Sie sind auf Seite 1von 10

Question1

Marks: 1

The message type ____ permits a gateway (router) on a nonoptimal route between sender and receiver to redirect traffic to a more optimal path. Choose one answer.
a. ICMP Echo/Echo Reply

b. ICMP Source Quench c. ICMP Redirect d. ICMP Destination Unreachable

Correct Marks for this submission: 1/1.

Question2
Marks: 1

The ICMP packet field____ provides error detection for the ICMP header only. Choose one answer.
a. Checksum

b. Type c. Host d. Code

Correct Marks for this submission: 1/1.

Question3
Marks: 1

Routers send ICMP Redirect messages to hosts to indicate that a preferable route exists. Answer: True Correct False

Marks for this submission: 1/1.

Question4
Marks: 1

____ enables a source to learn the currently supported MTU across an entire path, without requiring fragmentation. Choose one answer.
a. Firewalking

b. TRACEROUTE c. PATHPING d. PMTU Discovery

Correct Marks for this submission: 1/1.

Question5
Marks: 1

The ____ utility is a command-line utility that uses ICMP Echo packets to test router and link latency, as well as packet loss. Choose one answer.
a. NTP

b. PATHPING c. Path MTU d. TRACEROUTE

Correct Marks for this submission: 1/1.

Question6
Marks: 1

The value 0 in the IP header Protocol field denotes that an ICMP header follows the IP header. Answer:

True

False

Correct Marks for this submission: 1/1.

Question7
Marks: 1

With router advertising, the default Lifetime value for route entries is 10 minutes. Answer: True False

Correct Marks for this submission: 1/1.

Question8
Marks: 1

A(n) ____ process is one method of obtaining a list of the active hosts on a network. Choose one answer.
a. ICMP query

b. query c. IP address scanning d. firewalking

Correct Marks for this submission: 1/1.

Question9
Marks: 1

____ typically learn about routes through manual configuration of the default gateway parameter and redirection messages. Choose one answer.
a. Packets

b. Firewalls

c. Ports d. IP hosts

Correct Marks for this submission: 1/1.

Question10
Marks: 1

The message type ____ documents when routing or delivery errors prevent IP datagrams from reaching their destinations. Choose one answer.
a. ICMP Echo/Echo Reply

b. ICMP Source Quench c. ICMP Time Exceeded d. ICMP Destination Unreachable

Correct Marks for this submission: 1/1.

Question11
Marks: 1

The ____ utility uses route tracingto identify a pathfrom the sender to the target host. Choose one answer.
a. gateway

b. TRACEROUTE c. firewalking d. auto-recovery

Correct Marks for this submission: 1/1.

Question12

Marks: 1

Routers can use ICMP to provide a default gateway setting to a host (if the host requests assistance). Answer: True False

Correct Marks for this submission: 1/1.

Question13
Marks: 1

If configured to do so, routers periodically send unsolicitedICMP Router Advertisements to the all-hosts multicast address ____. Choose one answer.
a. 224.0.0.1

b. 255.255.0.0 c. 224.255.0.1 d. 255.224.0.1

Correct Marks for this submission: 1/1.

Question14
Marks: 1

ICMP Type ____ is used for Echo Request packets. Choose one answer.
a. 2

b. 4 c. 6 d. 8

Correct Marks for this submission: 1/1.

Question15
Marks: 1

____ defines a method for discovering a Path MTU (PMTU) using ICMP. Choose one answer.
a. RFC 1191

b. RFC 1241 c. RFC 1542 d. RFC 1577

Correct Marks for this submission: 1/1.

Question16
Marks: 1

____ messages serve to keep hosts apprised of networking conditions and problems, and equipped to use best paths around the network. Choose one answer.
a. NTP

b. Path MTU c. ICMP d. GMT

Correct Marks for this submission: 1/1.

Question17
Marks: 1

A router sends the ____ ICMP reply to indicate that the router cannot use the strict or loose source routing path specified in the original packet. Choose one answer.
a. Code 2: Protocol Unreachable

b. Code 3:Port Unreachable c. Code 4: Fragmentation Needed and Dont Fragment Was Set d. Code 5: Source Route Failed

Correct Marks for this submission: 1/1.

Question18
Marks: 1

The message type ____ supports functionality for reachability utilities like PING and TRACERT; essential when installing, configuring, and troubleshooting IP networks. Choose one answer.
a. ICMP Echo/Echo Reply

b. ICMP Source Quench c. ICMP Time Exceeded d. ICMP Destination Unreachable

Correct Marks for this submission: 1/1.

Question19
Marks: 1

There are two versions of the ____ ICMP reply - the standard version that simply states the packet had the Dont Fragment bit set when it reached a router that needed to fragment it, and the PMTU version that includes information about the restricting link. Choose one answer.
a. Code 2: Protocol Unreachable

b. Code 3:Port Unreachable c. Code 4: Fragmentation Needed and Dont Fragment Was Set

d. Code 5: Source Route Failed

Correct Marks for this submission: 1/1.

Question20
Marks: 1

A router or host may use ____ as a way to indicate that it is becoming congested or overloaded. Choose one answer.
a. Checksum

b. Source Quench c. GMT d. PMTU

Correct Marks for this submission: 1/1.

Question21
Marks: 1

ICMP packets contain only three required fields after the IP header: Type, Code, and Checksum. Answer: True False

Correct Marks for this submission: 1/1.

Question22
Marks: 1

For any network node to communicate and exchange data with another network node, some way of forwarding packets from the sender to receiver must exist. This concept is called ____. Choose one answer.
a. response time

b. route tracing

c. reachability d. network congestion

Correct Marks for this submission: 1/1.

Question23
Marks: 1

Although RFC ____ dictates that IP routersmust support the router part of the ICMP Router Discovery protocol on all connected networks on which the router supports either IP multicast or IP broadcast addressing, many do not. Choose one answer.
a. 1812

b. 1900 c. 1955 d. 1972

Correct Marks for this submission: 1/1.

Question24
Marks: 1

A host or router can send the ____ error message to indicate that the protocol defined in the IP header cannot be processed. Choose one answer.
a. Code 2: Protocol Unreachable

b. Code 3:Port Unreachable c. Code 4: Fragmentation Needed and Dont Fragment Was Set d. Code 5: Source Route Failed

Correct Marks for this submission: 1/1.

Question25
Marks: 1

Hackers can use ____ as part of a reconnaissance processto learn about active network addresses and active processes. Choose one answer.
a. availability

b. ICMP c. auto recovery d. presence

Correct Marks for this submission: 1/1.

Question26
Marks: 1

Using ICMP ____ and some manipulation of the TTL value in the IP header, TRACEROUTE results provide a list of routers along a path, as well as the round-trip latency time to each router. Choose one answer.
a. Echo Requests

b. paths c. metrics d. query messages

Correct Marks for this submission: 1/1.