Introduction to TCP/IP Quiz Answer. In this post you will get Quiz Answer Of Introduction to TCP/IP
Introduction to TCP/IP Quiz
Offered By ”Yonsei University”
Week- 1
My PC’s Internet & Gateway
1.
Question 1
Among the following statements on Subnets and Subnet Masks, which is incorrect?
1 point
- The Internet is divided into subnets, which are divided into smaller subnets
- The subnet size can be found from the Subnet Mask
- Subnet Masks are used in routing to determine which interface a packet needs to be sent to reach its destination
- IPv4 Subnet Masks are 128 bits
=================================================
2.
Question 2
Among the following statements on DNS (Domain Name Server), which is incorrect?
1 point
- DNS converts IP addresses in to hostnames
- Preferred DNS server is the
main DNS server used on a computer - Alternate DNS server is the
backup DNS server (to the Preferred DNS server) used on a computer - www.google.com and
www.facebook.com are hostnames
=================================================
3.
Question 3
Among the following statements
on DHCP (Dynamic Host Configuration Protocol), which is incorrect?
1 point
- For DHCP to work, a local DHCP server must exist
- DHCP is the dedicated Internet router that will send and receive all Internet IP packets for a computer
- DHCP is used for IPv4 and IPv6 connections
- The DHCP Server assigns an IP address, subnet mask, IP address of the DNS server, and more
=================================================
4.
Question 4
Among the following statements
on the effectiveness of DHCP, which is incorrect?
1 point
- DHCP enables a small number of IP addresses to support many computers
- Only a computer that needs an Internet connection is assigned an IP address, and after the Internet connection ends, the IP address is returned to the DHCP server
- DHCP helps to solve the serious shortage problem of IPv6 addresses
- DHCP is automatic, thus it is used on most smartphones and smart devices
=================================================
5.
Question 5
For IP Gateway and subnet configurations, which of the following is incorrect?
1 point
- Among the IP addresses of a subnet, commonly the Network Destination is assigned the lowest IP address
- Among the IP addresses of a subnet, commonly the Broadcast IP address is the highest IP address
- Classful addresses are
commonly used to represent the network destination IP address and subnet mask - Among the IP addresses of a
subnet, commonly the Gateway interface is assigned the second highest IP
address
=================================================
6.
Question 6
In DHCP operations, which of
the following is commonly not managed by the DHCP server?
1 point
- Name of the user of the computer
- Information of the computer (client device)
- Default Gateway
- Domain Name
- Name Server
- Time Server
=================================================
7.
Question 7
Among the following statements on DHCP setup messages and operations, which is incorrect?
1 point
- A client computer will broadcast
a ‘Server Discovery’ message when searching for a DHCP Server - Any DHCP Server on a local network can reply to a ‘Server Discovery’ message with an ‘IP Lease Offer’ message sent back to the client computer
- A client computer will send an ‘IP Lease Request’ message back to the DHCP Server that sent it an ‘IP Lease Offer’ message
- A DHCP Server will send back an ‘IP Lease Acknowledgement’ message to the client computer that sent it an ’IP Lease Request’ message
- DHCP uses TCP to connect to the DHCP Server
Week- 2
TCP/IP Protocol
1.
Question 1
Among the following statements on datagrams, which is incorrect?
1 point
IPv6 packets are not datagrams
Datagrams are self-contained
independent entities that can carry data
IPv4 packets are datagrams
A datagram has sufficient information to be routed from a source computer to a destination computer without reliance on earlier exchanges between the source and destination computers and the transporting network
=================================================
2.
Question 2
Among the following statements
on IPv4 packet length, which is incorrect?
1 point
In an Ethernet network, the
IPv4 packet size can be set to the maximum IPv4 packet size 65,535 octets
The maximum possible IPv4
packet length is 65,535 octets
In a Wi-Fi (IEEE 802.11 WLAN standard) network, 2,304 octets is the largest IPv4 packet size
The ‘Total Length’ field in an IPv4 packet represents the length of the entire IPv4 packet (in units of octets)
=================================================
3.
Question 3
Among the following statements
on the Header Checksum of IPv4 packets, which is incorrect?
1 point
The Header Checksum field is 16 bits
The Header Checksum is used to check errors only at the destination system
The Header Checksum does not check for errors that may have occurred in the payload data part of the IPv4 packet
The Header Checksum uses an error detection code to protect the IPv4 packet header from errors
=================================================
4.
