Deck 9: TCP/IP Internetworking II

Full screen (f)
exit full mode
Question
The routing prefix in IPv6 is like the ________ part in an IPv4 address.

A) network
B) subnet
C) host
D) both A and B
Use Space or
up arrow
down arrow
to flip the card.
Question
The part of an IPv6 global unicast address that designates the host is called the ________.

A) host part
B) interface ID
C) routing prefix
D) none of the above
Question
Your firm has an 8-bit network part.If you need at least 200 subnets,what must your subnet part size be?

A) 5
B) 6
C) 7
D) 8
Question
Your firm has a 22-bit network part.What subnet part would you select to give at least 10 subnets?

A) 2 bits
B) 3 bits
C) 4 bits
D) none of the above
Question
You have a 20-bit network part and a 4-bit subnet part.How many hosts can you have per subnet?

A) 15
B) 16
C) 254
D) none of the above
Question
In an IPv6 global unicast address,the interface ID is ________ bits long.

A) 8
B) 16
C) 64
D) Its size varies.
Question
A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center.

A) the interface ID
B) the subnet ID
C) fffe
D) 0000
Question
If your subnet part is 8 bits long,you can have ________ subnets.

A) 64
B) 128
C) 256
D) 254
Question
In IP subnet planning,you need to have at least 130 subnets.How large should your subnet part be?

A) 6
B) 7
C) 8
D) none of the above
Question
What field in an IPv6 global unicast address corresponds to the subnet part of an IPv4 address?

A) global routing prefix
B) subnet ID
C) interface ID
D) none of the above
Question
Your subnet part is 8 bits long.How many hosts can you have per subnet?

A) 8
B) 14
C) 254
D) none of the above
Question
The IEEE calls a 64-bit interface addresses that it designed a(n)________ address.

A) Extended Unique Identifier-64
B) Interface ID
C) MAC address
D) IP address
Question
If your subnet part is 7 bits long,how many subnets can you have?

A) 128
B) 256
C) 512
D) none of the above
Question
If the subnet ID in an IPv6 address is 32 bits,how long is the routing prefix?

A) 16 bits
B) 32 bits
C) 64 bits
D) none of the above
Question
________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm.

A) DNS
B) NAT
C) DHCP
D) none of the above
Question
Your firm has a 22-bit network part and a 6-bit subnet part.How many hosts can you have per subnet?

A) 6
B) 8
C) 14
D) none of the above
Question
Which is NOT one of the three parts of a public IPv6 unicast address?

A) subnet ID
B) routing prefix
C) host part
D) All of the above are parts in a public IPv6 unicast address.
Question
Convert the following EUI-48 address to a modified EUI-64 address: AA-00-00-FF-FF-00.

A) aa00:ff:feff:ff0
B) ae00:ff:feff:ff0
C) aa00:00ff:feff:ff0
D) ae00:00ff:feff:ff0
Question
In a large company,you want ________.

A) as big a routing prefix as you can have
B) a medium-size routing prefix
C) as small a routing prefix as you can have
D) The size of the routing prefix is of no importance.
Question
If your routing prefix is 16 bits,how long is your subnet ID?

A) 16 bits
B) 32 bits
C) 48 bits
D) not possible to caculate
Question
The domain name system ________.

A) is a way to find a host's IP addresses if your computer only knows the host's host name
B) is a general naming system for the Internet
C) both A and B
D) neither A nor B
Question
For an internal client to use NAT to communicate with an external webserver,the client must be configured to do so.
Question
In DNS,a group of resources under the control of an organization is called a ________.

A) network
B) subnet
C) scope
D) domain
Question
Companies get second-level domains from ________.

A) the IETF
B) domain registrars
C) the Internet Society
D) the United States Government
Question
If the local DNS server does not know an IP address and must contact a remote DNS server,which DNS server will return the response to the client?

A) the local DNS server
B) the remote DNS server
C) either A or B
D) No IP address will be returned to the client.
Question
".com" is a ________.

A) root domain
B) top-level domain
C) second-level domain
D) none of the above
Question
NAT is transparent to all applications.
Question
Which is a type of top-level domain?

A) generic TLD
B) specific TLD
C) both A and B
D) neither A nor B
Question
NAT ________.

