24
CS/IS 190 Homework #4 Instructions: Answer all questions and put the answers on the excel spreadsheet which is available on my web page. Note that some questions have multiple correct answers. Print out the answer sheet or email it to me before the due deadline. Be sure to put your name on the answer sheet. Chapter 12 Advanced Networking Devices 1. Which of the following is an example of a network operating system in a classic client/server network? A. Windows for Workgroups B. Microsoft Server operating systems C. Windows 98 D. Novell NetWare 2. Computers that both serve and request data participate in which kind of network? A. Virtual private network (VPN) B. VLAN C. Client/Server D. Peer-to-peer 3. Which operating system was once a common example of an operating system designed for peer-to-peer networking? A. Linux B. Windows 98 C. Microsoft Exchange Server D. Novell NetWare

Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

Embed Size (px)

Citation preview

Page 1: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

CS/IS 190 Homework #4Instructions: Answer all questions and put the answers on the excel spreadsheet which is available on my web page. Note that some questions have multiple correct answers. Print out the answer sheet or email it to me before the due deadline. Be sure to put your name on the answer sheet.

Chapter 12

Advanced Networking Devices

1. Which of the following is an example of a network operating system in a classic client/server network?A. Windows for WorkgroupsB. Microsoft Server operating systemsC. Windows 98D. Novell NetWare

2. Computers that both serve and request data participate in which kind of network?A. Virtual private network (VPN)B. VLANC. Client/ServerD. Peer-to-peer

3. Which operating system was once a common example of an operating system designed for peer-to-peer networking?A. LinuxB. Windows 98C. Microsoft Exchange ServerD. Novell NetWare

4. Peer-to-peer applications are often referred to simply as __________.A. P2PB. agentsC. PPTPD. apps

5. Which application uses the BitTorrent standard?

Page 2: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

A. TransmissionB. IPsecC. YOSTD. VoIP

6. Which type of network is created when you use encrypted tunnels between a computer or a remote network and a private network through the Internet?A. Peer-to-peerB. Dial-upC. Client/serverD. Virtual private network (VPN)

7. What TCP/IP protocol layer supports PPTP and L2TP?A. LinkB. InternetC. TransportD. Application

8. Which tools are tunneling protocols?A. PPTP and L2TPB. OpenVPN and IPsecC. IPSec and RadiusD. HTTP and HTTPS

9. What is the result of running “Create a New Connection” on the Windows client side of a PPTP VPN connection?A. An RRAS server is created.B. A dial-up connection is created.C. A DHCP server is created.D. A virtual NIC is created.

10. On the Windows client side of a PPTP VPN connection, where does a client get an IP address from after it creates a virtual NIC?A. DHCP serverB. WINS serverC. Default gatewayD. PPP private connection

Page 3: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

11. Which protocol suite does L2TP use for all of its security needs?A. DESB. IPsecC. AESD. Radius

12. A type of VPN connection, where a single computer logs into a remote network and becomes, for all intents and purposes, a member of that network, is commonly called a(n) __________ connection.A. host-to-site B. openC. virtualD. routed

13. Which protocol was a Cisco proprietary protocol that was replaced by L2TP?A. L2FB. PPPC. PPTPD. IPsec

14. Cisco has made a big push for companies to adopt VPN hardware that enables VPNs using __________.A. MAC addressingB. Secure Sockets Layer (SSL)C. port forwardingD. load balancing

15. What are the two most common types of SSL VPNs?A. SSL portal VPNs and SSL tunnel VPNsB. IPsec tunnel VPNs and TLS portal VPNsC. TLS portal VPNs and SSL tunnel VPNsD. SSL tunnel VPNs and IPsec tunnel VPNs

16. A __________ VPN deals with a specific single connection between two machines using VPN software or hardware.A. host-to-site

Page 4: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

B. client/serverC. site-to-siteD. host-to-host

17. In which type of VPN does the client browser run an active control, such as Java or Flash?A. Site-to-siteB. SSL tunnelC. ProxyD. SSL portal

