Genardas Janonis
Quiz by , created more than 1 year ago

Final

598
0
0
Genardas Janonis
Created by Genardas Janonis about 6 years ago
Close

Computer Networking Quiz 4, 5, 6

Question 1 of 37

1

Packet loss can occur at router output ports and this loss can be prevented by increasing the switch fabric speed.

Select one of the following:

  • True
  • False

Explanation

Question 2 of 37

1

What is the name of a network-layer packet?

Select one of the following:

  • Frame

  • Datagram

  • Segment

  • All are correct

Explanation

Question 3 of 37

1

The 8-bit protocol field in the IP datagram contains information about which transport layer protocol (TCP or UDP) the destination host should pass the segment to.

Select one of the following:

  • True
  • False

Explanation

Question 4 of 37

1

A data plane is responsible for

Select one of the following:

  • All are correct

  • b. the data plane’s input ports perform physical layer function of terminating an incoming physical link at a router,

  • c. performs link-layer function to interoperate with the link layer at the other side of the incoming link,

  • d. perform lookup function at the input ports

Explanation

Question 5 of 37

1

A control plane is responsible for

Select one of the following:

  • a. communicating with remote controllers,

  • b. responding to attached links that go up or down,

  • c. All are correct.

  • d. performing management functions.

  • e. executing routing protocols,

Explanation

Question 6 of 37

1

Which of these packet queueing disciplines ensure that all packets depart in the order in which they arrived?

Select one of the following:

  • a. Weighted Fair Queueing (WFQ)

  • b. FIFO,

  • c. Round Robin (RR),

  • d. Priority,

Explanation

Question 7 of 37

1

Packet loss can be eliminated if the switching fabric speed is at least n times as fast as the input line speed, where n is the number of input ports.

Select one of the following:

  • True
  • False

Explanation

Question 8 of 37

1

A datagram with a private network address should be able to be present in the larger public Internet.

Select one of the following:

  • True
  • False

Explanation

Question 9 of 37

1

Type-of-Service field in the IP header can be used to ensure that a packet is forwarded through no more than N routers?

Select one of the following:

  • a. Type-of-Service

  • b. Header Length

  • c. Upper-layer-protocol

  • d. Time-to-live

Explanation

Question 10 of 37

1

The main function of the control plane is forwarding, which is to determine the paths a packet takes from its source to its destination.

Select one of the following:

  • True
  • False

Explanation

Question 11 of 37

1

A link-layer switch forwards a packet based on the packet’s MAC (layer 2) address.

Select one of the following:

  • True
  • False

Explanation

Question 12 of 37

1

The main function of the data plane is packet routing, which is to route datagrams from their input links to their output links.

Select one of the following:

  • True
  • False

Explanation

Question 13 of 37

1

Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent from the source host to the destination host will travel over how many interfaces? How many forwarding tables will be indexed to move the datagram from the source to the destination?

Select one of the following:

  • a. 8 interfaces; 3 forwarding tables

  • b. 3 interfaces; 8 forwarding tables

  • c. 5 interfaces; 4 forwarding tables

  • d. 4 interfaces; 5 forwarding tables

Explanation

Question 14 of 37

1

Forwarding is a router’s local action of transferring packets from its input interfaces to its output interfaces, and forwarding takes place at very short timescales (typically a few nanoseconds), and thus is typically implemented in hardware.

Select one of the following:

  • True
  • False

Explanation

Question 15 of 37

1

Suppose that an arriving packet matches two or more entries in a router’s forwarding table. With traditional destination-based forwarding, what rule does a router apply to determine which of these rules should be applied to determine the output port to which the arriving packet should be switched?

Select one of the following:

  • a. Find exact prefix matching to forward the packet

  • b. To save time, find shortest prefix matching to forward the packet.

  • c.Use longest prefix matching to determine which link interface to forward the packet

  • d. None of these rules.

Explanation

Question 16 of 37

1

What two types of ICMP messages are received at the sending host executing the Traceroute program?

Select one of the following:

  • a.ICMP warning message (type 11 code 0) and a destination host unknown ICMP message (type 3 code 7).

  • b. ICMP warning message (type 11 code 0) and a destination port unreachable ICMP message (type 3 code 3).

  • c. ICMP warning message (type 9 code 0) and a destination port unreachable ICMP message (type 3 code 3).

  • d. ICMP Bad IP Header (type 12 code 0) and a destination host unknown ICMP message (type 3 code 7).

Explanation

Question 17 of 37

1

True or false: Link state algorithms: Computes the least-cost path between source and destination using complete, global knowledge about the network.

Select one of the following:

  • True
  • False

Explanation

Question 18 of 37

1

What is the purpose of the SNMP trap message?

Select one of the following:

  • a. A response to a managed device for which the device’s managing server requires notification.

  • b.A response to a request on a managed device for which the device’s managing server requires notification.

  • c. All are correct.

  • d.It is used for notifying a managing server of an exceptional situation (e.g., a link interface going up or down) that has resulted in changes to MIB object values.

Explanation

Question 19 of 37

1

Suppose you wanted to implement a new routing protocol in the SDN network. At which layer would you implement that protocol?

Select one of the following:

  • a.SDN’s network-control Controller (network operating system) layer

  • b. Added to all three layers.

