Q:
The IP packet that carries an IGMP packet has a value of _______ in its protocol field
belongs to collection: NETWORK LAYER PROTOCOLS MCQ
NETWORK LAYER PROTOCOLS MCQ
- What is the use of Ping command?
- What is the maximum header size of an IP packet?
- What do you mean by broadcasting in Networking?
- Which of the following is reliable communication protocol?
- DHCP Server provides _____ to the client
- Controlling access to a network by analyzing the incoming and outgoing packets is called
- This is an Internet Protocol (IP)-based storage networking standard for linking data storage facilities that can be used over existing Ethernet networks
- This is the telecommunication protocol that all computers must use to be part of the Internet
- This is one of two protocols that let a network administrator supervise and distribute IP addresses from a central point. It automatically sends a new IP address when a computer is plugged into a different place in the network
- ______________ allow many devices to share limited address space on a network
- NAT stands for
- How can we examine the current routing tables in command prompt?
- DHCP (dynamic host configuration protocol) provides _____ to the client
- DHCP is used for
- The DHCP server
- IP assigned for a client by DHCP server is
- DHCP uses UDP port ____ for sending data to the server
- The DHCP server can provide the _______ of the IP addresses
- DHCP client and servers on the same subnet communicate via
- After obtaining the IP address, to prevent the IP conflict the client may use
- What is DHCP snooping?
- If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network
- In IPv4, class _______ has the greatest number of addresses in each block
- Identify the class of the following IPv4 address: 4.5.6.7
- Identify the class of the following IPv4 address: 229.1.2.3
- Identify the class of the following IPv4 address: 191.1.2.3
- What is the result of ANDing 255 and 15?
- What is the result of ANDing 0 and 15?
- What is the result of ANDing 254 and 15?
- What is the result of ANDing 192 and 65?
- Which one is not a contiguous mask?
- The number of addresses in a class C block is _______
- The number of addresses in a class B block is _______
- The number of addresses in a class A block is _______
- The number of addresses assigned to an organization in classless addressing _______
- The first address assigned to an organization in classless addressing _______
- Which address could be the beginning address of a block of 32 classless addresses?aa
- Which address could be the beginning address of a block of 16 classless addresses?
- Which address could be the beginning address of a block of 256 classless addresses?
- What is the first address of a block of classless addresses if one of the addresses is 12.2.2.76/27?
- What is the first address of a block of classless addresses if one of the addresses is 12.2.2.76/10?
- What is the first address of a block of classless addresses if one of the addresses is 12.2.2.127/28?
- Find the number of addresses in a block of classless addresses if one of the addresses is 12.2.2.7/24
- Find the number of addresses in a block of classless addresses if one of the addresses is 12.2.2.7/30
- What is the last address of a block of classless addresses if one of the addresses is 12.2.2.127/28?
- What is the last address of a block of classless addresses if one of the addresses is 12.2.2.6/30?
- An organization is granted a block; one address is 2.2.2.64/20. The organization needs 10 subnets. What is the subnet prefix length?
- An organization is granted a block; one address is 2.2.2.64/25. If the subnet prefix length is /28, what is the maximum number of subnets?
- An organization is granted a block of classless addresses with the starting address 199.34.76.64/28. How many addresses are granted?
- An organization is granted a block of classless addresses with the starting address 199.34.32.0/27. How many addresses are granted?
- What is the default mask for class A in CIDR notation?
- What is the default mask for class B in CIDR notation?
- What is the default mask for class C in CIDR notation?
- In classless addressing, the ______ is another name for the common part of the address range
- In classless addressing, the _______ is the varying part (similar to the hostid)
- In classless addressing, the prefix length defines the _____________
- In a block, the prefix length is /24; what is the mask?
- In a block, the prefix length is /15 what is the mask?
- In a block, the mask is 255.255.192.0; what is the prefix length?