18. To configure a switch, you will need a(n) __________.A. port numberB. segment IDC. IP addressD. MAC address

19. Which type of network is created when you segment a network using the switches you already own?A. Virtual private network (VPN)B. Dial-upC. Ethernet LAND. Virtual LAN

20. VLANs require special __________ loaded with extra programming to create the virtual networks.A. hubsB. routersC. switchesD. bridges

21. In order for a VLAN to get its name, what is typically appended to the word “VLAN”?A. A numberB. A slashC. An IP addressD. A MAC address

22. Which term describes a port on a switch that is configured to carry all traffic, regardless of VLAN number, between all switches in a LAN?

Page 5: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

A. Logical portB. Trunk portC. Assigned portD. Port 0

23. Which trunk standard enables you to connect switches from different manufacturers?A. IEEE 802.1XB. IEEE 802.1QC. IEEE 802.11D. IEEE 802.3

24. Which three states can be applied to switches using VLAN Trunking Protocol (VTP)?A. Transparent, server, and clientB. Master, server, and clientC. Open, closed, and activeD. Secure, transparent, and gateway

25. Which term refers to making a bunch of servers look like a single server, thereby creating a server cluster?A. Load balancingB. Content switchingC. Round robinD. Proxy

26. What OSI model layer supports content switches?A. Layer 1B. Layer 2C. Layer 5D. Layer 7

27. What term does the Network+ exam use to describe a traffic shaping device that controls the flow based on packet rules?A. Bandwidth shaperB. Content switchC. Packet snifferD. Packet shaper

Page 6: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

28. Which term is used by the CompTIA Network+ exam for routers and switches that can implement traffic shaping?A. Traffic routersB. Bandwidth shapersC. Quality of service routersD. Port blockers

29. On many advanced routers and switches, you can implement QoS through bandwidth management, such as __________, where you control the flow of packets into or out of the network according to the type of packet or other rules.A. trunkingB. port mirroringC. traffic shapingD. content switching

30. A __________ consists of multiple sensors placed around the network, often on one or both sides of the gateway router.A. network-based IDS (NIDS)B. software-based IDS (SIDS)C. firewallD. load balancer

31. Which term refers to the capability of a switch to copy data from any or all physical ports on a switch to a single physical port?A. Port blockingB. Load balancingC. Port mirroringD. Port authentication

32. Which technology is incredibly useful for any type of situation where an administrator needs to inspect packets coming to or from certain computers?A. Port blockingB. ProxyingC. Port mirroringD. Port authentication

Page 7: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

33. Which proxy server is one of the oldest uses of a proxy server?A. HTTPB. FTPC. DNSD. Gopher

34. When configuring a Web client to use a proxy server, what setting should be provided so that the client requests are redirected to the server?A. Proxy server IP addressB. Backup DNS server IP addressC. Automatic IP configurationD. Port mirroring address

35. Which technology acts on behalf of clients, getting information from various sources and handing that info to the clients?A. Advanced switchB. Port mirror serverC. Forward proxy serverD. Reverse proxy server

--- END CHAPTER 12 ---

Chapter 13

IPv6

1. How many binary digits are in an IPv4 address?A. 4B. 8C. 16D. 32

Page 8: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

2. How many binary digits are in in an IPv6 address?A. 32B. 64C. 128D. 256

3. Which organization developed the new IPv6 standard?A. IEEEB. IANAC. ICANND. IETF

4. Which address notation is an example of an IPv6 address?A. 197.169.94.82B. 2001:0000:0000:3210:0800:200C:00CF:1234C. 197.169.94.82/24D. FEDC.BA98.7654.3210.0800.200C.00CF.1234.56AE.9512

5. Which address notation is the IPv6 loopback address?A. FEDC::00CF:1234B. 0127.0000.0000.0001.0127.0000.0000.0001C. 0000:0000:0000:0000:0000:0000:0000:0001D. 127.0.0.1