Question 4
Among the following statements on the Source & Destination Addresses of IPv4 packets, which is incorrect?
1 point
Source and Destination IPv4
addresses are each 32 bits
CIDR addressing makes the
Internet more scalable, because networks can be assigned proper subnet sizes
Classful Addresses (like Class
A, B, C) subnet sizes were too small, frequently resulting in lack of IP
addresses to use
CIDR (Classless Inter-Domain Routing) notation is commonly used
=================================================
5.
Question 5
Among the following statements on the CIDR (Classless Inter-Domain Routing) notation and addressing, which is incorrect?
1 point
CIDR enables IPv4 & IPv6 address block allocation to organizations based on actual network size (number of PCs, Servers) and short-term predicted needs
CIDR can be used for IPv4 networks only
CIDR uses VLSM (Variable-Length Subnet Masking)
123.234.100.56/24 represents the IPv4 address 123.234.100.56 and a subnet mask with 24 ones (followed by 8 zeros)
=================================================
6.
Question 6
IPv6 protocols use Hexadecimal (Ox) numbering. Among the following Binary = Hexadecimal = Decimal mapping, which is incorrect?
1 point
0000 = 0x0 = 0
0001 = 0x1 = 1
1000 = 0x8 = 8
1001 = 0x9 = 9
1010 = 0xa = 10
1011 = 0xb = 11
1101 = 0xe = 14
1111 = 0xf = 15
=================================================
7.
Question 7
Among the following
descriptions on IPv6 Jumbograms, which is incorrect?
1 point
If IPv6 Jumbograms can be used, IPv6 Jumbograms will provide an enhanced data transfer performance
The Jumbo Payload Option extension header needs to be used in IPv6 Jumbograms
An IPv4 Jumbogram can be much larger than 65,535 octets
An IPv6 Jumbogram will have its Payload Length field 16 bits all set to 0
=================================================
8.
Question 8
Among the following statements on UDP (User Datagram Protocol), which is incorrect?
1 point
UDP is a connectionless protocol, which does not establish an end-to-end connection manager to check on the received packets
UDP provides port information of the source and destination computers for application connection
UDP header includes a hop count field to check the number of hops from the source port to the destination port
UDP header includes a checksum field that can be used for checking errors in the UDP header and data
=================================================
9.
Question 9
Among the following statements, which is not used in the TCP Checksum Computation?
1 point
TCP Data
Ones complement sum of all 16 bit words in the TCP header
TCP Pseudo Header
UDP header
=================================================
10.
Question 10
TCP has functions to expedite networking services. Among the following, which is not a TCP header function for this purpose?
1 point
TCP uses the TTL (Time to Live) field in the TCP header to specify the time duration the TCP session has
to be completed
TCP uses the PSH Flag, which is a push function to push the data segment to the receiving application, which enables the received data segments to be quickly used by the application
TCP uses the UP (Urgent
Pointer) to point to the urgent data location, which enables the Receiver to
know how much urgent data is coming
TCP uses the URG (Urgent) Flag to indicate that the Urgent Pointer field is in use
Week- 3
Internet Routing & Functions
1.
Question 1
Among the following descriptions on IGP (Interior Gateway Protocol) and EGP (Exterior Gateway Protocol), which is incorrect?
1 point
IGP categories include LS (Link-State) and DV (Distance-Vector) routing protocols
IS-IS (Intermediate System to Intermediate System) is the BGP routing used between ASs
iBGP (internal BGP) is the BGP
routing used within an AS
BGP4 routing path selection is based on network policies and administrator configured rule-sets
=================================================
2.
Question 2
Among the following statements on BGP Security, which is incorrect?
1 point
Routers of different ISPs may
use different encryption and security schemes
BGP security is a challenging issue because BGP Routers commonly belong to different ISPs (Internet Service Providers)
BGP security is used in authentication and protection against spoofed BGP messages and malware
BGP routers do not exchange information with each other to make the network heterogeneous in order to enhance the security level
=================================================
3.
Question 3
Among the following descriptions on OSPF (Open Shortest Path First), which is incorrect?