A) allows a firm to have more internal IP addresses
B) provides some security
C) both A and B
D) neither A nor B
Question
NAT enhances security by ________.

A) preventing sniffers from learning internal IP addresses
B) encryption
C) both A and B
D) neither A nor B
Question
Which of the following is a private IP address range?

A) 10.x.x.x
B) 128.171.x.x
C) both A and B
D) neither A nor B
Question
A company has a domain name.What else must it have before it can make a website available to the public?

A) a DNS server to host its domain name
B) the website itself
C) both A and B
D) neither A nor B
Question
If your local DNS server does not know the host name of an IP address,it will get the address from a(n)________.

A) root DNS server
B) proxy DNS server
C) authoritative DNS server
D) none of the above
Question
In NAT,the ________ creates new external source IP addresses and port numbers.

A) router
B) firewall
C) source host
D) destination host
Question
________ is a general naming system for the Internet.

A) NAT
B) DNS
C) DHCP
D) Dotted decimal notation
Question
Which of the following IPv4 addresses would be used for Internet transmission?

A) 10.x.x.x
B) 128.171.x.x
C) both A and B
D) neither A nor B
Question
".edu" is a ________.

A) root domain
B) top-level domain
C) second-level domain
D) none of the above
Question
NAT ________.

A) allows a firm to have more internal IP addresses
B) reduces cost
C) both A and B
D) neither A nor B
Question
The highest-level DNS servers are called ________.

A) root servers
B) top-level domain servers
C) both A and B
D) neither A nor B
Question
Corporations wish to have ________ domain names.

A) top-level
B) second-level
C) third-level
D) none of the above
Question
For a particular domain name,a DNS server will have ________.

A) a single record
B) multiple records
C) two records-one for IPv4 and one for IPv6.
D) all of the above
Question
A DHCP server provides a client with ________.

A) one or more IP addresses for it to use
B) the IP address of one or more DNS servers
C) both A and B
D) neither A nor B
Question
In SNMP,the manager communicates directly with a(n)________.

A) managed device
B) agent
C) object
D) access point
Question
Which of the following can route non-IP packets?

A) OSPF
B) EIGRP
C) both A and B
D) neither A nor B
Question
In SNMP,companies are often reluctant to use ________ commands because of security dangers.

A) Get
B) Set
C) Trap
D) Request
Question
Which of the following would be an SNMP object?

A) number of rows in routing table
B) a managed switch
C) both A and B
D) neither A nor B
Question
Good security is an enabler if a company wishes to use SNMP ________ commands.

A) Get
B) Set
C) Trap
D) Reset
Question
In the Border Gateway Protocol,"gateway" means ________.

A) firewall
B) switch
C) router
D) none of the above
Question
The DNS ________ record is for the host name's ________ address

A) AAAA; IPv4
B) AAAA; IPv6
C) both A and B
D) neither A nor B
Question
Which of the following would be an SNMP object?

A) number of rows in routing table
B) system uptime (since last reboot)
C) both A and B
D) neither A nor B
Question
You need to use EIGRP if ________.

A) you have TCP/IP traffic exclusively
B) some of your traffic is TCP/IP traffic
C) both A and B
Question
The DNS ________ record is for the host name's ________ address

A) A; IPv4
B) A; IPv6
C) AAAA; IPv4
D) none of the above
Question
The almost-universal exterior dynamic routing protocol is ________.

A) EIGRP
B) OSPF
C) both A and B
D) neither A nor B
Question
________ is an interior dynamic routing protocol.

A) OSPF
B) BGP
C) both A and B
D) neither A nor B
Question
Dynamic ________ protocols allow routers to transmit routing table information to one another.

A) routing
B) transport
C) synchronization
D) none of the above
Question
Which of the following would be an SNMP interface object?

A) number of rows in routing table
B) whether the interface is undergoing testing
C) both A and B
D) neither A nor B
Question
A company is free to select whatever ________ dynamic routing protocol it wishes.

A) interior
B) exterior
C) both A and B
D) neither A nor B
Question
An advantage of using DHCP to configure clients is that ________.