6. The IPv6 address, 2001:0000:0000:3210:0800:200C:00CF:1234, can be shortened to __________.A. 2001:X:X:3210:800:200C:CF:1234B. 2001:0-0:3210:800:200C:CF:1234C. 2001.0.0.3210.800.200C.CF.1234D. 2001:0:0:3210:800:200C:CF:1234

7. Which address does a computer running IPv6 gives itself when it first boots up?A. EUI-64B. CIDRC. Link-localD. Global

Page 9: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

8. What type of address is a link-local address?A. MulticastB. Unicast C. BroadcastD. Stateful

9. Which statement is true of an IPv6 subnet mask?A. IPv6 subnet masks do not exist.B. An IPv6 subnet mask is limited to 32 bits in length.C. An IPv6 subnet mask consists of all zeros.D. An IPv6 subnet mask is a maximum of 64 bits.

10. Which multicast reserved address is designed to reach solicited-node addresses?A. FF02::0:XXXX:XXXXB. FF02::1:FFXXC. FF01::2:FFXX:XXXXD. FF02::1:FFXX:XXXX

11. Which address is a set of reserved addresses designed to go only to certain systems?A. Global unicast addressB. Link-local addressC. Anycast addressD. Multicast address

12. What is the function of the multicast address FF02::1?A. All routers addressB. Solicited node addressC. All nodes addressD. Broadcast address

13. Which address range does multicast use in IPv4?A. 224.0.0.0/4B. 127.0.0.0/8C. 192.168.0.0/24D. 172.16.0.0/16

Page 10: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

14. Which multicast addresses will only reach routers?A. FF02::1B. FF02::2C. FE80::.D. FF02::1:FFXX:XXXX

15. The Ethernet address __________ is used on Ethernet frames that encapsulate IPv6 multicast packets.A. 01-00-5E-xx-xx-xx B. 33-33-xx-xx-xx-xx C. FF02::1:FFXX:XXXXD. ::1

16. Ethernet reserves the address __________ for IPv4 multicast frame destination addresses.A. 01-00-5E-xx-xx-xxB. 33-33-xx-xx-xx-xxC. FF02::1:FFXX:XXXXD. ::1

17. In IPv6, __________ is commonly used with DNS.A. multicastB. unicastC. anycastD. broadcast

18. What type of IPv6 address do you need to get on the Internet?A. Global unicast addressB. Global multicast addressC. Anycast addressD. Link-local address

19. One advantage of aggregation is that it __________.A. compresses IPv6 addressesB. provides a more efficient routing schemeC. provides security through encryptionD. provides an efficient tunneling protocol

Page 11: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

20. Which entity passes out IPv6 prefixes?A. IANAB. IETFC. RIRsD. IEEE

21. What is the default status of IPv6 for Windows Server 2012?A. Developmental IPv6 supportB. Rudimentary IPv6 supportC. Complete IPv6 support; active on default installsD. Complete IPv6 support; not installed by default

22. A DHCPv6 server is operating very similarly to an IPv4 DHCP server by passing out IPv6 addresses, subnet masks, and default gateways, as well as optional items such as DNS server addresses. In which mode is this server?A. ActiveB. PassiveC. StatefulD. Stateless

23. In which mode is a DHCPv6 server operating if it only passes out optional information?A. ActiveB. PassiveC. StatefulD. Stateless

24. A DNS server identifies a record for a host with an IPv6 address by using a record type of __________ for IPv6 records.A. A B. AA C. AAA D. AAAA

Page 12: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

25. When the routers and DNS servers between an IPv6-capable computer and other IPv6-capable computers are not yet IPv6-ready, a(n) __________ is required to leap over this gap.A. DHCP6B. DNSC. IPv4-only routersD. tunnel

