Computer Networking Quiz 4, 5, 6

Genardas Janonis
Quiz by Genardas Janonis, updated more than 1 year ago
Genardas Janonis
Created by Genardas Janonis almost 3 years ago
218
0

Description

Final

Resource summary

Question 1

Question
Packet loss can occur at router output ports and this loss can be prevented by increasing the switch fabric speed.
Answer
  • True
  • False

Question 2

Question
What is the name of a network-layer packet?
Answer
  • Frame
  • Datagram
  • Segment
  • All are correct

Question 3

Question
The 8-bit protocol field in the IP datagram contains information about which transport layer protocol (TCP or UDP) the destination host should pass the segment to.
Answer
  • True
  • False

Question 4

Question
A data plane is responsible for
Answer
  • All are correct
  • b. the data plane’s input ports perform physical layer function of terminating an incoming physical link at a router,
  • c. performs link-layer function to interoperate with the link layer at the other side of the incoming link,
  • d. perform lookup function at the input ports

Question 5

Question
A control plane is responsible for
Answer
  • a. communicating with remote controllers,
  • b. responding to attached links that go up or down,
  • c. All are correct.
  • d. performing management functions.
  • e. executing routing protocols,

Question 6

Question
Which of these packet queueing disciplines ensure that all packets depart in the order in which they arrived?
Answer
  • a. Weighted Fair Queueing (WFQ)
  • b. FIFO,
  • c. Round Robin (RR),
  • d. Priority,

Question 7

Question
Packet loss can be eliminated if the switching fabric speed is at least n times as fast as the input line speed, where n is the number of input ports.
Answer
  • True
  • False

Question 8

Question
A datagram with a private network address should be able to be present in the larger public Internet.
Answer
  • True
  • False

Question 9

Question
Type-of-Service field in the IP header can be used to ensure that a packet is forwarded through no more than N routers?
Answer
  • a. Type-of-Service
  • b. Header Length
  • c. Upper-layer-protocol
  • d. Time-to-live

Question 10

Question
The main function of the control plane is forwarding, which is to determine the paths a packet takes from its source to its destination.
Answer
  • True
  • False

Question 11

Question
A link-layer switch forwards a packet based on the packet’s MAC (layer 2) address.
Answer
  • True
  • False

Question 12

Question
The main function of the data plane is packet routing, which is to route datagrams from their input links to their output links.
Answer
  • True
  • False

Question 13

Question
Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent from the source host to the destination host will travel over how many interfaces? How many forwarding tables will be indexed to move the datagram from the source to the destination?
Answer
  • a. 8 interfaces; 3 forwarding tables
  • b. 3 interfaces; 8 forwarding tables
  • c. 5 interfaces; 4 forwarding tables
  • d. 4 interfaces; 5 forwarding tables

Question 14

Question
Forwarding is a router’s local action of transferring packets from its input interfaces to its output interfaces, and forwarding takes place at very short timescales (typically a few nanoseconds), and thus is typically implemented in hardware.
Answer
  • True
  • False

Question 15

Question
Suppose that an arriving packet matches two or more entries in a router’s forwarding table. With traditional destination-based forwarding, what rule does a router apply to determine which of these rules should be applied to determine the output port to which the arriving packet should be switched?
Answer
  • a. Find exact prefix matching to forward the packet
  • b. To save time, find shortest prefix matching to forward the packet.
  • c.Use longest prefix matching to determine which link interface to forward the packet
  • d. None of these rules.

Question 16

Question
What two types of ICMP messages are received at the sending host executing the Traceroute program?
Answer
  • a.ICMP warning message (type 11 code 0) and a destination host unknown ICMP message (type 3 code 7).
  • b. ICMP warning message (type 11 code 0) and a destination port unreachable ICMP message (type 3 code 3).
  • c. ICMP warning message (type 9 code 0) and a destination port unreachable ICMP message (type 3 code 3).
  • d. ICMP Bad IP Header (type 12 code 0) and a destination host unknown ICMP message (type 3 code 7).

Question 17

Question
True or false: Link state algorithms: Computes the least-cost path between source and destination using complete, global knowledge about the network.
Answer
  • True
  • False

Question 18

Question
What is the purpose of the SNMP trap message?
Answer
  • a. A response to a managed device for which the device’s managing server requires notification.
  • b.A response to a request on a managed device for which the device’s managing server requires notification.
  • c. All are correct.
  • d.It is used for notifying a managing server of an exceptional situation (e.g., a link interface going up or down) that has resulted in changes to MIB object values.