- An IPv6 address is _________ bits long
- An IPv6 address consists of ________ bytes (octets)
- A best-effort delivery service such as IPv4 includes _______
- In IPv4 header, an HLEN value of decimal 10 means _______
- In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400 bytes?
- In IPv4, what is the length of the data field given an HLEN value of 12 and total length value of 40,000?
- An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true?
- In IPv4, if the fragment offset has a value of 100, it means that _______
- In IPv4, what is needed to determine the number of the last byte of a fragment?
- The IPv4 header size _______
- Which of the following is a necessary part of the IPv6 datagram?
- In IPv6, the _______ field in the base header restricts the lifetime of a datagram
- The ________ protocol is the transmission mechanism used by the TCP/IP suite
- IP is _________ datagram protocol
- The term ________ means that IP provides no error checking or tracking. IP assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees
- In IPv4, an HLEN value of decimal 10 means _______
- In IPv4, which field or bit value unambiguously identifies the datagram as a fragment?
- In IPv4, when a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______
- The IPv4 header field formerly known as the service type field is now called the _______ field
- In IPv6, options are inserted between the _________ and the ___________ data
- IPv6 allows _________ security provisions than IPv4
- In IPv6, when a datagram needs to be discarded in a congested network, the decision is based on the _______ field in the base header
- In IPv6, the _______ field in the base header and the sender IP address combine to indicate a unique path identifier for a specific flow of data
- ICMP is a _________ layer protocol
- ICMP messages are divided into two broad categories: _____________
- An ICMP message has _____ header and a variable-size data section
- Which of the following is true about ICMP messages?
- Which of the following is true about ICMP messages ?
- IGMP is a companion to the ______ protocol
- IGMP is _______ protocol
- IGMP helps a ________ router create and update a list of loyal members related to each router interface
- IGMP operates __________
- An IGMP query is sent from a _______ to a _______
- The _______ is used by a router in response to a received leave report
- The least significant 23 bits in a 48-bit Ethernet address identify a ________
- The _______ field of the IGMP message is all zeros in a query message
- A multicast message is sent from _______ to _______
- In networks that do not support physical multicast addressing, multicasting can be accomplished through _______
- If four hosts on a network belong to the same group, a total of _______ sent in response to a general query message
- In IGMP, a membership report is sent _______
- In IGMP, the general query message ___________________ group
- An IGMP packet is carried in an __________ packet
- The IP packet that carries an IGMP packet has a value of _______ in its protocol field
- The TCP/IP model has connection less communication in
- The type of disconnection in which three way handshake protocol is used is
- Port number for (Simple Network Management Protocol) SNMP?
- You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should you assign?
- The Internet Control Message Protocol (ICMP)
- ICMP (Internet Control Message Protocol) is
- Which of the following technique is used for Time-To-Live (TTL)?
- Which of the following files is used for NetBIOS name resolution?
- How can you see the address of the DHCP server from which a client received its IP address?
- Which of the following specifies the network address and host address of the computer?
- Which of the following network access standard is used for connecting stations to a packet-switched network?
- What is the main difference between DDCMP and SDLG?
- The standard suit of protocols used by the Internet, intranets, extranets, and some other networks
- The most important part of a multiple DHCP configurations is to make sure you don't have which of the following in the different scopes? Select the best answer
- ARP (Address Resolution Protocol) is
- Which of the following TCP/IP protocol is used for file transfer with minimal capability and minimal overhead?
- Which of the following is a wrong example of network layer:
- What is the term used to describe addresses available on a DHCP server?
- When a host knows its physical address but not its IP address, it can use _____
- What is the standard protocol for network management features?