A) the configuration information will be up-to-date
B) the configuration will be done securely
C) both A and B
D) neither A nor B
Question
ICMP is used for ________.

A) error messages
B) configuration messages
C) routing messages
D) none of the above
Question
A company is free to select its ________.

A) interior dynamic routing protocol
B) exterior dynamic routing protocol
C) both A and B
D) neither A nor B
Question
IPsec protects ________ layer content.

A) data link
B) application
C) both A and B
D) neither A nor B
Question
In remote access VPNs,IPsec has an ________ at the corporate site.

A) IPsec firewall
B) IPsec gateway
C) IPsec proxy server
D) IPsec endpoint
Question
The SA is negotiated in the ________.

A) IKE phase
B) IPsec protection phase
C) AES phase
D) none of the above
Question
SA protections are applied in the ________.

A) IKE phase
B) IPsec protection
C) AES
D) none of the above
Question
In tunnel mode,ESP fields surround an IPv4 packet's ________.

A) entire length
B) header
C) data field
D) none of the above
Question
Ping is for ________ messages.

A) error advisory
B) supervisory
C) both A and B
Question
SAs in two directions ________.

A) are always the same
B) are always different
C) are sometimes different
Question
Which has stronger security?

A) SSL/TLS
B) IPsec
C) Both have about equal security.
Question
IPsec is used for ________ VPNs.

A) remote-access
B) site-to-site
C) both A and B
D) neither A nor B
Question
The first stage of IPsec uses the ________ protocol.

A) SSL/TLS
B) AES
C) IKE
D) SHA
Question
Which of the following is more widely used?

A) ESP
B) AH
C) Both are about equally widely used.
Question
Which protects more of the original IP packet?

A) transport mode
B) tunnel mode
C) Both provide the same protection to the IP packet.
Question
Options for major cryptographic methods are sometimes unacceptably weak and must be prohibited.
Question
Which of the following is used in ESP?

A) ESP header
B) ESP trailer
C) Integrity check value
D) all of the above
Question
In transport mode,ESP fields surround an IPv4 packet's ________.

A) entire length
B) header
C) data field
D) none of the above
Question
In IPv6,ESP protects the IP packet's_____.

A) entire length
B) payload
C) header
D) none of the above
Question
SLAs define ________.

A) cryptographic methods
B) cryptographic options
C) both A and B
D) neither A nor B
Question
What security concern do ICMP echo request messages and echo response messages bring?

A) attackers can disable the other host
B) attackers can learn that the other host's IP address is in use
C) attackers can change the other host's IP address
D) all of the above.
Question
Pinging is to send ICMP ________ messages to the target host.

A) echo request
B) error advisement
C) ping
D) echo
Question
In IPsec,agreements about how security will be done are called ________.

A) tranches
B) security contracts
C) service-level agreements
D) security associations
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/81
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: TCP/IP Internetworking II
1
The routing prefix in IPv6 is like the ________ part in an IPv4 address.

A) network
B) subnet
C) host
D) both A and B
A
2
The part of an IPv6 global unicast address that designates the host is called the ________.

A) host part
B) interface ID
C) routing prefix
D) none of the above
B
3
Your firm has an 8-bit network part.If you need at least 200 subnets,what must your subnet part size be?

A) 5
B) 6
C) 7
D) 8
D
4
Your firm has a 22-bit network part.What subnet part would you select to give at least 10 subnets?

A) 2 bits
B) 3 bits
C) 4 bits
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
5
You have a 20-bit network part and a 4-bit subnet part.How many hosts can you have per subnet?

A) 15
B) 16
C) 254
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
6
In an IPv6 global unicast address,the interface ID is ________ bits long.

A) 8
B) 16
C) 64
D) Its size varies.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
7
A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center.

A) the interface ID
B) the subnet ID
C) fffe
D) 0000
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
8
If your subnet part is 8 bits long,you can have ________ subnets.

A) 64
B) 128
C) 256
D) 254
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
9
In IP subnet planning,you need to have at least 130 subnets.How large should your subnet part be?

A) 6
B) 7
C) 8
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
10
What field in an IPv6 global unicast address corresponds to the subnet part of an IPv4 address?

A) global routing prefix
B) subnet ID
C) interface ID
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
11
Your subnet part is 8 bits long.How many hosts can you have per subnet?