1 point
The SPT setup from the OSPF protocol is a collection of minimum cost routing paths (using Dijkstra’s algorithm) from a Source to each Destination node in the network
OSPF protocol results in a loop-free SPT (Shortest Path Tree) to be used for routing packets
OSPF uses the DV (Distance-Vector) routing protocol
In the Internet, OSPF is most commonly used for routing of IPv4, IPv6, and CIDR addressed packets
=================================================
4.
Question 4
Among the following metrics, which is not an OSPF link cost factor?
1 point
Number of hops to reach the destination
Availability
Throughput
Distance of a router
Cost of the router
Reliability
RTT (Round-Trip Time)
=================================================
5.
Question 5
Among the following router types, which is incorrect?
1 point
IR (Internal Router) is used when all routing interfaces belong to the same network area
ABR (Area Border Router) is used to connect one or more subarea networks to the backbone network
BR (Backbone Router) is used to connect to the backbone network
ASBR (Autonomous System Boundary Router) is used to make connection from a host inside an AS to its Boundary Router at the edge of the AS
=================================================
6.
Question 6
Among the following descriptions on ARP (Address Resolution Protocol), which is incorrect?
1 point
ARP parameter values are managed by the IETF (Internet Engineering Task Force)
ARP maps an IPv4/IPv6 address to a device’s DLL (Data Link Layer) address
ARP can be used to map a computer’s IPv4 address to its Ethernet MAC (Medium Access Control) address
IPv6 networks use NDP (Neighbor Discovery Protocol) for ARP functionality
=================================================
7.
Question 7
Among the following descriptions on NAT (Network Address Translation), which is incorrect?
1 point
One-to-Many NAT uses many IP addresses such that it has become one of the reason why IPv4 address space exhaustion has occurred
One-to-Many NAT provides enhanced security
One-to-One NAT is used in interconnection of two incompatibly addressed assigned IP networks
One-to-Many NAT is also called IP Masquerading
=================================================
8.
Question 8
Among the following descriptions on RPC (Remote Procedure Call), which is incorrect?
1 point
RPC request and response procedures used ‘Request’ and ‘Response’ messages between the client and server computer
RPC is used for long distance phone calls
RPC needs recovery procedures to help overcome from unpredictable network problems
RPC can enable programming on a remote computer as if it is a local computer
=================================================
9.
Question 9
Among the following
descriptions on FTP (File Transfer Protocol), which is incorrect?
1 point
FTP stream mode divides data into blocks and then uses compression to transfer data efficiently
FTP with TLS (Transport Layer Security) protection (FTPS) is commonly used
FTP is used to transfer files from a server to a client computer
FTP passive mode is used when the client is behind a firewall and cannot accept incoming TCP connections from the server
=================================================
10.
Question 10
Among the following descriptions on e-mail, which is incorrect?
1 point
POP3 (Post Office Protocol
version 3) can be used to move e-mails from the server onto your computer
SMTP (Simple Mail Transfer Protocol) is used to send and receive e-mails between servers
IMAP (Internet Message Access Protocol) enables a user e-mail account to be managed from multiple e-mail devices
Compared to IMAP, POP3 is more popular due to its simple operation
Week- 4
Internet Security
1.
Question 1
Among the most frequent
Internet attacks, which of the following is not true.
1 point
DNS attacks result in
changed domain names in order to hijack a communication session
Brute force attacks result in
stolen smartphones, laptops, etc.
Browser attacks are the most frequent Internet attack type
Browser attacks can be
defended by updating the OS and application
Scan attacks result in
computer ports being used in security breaches to the network computing systems
=================================================
2.
Question 2
Among the following
descriptions of 3G (3rd Generation) Firewalls, which is incorrect?
1 point
HTTP and DNS operations are
filtered in 3G firewalls
3G firewalls include IPS (Intrusion Prevention System) technology
3G firewalls use DPI (Deep Packet Inspection) and WAF (Web Application Firewall) technology
User Identities and computer
MAC addresses are monitored in 3G firewalls
3G firewalls track state changes in IPv4 and IPv6, but does not track TCP or UDP changes
=================================================
3.
Question 3
Among the following
descriptions of how to prevent an attack, which is incorrect?
