When encountering an IPv4-only router, an IPv6 datagram is dropped.
False
Select all features explicit in IPv6 which are not explicitly available in IPv4. (Check all that apply)
1234:aac:a03::abcd is a valid preferred-format IPv6 address.
True
Which of the following are used in a wired Ethernet network? (Check all that apply)
Given the following diagram of typical Ethernet hardware frame:
Select the proper portion of the data encapsulation from the dropdown menu, which corresponds to the letter in the figure.
A link-layer link between only two adjacent nodes is called a/an _____ link.
point to point
In Random Access multiple access schemes, no two nodes will ever transmit at the same time.
False
Select all Random Access schemes below.
* CSMA
There are reserved MAC addresses unusable for devices.
True
Most modern Ethernet LANs use a _____ topology.
star
A MAC address is permanent and unique.
False
In an Ethernet network, after 8 collisions, the range of wait times will be …
[0, 1, … 255] * 512 bit times
Ethernet uses a RTS/CTS contention-free period.
False
If an Ethernet sender senses a clear channel, and begins transmission, but shortly thereafter detects a collision, it will…
Terminate transmission and enter exponential backoff.
https://s3.amazonaws.com/classconnection/350/flashcards/1550350/jpg/capture-16240A702B7615BA8D0.jpg
01h 78h 1Bh 79h 1Bh 7Ah 1Bh 7Ah 04h
Which of the following are used in a wireless network such as 802.11n?
In direct routing, after the initial contact with the home network, the correspondent sends packets to
The care-of address
A device which moves between networks is a _____device.
Mobile
In indirect routing, after the initial contact with the home network, the correspondent sends packets to _____
The permanent address
Which of the following are major issues that must be handled in wireless networks (i.e., issues that are more significant than in wired networks). Check all that apply.
When an organization establishes a network security policy, which of the following should be considered? Check all that apply.
When an organization establishes a network security policy, which of the following should be considered?
When using an RSA algorithm to construct private and public keys for a public key encryption system, choose prime numbers p and q, and then calculate n = pq, z = (p-1)(q-1). Then choose e and d to create the public key and the private key . Suppose that p = 5, and q = 11. Which of the following values will work for d and e? Check all that apply.
S represents a source host and D represents a destination host. Which of the following is the most typical use of public key encryption, when S sends an authenticated (digitally signed) message to D?
S encrypts a signature using S’s private key, and D decrypts the signature using S’s public key.