- In the version field of IPv4 header, when the machine is using some other version of IPv4 then the datagram is
- The network layer at the source is responsible for creating a packet from the data coming from another
- The header of the datagram in the IPv4 has
- In the IPv4 layer, the datagram is of
- In IPv4, the service type of the service in the header field, the first 3 bits are called
- An IPv4 datagram can encapsulate data from several higher-level protocols such as UDP, ICMP, IGMP and
- To record the Internet routers of IPv4, that handles the datagram is responsibility of
- When the source needs to pass information to all routers visited by the datagram, option used in
- The Internet has chosen the datagram approach to switching in the
- In IPv4 datagram, padding is added if the size of a datagram is less than
- In IPv4, the only thing encapsulated in a frame is
- In Internetwork, network layer is responsible for
- In IPv4 protocol, each datagram is handled
- CCT stands for
- In IPv4, fragmented datagram\'s fragment size should have the first byte number divisible by
- IPv6 is designed to allow the extension of the
- The total length of the IPv4 datagram is limited to 65,535 (2^16 - 1) bytes, the field length is
- In IPv6, the base header can be followed by, up to
- When HEADER LENGTH field of the IPv4 header is at its maximum size, the value of the field willl be
- The flag field that does fragmentation of IPv4 segment is the
- In an IPv6 datagram, the M bit is 0, the value of HLEN is 5, the value of total length is 200 and the offset value is
- In IPv4, the code point subfield can be used in
- In IPv4, a machine drops the header and trailer, when it receives a
- A sender can choose a route so that its datagram does not travel through
- In fragmentation of IPv4, the 13-bit field that shows the relative position of the fragment with respect to the whole datagram is called
- An option that is used by the source to predetermine a route for the datagram as it travels through the Internet is known as
- The router discards the datagram when it is decremented to
- Datagram network uses the universal addresses defined in the network layer to route packets from the source to the
- In IPv4, some physical networks are not able to encapsulate a datagram of
- Physical and data link layers of a network operate
- In an IPv4 packet, the value of HLEN is
- A sequence of packets with same source and destination addresses can be sent one after another when the connection is
- The responsibility of Physical and data link layers on the network is
- The network layer was designed to solve the problem of delivery through
- In IPv4, the 4-bit field that defines the total length of the datagram header in 4-byte words is the
- In IPv4, formula for Length of data =
- If the IPv4 address is not listed in the datagram, a router must not be
- By extracting the 32 rightmost bits from the mapped address, we can Convert
- In IPv6, another example of Congestion-Controlled Traffic is
- In the strict source route, the sender can choose a route with a specific type of
- The bytes in the original datagram of IPv4 are numbered
- In IPv4, the value of the Maximum Transfer Unit (MTU) depends on the
- In IPv6, the flow label is assigned to a packet by the
- In the IPv4 layer, the datagrams are the
- IPng stands for
- In IPv6, each packet is composed of a mandatory base header followed by the
- To combines the concepts of the strict source route and the loose source route options of IPv4 we use
- A connectionless communication of the Internet is established at
- The size of the IPv4 datagram may increase, as the underlying technologies allows
- In IPv6, real-time audio or video, particularly in digital form, requires resources such as
- To enhance reliability, IPv4 must be paired with a reliable protocol such as
- IPv4 protocol carries data from different
- The field that remains unchanged during the time the IPv4 datagram travels from the source host to the destination host is
- In IPv4, the subfield of precedence was part of version
- In IPv6, the type of traffic that expects minimum delay is
- The packet is fragmented in the network layer, if the packet is
- In the IPv4, the value 0100 of the type of service bits are used to represent the
- In IPv6, the format and the length of the IP address were changed along with the
- The header of IPv4 datagram is made of
- Ethernet protocol has a minimum and maximum restriction on the size of data that can be encapsulated in a frame is
- In IPv4 protocol, the size of the source and destination address is
- When the IPv4 protocol sends a datagram, it copies the current value of the counter to the identification field and increments the counter by
- Connection-oriented protocols is used in virtual circuit approach for packet switching, such as in
- While transmission of packets over Internet, when all the packets have been delivered, the connection is
- In IPv6, the header checksum is eliminated because the checksum is provided by