26. Which type of tunnel allows you to encapsulate IPv6 traffic into an IPv4 tunnel to get to an IPv6-capable router?A. IPv6-to-IPv6 tunnelB. IPv6-to-IPv4 tunnelC. IPv4-to-IPv4 tunnelD. IPv4-to-IPv6 tunnel

27. Which tunneling protocol enables IPv6 traffic to use the IPv4 Internet without having to set up explicit tunnels?A. 6to4B. 6in4C. TeredoD. ISATAP

28. Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one does not require a tunnel broker?A. 6to4B. 6in4C. TeredoD. ISATAP

29. Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one is an open-source implementation of Teredo for Linux and some other UNIX-based systems?A. 6to4B. ISTATAPC. MiredoD. Teredo

Page 13: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

30. Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which two can go through a NAT router?A. 6to4and ISATAPB. 6in4 and TeredoC. 4in6 and 4to6D. ISATAP AND 4in6

31. Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one is built into Microsoft Windows?A. 6to4B. 6in4C. TeredoD. ISATAP

32. When using Teredo, which command should be entered at the Windows command prompt to ensure that a tunnel has been created and to see the tunnel adapter?A. ping /allB. ipconfig /allC. netshD. netstat

33. Of the four popular tunneling standards that allow you to connect your IPv6 client to an IPv6 router over an IPv4 network, which one uses nonstandard addresses for the endpoints?A. 6to4B. 6in4C. TeredoD. ISATAP

34. Which terms refer to automatic tunnel configuration protocols?A. TSP and TICB. ISATAP and TeredoC. Teredo and MiredoD. ISATAP and Miredo

Page 14: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

35. __________ create the actual IPv6 tunnel and (usually) offer a custom-made endpoint client for you to use, although more advanced users can often make a manual connection.A. DHCPv6 protocolsB. TSP protocolsC. TIC protocolsD. Tunnel brokers

--- END CHAPTER 13 ---

Chapter 14

Remote Connectivity

1. Which device takes a circuit and combines it with a few hundred other circuits into a single complex circuit on one wire?A. Bridged connectionB. Modulator-demodulator (modem)C. MultiplexerD. Terminal adapter (TA)

2. Which technology is used by multiplexers to separate individual voice calls by keeping every call in its own unique frequency range?A. Asynchronous Transfer Mode (ATM)B. Bridge connectionsC. Session Initiation Protocol (SIP)D. Frequency division multiplexing (FDM)

3. Which digital signal rate does a central office use to convert analog voice signals before multiplexing them into larger circuits?A. DS0B. DS1C. DS2D. DS3

Page 15: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

4. Which device converts an analog signal to digital and a digital signal to analog?A. MultiplexerB. Modulator-demodulatorC. ModulatorD. Demodulator

5. How many copper wires are used by a T1 line?A. one pairB. two pairsC. three pairsD. four pairs

6. Which device connects to each end of a T1 connection?A. ModemB. MultiplexerC. CSU/DSUD. Dedicated line

7. Which digital signal rate is used by a T1 line?A. DS0B. DS1C. DS2D. DS3

8. Which digital signaling rate has a frame containing a framing bit and 24 channels where each channel holds a single 8-bit DS0 data sample?A. DS1B. DS2C. DS3D. DS4

9. What is the data transfer speed for DS1?A. 1.544 MbpsB. 2,048 Mbps C. 34.368 MbpsD. 43 Mbps

Page 16: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

10. How many channels are in a T1 bundle?A. 16B. 24C. 32D. 64

11. What is the European counterpart to a T1 line?A. T3B. DS3C. E3D. E1

12. What is the approximate total bandwidth of an E3 line?A. 1.5 MbpsB. 2 MbpsC. 34 MbpsD. 43 Mbps

13. What is the low end speed of the SONET Optical Carrier specification (OC-1)?A. 34.368 MbpsB. 39.8 MbpsC. 43 MbpsD. 51.8 Mbps