  • c. SDN’s network-control application layer

  • d. SDN’s network-control data plane layer

Explanation

Question 20 of 37

1

What are the main network considerations for inter-AS and intra-AS protocols used in the Internet?

Select one of the following:

  • a.
    Performance

  • b.
    Scale

  • c.
    All are correct.

  • d.
    Policy

Explanation

Question 21 of 37

1

Routers use the AS-PATH attribute to detect and prevent looping advertisements; they also use it in choosing among multiple paths to the same prefix.

Select one of the following:

  • True
  • False

Explanation

Question 22 of 37

1

The NEXT-HOP attribute indicates the IP address of the first router along an advertised path (outside of the AS receiving the advertisement) to a given prefix. When configuring its forwarding table, a router uses the NEXT-HOP attribute.

Select one of the following:

  • True
  • False

Explanation

Question 23 of 37

1

Logically centralized control means that a logically central routing controller computes and distributes the forwarding tables to be used by each and every router, and each router does not compute its forwarding table, unlike the per-router control.

Select one of the following:

  • True
  • False

Explanation

Question 24 of 37

1

True or false: When an OSPF route sends its link state information, it is sent only to those nodes directly attached neighbors.

Select one of the following:

  • True
  • False

Explanation

Question 25 of 37

1

Define the following terms: subnet

Select one of the following:

  • a.
    All are correct.

  • b.
    A subnet does not contain a router;

  • c.
    A subnet is a portion of a larger network;

  • d.
    Its boundaries are defined by the router and host interfaces.

Explanation

Question 26 of 37

1

In the case of logically centralized control, the data plane and control plane are implemented in separate devices; the control plane is implemented in a central server or multiple servers, and the data plane is implemented in each router.

Select one of the following:

  • True
  • False

Explanation

Question 27 of 37

1

A distributed routing algorithm calculates the lease-cost path in an iterative, distributed manner by the routers. With a decentralized algorithm, no node has the complete information about the costs of all network links

Select one of the following:

  • True
  • False

Explanation

Question 28 of 37

1

If we using the analogy of cocktail party interactions, for polling protocol, there isn’t a discussion leader, but there is wine glass that the participants take turns holding. A participant is only allowed to talk if the participant is holding the wine glass.

Select one of the following:

  • True
  • False

Explanation

Question 29 of 37

1

What are some of the possible services that a link-layer protocol can offer to the network layer?

Select one of the following:

  • a. All are correct.

  • b. error detection and correction

  • c. link access;

  • d. reliable delivery:

  • e. flow control

Explanation

Question 30 of 37

1

What is the maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol?

Select one of the following:

  • a. 2048 VLAN

  • b. 1024 VLAN

  • c. 4096 VLAN

  • d. 9192 VLAN

Explanation

Question 31 of 37

1

With IP, datagrams in the same TCP connection can take different routes in the network, and therefore arrive out of order. TCP is still needed to provide the receiving end of the application the byte stream in the correct order.

Select one of the following:

  • True
  • False

Explanation

Question 32 of 37

1

If we using the analogy of cocktail party interactions, in Token Ring protocol, a discussion leader allows only one participant to talk at a time, with each participant getting a chance to talk in a round-robin fashion.

Select one of the following:

  • True
  • False

Explanation

Question 33 of 37

1

Suppose nodes A, B, and C each attach to the same broadcast LAN (through their adapters). If A sends thousands of IP datagrams to B with each encapsulating frame addressed to the MAC address of B, what will C’s adapter process do for these frames?

Select one of the following:

  • C’s adapter will not process the frames, but the adapter will pass the datagrams up the protocol stack

  • C’s adapter will not process the frames, and the adapter will not pass the datagrams up the protocol stack

  • C’s adapter will process the frames, but the adapter will not pass the datagrams up the protocol stack

  • C’s adapter will process the frames, but the adapter will pass the datagrams up the protocol stack

Explanation

Question 34 of 37

1

How big is the MAC address space?

Select one of the following:

  • a. 2^128 Bits

  • b. 2^64 Bits

  • c. 2^32 Bits

  • d. 2^48 Bits

Explanation

Question 35 of 37

1

Although each link guarantees that an IP datagram sent over the link will be received at the other end of the link without errors, it is not guaranteed that IP datagrams will arrive at the ultimate destination in the proper order.

Select one of the following:

  • True
  • False

Explanation

Question 36 of 37

1

Suppose nodes A, B, and C each attach to the same broadcast LAN (through their adapters). If A sends thousands of IP datagrams to B with frames with the MAC broadcast address of B, what will C’s adapter process these frames in this case?

Select one of the following:

  • C’s adapter will not process the frames, and the adapter will not pass the datagrams up the protocol stack

  • C’s adapter will process the frames, but the adapter will not pass the datagrams up the protocol stack

  • C’s adapter will both process the frames, and pass the datagrams up the protocol stack

  • C’s adapter will not process the frames, but the adapter will pass the datagrams up the protocol stack

Explanation

Question 37 of 37

1

How big is the IPv6 address space?

Select one of the following:

  • a. 2^48 Bits

  • b. 2^64 Bits

  • c. 2^32 Bits

  • d. 2^128 Bits

Explanation