0% found this document useful (0 votes)
24 views10 pages

02 Icmp - Arp - TCP

Uploaded by

senbook17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views10 pages

02 Icmp - Arp - TCP

Uploaded by

senbook17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Internet Control Message Protocol

1. (Single Choice) Which of the following protocols provides error report and send
information about the IP datagram processing status back to the source?
[Link]
[Link]
[Link]
[Link]
2. (Single Choice) Which of the following protocols is a management protocol used at
Network Layer to provide IP information service by embedding the protocol
information in IP packets?
[Link]
[Link]
[Link]
D.802.2
3. (Single Choice) Which of the following is the abbreviation for ICMP?
[Link] Control Mail Protocol
[Link] Control Message Protocol
[Link] connection Message Protocol
[Link] Control Message Protocol
4. (Multiple Choice) The protocol number of ICMP is ( )
A.1
B.6
C.17
D.22
5. (Single Choice) Which of the following operations can be used to verify the failure
of installation or running of TCP/IP protocol?
[Link] [Link]
[Link] [Link]
[Link] [Link]
[Link] [Link]
6. (Single Choice) Which of the following applications can be used to detect the path
along which the data packets are transmitted from the source to the destination?
[Link]
[Link]
[Link]
[Link]
7. (Single Choice) The ICMP protocol (RFC792) is not applied to Application Layer
but Network Layer.
[Link]
[Link]
8. (Single Choice) Which bytes in an ICMP packet use a unified format and consist of
the Type, Code, and Checksum fields?
[Link] 3 bytes
[Link] 4 bytes
[Link] 5 bytes
[Link] 8 bytes
9. (Single Choice) Which of the following statements about the ICMP protocol is true?
[Link] ICMP protocol searches for IP addresses based on MAC addresses.
[Link] ICMP protocol translates the IP address of a public network into the IP
address of a private network.
[Link] ICMP protocol monitors errors generated in datagram transmission.
[Link] ICMP protocol allocates and manages IP addresses in a network in a
uniform manner.
10. (Single Choice) In which type of packet is an ICMP packet generally advertised
during IP packet processing?
[Link]
[Link]
[Link]
[Link] IP address
11. (Single Choice) Which of the following fields is used to check an ICMP packet?
[Link] field in the ICMP packet
[Link] checksum field in an IP datagram
[Link] field in the ICMP packet
[Link] field in the ICMP packet
12. (Single Choice) The IP protocol is a kind of unreliable protocol and offers no error
detection. To provide error detection, which of the following must the IP protocol
work with?
[Link]
[Link]
[Link]
[Link]
13. (Multiple Choice) Which of the following applications use ICMP protocol?
(Select 3 Answers)
[Link]
[Link]
[Link]
[Link]
14. (Single Choice) When certain fields in the header of a received datagram have
incorrect values, this datagram is discarded and a certain ICMP packet is sent to the
source. Which type of ICMP packet is sent to the source?
[Link] Unreachable packet
[Link] Quench packet
[Link] Problem packet
[Link] packet
15. (Single Choice) When a router or host discards data because of data congestion,
which type of ICMP packet does the router or host send to the source?
[Link] Unreachable packet
[Link] Quench packet
[Link] Problem packet
[Link] packet
16. (Single Choice) Which of the following is the most common method used to check
the connectivity between an IP network and a host, for example, the connectivity
between routers and the connectivity between a router and a host?
[Link]
[Link]
[Link]
[Link]
17. (Single Choice) A series of packets are used in a Ping test to determine whether
delay and packet loss occur in communication. Which of the following represents the
packet used in a Ping test?
[Link]
[Link]
[Link]
[Link]
18. (Multiple Choice) Which of the following protocols are not used in a Tracert
process? (Select 2 Answers)
[Link]
[Link]
[Link]
[Link]
19. (Multiple Choice) Which of the following statements about Ping and Tracert are
true? (Select 3 Answers)
[Link] Ping and Tracert can be used to test network connectivity.
[Link] can be used to specify the source IP address of a packet.
[Link] is often used to obtain the path for forwarding a datagram.
[Link] can be used to determine a faulty point.
20. (Single Choice) Which type of packet does a Ping application send?
[Link] Request packet
[Link] Reply packet
[Link] Request packet
[Link] Reply packet
21. (Single Choice) The Tracert application is usually used in data network
commissioning. In this case, how many types of ICMP packets are involved in a
Tracert application?
A.2
B.3
C.4
D.6

