A packet filter firewall filters at _____
1. Physical layer
2.Data link layer
3.Network layer or Transport layer
4.Application layer
At which interval does OSPF refresh LSAs?
1.10 seconds
2. 30 seconds
3. 30 minutes
4.1 hour
DBD packets are involved during which two states?
1.Exstart and exchange
2. Loading and Two-way
3. Init and Full
4. Down and Loading
During datagram switching, the packets are placed in __________ to wait until the given transmission line becomes available.
1. Stack
2.Queue
3.Hash
4.Routing table
In OSPF database descriptor packet, if there are more database descriptor packets in the flow, ‘M’ field is set to ______
1.1
2.0
3.more
4.-1
MIB is a collection of groups of objects that can be managed by ____
1. SMTP
2.UDP
3.SNMP
4.TCP/IP
The outcome of Dijkstra’s calculation is used to populate the ____
1.Topology table
2.Routing table
3.Neighbor table
4.Adjacency table
A firewall needs to be __________ so that it can grow proportionally with the network that it protects.
1. Robust
2.Expansive
3.Fast
4. Scalable
A network management system can be divided into _____
1. three categories
2. five broad categories
3.seven broad categories
4. ten broad categories
A proxy firewall filters at _____
1.Physical layer
2.Data link layer
3.Network layer
4.Application layer
A stateful firewall maintains a ______ which is a list of active connections.
1.Routing table
2. Bridging table
3.State table
4. Connection table
An OSPF router receives an LSA, the router checks its sequence number, and this number matches the sequence number of the LSA that the receiving router already has. What does the receiving router do with the LSA?
1.Ignores the LSA
2. Adds it to the database
3.Sends newer LSU update to source router
4.Floods the LSA to the other routers
An OSPF router receives an LSA. The router checks its sequence number and finds that this number is higher than the sequence number it already has. Which two tasks does the router perform with the LSA?
1. Ignores the LSA
2.Adds it to the database
3. Sends newer LSU update to source router
4.Floods the LSA to the other routers
An OSPF router receives an LSA. The router checks its sequence number and finds that this number is lower than the sequence number it already has. What does the router do with the LSA?
1. ignores the LSA
2. adds it to the database
3.sends newer LSU update to source router
4. floods the LSA to the other routers
Choose the wrong statement from the following.
1.Nslookup is used to query a DNS server for DNS data
2.Ping is used to check connectivity
3.Pathping combines the functionality of ping with that of route
4. Ifconfig can configure TCP/IP network interface parameters
Complex networks today are made up of hundreds and sometimes thousands of _____
1.Documents
2.Documents
3.Servers
4.Entities
Configuration management can be divided into two subsystems: reconfiguration and ____
1. Documentation
2.Information
3.Servers
4.Entity
Control of users’ access to network resources through charges is the main responsibility of ______
1.Reactive Fault Management
2.Reconfigured Fault Management
3. Accounting Management
4.Security Management
Datagram networks mainly refers to _________
1.Connection oriented networks
2. Connection less networks
3.Telephone networks
4. Internetwork
Datagram switching is done at which layer of OSI model?
1.Network layer
2.Network layer
3.Application layer
4.Transport layer
Datagrams are routed to their destinations with the help of ________
1.Switch table
2.Segments table
3.Datagram table
4. Routing table
Each LSA has its own age timer. By default, how long does an LSA wait before requiring an update?
1. 30 seconds
2. 1 minute
3. 30 minutes
4.1 hour
ICMP is used in _____
1.Ping
2.Traceroute
3.Ifconfig
4.Both Ping & Traceroute
If you want to find the number of routers between a source and destination, the utility to be used is ______
1. route
2. Ipconfig
3.Ifconfig
4.Traceroute
In Network Management System, maps track each piece of hardware and its connection to the _________
1. IP Server
2.Domain
3.Network
4.Data
In Network Management System, the term that is responsible for controlling access to network based on predefined policy is called _______
1.Fault Management
2.Secured Management
3.Active Management
4.Security Management
In OSPF database descriptor packet, which field is used to detect a missing packet?
