Introduction to TCP/IP Quiz

Introduction to TCP/IP Quiz Answer. In this post you will get Quiz  Answer Of Introduction to TCP/IP

 

Introduction to TCP/IP Quiz

Offered By ”Yonsei University”

Enroll Now

Week- 1

My PC’s Internet & Gateway

1.
Question 1
Among the following statements on Subnets and Subnet Masks, which is incorrect?

1 point

  • The Internet is divided into subnets, which are divided into smaller subnets
  • The subnet size can be found from the Subnet Mask
  • Subnet Masks are used in routing to determine which interface a packet needs to be sent to reach its destination
  • IPv4 Subnet Masks are 128 bits

=================================================

 

2.
Question 2
Among the following statements on DNS (Domain Name Server), which is incorrect?

1 point

  • DNS converts IP addresses in to hostnames
  • Preferred DNS server is the
    main DNS server used on a computer
  • Alternate DNS server is the
    backup DNS server (to the Preferred DNS server) used on a computer
  • www.google.com and
    www.facebook.com are hostnames

=================================================

 

3.
Question 3
Among the following statements
on DHCP (Dynamic Host Configuration Protocol), which is incorrect?

1 point

  • For DHCP to work, a local DHCP server must exist
  • DHCP is the dedicated Internet router that will send and receive all Internet IP packets for a computer
  • DHCP is used for IPv4 and IPv6 connections
  • The DHCP Server assigns an IP address, subnet mask, IP address of the DNS server, and more

=================================================

 

4.
Question 4
Among the following statements
on the effectiveness of DHCP, which is incorrect?

1 point

  • DHCP enables a small number of IP addresses to support many computers
  • Only a computer that needs an Internet connection is assigned an IP address, and after the Internet connection ends, the IP address is returned to the DHCP server
  • DHCP helps to solve the serious shortage problem of IPv6 addresses
  • DHCP is automatic, thus it is used on most smartphones and smart devices

=================================================

 

5.
Question 5
For IP Gateway and subnet configurations, which of the following is incorrect?

1 point

  • Among the IP addresses of a subnet, commonly the Network Destination is assigned the lowest IP address
  • Among the IP addresses of a subnet, commonly the Broadcast IP address is the highest IP address
  • Classful addresses are
    commonly used to represent the network destination IP address and subnet mask
  • Among the IP addresses of a
    subnet, commonly the Gateway interface is assigned the second highest IP
    address

=================================================

 

6.
Question 6
In DHCP operations, which of
the following is commonly not managed by the DHCP server?

1 point

  • Name of the user of the computer
  • Information of the computer (client device)
  • Default Gateway
  • Domain Name
  • Name Server
  • Time Server

=================================================

 

7.
Question 7
Among the following statements on DHCP setup messages and operations, which is incorrect?

1 point

  • A client computer will broadcast
    a ‘Server Discovery’ message when searching for a DHCP Server
  • Any DHCP Server on a local network can reply to a ‘Server Discovery’ message with an ‘IP Lease Offer’ message sent back to the client computer
  • A client computer will send an ‘IP Lease Request’ message back to the DHCP Server that sent it an ‘IP Lease Offer’ message
  • A DHCP Server will send back an ‘IP Lease Acknowledgement’ message to the client computer that sent it an ’IP Lease Request’ message
  • DHCP uses TCP to connect to the DHCP Server

 

 

Week- 2

TCP/IP Protocol

1.
Question 1
Among the following statements on datagrams, which is incorrect?

1 point

IPv6 packets are not datagrams

Datagrams are self-contained
independent entities that can carry data

IPv4 packets are datagrams

A datagram has sufficient information to be routed from a source computer to a destination computer without reliance on earlier exchanges between the source and destination computers and the transporting network

=================================================

 

2.
Question 2
Among the following statements
on IPv4 packet length, which is incorrect?

1 point

In an Ethernet network, the
IPv4 packet size can be set to the maximum IPv4 packet size 65,535 octets

The maximum possible IPv4
packet length is 65,535 octets

In a Wi-Fi (IEEE 802.11 WLAN standard) network, 2,304 octets is the largest IPv4 packet size

The ‘Total Length’ field in an IPv4 packet represents the length of the entire IPv4 packet (in units of octets)

=================================================

 

 