A) 8
B) 14
C) 254
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
12
The IEEE calls a 64-bit interface addresses that it designed a(n)________ address.

A) Extended Unique Identifier-64
B) Interface ID
C) MAC address
D) IP address
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
13
If your subnet part is 7 bits long,how many subnets can you have?

A) 128
B) 256
C) 512
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
14
If the subnet ID in an IPv6 address is 32 bits,how long is the routing prefix?

A) 16 bits
B) 32 bits
C) 64 bits
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
15
________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm.

A) DNS
B) NAT
C) DHCP
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
16
Your firm has a 22-bit network part and a 6-bit subnet part.How many hosts can you have per subnet?

A) 6
B) 8
C) 14
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
17
Which is NOT one of the three parts of a public IPv6 unicast address?

A) subnet ID
B) routing prefix
C) host part
D) All of the above are parts in a public IPv6 unicast address.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
18
Convert the following EUI-48 address to a modified EUI-64 address: AA-00-00-FF-FF-00.

A) aa00:ff:feff:ff0
B) ae00:ff:feff:ff0
C) aa00:00ff:feff:ff0
D) ae00:00ff:feff:ff0
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
19
In a large company,you want ________.

A) as big a routing prefix as you can have
B) a medium-size routing prefix
C) as small a routing prefix as you can have
D) The size of the routing prefix is of no importance.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
20
If your routing prefix is 16 bits,how long is your subnet ID?

A) 16 bits
B) 32 bits
C) 48 bits
D) not possible to caculate
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
21
The domain name system ________.

A) is a way to find a host's IP addresses if your computer only knows the host's host name
B) is a general naming system for the Internet
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
22
For an internal client to use NAT to communicate with an external webserver,the client must be configured to do so.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
23
In DNS,a group of resources under the control of an organization is called a ________.

A) network
B) subnet
C) scope
D) domain
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
24
Companies get second-level domains from ________.

A) the IETF
B) domain registrars
C) the Internet Society
D) the United States Government
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
25
If the local DNS server does not know an IP address and must contact a remote DNS server,which DNS server will return the response to the client?

A) the local DNS server
B) the remote DNS server
C) either A or B
D) No IP address will be returned to the client.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
26
".com" is a ________.

A) root domain
B) top-level domain
C) second-level domain
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
27
NAT is transparent to all applications.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
28
Which is a type of top-level domain?

A) generic TLD
B) specific TLD
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
29
NAT ________.

A) allows a firm to have more internal IP addresses
B) provides some security
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
30
NAT enhances security by ________.

A) preventing sniffers from learning internal IP addresses
B) encryption
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is a private IP address range?

A) 10.x.x.x
B) 128.171.x.x
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
32
A company has a domain name.What else must it have before it can make a website available to the public?

A) a DNS server to host its domain name
B) the website itself
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
33
If your local DNS server does not know the host name of an IP address,it will get the address from a(n)________.

A) root DNS server
B) proxy DNS server
C) authoritative DNS server
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
34
In NAT,the ________ creates new external source IP addresses and port numbers.

A) router
B) firewall
C) source host
D) destination host
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
35
________ is a general naming system for the Internet.

A) NAT
B) DNS
C) DHCP
D) Dotted decimal notation
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following IPv4 addresses would be used for Internet transmission?

A) 10.x.x.x
B) 128.171.x.x
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
37
".edu" is a ________.

A) root domain
B) top-level domain
C) second-level domain
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
38
NAT ________.

A) allows a firm to have more internal IP addresses
B) reduces cost
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
39
The highest-level DNS servers are called ________.

A) root servers
B) top-level domain servers
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
40
Corporations wish to have ________ domain names.

A) top-level
B) second-level
C) third-level
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
41
For a particular domain name,a DNS server will have ________.

A) a single record
B) multiple records
C) two records-one for IPv4 and one for IPv6.
D) all of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
42
A DHCP server provides a client with ________.

A) one or more IP addresses for it to use
B) the IP address of one or more DNS servers
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
43
In SNMP,the manager communicates directly with a(n)________.

A) managed device
B) agent
C) object
D) access point
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following can route non-IP packets?

A) OSPF
B) EIGRP
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
45
In SNMP,companies are often reluctant to use ________ commands because of security dangers.

A) Get
B) Set
C) Trap
D) Request
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following would be an SNMP object?

A) number of rows in routing table
B) a managed switch
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
47
Good security is an enabler if a company wishes to use SNMP ________ commands.

A) Get
B) Set
C) Trap
D) Reset
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
48
In the Border Gateway Protocol,"gateway" means ________.

A) firewall
B) switch
C) router
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
49
The DNS ________ record is for the host name's ________ address

A) AAAA; IPv4
B) AAAA; IPv6
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following would be an SNMP object?

A) number of rows in routing table
B) system uptime (since last reboot)
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
51
You need to use EIGRP if ________.

A) you have TCP/IP traffic exclusively
B) some of your traffic is TCP/IP traffic
C) both A and B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
52
The DNS ________ record is for the host name's ________ address

A) A; IPv4
B) A; IPv6
C) AAAA; IPv4
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
53
The almost-universal exterior dynamic routing protocol is ________.

A) EIGRP
B) OSPF
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
54
________ is an interior dynamic routing protocol.

A) OSPF
B) BGP
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
55
Dynamic ________ protocols allow routers to transmit routing table information to one another.

A) routing
B) transport
C) synchronization
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following would be an SNMP interface object?

A) number of rows in routing table
B) whether the interface is undergoing testing
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
57
A company is free to select whatever ________ dynamic routing protocol it wishes.

A) interior
B) exterior
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
58
An advantage of using DHCP to configure clients is that ________.

A) the configuration information will be up-to-date
B) the configuration will be done securely
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
59
ICMP is used for ________.

A) error messages
B) configuration messages
C) routing messages
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
60
A company is free to select its ________.

A) interior dynamic routing protocol
B) exterior dynamic routing protocol
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
61
IPsec protects ________ layer content.

A) data link
B) application
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
62
In remote access VPNs,IPsec has an ________ at the corporate site.

A) IPsec firewall
B) IPsec gateway
C) IPsec proxy server
D) IPsec endpoint
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
63
The SA is negotiated in the ________.

A) IKE phase
B) IPsec protection phase
C) AES phase
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
64
SA protections are applied in the ________.

A) IKE phase
B) IPsec protection
C) AES
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
65
In tunnel mode,ESP fields surround an IPv4 packet's ________.

A) entire length
B) header
C) data field
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
66
Ping is for ________ messages.

A) error advisory
B) supervisory
C) both A and B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
67
SAs in two directions ________.

A) are always the same
B) are always different
C) are sometimes different
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
68
Which has stronger security?

A) SSL/TLS
B) IPsec
C) Both have about equal security.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
69
IPsec is used for ________ VPNs.

A) remote-access
B) site-to-site
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
70
The first stage of IPsec uses the ________ protocol.

A) SSL/TLS
B) AES
C) IKE
D) SHA
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following is more widely used?

A) ESP
B) AH
C) Both are about equally widely used.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
72
Which protects more of the original IP packet?

A) transport mode
B) tunnel mode
C) Both provide the same protection to the IP packet.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
73
Options for major cryptographic methods are sometimes unacceptably weak and must be prohibited.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following is used in ESP?

A) ESP header
B) ESP trailer
C) Integrity check value
D) all of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
75
In transport mode,ESP fields surround an IPv4 packet's ________.

A) entire length
B) header
C) data field
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
76
In IPv6,ESP protects the IP packet's_____.

A) entire length
B) payload
C) header
D) none of the above
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
77
SLAs define ________.

A) cryptographic methods
B) cryptographic options
C) both A and B
D) neither A nor B
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
78
What security concern do ICMP echo request messages and echo response messages bring?

A) attackers can disable the other host
B) attackers can learn that the other host's IP address is in use
C) attackers can change the other host's IP address
D) all of the above.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
79
Pinging is to send ICMP ________ messages to the target host.

A) echo request
B) error advisement
C) ping
D) echo
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
80
In IPsec,agreements about how security will be done are called ________.

A) tranches
B) security contracts
C) service-level agreements
D) security associations
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 81 flashcards in this deck.