3Business Data Networks and Security – 9th Edition by Raymond R. Panko Julia L. Panko – Test bank

$35.00

INSTANT DOWNLOAD
What student Can Expect From A Test Bank?
A test bank will include the following questions:
1. True/False
2. Multiple Choice Questions
3. Matching Questions
4. Fill In The Blanks
5. Essay Questions
6. Short  Questions

Description

Business Data Networks and Security, 9e (Panko)
Chapter 9 TCP/IP Internetworking II

1) In IP subnet planning, having a large subnet part allows more hosts per subnet.
Answer: FALSE

2) When the subnet part is made larger, the host part must be smaller.
Answer: TRUE

3) If your subnet part is 8 bits long, you can have ________ subnets.
A) 64
B) 128
C) 256
D) None of the above
Answer: D

4) In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be?
A) 6
B) 7
C) 8
D) None of the above
Answer: B

5) Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have?
A) 8
B) 16
C) 254
D) 65,534
Answer: D

6) You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?
A) 14
B) 16
C) 256
D) None of the above
Answer: D

7) ________ is the processing of presenting external IP addresses that are different from internal IP addresses used within the firm.
A) DNS
B) NAT
C) DHCP
D) None of the above
Answer: B
8) In NAT, the ________ creates new external source IP addresses and port numbers.
A) router
B) firewall
C) source host
D) destination host
Answer: B

9) NAT operates transparently to the two hosts.
Answer: TRUE

10) NAT provides security.
Answer: TRUE

11) NAT enhances security by preventing ________.
A) sniffers from learning internal IP addresses
B) encryption
C) Both A and B
D) Neither A nor B
Answer: A

12) NAT can multiply the number of IP addresses available to the firm by over a thousand.
Answer: TRUE

13) Private IP address ranges are only used within a firm.
Answer: TRUE

14) Which of the following can be used within a firm?
A) Private IP addresses.
B) Public IP addresses.
C) Both A and B
D) Neither A nor B
Answer: C

15) Which of the following is a private IP address range?
A) 10.x.x.x.
B) 128.171.x.x.
C) Both A and B
D) Neither A nor B
Answer: A

16) Which of the following is true about NAT?
A) It can enhance security.
B) It presents problems for some protocols.
C) Both A and B
D) Neither A nor B
Answer: C

17) NAT works automatically with all protocols.
Answer: FALSE
18) The domain name system ________.
A) is a way to find a host’s IP addresses if your computer only knows the host’s host name
B) is a general naming system for the Internet
C) Both A and B
D) Neither A nor B
Answer: C

19) ________ is a general naming system for the Internet.
A) NAT
B) DNS
C) Both A and B
D) Neither A nor B
Answer: B

20) In DNS, a group of resources under the control of an organization is called a ________.
A) network
B) subnet
C) scope
D) domain
Answer: D

21) “.com” is a ________.
A) root domain
B) top-level domain
C) second-level domain
D) None of the above
Answer: B

22) “.edu” is a ________.
A) root domain
B) top-level domain
C) second-level domain
D) None of the above
Answer: B

23) “.edu” is a generic top-level domain.
Answer: TRUE

24) “.UK” is a generic top-level domain.
Answer: FALSE

25) Corporations most wish to have ________ domain names.
A) top-level
B) second-level
C) third-level
D) None of the above
Answer: B
26) The highest-level DNS servers are called ________.
A) root servers
B) top-level servers
C) Both A and B
D) Neither A nor B
Answer: A

27) In the Domain Name System, there is a single root server.
Answer: FALSE

28) How many DNS root servers are there?
A) 1.
B) 2.
C) 10.
D) 13.
Answer: D

29) A company receives its domain name from ________.
A) the IETF
B) its ISP
C) a domain registrar
D) None of the above
Answer: C

30) Servers are normally given ________ IP addresses.
A) well-known
B) static
C) dynamic
D) None of the above
Answer: B

31) Servers are normally given dynamic IP addresses.
Answer: FALSE

32) Servers have static IP addresses so that clients can find them easily.
Answer: TRUE

33) Which of the following are usually given dynamic IP addresses?
A) Clients.
B) Servers.
C) Both A and B
D) Neither A nor B
Answer: A

34) Clients normally get their IP addresses from ________.
A) DNS servers
B) DHCP servers
C) directory servers
D) identity servers
Answer: B
35) ________ servers provide ________ IP addresses to clients.
A) DNS, static
B) DNS, dynamic
C) DHCP, static
D) DHCP, dynamic
Answer: D

36) Clients can send a DHCP request message to multiple DHCP servers.
Answer: TRUE