3.
Question 3
Among the following statements
on the Header Checksum of IPv4 packets, which is incorrect?

1 point

The Header Checksum field is 16 bits

The Header Checksum is used to check errors only at the destination system

The Header Checksum does not check for errors that may have occurred in the payload data part of the IPv4 packet

The Header Checksum uses an error detection code to protect the IPv4 packet header from errors

=================================================

 

4.
Question 4
Among the following statements on the Source & Destination Addresses of IPv4 packets, which is incorrect?

1 point

Source and Destination IPv4
addresses are each 32 bits

CIDR addressing makes the
Internet more scalable, because networks can be assigned proper subnet sizes

Classful Addresses (like Class
A, B, C) subnet sizes were too small, frequently resulting in lack of IP
addresses to use

CIDR (Classless Inter-Domain Routing) notation is commonly used

=================================================

 

5.
Question 5
Among the following statements on the CIDR (Classless Inter-Domain Routing) notation and addressing, which is incorrect?

1 point

CIDR enables IPv4 & IPv6 address block allocation to organizations based on actual network size (number of PCs, Servers) and short-term predicted needs

CIDR can be used for IPv4 networks only

CIDR uses VLSM (Variable-Length Subnet Masking)

123.234.100.56/24 represents the IPv4 address 123.234.100.56 and a subnet mask with 24 ones (followed by 8 zeros)

=================================================

 

6.
Question 6
IPv6 protocols use Hexadecimal (Ox) numbering. Among the following Binary = Hexadecimal = Decimal mapping, which is incorrect?

1 point

0000 = 0x0 = 0

0001 = 0x1 = 1

1000 = 0x8 = 8

1001 = 0x9 = 9

1010 = 0xa = 10

1011 = 0xb = 11

1101 = 0xe = 14

1111 = 0xf = 15

=================================================

 

7.
Question 7
Among the following
descriptions on IPv6 Jumbograms, which is incorrect?

1 point

If IPv6 Jumbograms can be used, IPv6 Jumbograms will provide an enhanced data transfer performance

The Jumbo Payload Option extension header needs to be used in IPv6 Jumbograms

An IPv4 Jumbogram can be much larger than 65,535 octets

An IPv6 Jumbogram will have its Payload Length field 16 bits all set to 0

=================================================

 

8.
Question 8
Among the following statements on UDP (User Datagram Protocol), which is incorrect?

1 point

UDP is a connectionless protocol, which does not establish an end-to-end connection manager to check on the received packets

UDP provides port information of the source and destination computers for application connection

UDP header includes a hop count field to check the number of hops from the source port to the destination port

UDP header includes a checksum field that can be used for checking errors in the UDP header and data

=================================================

 

9.
Question 9
Among the following statements, which is not used in the TCP Checksum Computation?

1 point

TCP Data

Ones complement sum of all 16 bit words in the TCP header

TCP Pseudo Header

UDP header

=================================================

 

10.
Question 10
TCP has functions to expedite networking services. Among the following, which is not a TCP header function for this purpose?

1 point

TCP uses the TTL (Time to Live) field in the TCP header to specify the time duration the TCP session has
to be completed

TCP uses the PSH Flag, which is a push function to push the data segment to the receiving application, which enables the received data segments to be quickly used by the application

TCP uses the UP (Urgent
Pointer) to point to the urgent data location, which enables the Receiver to
know how much urgent data is coming

TCP uses the URG (Urgent) Flag to indicate that the Urgent Pointer field is in use

 

 

Week- 3

Internet Routing & Functions

1.
Question 1
Among the following descriptions on IGP (Interior Gateway Protocol) and EGP (Exterior Gateway Protocol), which is incorrect?

1 point

IGP categories include LS (Link-State) and DV (Distance-Vector) routing protocols

IS-IS (Intermediate System to Intermediate System) is the BGP routing used between ASs

iBGP (internal BGP) is the BGP
routing used within an AS

BGP4 routing path selection is based on network policies and administrator configured rule-sets

=================================================

 

2.
Question 2
Among the following statements on BGP Security, which is incorrect?

1 point

Routers of different ISPs may
use different encryption and security schemes

BGP security is a challenging issue because BGP Routers commonly belong to different ISPs (Internet Service Providers)

BGP security is used in authentication and protection against spoofed BGP messages and malware

BGP routers do not exchange information with each other to make the network heterogeneous in order to enhance the security level

=================================================

 

3.
Question 3
Among the following descriptions on OSPF (Open Shortest Path First), which is incorrect?

1 point

The SPT setup from the OSPF protocol is a collection of minimum cost routing paths (using Dijkstra’s algorithm) from a Source to each Destination node in the network

