Question 1
In public key encryption, if B wants to send a digitally signed message to A, then B will encrypt the message hash with

Question 1 options:
1) A’s private key
2) A’s public key
3) B’s private key
4) B’s public key

Question 2
Which of the following is FALSE about OSPF?

Question 2 options:
1) Split horizon is used to solve the problem of looping instability.
2) It is link-state routing.
3) Updates are sent when there is a change
4) Updates are flooded to all nodes.

Question 3

In public key encryption, if B wants to send an encrypted and confidential message to A, then B should encrypt the message with

Question 3 options:
1) B’s private key
2) A’s public key
3) B’s public key
4) A’s private key

Question 4
When TCP is implemented over LLC and MAC, the headers appear in the following order (first header sent is leftmost in list)

Question 4 options:

Question 5
For a class C network, is a

Question 5 options:
1) Zorro Mask
2) non-mask
3) subnet mask
4) default mask
5) supernet mask

Question 6
Routing loops can occur in distance routing protocol. What methods can be usd to avoid them or reduce their impact (choose all that apply)

Question 6 options:
Route authentication
Route summarization
Split horizon
Route splitting
Dijkstra open path advertisement
Hold-down timers
Black hole routing
Route suppression
Route poisoning

Question 7
An ARP request is normally

Question 7 options:
1) multicast.
2) unicast.
3) anycast.
4) TV cast
5) broadcast.

Question 8
Which of the following is done during a TCP SYN attack to prevent new connections?

Question 8 options:
1) Attacker sends TCP segments with same ACK field forcing the sender to retransmit the same TCP packet over and over.
2) Attacker increments the TCP ISN of each segment to fill up the receive buffers
3) Attacker sends TCP RST packet with the target IP as source address
4) Attacker fills up a host listen queue by not sending ACK to partially opened TCP connections
5) Attacker sends many FIN packets to force the connection release

Question 9
RIP, OSPF, and BGP are encapsulated by _______, _________, and _________ respectively.

Question 9 options:
5) LLC, IP, IP

Question 10
An IP header has the following field values: HLEN: 6; Total length:200 and Offset: 40. This indicates that:

Question 10 options:
1) The IP packet is the first fragment
2) The header has no options
3) The total length of the original packet is 1600 bytes
4) The packet is a part of a fragmented packet

Question 11
Host A and Host B are communicating via TCP. The following packets are sent:

Packet 1 from A to B:
    Window: 512
    Ack: 48177
    Sequence: 50808
    Bytes Sent: 1024

Packet 2 from B to A:
    Window: 1024
    Ack: 51832
    Sequence: 48177
    Bytes Sent: 512

Packet 3 from A to B:
    Window: 2048
    Ack: ?????
    Sequence: ???
    Bytes Sent: 1024

Assuming no loss or errors, what are the values of “ACK” (A) and “Sequence” (S) in packet 3?

Question 11 options:
1) A= 48690 S= 51833
2) A= 51832 S= 48699
3) A= 48689 S= 51832
4) A= 48689 S= 48178
5) A= 48689 S= 51833
6) None of these

Question 12
What is/are the best practices to design a large (100 routers) OSPF network? (choose several if appropriate)

Question 12 options:
1) OSPF has auto-design feature so you don’t have to do it
2) Create a fully meshed network
3) Minimize the number of areas, ideally using only 1 area
4) Use RIPv1 instead of OSPF
5) Create a flat network
6) Create a hierarchical network with route summarization

Question 13
A newer type of VPN solution which does not use a classic VPN concentrator, and uses a web browser to allow a secure connection to the corporate network is:

Question 13 options:
1) Very Practical Nephew
4) new class VPN
6) Dial VPN

Question 14
Which of the following URLs would connect to server on TCP port 8066?

Question 14 options:
1) mailto://
7) None of these

Question 15
What router table is used to forward MPLS labeled packets:

Question 15 options:
1) The routing table
2) The Routing Information Base (RIB)
3) The BGP table
4) The Label Forwarding Information Base (LFIB)
5) The Label Information Base (LIB)

Question 16
In Frame Relay, the BECN bit is set by:

Question 16 options:
1) The sender DTE to note that congestion is been experienced
2) The frame relay switch to inform the DTE receiving the frame that congestion was experienced in the path from source to destination.
3) The receiver DTE to note congestion was experienced
4) The receiver DTE to notify that Backoff Experiment for Congestion Nullification is taking place to resolve network congestion.
5) Any DCE noticing congestion
6) The frame relay switch in frames traveling in the opposite direction to the frame that experienced congestion to inform the sending DTE

Question 17
Which subnet mask gives you exactly 510 assignable IP addresses?

Question 17 options:
8) None of these

Question 18
Which one of the following is NOT a benefit gained from the use of NAT or PAT to translate network addresses?

Question 18 options:
1) Changing ISPs requires minimal work
2) It hides the internal network addressing scheme from the internet and potential attackers
3) Connections to the Internet are given greater bandwidth through the use of NAT and PAT
4) Allows a large number of internal devices to access the Internet using a small number of public IP addresses

Question 19
When a router has multiple entries in its routing table that match a packet’s destination address, which routing table entry will be used to forward the packet?