Question 19

Question
Suppose you wanted to implement a new routing protocol in the SDN network. At which layer would you implement that protocol?
Answer
  • a.SDN’s network-control Controller (network operating system) layer
  • b. Added to all three layers.
  • c. SDN’s network-control application layer
  • d. SDN’s network-control data plane layer

Question 20

Question
What are the main network considerations for inter-AS and intra-AS protocols used in the Internet?
Answer
  • a. Performance
  • b. Scale
  • c. All are correct.
  • d. Policy

Question 21

Question
Routers use the AS-PATH attribute to detect and prevent looping advertisements; they also use it in choosing among multiple paths to the same prefix.
Answer
  • True
  • False

Question 22

Question
The NEXT-HOP attribute indicates the IP address of the first router along an advertised path (outside of the AS receiving the advertisement) to a given prefix. When configuring its forwarding table, a router uses the NEXT-HOP attribute.
Answer
  • True
  • False

Question 23

Question
Logically centralized control means that a logically central routing controller computes and distributes the forwarding tables to be used by each and every router, and each router does not compute its forwarding table, unlike the per-router control.
Answer
  • True
  • False

Question 24

Question
True or false: When an OSPF route sends its link state information, it is sent only to those nodes directly attached neighbors.
Answer
  • True
  • False

Question 25

Question
Define the following terms: subnet
Answer
  • a. All are correct.
  • b. A subnet does not contain a router;
  • c. A subnet is a portion of a larger network;
  • d. Its boundaries are defined by the router and host interfaces.

Question 26

Question
In the case of logically centralized control, the data plane and control plane are implemented in separate devices; the control plane is implemented in a central server or multiple servers, and the data plane is implemented in each router.
Answer
  • True
  • False

Question 27

Question
A distributed routing algorithm calculates the lease-cost path in an iterative, distributed manner by the routers. With a decentralized algorithm, no node has the complete information about the costs of all network links
Answer
  • True
  • False

Question 28

Question
If we using the analogy of cocktail party interactions, for polling protocol, there isn’t a discussion leader, but there is wine glass that the participants take turns holding. A participant is only allowed to talk if the participant is holding the wine glass.
Answer
  • True
  • False

Question 29

Question
What are some of the possible services that a link-layer protocol can offer to the network layer?
Answer
  • a. All are correct.
  • b. error detection and correction
  • c. link access;
  • d. reliable delivery:
  • e. flow control

Question 30

Question
What is the maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol?
Answer
  • a. 2048 VLAN
  • b. 1024 VLAN
  • c. 4096 VLAN
  • d. 9192 VLAN

Question 31

Question
With IP, datagrams in the same TCP connection can take different routes in the network, and therefore arrive out of order. TCP is still needed to provide the receiving end of the application the byte stream in the correct order.
Answer
  • True
  • False

Question 32

Question
If we using the analogy of cocktail party interactions, in Token Ring protocol, a discussion leader allows only one participant to talk at a time, with each participant getting a chance to talk in a round-robin fashion.
Answer
  • True
  • False

Question 33

Question
Suppose nodes A, B, and C each attach to the same broadcast LAN (through their adapters). If A sends thousands of IP datagrams to B with each encapsulating frame addressed to the MAC address of B, what will C’s adapter process do for these frames?
Answer
  • C’s adapter will not process the frames, but the adapter will pass the datagrams up the protocol stack
  • C’s adapter will not process the frames, and the adapter will not pass the datagrams up the protocol stack
  • C’s adapter will process the frames, but the adapter will not pass the datagrams up the protocol stack
  • C’s adapter will process the frames, but the adapter will pass the datagrams up the protocol stack

Question 34

Question
How big is the MAC address space?
Answer
  • a. 2^128 Bits
  • b. 2^64 Bits
  • c. 2^32 Bits
  • d. 2^48 Bits

Question 35

Question
Although each link guarantees that an IP datagram sent over the link will be received at the other end of the link without errors, it is not guaranteed that IP datagrams will arrive at the ultimate destination in the proper order.
Answer
  • True
  • False

Question 36

Question
Suppose nodes A, B, and C each attach to the same broadcast LAN (through their adapters). If A sends thousands of IP datagrams to B with frames with the MAC broadcast address of B, what will C’s adapter process these frames in this case?
Answer
  • C’s adapter will not process the frames, and the adapter will not pass the datagrams up the protocol stack
  • C’s adapter will process the frames, but the adapter will not pass the datagrams up the protocol stack
  • C’s adapter will both process the frames, and pass the datagrams up the protocol stack
  • C’s adapter will not process the frames, but the adapter will pass the datagrams up the protocol stack

Question 37

Question
How big is the IPv6 address space?
Answer
  • a. 2^48 Bits
  • b. 2^64 Bits
  • c. 2^32 Bits
  • d. 2^128 Bits
Show full summary Hide full summary

Similar

Guía general para el desarrollo de cadenas de valor
lilia aire de la cruz muñoz
Modelo de creación de valor para el cliente
lilia aire de la cruz muñoz
Implementación de la gestión del conocimiento en la empresa
lilia aire de la cruz muñoz
PROGRAMACIÓN LINEAL
Ariel Arauz
Gestión del conocimiento: Elementos para mejorar el proceso de identificación en las organizaciones
lilia aire de la cruz muñoz
PROPUESTA METODOLÓGICA PARA LA AUDITORIA TECNOLÓGICA
lilia aire de la cruz muñoz
Таблица за умножение с 5 и 6
Аничка Петкова
Assessment Quiz 2
Corrine Moore
Cell Biology
foleyshannon0
Chemistry 6 Extracting Vegetable Oil Core GCSE AQA
Chloe Roberts
Unit 5: Evolution
Gurleen Dhillon