- In IPv4, parts of the header must be copied by all fragments, if the datagram is
- In connection-oriented protocols, a sequence of packets are sent on same path in
- All routers may use universal time, their local clocks may not be
- The initial value of checksum is
- RTP stands for
- Switching can be divided into three broad categories: circuit switching, packet switching and
- An option which is used to record the time of datagram processing by a router is called
- In IPv4, a record route can list up to
- IPv6 has the large address
- Three strategies used to handle the transition from version 4 to version 6 are dual stack, tunneling and
- In internetwork, the network layer at the destination is responsible for
- The total length field defines the total length of the datagram including the
- MTU stands for
- The header of the IPv4 packet changes with each
- In IPv4, If we use a protocol with Maximum Transfer Unit (MTU), it makes the transmission more
- A term that has a limited lifetime in its travel through an internet is called
- If a host does not support the flow label, it sets the flow label field to
- Internet is also known as
- When two computers using IPv6 want to communicate with each other, the strategy is used known as
- The value of the checksum must be recalculated regardless of
- A sequence of packets with same source and destination addresses can be sent one after another, shows the
- Another option which is similar to the strict source route is
- The first fragment has an offset field value of
- In connectionless service, the network layer protocol treats each packet
- In IPv6, the base header has the
- In IPv4, the checksum covers only the
- The Encrypted Security Payload (ESP) is an extension that provides
- The Datagram field is to intentionally limit the journey of the
- In packet format, the base header occupies
- In its simplest form, a flow label can be used to speed up the processing of a packet by a
- The source first makes a connection with the destination before sending a packet in
- A system with 8-bit addresses has address space of
- A link local address of the local addresses is used in an
- In classless addressing, there are no classes but the addresses are still granted in
- In IPv4 Addresses, classful addressing is replaced with
- The address FE80::12 is a
- The first address in a block is used as the network address that represents the
- An IPv6 address is
- In classful addressing, a large part of the available addresses are
- Network addresses are the very important concepts of
- In the subcategories of reserved address in the IPv6, the address that is used by a host to test itself without going into the network is called
- In IPv4 Addresses, each block in classfull addressing has the fixed number of
- In classful addressing, an IP address in class A, B, or C is divided into
- The dotted-decimal notation is used to make an IPv4 address more compact and easier to
- A few leftmost bits in each address of the IPv6 address define its category,is known as
- In IPv4, two devices on the Internet can never have the
- The term that enables a user to have a large set of addresses internally and one address externally is called
- All the outgoing packets go through NAT router, which replaces the source address in the packet with
- In IPv6 addresses, the addresses start with eight 0s are called
- To represent the IPv4 address, there are
- In classless addressing the size of the block, varies based on the nature and size of the
- Each number in dotted-decimal notation is a value ranging from
- An IPv4 address uniquely and universally defines the connection of a device to the
- IPv6 has the address space of
- In IPv6 Addresses, the field of the prefixes for provider-based unicast address that defines the identity of the node connected to a subnet is called
- The router of the Network Address Translation (NAT) that connects the network to the global address uses
- A unicast address of the IPv6 defines a
- In IPv6 anycast address, a packet destined is delivered to the
- In the multicast address of the IPv6, a transient group address, is used
- Using the form of abbreviation in IPv6 address, 3210 can be written as
- In multicast address of IPv6, the value of the prefix is
- IPv6 has a larger address space of
- In IPv4 Addresses, a telephone network has three levels of
- In the Network Address Translation (NAT), all the outgoing packets go through
- ICANN stands for
- In IPv4 Addresses, organizational networks are connected to the Internet via a
- In classfull addressing, the smaller networks are called
- Multicast addresses in Ipv6 starts with
- In using One IP address for the Network Address Translation, then the translation table has
- In classful addressing, the number of blocks in Class D is
- In IPv4 Addresses, every Network Address Translation router has a
- An IPv4 address is a
- In IPv6 Addresses, the 5-bit field in the prefixes for provider-based unicast address indicates the agency that has registered the address is