Address Resolution Protocol


1. (Single Choice) The Advanced Research Projects Agency Network (ARPANET)
network is created by United States Department of Defense and is the predecessor of
the contemporary global. Which of the following is the basis of an ARPANET
network?
[Link]-speed serial connection
[Link] switching
[Link] switching
[Link] forwarding
2. (Single Choice) What is the function of ARP?
[Link] port number to IP address
[Link] MAC address to IP address
[Link] IP address
[Link] IP address to Mac address
3. (Single Choice) What is the function of RARP?
[Link] source IP address to MAC address
[Link] destination IP address to MAC address
[Link] destination MAC address to IP address
[Link] source MAC address to IP address
4. (Single Choice) Which category does the ARP protocol belong to?
[Link]
[Link]
[Link]
[Link]
5. (Single Choice) An RARP request packet is sent by means of broadcast. How is an
RARP Reply packet sent to save network resources?
[Link]
[Link]
[Link]
[Link]

Transport Layer Protocols

1. (Single Choice) Which of the following protocols provides connection oriented


transmission service?
[Link]
B.IPv6
[Link]
[Link]
2. (Multiple Choice) Which of the following protocols reside at transport layer?
(Select 2 Answers)
[Link]
[Link]
[Link]
[Link]
3 (Single Choice) What is the port number of DNS?
A.21
B.23
C.53
D.80
4. (Single Choice) Which of the following is the correct sequence about the data
encapsulation process?
[Link]->Packet->Frame->Bit->Data
[Link] ->Segment ->Packet->Frame->Data
[Link]->Packet->Segment ->Frame->Bit
[Link]->Segment->Packet->Frame->Bit
5. (Single Choice) Which of the following is the function of session layer?
[Link] encryption and decryption
[Link] data transformation and data format
[Link] connection between hosts
[Link] maintain and terminate session
6. (Single Choice) Compared with OSI reference model, which of the following is not
defined in TCP/IP protocol stack?
[Link] link layer and network layer
[Link] layer and transport layer
[Link] layer and presentation layer
[Link] layer and session layer
7. (Single Choice) RPC, NFS and SQL protocols reside at the ( ) of the OSI reference
model.
[Link] layer
[Link] layer
[Link] layer
[Link] layer
8. (Multiple Choice) According to OSI reference model, which of the following
functions belong to presentation layer? (Select 3 Answers)
[Link] encryption
[Link] compression
[Link] control
[Link] format transformation
9. (Single Choice) In the OSI reference model, one layer processes requests and
responses initiated by applications of different devices. Which of the following layers
stands for this layer?
[Link] Link Layer
[Link] Layer
[Link] Layer
[Link] Layer
10. (Single Choice) In the OSI reference model, one layer provides network services
through applications in addition to communications between different applications.
Which of the following layers
[Link] Link Layer
[Link] Layer
[Link] Layer
[Link] Layer
11. (Single Choice) Similar to the OSI reference model, the TCP/IP model also
contains several layers. How many layers does the TCP/IP model contain?
[Link]
[Link]
[Link]
[Link]
12. (Multiple Choice) Which of the following are the functions of transport layer?
(Select 4 Answers)
[Link] upper layer data
[Link] end to end connection
[Link] data from one host to another host
[Link] ordered, reliable, and correct transmission
[Link]
13. (Single Choice) According to OSI reference model, when receiver can not process
more data, which layer is responsible for sending stop message to the transmitter?
[Link] layer
[Link] layer
[Link] layer
[Link] layer
14. (Single Choice) Which protocol does an application (such as SNMP or RADIUS)
that focuses on transmission efficiency use at Transport Layer?