Question 19 options:
1) The route that was learned first
2) The route that uses the fastest interface
3) The route that was learned last
4) The route that matches the longest prefix length
5) The route that matches the shortest prefix length
6) The route that has the least bandwidth utilization
7) The route that appears first in the routing table list
8) None of the above.

Question 20
The ARP functionality in IPv4 is accomplished by what ICMPv6 messages in IPv6?

Question 20 options:
1) Redirection
2) Multicast
3) Neighbor Solicit and Neighbor Advertisement
4) ARP is done the same in IPv6 and IPv4
5) Router Advertisement and Router Solicit
6) Neighbor Solicit and Router Advertisement

Question 21
Which of the following is NOT a characteristic of a good hash function?

Question 21 options:
1) Given a message with a particular hash value, it is easy to find another message with the same hash value
2) It is computationally efficient to calculate the hash given a message
3) It is a one-way function
4) Hash functions can be used, along with additional measures, to ensure message integrity.

Question 22
A BGP Neighbor: (choose all that apply)

Question 22 options:
1. Must belong to a different AS#
2. Is automatically discovvered via the hello packets
3. Can be several hops away in iBGP.
4. Is considered friendly if he/she shovels the snow when you are away.
5. Must be directly connected if it is an eBGP neighbor unless it is configured to override that requirement.

Question 23
The purpose of a VLAN is to ___

Question 23 options:
1) Aggregate Collision Domains
2) Aggregate Broadcast Domains
3) Provide security services and segmentation of segments.
4) Segregate Broadcast Domains
5) Segregate Collision Domains
6) Aggregate IP subnets

Question 24
A router has an interface configured as follows:

interface G0/0/0
ip address
no shut

How would this router treat a packet with destination IP of

Question 24 options:
1) Indirect multicast
2) Directed unicast out G0/0/0 to the destination
3) Directed Multicast forwarding out G0/0/0
4) Broadcast the packet out G0/0/0
5) Send packet out a different interface
6) Drop the packet as it is invalid

Question 25
My PC has IP address with mask Which of the following IP addresses are on the same subnet as my PC (select all)?

Question 25 options:

Question 26
If the Bandwidth parameter of an interface is set to 4000 Kbps, then the OSPF Cost of the interface is:

Question 26 options:
1) 4000
2) 4000000
3) 2000
4) 40
5) 25
6) 20
7) None of these

Question 27
What is the major difference between WDM and DWDM?

Question 27 options:
1) DWDM is more reliable.
2) DWDM is an international standard, and WDM is for US only.
3) DWDM uses lower frequency spectrums.
4) No differences.
5) DWDM has shorter spectrum spacing and supports more channels
6) DWDM is for longer distance transmission.

Question 28
The subnet mask indicates that the host field consists of

Question 28 options:
1. 17 bits
2. 13 bits
3. 19 bits
4. 24 bits
5. 248 bits

Question 29
Domain name service (DNS) is used for

Question 29 options:
1) translating DNA addresses into SNA addresses
2) Translating domain names into IP addresses
3) translating domains to their owners
4) translating application names into TCP port numbers
5) translating IP addresses to MAC addresses

Question 30
Which of the following IP addresses should you NOT see as the source IP in the IP header of any packet on the public Internet (select all that apply)?

Question 30 options:

Multiple Choice Section B
The following 3 questions all refer to the following routing table:

Question 31
A packet with which of the following destination addresses will be routed through

Question 31 options:

Question 32
A packet with which of the following destination addresses can be routed directly (no next hop)?

Question 32 options:

Question 33
What is the next hop address for a packet with destination address

Question 33 options:

Multiple Choice Section C
The following two questions refer to this network diagram:

Network Diagram 1

Question 34
In the network above, a packet is sent from Client #1 to the Web Server. What value will be in the Destination Address of the Ethernet header of the packet when it is sent by Client #1?

Question 34 options:
1. 00:01:02:03:04:06
2. 00:01:02:03:04:11
3. 00:01:02:03:04:02
4. 00:01:02:03:04:09
5. 00:01:02:03:04:22

Question 35
In the network above, a packet is sent from Client #1 to the Web Server. What value will be in the Source Address of the Ethernet header of this packet when it is received by the Web Server?

Question 35 options:
1. 00:01:02:03:04:11
2. 00:01:02:03:04:22
3. 00:01:02:03:04:06
4. 00:01:02:03:04:09
5. 00:01:02:03:04:02

Question 36
The IP address of my computer is I want to send an IP packet to a computer with IP address The subnet mask used on our network is Does this packet need to go through a router or not?

Clearly justify your answer, show any calculations

Solution PreviewSolution Preview

These solutions may offer step-by-step problem-solving explanations or good writing examples that include modern styles of formatting and construction of bibliographies out of text citations and references. Students may use these solutions for personal skill-building and practice. Unethical use is strictly forbidden.

    By purchasing this solution you'll be able to access the following files:

    for this solution

    or FREE if you
    register a new account!

    PayPal, G Pay, ApplePay, Amazon Pay, and all major credit cards accepted.

    Find A Tutor

    View available Network Management and Data Communication Tutors

    Get College Homework Help.

    Are you sure you don't want to upload any files?

    Fast tutor response requires as much info as possible.

    Upload a file
    Continue without uploading

    We couldn't find that subject.
    Please select the best match from the list below.

    We'll send you an email right away. If it's not in your inbox, check your spam folder.

    • 1
    • 2
    • 3
    Live Chats