Genardas Janonis
Test por , creado hace más de 1 año

Final

591
0
0
Genardas Janonis
Creado por Genardas Janonis hace casi 6 años
Cerrar

Computer Networking Quiz 4, 5, 6

Pregunta 1 de 37

1

Packet loss can occur at router output ports and this loss can be prevented by increasing the switch fabric speed.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 2 de 37

1

What is the name of a network-layer packet?

Selecciona una de las siguientes respuestas posibles:

  • Frame

  • Datagram

  • Segment

  • All are correct

Explicación

Pregunta 3 de 37

1

The 8-bit protocol field in the IP datagram contains information about which transport layer protocol (TCP or UDP) the destination host should pass the segment to.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 4 de 37

1

A data plane is responsible for

Selecciona una de las siguientes respuestas posibles:

  • All are correct

  • b. the data plane’s input ports perform physical layer function of terminating an incoming physical link at a router,

  • c. performs link-layer function to interoperate with the link layer at the other side of the incoming link,

  • d. perform lookup function at the input ports

Explicación

Pregunta 5 de 37

1

A control plane is responsible for

Selecciona una de las siguientes respuestas posibles:

  • a. communicating with remote controllers,

  • b. responding to attached links that go up or down,

  • c. All are correct.

  • d. performing management functions.

  • e. executing routing protocols,

Explicación

Pregunta 6 de 37

1

Which of these packet queueing disciplines ensure that all packets depart in the order in which they arrived?

Selecciona una de las siguientes respuestas posibles:

  • a. Weighted Fair Queueing (WFQ)

  • b. FIFO,

  • c. Round Robin (RR),

  • d. Priority,

Explicación

Pregunta 7 de 37

1

Packet loss can be eliminated if the switching fabric speed is at least n times as fast as the input line speed, where n is the number of input ports.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 8 de 37

1

A datagram with a private network address should be able to be present in the larger public Internet.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 9 de 37

1

Type-of-Service field in the IP header can be used to ensure that a packet is forwarded through no more than N routers?

Selecciona una de las siguientes respuestas posibles:

  • a. Type-of-Service

  • b. Header Length

  • c. Upper-layer-protocol

  • d. Time-to-live

Explicación

Pregunta 10 de 37

1

The main function of the control plane is forwarding, which is to determine the paths a packet takes from its source to its destination.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 11 de 37

1

A link-layer switch forwards a packet based on the packet’s MAC (layer 2) address.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 12 de 37

1

The main function of the data plane is packet routing, which is to route datagrams from their input links to their output links.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 13 de 37

1

Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent from the source host to the destination host will travel over how many interfaces? How many forwarding tables will be indexed to move the datagram from the source to the destination?

Selecciona una de las siguientes respuestas posibles:

  • a. 8 interfaces; 3 forwarding tables

  • b. 3 interfaces; 8 forwarding tables

  • c. 5 interfaces; 4 forwarding tables

  • d. 4 interfaces; 5 forwarding tables

Explicación

Pregunta 14 de 37

1

Forwarding is a router’s local action of transferring packets from its input interfaces to its output interfaces, and forwarding takes place at very short timescales (typically a few nanoseconds), and thus is typically implemented in hardware.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 15 de 37

1

Suppose that an arriving packet matches two or more entries in a router’s forwarding table. With traditional destination-based forwarding, what rule does a router apply to determine which of these rules should be applied to determine the output port to which the arriving packet should be switched?

Selecciona una de las siguientes respuestas posibles:

  • a. Find exact prefix matching to forward the packet

  • b. To save time, find shortest prefix matching to forward the packet.

  • c.Use longest prefix matching to determine which link interface to forward the packet

  • d. None of these rules.

Explicación

Pregunta 16 de 37

1

What two types of ICMP messages are received at the sending host executing the Traceroute program?

Selecciona una de las siguientes respuestas posibles:

  • a.ICMP warning message (type 11 code 0) and a destination host unknown ICMP message (type 3 code 7).

  • b. ICMP warning message (type 11 code 0) and a destination port unreachable ICMP message (type 3 code 3).

  • c. ICMP warning message (type 9 code 0) and a destination port unreachable ICMP message (type 3 code 3).

  • d. ICMP Bad IP Header (type 12 code 0) and a destination host unknown ICMP message (type 3 code 7).

Explicación

Pregunta 17 de 37

1

True or false: Link state algorithms: Computes the least-cost path between source and destination using complete, global knowledge about the network.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 18 de 37

1

What is the purpose of the SNMP trap message?

Selecciona una de las siguientes respuestas posibles:

  • a. A response to a managed device for which the device’s managing server requires notification.

  • b.A response to a request on a managed device for which the device’s managing server requires notification.

  • c. All are correct.

  • d.It is used for notifying a managing server of an exceptional situation (e.g., a link interface going up or down) that has resulted in changes to MIB object values.

Explicación

Pregunta 19 de 37

1

Suppose you wanted to implement a new routing protocol in the SDN network. At which layer would you implement that protocol?

