LAYER PROTOCOLS
Multiple Choices:
1. Which protocol is an authentication protocol?
A. IKE
B. CHAP
C. MD5
D. ESP
Answer: B Reference: Protocols Difficulty: Easy
2. A VPN
A. only uses T1 line.
B. only uses Frame Relay.
C. cannot support extranets.
D. can support extranets.
Answer: D Reference: Applications Difficulty: Easy
3. Where can a one-way encryption be used?
A. in a password-based authentication
B. in encrypting data and then decrypting it
C. in Caesar Cipher
D. in a transposition cipher
Answer: A Reference: Encryption Technologies Difficulty: Easy
4. A digital certificate
A. is the same as a digital signature.
B. is just a hash code.
C. is a method that assures that a digital signature truly belongs to the person sending it.
1
, D. is produced only by the sender.
Answer: C Reference: Encryption Technologies Difficulty: Easy
5. What are the components of the TCP/IP Protocol suite?
A. UDP and IPX
B. TCP and IPX
C. ICMP and IPX
D. TCP and IP
Answer: D Reference: The TCP/IP Protocol Suite Difficulty: Easy
6. IP
A. is at the Data Link Layer.
B. is at the Inter-Network Layer.
C. is at the Transport Layer.
D. is at the Application Layer.
Answer: B Reference: The TCP/IP Protocol Suite Difficulty: Easy
7. The Application Layer of the TCP/IP Protocol suite applies to how many layers in the OSI stack?
A. five layers
B. one layer
C. three layers
D. two layers
Answer: C Reference: The TCP/IP Protocol Suite Difficulty: Medium
8. Ethernet is
A. an asynchronous protocol.
B. a synchronous protocol.
C. a statistical protocol.
D. an encryption protocol.
Answer: A Reference: Data Link Layer Frame Acceptance Modes and Addressing Difficulty: Medium
2
,9. What are the two main types of Ethernet connectivity devices?
A. repeaters and broadcast hubs
B. broadcast hubs and routers
C. Ethernet switches and broadcast hubs
D. multiplexers and routers
Answer: C Reference: Data Link Layer Frame Acceptance Modes and Addressing Difficulty: Medium
10. Which bytes in a MAC address indicate the vendor or manufacture of the NIC?
A. the first six bytes
B. the first three bytes
C. the first four bytes
D. the first five bytes
Answer: B Reference: Ethernet Media Access Control (MAC) Difficulty: Medium
11. Where is the broadcast address in Hex format at the Data Link Layer?
A. 255.255.255.255
B. FF:FF:FF:FF
C. BB:BB:BB:BB:BB:BB
D. FF:FF:FF:FF:FF:FF
Answer: D Reference: Unicast and Broadcast Addresses Difficulty: Medium
12. In which mode will all packets be accepted regardless of destination MAC address?
A. Promiscous mode
B. Multicast mode
C. Unicast mode
D. all the above modes
Answer: A Reference: Promiscuous Mode – When Is It Appropriate? Difficulty: Medium
13. Where is the Time to Live (TTL) field located?
A. within a UDP header
3
, B. within a TCP header
C. within an IPv4 header
D. within an IPv6 header
Answer: C Reference: IP Header Contents Difficulty: Medium
14. The Differentiated Services
A. use the first 3 bits of the TOS field to determine how packets are serviced in terms of priority
queuing mechanisms and buffer capacity.
B. use the first 6 bits of the TOS field to determine how packets are serviced in terms of priority
queuing mechanisms and buffer capacity.
C. use the first 3 bits of the TTL field to determine how packets are serviced in terms of priority
queuing mechanisms and buffer capacity.
D. use the first 6 bits of the TTL field to determine how packets are serviced in terms of priority
queuing mechanisms and buffer capacity.
Answer: B Reference: IP Header Contents Difficulty: Difficult
15. What is the broadcast address for class B private network 172.16.0.0?
A. 255.255.0.0
B. 255.255.255.0
C. 172.16.255.255
D. 172.16.255.0
Answer: C Reference: Introduction to Internet Protocol Difficulty: Difficult
16. An IP address 191.10.11.12
A. is an address of Class A.
B. is an address of Class B.
C. is an address of Class C.
D. is an address of Class D.
Answer: B Reference: Introduction to Internet Protocol Difficulty: Medium
17. Traffic monitoring
A. is in the passive category of filtering application.
4