37) DHCP ________ are configurable parameters that determine which subnets the DHCP server will serve.
A) ranges
B) scopes
C) spans
D) domains
Answer: B

38) Which of the above is NOT an element in a network management system?
A) The manager.
B) Agents.
C) Objects.
D) All of the above ARE elements in network management systems.
Answer: D

39) In SNMP, the manager communicates directly with a(n) ________.
A) managed device
B) agent
C) Both A and B
D) Neither A nor B
Answer: B

40) In SNMP, the manager communicates directly with the managed device.
Answer: FALSE

41) In SNMP, “object” is another name for “managed device.”
Answer: FALSE

42) In SNMP, the time-to-live value for a router interface is the value for an object.
Answer: TRUE

43) The management information base (MIB) is a(n) ________.
A) schema
B) actual database
C) Either A or B
D) Neither A nor B
Answer: C

44) Human interface functionality is defined by the SNMP standard.
Answer: FALSE
45) Which of the following would be an SNMP object?
A) Number of rows in routing table.
B) System uptime (since last reboot).
C) Both A and B
D) Neither A nor B
Answer: C

46) In SNMP, the ________ creates commands.
A) manager
B) agent
C) Both A and B
D) Neither A nor B
Answer: A

47) In SNMP, the agent can create commands.
Answer: FALSE

48) In SNMP, the ________ creates responses.
A) manager
B) agent
C) Both A and B
D) Neither A nor B
Answer: B

49) In SNMP, the manager creates both commands and responses.
Answer: FALSE

50) In SNMP, the ________ creates traps.
A) manager
B) agent
C) Both A and B
D) Neither A nor B
Answer: B

51) In SNMP, the manager can create ________.
A) traps
B) GET commands
C) Both A and B
D) Neither A nor B
Answer: B

52) In SNMP, Set commands tell the agent to change a parameter on the managed device.
Answer: TRUE

53) A(n) ________ is a message sent by an agent to let the manager know about a condition the agent has detected. Select the name used in the SNMP standard.
A) command
B) trap
C) alarm
D) All of the above
Answer: B
54) In SNMP, companies are often reluctant to use ________ commands because of security dangers.
A) Get
B) Set
C) Neither A nor B
Answer: A

55) SNMPv1 uses ________ for authentication.
A) community names
B) digital certificates and digital signatures
C) a different password for each manager-agent pair
D) All of the above
Answer: A

56) SNMPv3 uses ________ for authentication.
A) community names
B) digital certificates and digital signatures
C) a different password for each manager-agent pair
D) All of the above
Answer: C

57) In MPLS, the interface to send the packet back out will be decided ________.
A) during the router’s routing process
B) before the packet arrives
C) on the basis of the previous packet going to the packet’s IP address.
D) None of the above
Answer: A

58) In MPLS, the packet travels along the ________.
A) route
B) data link
C) label-switched path
D) MPLS path
Answer: C

59) Label-switching routers do NOT look at the IP address of each arriving packet.
Answer: TRUE

60) Label-switching routers base their decisions on a packet’s ________.
A) IP address
B) label number
C) Both A and B
D) Neither A nor B
Answer: B

61) In MPLS, the ________ adds the label to the packet.
A) source host
B) first label-switching router
C) Both A and B
D) Neither A nor B
Answer: B
62) Label-switching routers provide ________.
A) lower cost
B) the ability to do traffic engineering
C) Both A and B
D) Neither A nor B
Answer: C

63) IPsec is a(n) ________ layer standard.
A) physical
B) data link
C) internet
D) All of the above
Answer: C

64) IPsec operates at the data link layer.
Answer: FALSE

65) IPsec protects ________ layer messages.
A) data link
B) application
C) Both A and B
D) Neither A nor B
Answer: B

66) IPsec protects all layers above the internet layer.
Answer: TRUE

67) To be protected by IPsec, applications must be IPsec-aware.
Answer: FALSE

68) In tunnel mode, IPsec provides protection ________.
A) all the way between the two hosts
B) only between the IPsec servers
C) Both A and B
D) Neither A nor B
Answer: B

69) In tunnel mode, IPsec provides protection all the way between the two hosts.
Answer: FALSE

70) The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is ________.
A) protection over only part of the route
B) higher cost
C) Both A and B
D) Neither A nor B
Answer: A

71) In transport mode, IPsec provides security over the internal networks.
Answer: TRUE
72) Which mode of IPsec is more expensive?
A) Transport mode.
B) Tunnel mode.
C) Both A and B are equally expensive.
Answer: B

73) The main disadvantage of transport mode protection compared to tunnel mode protection in IP is ________.
A) that it provides protection over only part of the route
B) higher cost
C) Both A and B
D) Neither A nor B
Answer: B

