSPF
C) both A and B
D) neither A nor B
Answer: D
Difficulty: Basic
Question: 12f
Objective: Describe Dynamic Routing Protocols.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
59) In the Border Gateway Protocol, “gateway” means ________.
A) firewall
B) switch
C) router
D) none of the above
Answer: C
Difficulty: Basic
Question: 12g
Objective: Describe Dynamic Routing Protocols.
AACSB: Applying Information Technology
60) ICMP is used for ________.
A) error messages
B) configuration messages
C) routing messages
D) none of the above
Answer: A
Difficulty: Basic
Question: 13a
Objective: Describe the Internet Control Message Protocol.
AACSB: Applying Information Technology, Application of Knowledge
61) Ping is for ________ messages.
A) error advisory
B) supervisory
C) both A and B
Answer: B
Difficulty: Basic
Question: 13b
Objective: Describe the Internet Control Message Protocol.
AACSB: Applying Information Technology, Application of Knowledge
62) Pinging is to send ICMP ________ messages to the target host.
A) echo request
B) error advisement
C) ping
D) echo
Answer: A
Difficulty: Deeper
Question: 13c
Objective: Describe the Internet Control Message Protocol.
AACSB: Applying Information Technology, Application of Knowledge
63) What security concern do ICMP echo request messages and echo response messages bring?
A) attackers can disable the other host
B) attackers can learn that the other host’s IP address is in use
C) attackers can change the other host’s IP address
D) all of the above.
Answer: B
Difficulty: Basic
Question: 13d
Objective: Describe the Internet Control Message Protocol.
AACSB: Applying Information Technology, Application of Knowledge
64) IPsec protects ________ layer content.
A) data link
B) application
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Basic
Question: 14a
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
65) Which of the following is more widely used?
A) ESP
B) AH
C) Both are about equally widely used.
Answer: A
Difficulty: Basic
Question: 14b
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology, Application of Knowledge
66) Which protects more of the original IP packet?
A) transport mode
B) tunnel mode
C) Both provide the same protection to the IP packet.
Answer: B
Difficulty: Basic
Question: 14d
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
67) IPsec is used for ________ VPNs.
A) remote-access
B) site-to-site
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 15a
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology, Application of Knowledge
68) In remote access VPNs, IPsec has an ________ at the corporate site.
A) IPsec firewall
B) IPsec gateway
C) IPsec proxy server
D) IPsec endpoint
Answer: B
Difficulty: Basic
Question: 15b
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology
69) Which of the following is used in ESP?
A) ESP header
B) ESP trailer
C) Integrity check value
D) all of the above
Answer: D
Difficulty: Basic
Question: 16a
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology
70) In transport mode, ESP fields surround an IPv4 packet’s ________.
A) entire length
B) header
C) data field
D) none of the above
Answer: C
Difficulty: Basic
Question: 16b
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology, Application of Knowledge
71) In tunnel mode, ESP fields surround an IPv4 packet’s ________.
A) entire length
B) header
C) data field
D) none of the above
Answer: A
Difficulty: Basic
Question: 16c
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology, Application of Knowledge
72) In IPv6, ESP protects the IP packet’s_____.
A) entire length
B) payload
C) header
D) none of the above
Answer: D
Difficulty: Deeper
Question: 16d
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
73) SLAs define ________.
A) cryptographic methods
B) cryptographic options
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 17a
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology
74) In IPsec, agreements about how security will be done are called ________.
A) tranches
B) security contracts
C) service-level agreements
D) security associations
Answer: D
Difficulty: Basic
Question: 17b
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology
75) The first stage of IPsec uses the ________ protocol.
A) SSL/TLS
B) AES
C) IKE
D) SHA
Answer: C
Difficulty: Deeper
Question: 18a
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology, Application of Knowledge
76) The SA is negotiated in the ________.
A) IKE phase
B) IPsec protection phase
C) AES phase
D) none of the above
Answer: A
Difficulty: Basic
Question: 18c
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology, Application of Knowledge
77) SA protections are applied in the ________.
A) IKE phase
B) IPsec protection
C) AES
D) none of the above
Answer: B
Difficulty: Basic
Question: 18d
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology, Application of Knowledge
78) SAs in two directions ________.
A) are always the same
B) are always different
C) are sometimes different
Answer: C
Difficulty: Basic
Question: 18e
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology, Application of Knowledge
79) Options for major cryptographic methods are sometimes unacceptably weak and must be prohibited.
Answer: TRUE
Difficulty: Deeper
Question: 18f
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology, Application of Knowledge
80) Which has stronger security?
A) SSL/TLS
B) IPsec
C) Both have about equal security.
Answer: B
Difficulty: Basic
Question: 19a
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology, Application of Knowledge
81) Which is less expensive to implement?
A) SSL/TLS
B) IPsec
C) Both cost about the same to implement.
Answer: A
Difficulty: Basic
Question: 19b
Objective: Describe basic concepts in IP security.
AACSB: Applying Information Technology, Application of Knowledge
PAGE \* MERGEFORMAT 1
Copyright © 2019 Pearson Education, Inc.