Deck 9: Networking and Transport Layer Protocols: OSPF IPV6, and UDP

Full screen (f)
exit full mode
Question
Which of the following is not a type of OSPF packet?

A)hello
B)link-state request
C)link-state response
D)link-state ack
Use Space or
up arrow
down arrow
to flip the card.
Question
In OSPF header, which field is used to detect errors in the packet?

A)type
B)area id
C)authentication type
D)checksum
Question
In OSPF database descriptor packet, if there are more database descriptor packets in the flow, 'M' field is set to                          

A)1
B)0
C)more
D)-1
Question
In OSPF database descriptor packet, which field is used to indicate that the router is master?

A)m
B)ms
C)i
D)options
Question
In OSPF database descriptor packet, which field is used to detect a missing packet?

A)lsa header
B)ms
C)database descriptor sequence number
D)options
Question
The header length of an IPv6 datagram is

A)10bytes
B)25bytes
C)30bytes
D)40bytes
Question
In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?

A)fragmentation field
B)fast-switching
C)tos field
D)option field
Question
Which among the following features is

A)hop limit
B)ttl
C)next header
D)type of traffic
Question
Dual-stack approach refers to                    

A)implementing ipv4 with 2 stacks
B)implementing ipv6 with 2 stacks
C)node has both ipv4 and ipv6 support
D)implementing a mac address with 2 stacks
Question
The------------field determines the lifetime of IPv6 datagram

A)use dual-stack approach
B)tunneling
C)no solution
D)replace the system
Question
Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits              

A)96 to 127
B)0 to 63
C)80 to 95
D)64 to 79
Question
Which one of the following is a version of UDP with congestion control?

A)datagram congestion control protocol
B)stream control transmission protocol
C)structured stream transport
D)user congestion control protocol
Question
2 USER DATAGRAM PROTOCOLS (UDP)

A)connection-oriented
B)unreliable
C)transport layer protocol
D)low overhead
Question
Return value of the UDP port "Chargen" is

A)string of characters
B)string of integers
C)array of characters with integers
D)array of zero's and one's
Question
What is the main advantage of UDP?

A)more overload
B)reliable
C)low overhead
D)fast
Question
The port number is "ephemeral port number", if the source host is                

A)ntp
B)echo
C)server
D)client
Question
"Total length" field in UDP packet header is the length of                    

A)only udp header
B)only data
C)only checksum
D)udp header plus data
Question
Which is the correct expression for the length of UDP datagram?

A)udp length = ip length - ip header's length
B)udp length = udp length - udp header's length
C)udp length = ip length + ip header's length
D)udp length = udp length + udp header's length
Question
The-------------- field is used to detect errors over the entire user datagram.

A)udp header
B)checksum
C)source port
D)destination port
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/19
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Networking and Transport Layer Protocols: OSPF IPV6, and UDP
1
Which of the following is not a type of OSPF packet?

A)hello
B)link-state request
C)link-state response
D)link-state ack
link-state response
2
In OSPF header, which field is used to detect errors in the packet?

A)type
B)area id
C)authentication type
D)checksum
checksum
3
In OSPF database descriptor packet, if there are more database descriptor packets in the flow, 'M' field is set to                          

A)1
B)0
C)more
D)-1
1
4
In OSPF database descriptor packet, which field is used to indicate that the router is master?

A)m
B)ms
C)i
D)options
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
5
In OSPF database descriptor packet, which field is used to detect a missing packet?

A)lsa header
B)ms
C)database descriptor sequence number
D)options
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
6
The header length of an IPv6 datagram is

A)10bytes
B)25bytes
C)30bytes
D)40bytes
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
7
In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?

A)fragmentation field
B)fast-switching
C)tos field
D)option field
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
8
Which among the following features is

A)hop limit
B)ttl
C)next header
D)type of traffic
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
9
Dual-stack approach refers to                    

A)implementing ipv4 with 2 stacks
B)implementing ipv6 with 2 stacks
C)node has both ipv4 and ipv6 support
D)implementing a mac address with 2 stacks
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
10
The------------field determines the lifetime of IPv6 datagram

A)use dual-stack approach
B)tunneling
C)no solution
D)replace the system
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
11
Teredo is an automatic tunneling technique. In each client the obfuscated IPv4 address is represented by bits              

A)96 to 127
B)0 to 63
C)80 to 95
D)64 to 79
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
12
Which one of the following is a version of UDP with congestion control?

A)datagram congestion control protocol
B)stream control transmission protocol
C)structured stream transport
D)user congestion control protocol
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
13
2 USER DATAGRAM PROTOCOLS (UDP)

A)connection-oriented
B)unreliable
C)transport layer protocol
D)low overhead
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
14
Return value of the UDP port "Chargen" is

A)string of characters
B)string of integers
C)array of characters with integers
D)array of zero's and one's
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
15
What is the main advantage of UDP?

A)more overload
B)reliable
C)low overhead
D)fast
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
16
The port number is "ephemeral port number", if the source host is                

A)ntp
B)echo
C)server
D)client
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
17
"Total length" field in UDP packet header is the length of                    

A)only udp header
B)only data
C)only checksum
D)udp header plus data
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
18
Which is the correct expression for the length of UDP datagram?

A)udp length = ip length - ip header's length
B)udp length = udp length - udp header's length
C)udp length = ip length + ip header's length
D)udp length = udp length + udp header's length
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
19
The-------------- field is used to detect errors over the entire user datagram.

A)udp header
B)checksum
C)source port
D)destination port
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 19 flashcards in this deck.