SlideShare a Scribd company logo
 Home Self-Assessment Multiple Choice Quiz Chapter 5
1
2
Self-Assessment Multiple Choice Quiz
Chapter 5: The Network Layer: Control Plane
The link-state algorithm in Section 4.5 has the following properties:
Suppose that c(E,F) = 6 instead of 2 in Figure 4.27. Then the link state algorithm nds
the shortest path to F in
In routing among ASs which of the following issues dominants:
Computer Networking: a Top-Down
Approach, 7th Edition
Kurose • Ross
COMPANION WEBSITE Help  Sign out
it requires the source node to know the costs between every pair of adjacentit requires the source node to know the costs between every pair of adjacent
nodes in the graphnodes in the graph
after theafter the kkth iteration, the least-cost paths are known toth iteration, the least-cost paths are known to kk nodesnodes
it determines the shortest path from the source node to all other nodesit determines the shortest path from the source node to all other nodes
all of the aboveall of the above
step 6step 6
step 5step 5
step 3step 3
step 4step 4
3
4
5
In routing among ASs, which of the following issues dominants:
The ICMP protocol
As part of hierarchical routing, hot-potato routing does the following:
number of ASs traversednumber of ASs traversed
geographical distance between ASsgeographical distance between ASs
current congestion levels in the ASscurrent congestion levels in the ASs
policypolicy
runs on top of UDPruns on top of UDP
runs on top of TCPruns on top of TCP
runs directly on top of IPruns directly on top of IP
none of the abovenone of the above
Provides information to a router about the existence of external networks.Provides information to a router about the existence of external networks.
Determines the number of ASes in the shortest AS path from router toDetermines the number of ASes in the shortest AS path from router to
destination.destination.
Chooses the gateway that has the smallest cost.Chooses the gateway that has the smallest cost.
Labels suspicious packets as “hot”.Labels suspicious packets as “hot”.
6
7
8
Which of the following statements best describes the purpose of the SNMP protocol:
What is the purpose of the SNMP SetRequest message?
Suppose a network manager wanted to query the value of the number of TCP
segments received by a host running the Microsoft Windows 2000 operating system
in a US-based company. What would be the pre x (leading digits) of the MIB variable
that should be queried:
What is the maximum number of received UDP datagrams that can be counted
The SNMP protocol specifies the actions a network manager should take inThe SNMP protocol specifies the actions a network manager should take in
response to a specific set of network fault conditions.response to a specific set of network fault conditions.
The SNMP protocol is a tool for gathering data about network conditions andThe SNMP protocol is a tool for gathering data about network conditions and
executing remote actions at remote managed devicesexecuting remote actions at remote managed devices
The SNMP protocol is used by the network manager to provision resources,The SNMP protocol is used by the network manager to provision resources,
such as bandwidth, server capacity and other computational/communicationsuch as bandwidth, server capacity and other computational/communication
resources needed to meet the mission-specific needs of an enterpriseresources needed to meet the mission-specific needs of an enterprise
To allow a managing entity to query the value of a set of MIB object values in aTo allow a managing entity to query the value of a set of MIB object values in a
managed device.managed device.
To allow a managing entity to set the value of one or more MIB objects in aTo allow a managing entity to set the value of one or more MIB objects in a
managed device.managed device.
To allow a managed device to request and receive a set of initial values for MIBTo allow a managed device to request and receive a set of initial values for MIB
objects in the managed deviceobjects in the managed device
1.2.8401.2.840
1.3.6.1.2.1.11.3.6.1.2.1.1
1.2.840.113561.2.840.11356
9
Pearson Higher Education
About Us
Educators
Academic Executives
Students
Other Customers
Browse our Catalog
Pearson Higher Education
Contact a Rep
Find your Pearson rep
Technical Help
Pearson Technical Support
What is the maximum number of received UDP datagrams that can be counted
(without over ow) in the MIB-2 UDP module?
Copyright © 2018 Pearson Education. All rights reserved.   Terms of Use |  Privacy Policy |  Permissions |  Report Piracy |  Accessibility
See Results
Reset / Start Over
2**16 - 12**16 - 1
2**31 - 12**31 - 1
2**32 - 12**32 - 1
2**64 -12**64 -1

More Related Content

PDF
Chapter 4 - The Network Layer: Data Plane
DOCX
Final networks lab manual
PDF
CCNA 200-120 Exam Quick Notes
PPT
Icmp V4 And Icmp V6
PDF
CCNA Dec, 2015 Questions
PPT
CCNA Access Lists
PPT
CCNA Network Services
Chapter 4 - The Network Layer: Data Plane
Final networks lab manual
CCNA 200-120 Exam Quick Notes
Icmp V4 And Icmp V6
CCNA Dec, 2015 Questions
CCNA Access Lists
CCNA Network Services

What's hot (20)

PPTX
CCNA 200-120 Latest Dumps
PPT
CCNA Basic Switching and Switch Configuration
PDF
CCNA Routing Protocols
PPTX
Network Design on cisco packet tracer 6.0
PDF
Ccna 200-120 Exam Dumps
PDF
Ccna 1 4
PPTX
CCNA ppt Day 2
PPTX
Ip and icmp
PPT
Internet innovation with Multipath TCP
PDF
Top 20 ccna interview questions and answers pdf
PPT
PDF
CCNA 200-120 Exam Questions
PPTX
Transmission Control Protocol (TCP)
PDF
Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338q
PDF
Wireshark course, Ch 03: Capture and display filters
PDF
CCNA Exam Question
PPT
Basic network training1
PDF
IP Routing
CCNA 200-120 Latest Dumps
CCNA Basic Switching and Switch Configuration
CCNA Routing Protocols
Network Design on cisco packet tracer 6.0
Ccna 200-120 Exam Dumps
Ccna 1 4
CCNA ppt Day 2
Ip and icmp
Internet innovation with Multipath TCP
Top 20 ccna interview questions and answers pdf
CCNA 200-120 Exam Questions
Transmission Control Protocol (TCP)
Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338q
Wireshark course, Ch 03: Capture and display filters
CCNA Exam Question
Basic network training1
IP Routing
Ad

Similar to Chapter 5 - The Network Layer: Control Plane (20)

DOC
Ntc 362 forecasting and strategic planning -uopstudy.com
DOC
Ntc 362 effective communication uopstudy.com
PDF
Self assessment true-false Quiz: Chapter 5 - Computer Networking a top-down A...
PDF
Network management
PPTX
14 coms 525 tcpip - applications - snmp
PPT
Network management
PDF
HOST AND NETWORK SECURITY by ThesisScientist.com
PPTX
SNMP Demystified Part-I
PPT
Snmp chapter7
PPT
(Snmp) simple network management protocol
PPT
Snmpv3
PPTX
PPTX
Simple Network Management Protocole
PPT
Net Man
PPTX
SNMP AT a GLANCE
PPTX
SIMPLE NETWORK MAIL PROTOCOL IN COMPUTER
PPT
Chapter 28
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 effective communication uopstudy.com
Self assessment true-false Quiz: Chapter 5 - Computer Networking a top-down A...
Network management
14 coms 525 tcpip - applications - snmp
Network management
HOST AND NETWORK SECURITY by ThesisScientist.com
SNMP Demystified Part-I
Snmp chapter7
(Snmp) simple network management protocol
Snmpv3
Simple Network Management Protocole
Net Man
SNMP AT a GLANCE
SIMPLE NETWORK MAIL PROTOCOL IN COMPUTER
Chapter 28
Ad

More from Andy Juan Sarango Veliz (20)

PDF
Examen final de CCNA Routing y Switching Academia OW
PDF
Criptología de empleo en el Esquema Nacional de Seguridad
PDF
Alfabetización Informática - 3. Navegador Web
PDF
Alfabetización Informática - 2. Test de Conceptos Básicos
PDF
Alfabetización Informática - 1. Conceptos Básicos
PDF
Gestión y Operación de la Ciberseguridad
PPTX
Tecnologías de virtualización y despliegue de servicios
PDF
3. wordpress.org
PDF
2. wordpress.com
PDF
1. Introducción a Wordpress
PDF
Redes de Computadores: Un enfoque descendente 7.° Edición - Capítulo 9
PDF
Análisis e Implementación de una Red "SDN" usando controladores "Open Source"
PDF
Software Defined Radio - Capítulo 5: Modulación Digital I
PDF
Software Defined Radio - Capítulo 4: Modulación FM
PDF
Software Defined Radio - Capítulo 3: Modulación AM
PDF
Software Defined Radio - Capítulo 2: GNU Radio Companion
PDF
Software Defined Radio - Capítulo 1: Introducción
PDF
MAE-RAV-ROS Introducción a Ruteo Avanzado con MikroTik RouterOS v6.42.5.01
PDF
Los cuatro desafíos de ciberseguridad más críticos de nuestra generación
PDF
ITIL Foundation ITIL 4 Edition
Examen final de CCNA Routing y Switching Academia OW
Criptología de empleo en el Esquema Nacional de Seguridad
Alfabetización Informática - 3. Navegador Web
Alfabetización Informática - 2. Test de Conceptos Básicos
Alfabetización Informática - 1. Conceptos Básicos
Gestión y Operación de la Ciberseguridad
Tecnologías de virtualización y despliegue de servicios
3. wordpress.org
2. wordpress.com
1. Introducción a Wordpress
Redes de Computadores: Un enfoque descendente 7.° Edición - Capítulo 9
Análisis e Implementación de una Red "SDN" usando controladores "Open Source"
Software Defined Radio - Capítulo 5: Modulación Digital I
Software Defined Radio - Capítulo 4: Modulación FM
Software Defined Radio - Capítulo 3: Modulación AM
Software Defined Radio - Capítulo 2: GNU Radio Companion
Software Defined Radio - Capítulo 1: Introducción
MAE-RAV-ROS Introducción a Ruteo Avanzado con MikroTik RouterOS v6.42.5.01
Los cuatro desafíos de ciberseguridad más críticos de nuestra generación
ITIL Foundation ITIL 4 Edition

Recently uploaded (20)

PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
communication and presentation skills 01
PDF
737-MAX_SRG.pdf student reference guides
PDF
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPT
Occupational Health and Safety Management System
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
communication and presentation skills 01
737-MAX_SRG.pdf student reference guides
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
Information Storage and Retrieval Techniques Unit III
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Occupational Health and Safety Management System
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Abrasive, erosive and cavitation wear.pdf
R24 SURVEYING LAB MANUAL for civil enggi
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf

Chapter 5 - The Network Layer: Control Plane

  • 1.  Home Self-Assessment Multiple Choice Quiz Chapter 5 1 2 Self-Assessment Multiple Choice Quiz Chapter 5: The Network Layer: Control Plane The link-state algorithm in Section 4.5 has the following properties: Suppose that c(E,F) = 6 instead of 2 in Figure 4.27. Then the link state algorithm nds the shortest path to F in In routing among ASs which of the following issues dominants: Computer Networking: a Top-Down Approach, 7th Edition Kurose • Ross COMPANION WEBSITE Help  Sign out it requires the source node to know the costs between every pair of adjacentit requires the source node to know the costs between every pair of adjacent nodes in the graphnodes in the graph after theafter the kkth iteration, the least-cost paths are known toth iteration, the least-cost paths are known to kk nodesnodes it determines the shortest path from the source node to all other nodesit determines the shortest path from the source node to all other nodes all of the aboveall of the above step 6step 6 step 5step 5 step 3step 3 step 4step 4
  • 2. 3 4 5 In routing among ASs, which of the following issues dominants: The ICMP protocol As part of hierarchical routing, hot-potato routing does the following: number of ASs traversednumber of ASs traversed geographical distance between ASsgeographical distance between ASs current congestion levels in the ASscurrent congestion levels in the ASs policypolicy runs on top of UDPruns on top of UDP runs on top of TCPruns on top of TCP runs directly on top of IPruns directly on top of IP none of the abovenone of the above Provides information to a router about the existence of external networks.Provides information to a router about the existence of external networks. Determines the number of ASes in the shortest AS path from router toDetermines the number of ASes in the shortest AS path from router to destination.destination. Chooses the gateway that has the smallest cost.Chooses the gateway that has the smallest cost. Labels suspicious packets as “hot”.Labels suspicious packets as “hot”.
  • 3. 6 7 8 Which of the following statements best describes the purpose of the SNMP protocol: What is the purpose of the SNMP SetRequest message? Suppose a network manager wanted to query the value of the number of TCP segments received by a host running the Microsoft Windows 2000 operating system in a US-based company. What would be the pre x (leading digits) of the MIB variable that should be queried: What is the maximum number of received UDP datagrams that can be counted The SNMP protocol specifies the actions a network manager should take inThe SNMP protocol specifies the actions a network manager should take in response to a specific set of network fault conditions.response to a specific set of network fault conditions. The SNMP protocol is a tool for gathering data about network conditions andThe SNMP protocol is a tool for gathering data about network conditions and executing remote actions at remote managed devicesexecuting remote actions at remote managed devices The SNMP protocol is used by the network manager to provision resources,The SNMP protocol is used by the network manager to provision resources, such as bandwidth, server capacity and other computational/communicationsuch as bandwidth, server capacity and other computational/communication resources needed to meet the mission-specific needs of an enterpriseresources needed to meet the mission-specific needs of an enterprise To allow a managing entity to query the value of a set of MIB object values in aTo allow a managing entity to query the value of a set of MIB object values in a managed device.managed device. To allow a managing entity to set the value of one or more MIB objects in aTo allow a managing entity to set the value of one or more MIB objects in a managed device.managed device. To allow a managed device to request and receive a set of initial values for MIBTo allow a managed device to request and receive a set of initial values for MIB objects in the managed deviceobjects in the managed device 1.2.8401.2.840 1.3.6.1.2.1.11.3.6.1.2.1.1 1.2.840.113561.2.840.11356
  • 4. 9 Pearson Higher Education About Us Educators Academic Executives Students Other Customers Browse our Catalog Pearson Higher Education Contact a Rep Find your Pearson rep Technical Help Pearson Technical Support What is the maximum number of received UDP datagrams that can be counted (without over ow) in the MIB-2 UDP module? Copyright © 2018 Pearson Education. All rights reserved.   Terms of Use |  Privacy Policy |  Permissions |  Report Piracy |  Accessibility See Results Reset / Start Over 2**16 - 12**16 - 1 2**31 - 12**31 - 1 2**32 - 12**32 - 1 2**64 -12**64 -1