logo

CuriousTab

CuriousTab

Discussion


Home Networking TCP/IP See What Others Are Saying!
  • Question
  • Which statements are true regarding ICMP packets?

    1. They acknowledge receipt of a TCP segment.
    2. They guarantee datagram delivery.
    3. They can provide hosts with information about network problems.
    4. They are encapsulated within IP datagrams.


  • Options
  • A. 1 only
  • B. 2 and 3
  • C. 3 and 4
  • D. 2, 3 and 4

  • Correct Answer
  • 3 and 4 

    Explanation
    Internet Control Message Protocol (ICMP) is used to send error messages through the network, but they do not work alone. Every segment or ICMP payload must be encapsulated within an IP datagram (or packet).

  • More questions

    • 1. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?

    • Options
    • A. During high-traffic periods
    • B. After broken links are reestablished
    • C. When upper-layer protocols require high reliability
    • D. In an improperly implemented redundant topology
    • Discuss
    • 2. What is the purpose of Spanning Tree Protocol in a switched LAN?

    • Options
    • A. To provide a mechanism for network monitoring in switched environments
    • B. To prevent routing loops in networks with redundant paths
    • C. To prevent switching loops in networks with redundant switched paths
    • D. To manage the VLAN database across multiple switches
    • E. To create collision domains
    • Discuss
    • 3. If you want to disable STP on a port connected to a server, which command would you use?

    • Options
    • A. disable spanning-tree
    • B. spanning-tree off
    • C. spanning-tree security
    • D. spanning-tree portfast
    • Discuss
    • 4. Which of the following commands connect access list 110 inbound to interface ethernet0?

    • Options
    • A. Router(config)# ip access-group 110 in
    • B. Router(config)# ip access-list 110 in
    • C. Router(config-if)# ip access-group 110 in
    • D. Router(config-if)# ip access-list 110 in
    • Discuss
    • 5. You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?

    • Options
    • A. access-list 10 deny 172.16.48.0 255.255.240.0
    • B. access-list 10 deny 172.16.0.0 0.0.255.255
    • C. access-list 10 deny 172.16.64.0 0.0.31.255
    • D. access-list 10 deny 172.16.48.0 0.0.15.255
    • Discuss
    • 6. Which of the following describes an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI model?

    • Options
    • A. HDLC
    • B. Cable
    • C. VPN
    • D. IPSec
    • E. xDSL
    • Discuss
    • 7. What protocols are used to configure trunking on a switch?

      1. VLAN Trunking Protocol
      2. VLAN
      3. 802.1Q
      4. ISL

    • Options
    • A. 1 and 2
    • B. 3 and 4
    • C. 1 only
    • D. 2 only
    • Discuss
    • 8. When a router is connected to a Frame Relay WAN link using a serial DTE interface, how is the clock rate determined?

    • Options
    • A. Supplied by the CSU/DSU
    • B. By the far end router
    • C. By the clock rate command
    • D. By the Physical layer bit stream timing
    • Discuss
    • 9. What are the decimal and hexadecimal equivalents for the binary number 10110111?

    • Options
    • A. 69/0x2102
    • B. 183/B7
    • C. 173/A6
    • D. 83/0xC5
    • Discuss
    • 10. What type of RJ45 UTP cable is used between switches?

    • Options
    • A. Straight-through
    • B. Crossover cable
    • C. Crossover with a CSU/DSU
    • D. Crossover with a router in between the two switches
    • Discuss


    Comments

    There are no comments.

Enter a new Comment