OSPF protocol results in a loop-free SPT (Shortest Path Tree) to be used for routing packets

OSPF uses the DV (Distance-Vector) routing protocol

In the Internet, OSPF is most commonly used for routing of IPv4, IPv6, and CIDR addressed packets

=================================================

 

4.
Question 4
Among the following metrics, which is not an OSPF link cost factor?

1 point

Number of hops to reach the destination

Availability

Throughput

Distance of a router

Cost of the router

Reliability

RTT (Round-Trip Time)

=================================================

 

5.
Question 5
Among the following router types, which is incorrect?

1 point

IR (Internal Router) is used when all routing interfaces belong to the same network area

ABR (Area Border Router) is used to connect one or more subarea networks to the backbone network

BR (Backbone Router) is used to connect to the backbone network

ASBR (Autonomous System Boundary Router) is used to make connection from a host inside an AS to its Boundary Router at the edge of the AS

=================================================

 

6.
Question 6
Among the following descriptions on ARP (Address Resolution Protocol), which is incorrect?

1 point

ARP parameter values are managed by the IETF (Internet Engineering Task Force)

ARP maps an IPv4/IPv6 address to a device’s DLL (Data Link Layer) address

ARP can be used to map a computer’s IPv4 address to its Ethernet MAC (Medium Access Control) address

IPv6 networks use NDP (Neighbor Discovery Protocol) for ARP functionality

=================================================

 

7.
Question 7
Among the following descriptions on NAT (Network Address Translation), which is incorrect?

1 point

One-to-Many NAT uses many IP addresses such that it has become one of the reason why IPv4 address space exhaustion has occurred

One-to-Many NAT provides enhanced security

One-to-One NAT is used in interconnection of two incompatibly addressed assigned IP networks

One-to-Many NAT is also called IP Masquerading

=================================================

 

8.
Question 8
Among the following descriptions on RPC (Remote Procedure Call), which is incorrect?

1 point

RPC request and response procedures used ‘Request’ and ‘Response’ messages between the client and server computer

RPC is used for long distance phone calls

RPC needs recovery procedures to help overcome from unpredictable network problems

RPC can enable programming on a remote computer as if it is a local computer

=================================================

 

9.
Question 9
Among the following
descriptions on FTP (File Transfer Protocol), which is incorrect?

1 point

FTP stream mode divides data into blocks and then uses compression to transfer data efficiently

FTP with TLS (Transport Layer Security) protection (FTPS) is commonly used

FTP is used to transfer files from a server to a client computer

FTP passive mode is used when the client is behind a firewall and cannot accept incoming TCP connections from the server

=================================================

 

10.
Question 10
Among the following descriptions on e-mail, which is incorrect?

1 point

POP3 (Post Office Protocol
version 3) can be used to move e-mails from the server onto your computer

SMTP (Simple Mail Transfer Protocol) is used to send and receive e-mails between servers

IMAP (Internet Message Access Protocol) enables a user e-mail account to be managed from multiple e-mail devices

Compared to IMAP, POP3 is more popular due to its simple operation

 

 

Week- 4

Internet Security

1.
Question 1
Among the most frequent
Internet attacks, which of the following is not true.

1 point

DNS attacks result in
changed domain names in order to hijack a communication session

Brute force attacks result in
stolen smartphones, laptops, etc.

Browser attacks are the most frequent Internet attack type

Browser attacks can be
defended by updating the OS and application

Scan attacks result in
computer ports being used in security breaches to the network computing systems

=================================================

 

2.
Question 2
Among the following
descriptions of 3G (3rd Generation) Firewalls, which is incorrect?

1 point

HTTP and DNS operations are
filtered in 3G firewalls

3G firewalls include IPS (Intrusion Prevention System) technology

3G firewalls use DPI (Deep Packet Inspection) and WAF (Web Application Firewall) technology

User Identities and computer
MAC addresses are monitored in 3G firewalls

3G firewalls track state changes in IPv4 and IPv6, but does not track TCP or UDP changes

=================================================

 

3.
Question 3
Among the following
descriptions of how to prevent an attack, which is incorrect?

1 point

Backdoor attacks can be defended by frequent replacing of Internet switches and routers

Brute force attacks can be
defended by frequent and well-selected password changes

