Deck 9: Networking and Transport Layer Protocols: OSPF IPV6, and UDP
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/19
Play
Full screen (f)
Deck 9: Networking and Transport Layer Protocols: OSPF IPV6, and UDP
1
Which of the following is not a type of OSPF packet?
A)hello
B)link-state request
C)link-state response
D)link-state ack
A)hello
B)link-state request
C)link-state response
D)link-state ack
link-state response
2
In OSPF header, which field is used to detect errors in the packet?
A)type
B)area id
C)authentication type
D)checksum
A)type
B)area id
C)authentication type
D)checksum
checksum
3
In OSPF database descriptor packet, if there are more database descriptor packets in the flow, 'M' field is set to
A)1
B)0
C)more
D)-1
A)1
B)0
C)more
D)-1
1
4
In OSPF database descriptor packet, which field is used to indicate that the router is master?
A)m
B)ms
C)i
D)options
A)m
B)ms
C)i
D)options
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
5
In OSPF database descriptor packet, which field is used to detect a missing packet?
A)lsa header
B)ms
C)database descriptor sequence number
D)options
A)lsa header
B)ms
C)database descriptor sequence number
D)options
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
6
The header length of an IPv6 datagram is
A)10bytes
B)25bytes
C)30bytes
D)40bytes
A)10bytes
B)25bytes
C)30bytes
D)40bytes
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
7
In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
A)fragmentation field
B)fast-switching
C)tos field
D)option field
A)fragmentation field
B)fast-switching
C)tos field
D)option field
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
8
Which among the following features is
A)hop limit
B)ttl
C)next header
D)type of traffic
A)hop limit
B)ttl
C)next header
D)type of traffic
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
9
Dual-stack approach refers to
A)implementing ipv4 with 2 stacks
B)implementing ipv6 with 2 stacks
C)node has both ipv4 and ipv6 support
D)implementing a mac address with 2 stacks
A)implementing ipv4 with 2 stacks
B)implementing ipv6 with 2 stacks
C)node has both ipv4 and ipv6 support
D)implementing a mac address with 2 stacks
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
10
The------------field determines the lifetime of IPv6 datagram
A)use dual-stack approach
B)tunneling
C)no solution
D)replace the system
A)use dual-stack approach
B)tunneling
C)no solution
D)replace the system
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
11
Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits
A)96 to 127
B)0 to 63
C)80 to 95
D)64 to 79
A)96 to 127
B)0 to 63
C)80 to 95
D)64 to 79
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
12
Which one of the following is a version of UDP with congestion control?
A)datagram congestion control protocol
B)stream control transmission protocol
C)structured stream transport
D)user congestion control protocol
A)datagram congestion control protocol
B)stream control transmission protocol
C)structured stream transport
D)user congestion control protocol
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
13
2 USER DATAGRAM PROTOCOLS (UDP)
A)connection-oriented
B)unreliable
C)transport layer protocol
D)low overhead
A)connection-oriented
B)unreliable
C)transport layer protocol
D)low overhead
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
14
Return value of the UDP port "Chargen" is
A)string of characters
B)string of integers
C)array of characters with integers
D)array of zero's and one's
A)string of characters
B)string of integers
C)array of characters with integers
D)array of zero's and one's
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
15
What is the main advantage of UDP?
A)more overload
B)reliable
C)low overhead
D)fast
A)more overload
B)reliable
C)low overhead
D)fast
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
16
The port number is "ephemeral port number", if the source host is
A)ntp
B)echo
C)server
D)client
A)ntp
B)echo
C)server
D)client
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
17
"Total length" field in UDP packet header is the length of
A)only udp header
B)only data
C)only checksum
D)udp header plus data
A)only udp header
B)only data
C)only checksum
D)udp header plus data
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
18
Which is the correct expression for the length of UDP datagram?
A)udp length = ip length - ip header's length
B)udp length = udp length - udp header's length
C)udp length = ip length + ip header's length
D)udp length = udp length + udp header's length
A)udp length = ip length - ip header's length
B)udp length = udp length - udp header's length
C)udp length = ip length + ip header's length
D)udp length = udp length + udp header's length
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
19
The-------------- field is used to detect errors over the entire user datagram.
A)udp header
B)checksum
C)source port
D)destination port
A)udp header
B)checksum
C)source port
D)destination port
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck