Advertisement Upgrade to remove ads

Chapter 3 & 4 Theory test

The TCP/IP model explains how the protocol suite works to provide communications.

TRUE

The Trivial File Transfer Protocol (TFTP) sends data using a reliable connection.

FALSE

Both TCP and UDP use port numbers for communications between hosts.

TRUE

The size of the TCP window determines the number of acknowledgements sent for a given data transfer.

TRUE

A small TCP window size produces few acknowledgements.

FALSE

An IP address has 32 bits divided into four octets (four sets of eight binary digits).

TRUE

TCP/IP networks cannot use MAC addresses in communication.

FALSE

TCP/IP host use the combination of the IP address and the subnet mask to determine is other addresses are local or remote.

TRUE

The file allocation of network numbers based on CIDR has led to the depletion of IP addresses.

FALSE

Basic routing protocols such as RIP version 1 and IGRP support VLSM.

FALSE

The invention and evolution of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite resulted from a coordinated effort by the U.S. _____.

Department of Defense (DOD)

The _____ layer in the TCP/IP model maps to the OSI Application, Presentation, and Session layers.

Application

The _____ layer in the TCP/IP model determines the connectionless or connection-oriented services.

Transport

The _____ layer in the TCP/IP model is a direct equivalent to the Network layer in the OSI reference model.

Internetwork

The _____ layer of the TCP/IP model maps to both the Data Link and the Physical layers of the OSI reference model.

Network Interface

_____ is a connection-oriented protocol that allows you to connect other computers on the Internet and view Web page content.

HTTP

_____is a communication method for network devices that is designed to reduce the flow of packets from their source.

Congestion avoidance

The _____ layer in the TCP/IP model handles software, or logical addressing.

Internetwork

The _____ protocol provides a connectionless delivery service.

IP

Many network devices maintain tables of the MAC and IP addresses of other devices on the network. These tables are called _____.

ARP tables

A(n) _____ supplies the MAC address of the destination host in a unicast packet.

ARP reply

_____ provides the same basic functionality as RARP.

DHCP

Network administrators and support personnel commonly use the _____ utility to verify connectivity between two points.

Ping

The _____ utility uses ICMP echo request/reply messages and can verify Internetwork layer (OSI-Network layer) connectivity.

Trace

Trace shows the exact path a packet takes from the source to the destination. This is accomplished through the use of the _____ counter.

Time-to-live (TTL)

A(n) _____ is caused by a malicious user or program that sends a large quantity of ICMP echo request (pings) to a target in an attempt to crash or greatly reduce the performance of the target device.

ICMP flood

A router references its _____ to determine which of its interfaces is connected to the destination network.

Routing table

_____ protocols allows the router to be updated automatically.

Routing

The Cisco _____ model does not describe how communications take place. Rather, it focuses on how best to design a network, especially a relatively large network or one that is expected to grow.

Three-Layer Hierarchical

_____ is the process of assigning unique IP addresses to devices on the network.

IP addressing

A(n) _____ address identifies both a network and a host, so you can route communications through large networks, including the Internet.

IP

It seems that 127.0.0.1 (decimal) is the highest Class A address, but that particular address range is reserved as the _____ address.

Loopback

To determine how many digits are used for the network identifier, you must look at the _____, which is a required component for all IP hosts.

Subnet mask

When the host portion of an IP address is all binary zeros, that address is the _____ identifier.

Subnetwork

The CIDR addressing method allows the use of a _____ to designate the number of network bits in the mask.

Prefix

_____ tell the computer or router which part of an IP address is the network portion and which part is the host portion.

Subnet masks

In a _____ world, the routing updates carry subnet mask information and allow different masks to be used on different subnets.

Classless

The decimal number 192 expressed in binary is _____.

11000000

Although the base _____ numbering system seems foreign at first glance, largely due to the addition of letters, it really is an efficient way to express large numbers such as MAC and IPv6 addresses.

16

_____ is the version of IP currently deployed on most systems today.

IPv4

_____ was originally designed to address the eventual depletion of IPv4 addresses.

IPv6

_____ allows a single IP address to provide connectivity for many hosts and is widely used on networks of all sizes.

NAT

_____ is the most important layer 3 security protocol.

IPSec

IPv4 networks rely on _____, which is inefficient because many hosts unnecessarily see and partially process traffic not ultimately destined for them.

Broadcasting

_____ is a transition method that encapsulates IPv6 traffic inside IPv4 packets.

Tunneling

A series of documents called _____define, describe, and standardize the implementation and configuration of the TCP/IP protocol suite.

Request for Comments (RFC)

Before two computers can communicate over TCP, they must synchronize their _____.

Initial Sequence Number (ISN)

_____, also known as windowing is a method of controlling packet flow between hosts.

Sliding Windows

_____ broadcasts are broadcasts for any subnet and use the IP address 255.255.255.255.

Flooded

The purpose of _____ is to allow many IP subnets to be advertised as one.

Summarization

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set