14. Which term refers to the first generation of packet-switching technology?A. X.25B. SONETC. ATMD. OC-1

15. Which term refers to a technology that serves as a replacement for Frame Relay and ATM switching?A. FDMB. TCP/IPC. SONETD. Multi-Protocol Label Switching (MPLS)

Page 17: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

16. What is the range of transfer speed for ATM?A. 155.52 to 622.08 Mbps and beyond B. 1.544 Mbps to 2.048 MbpsC. 1.544 Gbps to 34.368 GbpsD. 34.368 Gbps to 155.52 Mbps

17. What is the size of an ATM fixed-length cell?A. 53 bytesB. 128 bytesC. 1024 bytesD. 2048 bytes

18. Which test should a network administrator run on a CSU/DSU to test a WAN connection and verify the T-carrier connection from end to end?A. Time division multiplexingB. PRIC. BERTD. Baud rate

19. Which phone line has a baud rate of 2,400 and uses an RJ-11 connector?A. ISDNB. PSTNC. Dedicated lineD. SONET

20. Which device takes 8-bit-wide digital data, converts it into 1-bit-wide digital data, and then hands it to a modem for conversion to analog?A. CSU/DSUB. DSL modemC. UARTD. Multiplexer

21. What is the current modem standard now on the market?A. V.90B. V.92C. V.42bisD. MNP5

Page 18: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

22. When you install an ISDN terminal adapter (TA), what special number provided by the telephone company must be configured along with the other ISDN telephone number you want to call?A. Default gatewayB. Service Profile ID (SPID)C. DS0D. Basic Service Set Identifier (BSID)

23. Which statement describes an ISDN PRI?A. ISDN PRI is a full T3 line, carrying 23 B channels.B. ISDN PRI is a full T3 line, carrying 23 DS0 channels.C. ISDN PRI is a full T1 line, carrying 23 B channels.D. ISDN PRI is a full T1 line, carrying 23 DS0 channels.

24. Which terms refer to versions of DSL service?A. xDSL and MDSLB. SDSL and ADSLC. UDSL and MDSLD. NDSL and MDSL

25. Which term describes a DSL device that is located in a central office, connecting multiple DSL customers to the Internet?A. UARTB. NIUC. CSU/DSUD. DSLAM

26. What is the maximum distance between a user’s demarc and the central office for all versions of DSL?A. 18,000 feetB. 5 milesC. 3,000 yardsD. 3.4 kilometers

Page 19: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

27. In the most common DSL connection, what device is connected to a telephone wall jack and to a standard NIC in your computer?A. CSU/DSUB. MultiplexerC. DSL modemD. Router

28. If you have cable Internet service, what protocol is used between the head end connection and the cable company’s network?A. TCP/IPB. DOCSISC. H.323D. DSLAM

29. Long Term Evolution (LTE) networks feature speeds (in theory) of up to __________ Mbps for downloads and 75 Mbps for uploads.A. 53B. 75C. 150D. 300

30. Which technology tries to bring usable Internet access to homes and businesses through the electrical power grid?A. WiMAXB. PPOEC. BPLD. DSL

31. To make rollouts affordable, most fiber-to-the-home technologies employ a version of __________ architecture that uses a single fiber to the neighborhood switch and then individual fiber runs to each final destination.A. SONETB. passive optical networkC. OC-1D. active optical network

Page 20: Web viewB. IPsec tunnel VPNs and TLS portal VPNs. ... C. site-to-site. D. host-to-host. ... To configure a switch, you will need a(n)

32. Which connection type is always used for dial-up connection to the Internet?A. PPPoEB. PPPC. DHCPD. PPTP

33. Which standard, developed by Citrix, is used with a remote terminal connection?A. RDPB. SIPC. RDCD. ICA

34. Which term refers to the standard used by the vast majority of VoIP solutions?A. SIPB. H.323C. RTPD. RDC

35. Which protocol is commonly used to stream video?A. LTEB. RTSPC. LECD. GSM

--- END CHAPTER 14 ---