DoS (Denial of Service) attacks can be defended by anti-virus software and firewall updating

DNS spoofing and hijacking can
be defended by using a random source port and updating server security patches

DNS attacks can be defended by
using a random source port and updating server security patches

=================================================

 

4.
Question 4
Among the following, which is not a type of IDS (Intrusion Detection
System)?

1 point

Anomaly-based IDS

HIDS (Host IDS)

Location-based IDS

Signature-based IDS

NIDS (Network IDS)

=================================================

 

5.
Question 5
Among the following listed,
which is not a Phishing type?

1 point

Clone Phishing

Social Engineering

Whaling

Link Manipulation

Filter Evasion

Fishing Phishing

=================================================

 

6.
Question 6
Among the following
descriptions of Buffer Overflow, which is incorrect?

1 point

Buffer overflow is used in DoS
(Denial of Service) and DDoS (Distributed DoS) attacks

Buffer overflow can occur when malware overruns the buffer’s boundary and overwrites into adjacent memory locations

Buffer overflow defense
schemes include randomizing the layout of memory and monitoring actions that
write into adjacent memory spaces

Stack overflow is a type of
buffer overflow that the attacker manipulates a local variable, the return
address, or a function pointer to create a malfunction on the stack’s buffer

USB overflow is a type of buffer overflow that the attacker fills up one’s portable USB such that no more files can be saved on the USB memory device

=================================================

 

7.
Question 7
Among the following Internet
security and threat issues, which is not true?

1 point

Zero-day attacks commonly
result in disabled web services

A zombie computer is a hacker
compromised computer that is connected to the Internet

Companies that receive a cyber attack are seldom attacked again

Users of zombie computers are
commonly unaware

New zero-day vulnerabilities
are discovered almost every day

=================================================

 

8.
Question 8
Among the following Internet security and protection schemes, which is not true?

1 point

Botnets are used to conduct various Internet attacks, which include DDoS, spam, and intrusions

Backdoors are used by developers or administrators to fix the system, but if a hacker gets access to a backdoor, then the amount of damage to the system or network can be significant

DNS spoofing is commonly used
in DNS hijacking attacks

Botnets are used as a countermeasure to defend against zombie computers

MITM (Man-in-the-Middle) attackers
secretly relay packets in conducting eavesdropping and manipulation of
information

=================================================

 

9.
Question 9
Which of the following
statements on Internet security and protection is incorrect?

1 point

TLS (Transport Layer Security)
is a symmetric cryptography technology that is used with encryption keys
generated uniquely for each connection in order to provide privacy and data
integrity between networked applications

WPA2 (Wi-Fi Protected Access 2)
includes all mandatory elements of the IEEE 802.11i standard and requires Wi-Fi
Alliance testing and certification

SSH (Secure Shell)
cryptography enable secure services over unsecured networks

WPA2 certified Wi-Fi device are rare to find in new Wi-Fi AP (Access Point) products

TLS replaces SSL (Secure Sockets Layer) technology as it is provides a higher level of protection

=================================================

 

10.
Question 10
Which of the following
statements on Internet security and protection is incorrect?

1 point

Attackers use SQL code
injection to attack SQL databases and data-driven applications

Due to the vulnerabilities of WPA (Wi-Fi Protected Access), it was replaced with the new WEP (Wired Equivalent Privacy) protocol

DoS (Denial of Service) is a cyber
attack that disables a device or network by making operational resources
unavailable

One of the best knowns defense
mechanisms against MITM (Man-in-the-Middle) attacks is to enhance the
authentication process using a CA (Certificate Authority)

DDoS (Distributed DoS) attacks
commonly occur using multiple distributed botnets and zombie computers

 

 

Week- 5

Wireshark Internet Project

1.
Question 1
Did
you succeed in installing Wireshark?

1 point

Yes

No

=================================================

 

2.
Question 2
Were you able to identify the
TCP and/or TLSv1.2 handshake using Wireshark?

1 point

Yes

No

=================================================

 

3.
Question 3
Were you able to identify the
TCP Window size using Wireshark?

1 point

Yes

No

=================================================

 

4.
Question 4
Were you able to successfully download the file from the Google drive or Baidu drive and capture packets using Wireshark?

1 point

Yes

No

=================================================

 

5.
Question 5
Were
you able to identify the average data rate and the total elapsed time used in
downloading the file from the Google drive or Baidu drive?

1 point

Yes

No

 

Other Questions Of This Category