Exam 5: Internet Control Message Protocol
Exam 1: Introducing Tcp/Ip50 Questions
Exam 2: Ip Addressing and Related Topics50 Questions
Exam 3: Basic Ip Packet Structures: Headers and Payloads50 Questions
Exam 4: Data Link and Network Layer Protocols in Tcp/Ip50 Questions
Exam 5: Internet Control Message Protocol50 Questions
Exam 6: Neighbors Discovery in Ipv650 Questions
Exam 7: Ip Address Auto Configuration50 Questions
Exam 8: Name Resolution on Ip Networks50 Questions
Exam 9: Tcp/ip Transport Layer Protocols50 Questions
Exam 10: Transitioning From Ipv4 to Ipv6: Interoperation50 Questions
Exam 11: Deploying Ipv650 Questions
Exam 12: Securing Tcp/Ip Environments50 Questions
Exam 13: Available in Mindtap Only: Troubleshooting Tcp/Ip50 Questions
Exam 14: Available in Mindtap Only: Tcp/Ip Best Practices and Practical Applications50 Questions
Select questions type
Routers send ICMP Redirect messages to hosts to indicate that a preferable route exists.
(True/False)
4.8/5
(41)
Which of the following message types permit a gateway (router) on a nonoptimal route between sender and receiver to redirect traffic to a more optimal path?
(Multiple Choice)
4.7/5
(37)
The PMTU specification defined in RFC 1191 requires the PMTU host to try periodically a larger MTU to see if the ____________________ has increased.
(Short Answer)
4.9/5
(33)
Which of the following types of messages serves to keep hosts apprised of networking conditions and problems, and equipped to use best paths around the network?
(Multiple Choice)
5.0/5
(43)
The value 0 in the IP header Protocol field denotes that an ICMP header follows the IP header.
(True/False)
4.8/5
(35)
Two of the most well-known utilities, Ping and Traceroute, rely on ICMP to perform connectivity tests and ____________________.
(Short Answer)
4.8/5
(35)
Match each item with a statement below.
a.Network congestion
b.firewalking
c.ICMP query message
d.inverse mapping
e.ICMP Echo communication
f.overhead
g.reachability
h.throughput difference
i.restricting link
-the process of identifying live network hosts positioned behind a filtering device by probing for addresses known not to be in use
(Short Answer)
4.8/5
(32)
Which of the following can hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?
(Multiple Choice)
4.7/5
(31)
What is the purpose of the following ICMP message types: ICMP Redirect, ICMP Time Exceeded, and ICMP Parameter Problem?
(Essay)
4.9/5
(34)
Which ICMP reply does a router send in order to indicate that the router cannot use the strict or loose source routing path specified in the original packet?
(Multiple Choice)
4.7/5
(33)
Which of the following ICMP packet fields provide error detection for the ICMP header only?
(Multiple Choice)
4.9/5
(33)
Which of the following typically learn about routes through manual configuration of the default gateway parameter and redirection messages?
(Multiple Choice)
4.8/5
(34)
What protocol protects the authentication and confidentiality of ICMPv6 exchanges?
(Multiple Choice)
4.9/5
(45)
Match each item with a statement below.
a.Network congestion
b.firewalking
c.ICMP query message
d.inverse mapping
e.ICMP Echo communication
f.overhead
g.reachability
h.throughput difference
i.restricting link
-a condition that occurs when the delivery time for packets increases beyond normal limits
(Short Answer)
4.7/5
(36)
With router advertising, the default Lifetime value for route entries is 10 minutes.
Indicate the answer choice that best completes the statement or answers the question.
(True/False)
5.0/5
(34)
ICMP packets contain only three required fields after the IP header: Type, Code, and Checksum.
(True/False)
4.7/5
(42)
Briefly describe the fields that are included in the ICMPv4 Router Advertisement packets (after the ICMP Checksum field).
(Essay)
4.9/5
(30)
Match each item with a statement below.
a.Network congestion
b.firewalking
c.ICMP query message
d.inverse mapping
e.ICMP Echo communication
f.overhead
g.reachability
h.throughput difference
i.restricting link
-an ICMP message that contains requests for configuration or other information
(Short Answer)
4.9/5
(39)
For any network node to communicate and exchange data with another network node, some way of forwarding packets from the sender to receiver must exist. What is this concept called?
(Multiple Choice)
4.9/5
(27)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)