You are on page 1of 5

Review Test Chapter 01: Introducing TCP/IP

1. ____ are applied to the packets that are captured into the trace buffer. Decodes 2. ____ typically include "envelope information" in the form of specific headers and trailers. PDUs 3. Breaking up an incoming data stream so separate portions may be delivered to the correct applications is called ____.

4. Each PDU has its own particular opening component called a(n) ____ that identifies the protocol in use,
the sender and intended recipient, and other information.

packet header
5. McGill University released the ____ protocol and service in 1990, which permits Internet users to search text-based document archives.

6. One special ____ is titled "Internet Official Protocol Standards." RFC 7. ____ marked the year that the Berkeley Software Distribution version of UNIX, known as 4.2 BSD, incorporated support for TCP/IP in the operating system.

8. A(n) ____ defines a philosophy, or a particular approach, to a network design or implementation that is recommended as tried and true, or that enjoys certain desirable characteristics worthy of consideration when building or maintaining a TCP/IP network.

9. At each layer in the ____ protocol stack data is packaged and identified for delivery to the layer underneath. TCP/IP 10. Combining the various sources of outgoing data into a single output data stream is called ____. multiplexing

11. Many analyzers have configurable ____ that indicate unusual network events or errors. alarms 12. The ____ layer includes the physical transmission medium (cables or wireless media) that any network
must use to send and receive the signals that constitute the physical expression of networked communications.

13. A potential Standard RFC begins its life when a process or protocol is developed, defined, and reviewed,
and then tested and reviewed further by the Internet community.

14. In an IP datagram header, the protocol number appears as its 12th byte. False

15. A card that runs in promiscuous mode can capture broadcast packets, multicast packets, and unicast
packets sent to other devices, as well as error packets.

16. At each layer in the TCP/IP protocol stack, incoming data has its encapsulating information from the
underlying layer stripped off before it is delivered to its upper-layer partner.

17. The Internet Society (ISOC) is the parent organization for all the various Internet boards and task forces. True 18. The Network layer is where ongoing communications between a sender and a receiver, somewhat like a
telephone conversation, are set up, maintained, and then terminated, or torn down, as needed.


Review Test Chapter 02: IP Addressing and Related Topics

1. Switches make their decisions with specialized hardware known as ____. ASICs 2. ____ "steal" bits from the network portion of an IP address to "lend" those bits to the host. Supernets 3. ____ is used to permit computers to translate numeric IP addresses to MAC layer addresses. ARP 4. ____ lets networks use multiple private IP addresses internally and maps them to one or more public IP addresses externally.

5. Some IP services require what's called a secure ____, IP traffic must be able to move in encrypted form between the sender and receiver without intermediate translation.

end to end connection

6. The address range for Class E addresses runs from to ____. 7. ____ allows network administrators to match subnetworks to actual routing regions on their networks so machines on the same physical network can communicate using MAC layer addresses.

8. ____ is primarily done to prevent unnecessary broadcasts from clogging expensive WAN circuits. Routing

9. ____ may be performed by boundary devices that include proxy server capabilities to replace private IP addresses with one or more public IP addresses as outbound traffic exits the server, and to replace such public addresses with their proper private equivalents as incoming traffic passes through the server.

Address masquerading

10. Class ____ addresses are used for multicast communications, in which a single address may be
associated with more than one network host machine.

11. Each numeric IP address functions at the ____ layer of the ISO/OSI network reference model to assign a unique set of numbers to each and every network interface on a network.

12. RFC ____ reserves three ranges of IP addresses for private usea single Class A (, 16 Class Bs (, and 256 Class Cs (

13. Many companies and individuals rent, rather than own, IP addresses from their ISPs today. True 14. VLSM makes it possible to create routing hierarchies and limit traffic on the backbone by making sure that smaller subnet address spaces can access the resources they need as efficiently as possible.

15. Any IP network is also a broadcast domain. True 16. Class E addresses are reserved entirely for experimental use. True 17. Public IP addresses have great value for many organizations simply because the vast majority of
machines on TCP/IP networks are client workstations.

18. RARP (ReverseARP) is used to translate MAC layer addresses into numeric IP addresses. True

Review Test Chapter 03: Data Link and Network Layer TCP/IP Protocols
1. On a token ring network, each token ring workstation acts as a(n) ____, repeating each packet received back onto the network.

2. Routers use Type of Service (TOS) to select a routing path when there are ____ available.

multiple paths
3. ____ is a general-purpose protocol that overcomes SLIP's deficiencies and provides WAN data link encapsulation services similar to those available for LAN encapsulations.

4. ____ offers connectionless service with end-to-end Network layer addressing.


5. ____ was designed to provide devices with a method for notifying each other that a link is experiencing congestion before the routers start to drop packets.


6. By default, Windows 2000 and Windows XP use the ____ frame type for all ARP traffic.

Ethernet II
7. On a network that is low on available bandwidth, the ____ process causes more traffic on the wire.

fragment retransmission
8. Before an IP datagram is transmitted onto the cable, the ____ driver puts the leading frame onto the datagram.

data link
9. A router uses ____ to determine what packet to send when several packets are queued for transmission from a single-output interface.

10. The ____ field can include a unicast, multicast, or broadcast address.

Destination Address
11. The ____ field defines whether this ARP packet is a request or reply packet, and defines the type of address resolution taking place.

12. The recommended starting TTL value is ____.

13. There are two types of route table entries: a host route entry and ____ route entry.

14. With ____, checksums calculated before and after transmission, when compared, indicate if the message changed between when it was sent and when it was received.

a bit-level integrity check

15. OSPF and Border Gateway Protocol (BGP) are two examples of routing protocols that support multiple types of services.

16. Token ring networks rely on a logical star design.

17. ARP is routable.

18. The route resolution process enables an IP host to determine if the desired destination is local or remote.

19. VoIP is intolerant of any sort of delay

20. When a packet is fragmented, all fragments are given the same TTL value.


21. When PPP is used with synchronous technologies, such as T1, Integrated Services Digital Network (ISDN), DSL, or Synchronous Optical Network (SONET) links, a faster, more efficient technique of bit substitution is used, rather than the wholesale character replacement used with asynchronous links.


Review Test Chapter 04: Internet Control Message Protocol

1. ____ occurs when network traffic starts to exceed handling capacities. Network congestion 2. A(n) ____ consists of an Ethernet header, IP header, ICMP header, and some undefined data. ICMP Echo Request packet 3. The ____ field identifies types of ICMP messages that can be sent on the network. Type 4. ____ permits a receiving host or intermediate gateway to instruct a sending host to adjust (lower) its sending rate to ease congestion problems.

ICMP Source Quench

5. Most PING utilities send a series of several Echo Requests to the target in order to obtain a(n) ____. average response time 6. Routers send ICMP ____ messages to hosts to indicate that a preferable route exists. Redirect 7. The ICMP Echo Request is a connectionless process with no guarantee of delivery. True 8. ICMP reports errors only about processing of non-ICMP IP datagrams. True 9. The Code field provides error detection for the ICMP header only. False