- 252.5.15.111 adress lies in class
- In IP addresses, the third-level of hierarchy is
- Network Address Translation (NAT) is used mostly by
- An IPv6 address of the Internet consists of
- Internet Corporation for Assigned Names and Addresses (ICANN) does not normally allocate addresses to
- The structure of classless addressing does not restrict the number of
- In classful addressing, the length of netid and hostid is predetermined, we can use it as
- In IPv4 Addresses, classless addressing is used to
- In IPv4 addressing, a block of addresses can be defined as
- In NAT, the range of addresses for private networks from 10.0.0.0 to 10.255.255.255 makes a total of
- The first 3 codes in IPv4 Addresses, the telephone networks defines the
- There are two types of the address that are defined for the
- The Internet authorities have reserved three sets of addresses as
- In IPv4 Addresses, the reserved addresses of the Internet are unique
- In hexadecimal colon notation, the address consists of 32 hexadecimal digits with every four digits separated by a
- The value 0000001 of the prefix of the IPv6 address shows the type of
- The class of the IP addresses 208.34.54.12 will be
- IPv6 addresses use
- In the old time, a user was connected to the Internet with a
- In classfull addressing, several networks are combined to create a
- In IPv6 Addresses, to make addresses more readable, IPv6 specifies
- CIDR stands for
- In Type Identifier of Unicast address, the 3 bit-field defines the address as
- The IPv4 addressing is also called the classful addressing because it uses the concept of
- In network addresses, each router has two
- Internet addresses are usually written in
- In IPv6 Addresses, the leading zeros of a section can be omitted in the
- In the IP networks all prefixes are
- The masks in slash notation of 255.255.255.0 would be
- In multicast address of IPv6, the third field defines the
- Unicast, any cast and multicast are addresses of
- The private network in the NAT is transparent to the rest of the
- An application-level protocol in which a few manager stations control a set of agents, known as
- The full duplex mode increases the capacity of each domain from
- The Configuration management can be divided into two subsystems which are
- To use Simple Network Management System (SNMP), we need
- The main difference between SNMPv3 and SNMPv2 is the
- Networks that are made up of hundreds and sometimes thousands of components are known as
- The Performance management, is closely related to
- Configuration management can be divided into two subsystems: reconfiguration and
- Simple Network Management Protocol (SNMP), defines eight types of
- A management station, called a manager, is a host that runs the
- Based on the predefined policy of Network management, controlling access to the network is the task of
- BER stands for
- The control of users, access to network resources through charges are the main responsibilities of
- SNMP is a framework for managing devices in an internet using the
- Structure of Management Information (SMI), is the guideline of
- In Network Management System, maps track each piece of hardware and its connection to the
- The MIB is a collection of groups of objects that can be managed by
- An agent contributes to the management process by warning the manager of an
- A network management system can be divided into
- Hardware documentation normally involves two sets of
- SNMP provides a set of fundamental operations for monitoring and maintaining a
- The Simple Network Management Protocol (SNMP), uses the concept of manager and
- A system is responsible for detecting, isolating, correcting and recording faults in
- SNMP defines the format of packets exchanged between a manager and an agent, It reads and changes the status of objects in
- SNMP is responsible for creating a message, called a
- The entities of network management system have an initial configuration when the network is set up, but can change with
- In Network Management System, a large network is usually made up of hundreds of
- A reactive fault management system is responsible for
- The server program running on the agent can check the
- In Network Management System, Fault management is closely related to
- In Network Management System, the agent keeps performance information in a
- A switch can allow fast handling of the
- Adjusting the network components and features, can be a daily occurrence in a large network is called
- SMI objects are named according to a
- Simple Network Management Protocol (SNMP), uses the services of UDP on
- MIB Stands for
- To creates a collection of named objects, their types and their relationships to each other in an entity to be managed, we use
- To define the packet to be sent from a manager to an agent and vice versa, the term is used named
- What is the maximum number of loop ports that can participate in an arbitrated?
(b).2
need an explanation for this answer? contact us directly to get an explanation for this answer