1. LSA header
2.MS
3.Database descriptor sequence number
4.Options
Packets in datagram switching are referred to as ________
1.Switches
2. Segments
3.Datagrams
4.Data-packets
Performance management is closely related to _______
1.Proactive Fault Management
2.Fault management
3.Reactive Fault Management
4.Preventive Fault Management
Ping can ____
1.Measure round-trip time
2.Report packet loss
3.Report latency
4.all of the mentioned
Ping sweep is a part of ______
1. Traceroute
2.Nmap
3.Route
4. Ipconfig
The main contents of the routing table in datagram networks are ______
1.Source and Destination address
2.Destination address and Output port
3.Source address and Output port
4. Input port and Output port
The physical connection between an end point and a switch or between two switches is __________
1.Transmission path
2.Virtual path
3. Virtual circuit
4.Transmission circuit
The probability of the error in a transmitted block _________ with the length of the block
1.Remains same
2.Decreases
3. Increases
4.Is not proportional
What is one advantage of setting up a DMZ with two firewalls?
1. You can control where traffic goes in three networks
2.You can do stateful packet filtering
3.You can do load balancing
4.Improved network performance
What is the IP protocol number for OSPF packets?
1. 89
2.86
3.20
4.76
What tells a firewall how to reassemble a data stream that has been divided into packets?
1.The source routing feature
2. The number in the header’s identification field
3. The destination IP address
4. The header checksum field in the packet header
Which field is NOT a field within an OSPF packet header?
1. Packet length
2. Router ID
3. Authentication type
4.Maxage time
Which multicast address does the OSPF Hello protocol use?
1. 224.0.0.5
2.224.0.0.6
3. 224.0.0.7
4. 224.0.0.8
Which of the following is / are the types of firewall?
1. Packet Filtering Firewall
2.Dual Homed Gateway Firewall
3.Screen Host Firewall
4.Dual Host Firewall
Which of the following is false with respect to the datagram networks?
1.Number of flows of packets are not limited
2. Packets may not be in order at the destination
3.Path is not reserved
4.Delay is the same for all packets in a flow
Which of the following is not related to ipconfig in Microsoft Windows?
1. Display all current TCP/IP network configuration values
2.Modify DHCP settings
3.Modify DNS settings
4.Trace the routers in the path to destination
Which of the following is true with respect to the delay in datagram networks?
1. Delay is greater than in a virtual circuit network
2.Each packet may experience a wait at a switch
3.Delay is not uniform for the packets of a message
4. All of the mentioned
Which of the following networks supports pipelining effect?
1.Circuit-switched networks
2.Message-switched networks
3.Packet-switched networks
4.Stream-switched networks
Which of the following remains same in the header of the packet in a datagram network during the entire journey of the packet?
1.Destination address
2.Source address
3. Checksum
4.Padding
Which OSPF show command describes a list of OSPF adjacencies?
1.Show ip ospf interface
2.Show ip ospf
3.Show ip route
4.Show ip ospf neighbor
Which packet is NOT an OSPF packet type?
1.LSU
2. LSR
3.DBD
4.Query
Which two commands are required for basic OSPF configuration?
1.“[Network mask] area [area-id]†and “Router ospf [process-id]â€
2.“[Wildcard-mask] area [area-id]†and “[Network mask] area [area-id]â€
3.Only “Router ospf [process-id]â€
4.“[Wildcard-mask] area [area-id]†and “Router ospf [process-id]â€
_____ command is used to manipulate TCP/IP routing table.
1. route
2.Ipconfig
3.Ifconfig
4.Traceroute
______ allows checking if a domain is available for registration.
1. Domain Check
2.Domain Dossier
3.Domain Lookup
4.Domain registers