74) Client PCs must have digital certificates in ________.
A) transport mode
B) tunnel mode
C) Both A and B
D) Neither A nor B
Answer: A

75) IPsec is used for ________ VPNs.
A) remote-access
B) site-to-site
C) Both A and B
D) Neither A nor B
Answer: C

76) IPsec is used for site-to-site VPNs.
Answer: TRUE

77) In IPsec, agreements about how security will be done are called ________.
A) tranches
B) security contracts
C) service-level agreements
D) security associations
Answer: D

78) Which of the following standards provides for central management?
A) IPsec.
B) SSL/TLS.
C) Both A and B
D) Neither A nor B
Answer: A

79) Which is less expensive to implement?
A) SSL/TLS.
B) IPsec.
C) Both cost about the same to implement.
Answer: A

80) Which has stronger security?
A) SSL/TLS.
B) IPsec.
C) Both have about equal security.
Answer: B

81) If a host to be able to communicate via IPv4 and IPv6, it is said to ________.
A) be bilingual
B) have a dual stack
C) be IPv6 ready
D) be fully compliant
Answer: B

82) Today, it is problematic to have ________.
A) only a single IPv4 stack
B) only a single IPv6 stack
C) a dual stack
D) All of the above
Answer: B

83) Which is not one of the three parts of a public IPv6 unicast address?
A) Subnet ID.
B) Routing prefix.
C) Host part.
D) All of the above ARE parts in a public IPv6 unicast address.
Answer: C

84) The routing prefix in IPv6 is like the ________ part in an IPv4 address.
A) network
B) subnet
C) host
D) Both A and B
Answer: A

85) If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?
A) 16 bits.
B) 32 bits.
C) 64 bits.
D) We cannot say.
Answer: B

86) The part of an IPv6 global unicast address that designates the host is called the ________.
A) host part
B) interface ID
C) routing prefix
D) We cannot say.
Answer: B
87) In an IPv6 global unicast address, the interface ID is ________ bits long.
A) less than 32
B) 64
C) 128
D) We cannot say.
Answer: B

88) The IEEE calls 64-bit interface addresses ________.
A) Extended Unique Identifiers
B) Interface IDs
C) Both A and B
Answer: A

89) A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center.
A) the interface ID
B) the subnet ID
C) fffe
D) 0000
Answer: C

90) To configure itself, a client PC running IPv6 can configure itself using ________.
A) DHCP
B) stateless autoconfiguration
C) Both A and B
D) Neither A nor B
Answer: C

91) The first stage in IPv6 stateless autoconfiguration is to create an address that can only be used on the host’s single network.
Answer: TRUE

92) After creating a link local IPv6 address, a host doing IPv6 stateless autoconfiguration should use the neighbor discovery protocol.
Answer: TRUE

93) Access to a router is needed to create a ________.
A) link local IPv6 address
B) global unicast IPv6 address
C) Both A and B
D) Neither A nor B
Answer: B

94) The router advertisement protocol may ________.
A) give the client an IPv6 address
B) forbid the use of stateless autoconfiguration
C) Both A and B
D) Neither A nor B
Answer: B
95) The router advertisement protocol may ________.
A) give the client a routing prefix
B) give the client a subnet ID
C) Both A and B
D) Neither A nor B
Answer: C

96) Stateless autoconfiguration makes more sense for ________.
A) single-stack IPv4 hosts
B) single-stack IPv6 hosts
C) dual-stack hosts
D) It makes equal sense for all of the above.
Answer: C

97) Stateless autoconfiguration will give an IPv6 host most or all of the configuration information it needs to operate effectively.
Answer: FALSE

98) In stateless autoconfiguration, providing the address of DNS servers is ________.
A) unnecessary
B) mandatory
C) optional
D) impossible
Answer: A

99) IPv6 has a number of known security weaknesses.
Answer: TRUE

100) Stateless autoconfiguration can be used to change all routing prefixes and subnet IDs in a network.
Answer: TRUE

101) Stateless autoconfiguration can be used to ________.
A) change all subnet IDs in a network
B) change all routing prefixes in a network
C) Both A and B
D) Neither A nor B
Answer: C

102) In DNS servers, the IPv6 address of a host is contained in the ________ record.
A) IPv6
B) IPv4+
C) A
D) None of the above
Answer: D
103) The neighbor advertisement protocol message was created to give the ________ address of the host sending the message.
A) IPv6
B) IPv4
C) Both A and B
D) Neither A nor B
Answer: A

Reviews

There are no reviews yet.

Be the first to review “3Business Data Networks and Security – 9th Edition by Raymond R. Panko Julia L. Panko – Test bank”

Your email address will not be published. Required fields are marked *