[Link]
[Link]
[Link]
[Link]
15. (Single Choice) Which of the following protocols provides a reliability mechanism
and can be used as a transport-level protocol?
[Link]
[Link]
[Link]
[Link]
16. (Single Choice) Which of the following protocols is a transport-level protocol
based on TCP, translates a domain name into an IP address, and manages domain
names in a distributed manner?
[Link]
[Link]
[Link]
[Link]
17. (Single Choice) Which of the following protocols is used to transfer Web pages in
the Internet?
[Link]
[Link]
[Link]
[Link]
18. (Multiple Choice) Which protocols are defined by the TCP/IP model to transmit
and receive mails? (Select 2 Answers)
[Link]
B.POP3
[Link]
[Link]
19. (Single Choice) Which of the following protocols authenticates a user remotely,
authorizes the user access, and performs charging?
[Link]
[Link]
[Link]
[Link]
20. (Multiple Choice) TCP is a connection oriented and reliable transport layer
protocol. Which of the following are used to ensure the transmission reliability?
(Select 2 Answers)
[Link]
[Link]
[Link] quench messages
[Link]
21. (Single Choice) A TCP packet consists of a maximum of 60 bytes. How many
bytes does a TCP packet header consist of after the Option field is deducted?
A.8
B.20
C.30
D.40
22. (Single Choice) The TCP protocol assigns a source port No. to each application.
How many bytes does the source port No. in the TCP packet header consist of?
A.1
B.2
C.4
D.8
23. (Multiple Choice) Which of the following fields are contained in a TCP packet
header? (Select 3 Answers)
[Link] Port
[Link] Port
[Link] Number
D.CRC32
24. (Single Choice) Which of the following ranges represents the size of a maximum
transfer unit (MTU) packet?
A.64–1518
B.60–1518
C.64–1480
D.60–1480
25. (Single Choice) The TTL field in an IP header specifies the number of routers that
a datagram is allowed to traverse. After the datagram traverses a router, the TTL value
is deducted by 1. When the TTL reaches a certain value, the datagram is discarded.
Which of the following represents this value?
[Link]
[Link]
[Link]
[Link]
[Link]
26. (Single Choice) Defragmentation can occur at either the original transmitter or an
intermediate router. Where is an IP datagram is reassembled after it is defragmented?
[Link] the process in which the packet is looped back
[Link] the next router
[Link] an intermediate router
[Link] the destination of the packet
27. (Multiple Choice) Which of the following statements about TCP connection
establishment are true? (Select 2 Answers)
A.A TCP connection is established after three-way handshake is done.
[Link]-way handshake can resolve the delay problem with packet data
transmission.
[Link] three-way handshake helps guarantee the reliability of data switching.
[Link] three-way handshake cannot guarantee the security of data switching.
28. (Single Choice) Tracert is an application based on application layer, which
transport layer protocol is used by Tracert?
[Link]
[Link]
[Link]
[Link]
29. (Single Choice) What is the main function of DNS?
[Link] Name Resolution
[Link] Access
[Link] Transfer
[Link] Transfer
30. (Single Choice) Which of the following is the default TCP port number used by
HTTP?
A.80
B.8080
C.110
D.25
31. (Single Choice) Which protocol does FTP use to provide reliable data
transmission?
[Link]
[Link]
[Link]
[Link]
32. (Single Choice) Which of the following protocols is used to send email on the
internet?
[Link]
[Link]
[Link]
[Link]
33. (Single Choice) Which TCP port number is used by SMTP by default to send e-
mail message?
A.21
B.23
C.25
D.53
34. (Single Choice) POP (Post Office Protocol) is used for receiving E-mail. Which
TCP port numbers does it use by default?
A.110
B.53
C.21
D.23

You might also like