It sends back the protocol received from a router as a poison pill, which stops the regularupdates.
It is information received from a router that can’t be sent back to the originating router.
It prevents regular update messages from reinstating a route that has just come up.
It describes when a router sets the metric for a downed link to infinity.
Which of the following is true regarding RIPv2?
It has a lower administrative distance than RIPv1.
It converges faster than RIPv1.
It has the same timers as RIPv1.
It is harder to configure than RIPv1.
Which of the following protocols are examples of TCP/IP transport layer protocols?
TCP, Ethernet
IP, HTTP
UDP, TCP
IP, SMTP
Which of the following protocols are examples of TCP/IP network access layer protocols?
UDP, TCP
Token Ring, Ethernet
IP, HTTP
IP, SMTP
The process of a web server adding a TCP header to the contents of a web page, followed by adding an IP header, and then adding a data link header and trailer is an example of what?
Data encapsulation
Same-layer interaction
OSI model
All of these answers are correct.
Which of the following terms is used specifically to identify the entity created when encapsulating data inside data link layer headers and trailers?
Data
Segment
Frame
Packet
Which of the following functions of OSI Layer 2 is specified by the protocol standard for PPP, but is implemented with a Cisco proprietary header field for HDLC?
Framing
Addressing
Error detection
Identifying the type of protocol that is inside the frame
Imagine that PC1 needs to send some data to PC2, and PC1 and PC2 are separated by several routers. What are the largest entities that make it from PC1 to PC2?
Frame
|
|
Segment
Packet
Bits
Which of the following are not features of a protocol that is considered to match OSI Layer 4?
Error recovery
Flow control
Segmenting of application data
Conversion from binary to ASCII
Which of the following does a router normally use when making a decision about routing TCP/IP packets?
Destination MAC address
Source MAC address
Destination IP address
Source IP address
Which of the following protocols allows a client PC to discover the IP address of another computer based on that other computer’s name?
ARP
RARP
DNS
DHCP
Which of the following header fields identify which TCP/IP application gets data received by the computer?
Ethernet Type
IP Protocol Field
TCP or UDP Port Number
Application ID
What do you call data that includes the Layer 4 protocol header, and data given to Layer 4 by the upper layers, not including any headers and trailers from Layers 1 to 3?
Bits
Segment
Packet
Frame
Which of the following is a device or function whose most notable feature is to examine trends over time to recognize different known attacks as compared to a list of common attack signatures?
VPN
Firewall
IDS
NAC