Selecciona una de las siguientes respuestas posibles:

  • a.SDN’s network-control Controller (network operating system) layer

  • b. Added to all three layers.

  • c. SDN’s network-control application layer

  • d. SDN’s network-control data plane layer

Explicación

Pregunta 20 de 37

1

What are the main network considerations for inter-AS and intra-AS protocols used in the Internet?

Selecciona una de las siguientes respuestas posibles:

  • a.
    Performance

  • b.
    Scale

  • c.
    All are correct.

  • d.
    Policy

Explicación

Pregunta 21 de 37

1

Routers use the AS-PATH attribute to detect and prevent looping advertisements; they also use it in choosing among multiple paths to the same prefix.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 22 de 37

1

The NEXT-HOP attribute indicates the IP address of the first router along an advertised path (outside of the AS receiving the advertisement) to a given prefix. When configuring its forwarding table, a router uses the NEXT-HOP attribute.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 23 de 37

1

Logically centralized control means that a logically central routing controller computes and distributes the forwarding tables to be used by each and every router, and each router does not compute its forwarding table, unlike the per-router control.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 24 de 37

1

True or false: When an OSPF route sends its link state information, it is sent only to those nodes directly attached neighbors.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 25 de 37

1

Define the following terms: subnet

Selecciona una de las siguientes respuestas posibles:

  • a.
    All are correct.

  • b.
    A subnet does not contain a router;

  • c.
    A subnet is a portion of a larger network;

  • d.
    Its boundaries are defined by the router and host interfaces.

Explicación

Pregunta 26 de 37

1

In the case of logically centralized control, the data plane and control plane are implemented in separate devices; the control plane is implemented in a central server or multiple servers, and the data plane is implemented in each router.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 27 de 37

1

A distributed routing algorithm calculates the lease-cost path in an iterative, distributed manner by the routers. With a decentralized algorithm, no node has the complete information about the costs of all network links

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 28 de 37

1

If we using the analogy of cocktail party interactions, for polling protocol, there isn’t a discussion leader, but there is wine glass that the participants take turns holding. A participant is only allowed to talk if the participant is holding the wine glass.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 29 de 37

1

What are some of the possible services that a link-layer protocol can offer to the network layer?

Selecciona una de las siguientes respuestas posibles:

  • a. All are correct.

  • b. error detection and correction

  • c. link access;

  • d. reliable delivery:

  • e. flow control

Explicación

Pregunta 30 de 37

1

What is the maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol?

Selecciona una de las siguientes respuestas posibles:

  • a. 2048 VLAN

  • b. 1024 VLAN

  • c. 4096 VLAN

  • d. 9192 VLAN

Explicación

Pregunta 31 de 37

1

With IP, datagrams in the same TCP connection can take different routes in the network, and therefore arrive out of order. TCP is still needed to provide the receiving end of the application the byte stream in the correct order.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 32 de 37

1

If we using the analogy of cocktail party interactions, in Token Ring protocol, a discussion leader allows only one participant to talk at a time, with each participant getting a chance to talk in a round-robin fashion.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 33 de 37

1

Suppose nodes A, B, and C each attach to the same broadcast LAN (through their adapters). If A sends thousands of IP datagrams to B with each encapsulating frame addressed to the MAC address of B, what will C’s adapter process do for these frames?

Selecciona una de las siguientes respuestas posibles:

  • C’s adapter will not process the frames, but the adapter will pass the datagrams up the protocol stack

  • C’s adapter will not process the frames, and the adapter will not pass the datagrams up the protocol stack

  • C’s adapter will process the frames, but the adapter will not pass the datagrams up the protocol stack

  • C’s adapter will process the frames, but the adapter will pass the datagrams up the protocol stack

Explicación

Pregunta 34 de 37

1

How big is the MAC address space?

Selecciona una de las siguientes respuestas posibles:

  • a. 2^128 Bits

  • b. 2^64 Bits

  • c. 2^32 Bits

  • d. 2^48 Bits

Explicación

Pregunta 35 de 37

1

Although each link guarantees that an IP datagram sent over the link will be received at the other end of the link without errors, it is not guaranteed that IP datagrams will arrive at the ultimate destination in the proper order.

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 36 de 37

1

Suppose nodes A, B, and C each attach to the same broadcast LAN (through their adapters). If A sends thousands of IP datagrams to B with frames with the MAC broadcast address of B, what will C’s adapter process these frames in this case?

Selecciona una de las siguientes respuestas posibles:

  • C’s adapter will not process the frames, and the adapter will not pass the datagrams up the protocol stack

  • C’s adapter will process the frames, but the adapter will not pass the datagrams up the protocol stack

  • C’s adapter will both process the frames, and pass the datagrams up the protocol stack

  • C’s adapter will not process the frames, but the adapter will pass the datagrams up the protocol stack

Explicación

Pregunta 37 de 37

1

How big is the IPv6 address space?

Selecciona una de las siguientes respuestas posibles:

  • a. 2^48 Bits

  • b. 2^64 Bits

  • c. 2^32 Bits

  • d. 2^128 Bits

Explicación