1 point
Backdoor attacks can be defended by frequent replacing of Internet switches and routers
Brute force attacks can be
defended by frequent and well-selected password changes
DoS (Denial of Service) attacks can be defended by anti-virus software and firewall updating
DNS spoofing and hijacking can
be defended by using a random source port and updating server security patches
DNS attacks can be defended by
using a random source port and updating server security patches
=================================================
4.
Question 4
Among the following, which is not a type of IDS (Intrusion Detection
System)?
1 point
Anomaly-based IDS
HIDS (Host IDS)
Location-based IDS
Signature-based IDS
NIDS (Network IDS)
=================================================
5.
Question 5
Among the following listed,
which is not a Phishing type?
1 point
Clone Phishing
Social Engineering
Whaling
Link Manipulation
Filter Evasion
Fishing Phishing
=================================================
6.
Question 6
Among the following
descriptions of Buffer Overflow, which is incorrect?
1 point
Buffer overflow is used in DoS
(Denial of Service) and DDoS (Distributed DoS) attacks
Buffer overflow can occur when malware overruns the buffer’s boundary and overwrites into adjacent memory locations
Buffer overflow defense
schemes include randomizing the layout of memory and monitoring actions that
write into adjacent memory spaces
Stack overflow is a type of
buffer overflow that the attacker manipulates a local variable, the return
address, or a function pointer to create a malfunction on the stack’s buffer
USB overflow is a type of buffer overflow that the attacker fills up one’s portable USB such that no more files can be saved on the USB memory device
=================================================
7.
Question 7
Among the following Internet
security and threat issues, which is not true?
1 point
Zero-day attacks commonly
result in disabled web services
A zombie computer is a hacker
compromised computer that is connected to the Internet
Companies that receive a cyber attack are seldom attacked again
Users of zombie computers are
commonly unaware
New zero-day vulnerabilities
are discovered almost every day
=================================================
8.
Question 8
Among the following Internet security and protection schemes, which is not true?
1 point
Botnets are used to conduct various Internet attacks, which include DDoS, spam, and intrusions
Backdoors are used by developers or administrators to fix the system, but if a hacker gets access to a backdoor, then the amount of damage to the system or network can be significant
DNS spoofing is commonly used
in DNS hijacking attacks
Botnets are used as a countermeasure to defend against zombie computers
MITM (Man-in-the-Middle) attackers
secretly relay packets in conducting eavesdropping and manipulation of
information
=================================================
9.
Question 9
Which of the following
statements on Internet security and protection is incorrect?
1 point
TLS (Transport Layer Security)
is a symmetric cryptography technology that is used with encryption keys
generated uniquely for each connection in order to provide privacy and data
integrity between networked applications
WPA2 (Wi-Fi Protected Access 2)
includes all mandatory elements of the IEEE 802.11i standard and requires Wi-Fi
Alliance testing and certification
SSH (Secure Shell)
cryptography enable secure services over unsecured networks
WPA2 certified Wi-Fi device are rare to find in new Wi-Fi AP (Access Point) products
TLS replaces SSL (Secure Sockets Layer) technology as it is provides a higher level of protection
=================================================
10.
Question 10
Which of the following
statements on Internet security and protection is incorrect?
1 point
Attackers use SQL code
injection to attack SQL databases and data-driven applications
Due to the vulnerabilities of WPA (Wi-Fi Protected Access), it was replaced with the new WEP (Wired Equivalent Privacy) protocol
DoS (Denial of Service) is a cyber
attack that disables a device or network by making operational resources
unavailable
One of the best knowns defense
mechanisms against MITM (Man-in-the-Middle) attacks is to enhance the
authentication process using a CA (Certificate Authority)
DDoS (Distributed DoS) attacks
commonly occur using multiple distributed botnets and zombie computers
Week- 5
Wireshark Internet Project
1.
Question 1
Did
you succeed in installing Wireshark?
1 point
Yes
No
=================================================
2.
Question 2
Were you able to identify the
TCP and/or TLSv1.2 handshake using Wireshark?
1 point
Yes
No
=================================================
3.
Question 3
Were you able to identify the
TCP Window size using Wireshark?
1 point
Yes
No
=================================================
4.
Question 4
Were you able to successfully download the file from the Google drive or Baidu drive and capture packets using Wireshark?
1 point
Yes
No
=================================================
5.
Question 5
Were
you able to identify the average data rate and the total elapsed time used in
downloading the file from the Google drive or Baidu drive?
1 point
Yes
No