Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESEFinal Xarxes

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
Final Xarxes

Descripción:
Examen Final Networks

Autor:
Edu
(Otros tests del mismo autor)

Fecha de Creación:
25/06/2022

Categoría:
Personal

Número preguntas: 56
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
VLAN Stacking, also known as QinQ, allows to: a. Stack different switches, so they act as a single logical switch b. Extend the VLAN Trunking (802.1Q) by increasing the Tag Protocol Identifier (TPID) from 2 byte to 4 byte c. Extend the VLAN Trunking (802.1Q) by increasing the VLAN ID from 12-bit long to 48-bit long d. Stack the VLAN tags, supporting multiple tagging.
Tell what it is false about TLS/SSL: a. Both TLS and SSL are security protocols. TLS is the newer version of SSL b. TLS/SSL can work over IP networks c. Use X.509 Certificates d. It is a layer 3 protocol.
What it is false about VxLAN Tunnelization protocol? a. It is a tunnel encapsulation to provide L2 overlay networks over L3 networks b. VxLAN stands for Virtual eXtensible LAN c. It is a tunnel encapsulation to provide L4 overlay networks over L3 networks d. Uses UDP.
Which of the followings is the technique used to decide where the content should be placed? a. Consistent hashing b. Latency c. Cost-matrix d. Network topology.
Indicate the main reason why operator companies use a CDN a. To reduce latency with the users b. To store content into cache servers c. All of them d. To reduce bandwidth cost in their networks.
Given the following code, tell what is true about it: a. This code is part of a RyU script to configure an SDN controller named GNS3 b. This code is a section of an ovf Description File describing a VM named GNS3 c. This code is a Dockerfile to create a GNS3 Docker container d. This code is a section of a vmdk file of a VM named GNS3.
Which are the main protocols used to configure the LSP paths in an MPLS network: a. Label Distribution Protocol (LDP) and Resource Reservation Protocol with Traffic Engineering (RSVP-TE) b. Label Distribution Protocol (LDP) and Open Shortest Path First (OSPF) c. Resource Reservation Protocol with Traffic Engineering (RSVP-TE) and Open Shortest Path First (OSPF) d. Multicast Label Assignment Protocol (MuLa Protocol) and Multiple Path Protocol (MuPa Protocol).
What is true about Docker container: a. Containerized software depends on the underlying infrastructure b. Docker containers achieve a level of isolation and virtualization which is considered heavy weight. c. Docker images become containers at runtime d. Docker containers become images at runtime.
Indicate what is false about the ports when using VLANs: a. An Access port manageds untagged frames b. A Trunking port manages multiple VLANs c. An Access Port can manage multiple VLANs d. A Trunking port manages tagged frames.
Using MiniEdit we have created the following network. In order to configure properly this network, an assignment of an IP address and network mask must be done in the different interfaces of r1 and r2. Indicate which one of the following possibilities is valid for r1: a. r1.cmd('ifconfig r1-eth0 192.168.1.1 netmask 255.255.255.0 up') r1.cmd('ifconfig r1-eth1 10.10.10.1 netmask 255.255.255.252 up') b. r1.cmd('ifconfig r1-eth0 10.10.10.1 netmask 255.255.255.0 up') r1.cmd('ifconfig r1-eth1 10.10.10.1 netmask 255.255.255.252 up') c. r1.cmd('ifconfig r1-eth0 10.10.10.1 netmask 255.255.255.252 up') r1.cmd('ifconfig r1-eth1 192.168.1.1 netmask 255.255.255.0 up') d. r1.cmd('ifconfig r1-eth0 192.168.1.1 netmask 255.255.255.252 up') r1.cmd('ifconfig r1-eth1 10.10.10.1 netmask 255.255.255.252 up').
Relationship between PoP and cache server a. None of them b. PoP delivers the content from the cache server to the users c. PoP and cache server are the same concept with different name d. PoP is a data center where cache servers are located.
Which are the elements which limit the network capacity: a. The Channel Bandwidth (Hz), the Signal/Noise ratio and the refractive index of channe b. Both Channel Bandwidth (Hz) and Signal/Noise ratio c. Only the Signal/Noise ratio d. Only the Channel Bandwidth (Hz).
The following network topology has the address 172.10.0.0/20, which of the following IP addresses is valid for the host h1: a. 172.10.15.5 b. 192.10.15.5 c. 172.10.25.5 d. 172.15.25.5.
To setup a UDP session, it is required: a. To perform a four-way handshaking process b. To perform a three-way handshaking process c. Nothing. No handshaking is required d. To perform a two-way handshaking process.
The Open Systems Interconnection model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology, and it is built with: a. Five layers, which are Data Link, Network, Transport, Security and Application b. Seven layers, which are Physical, Data Link, Network, Transport, Security, Domain and Application c. Seven layers, which are Physical, Data Link, Network, Transport, Session, Presentation and Application d. Two layers: Network layer and Application layer.
Link Aggregation Group is NOT used to: a. Keep connectivity between hosts in case of partial link failure b. Avoid infinitive L2 loops in path redundancy d. Provide multiple links between two nodes to support more throughput d. Two layers: Network layer and Application layer.
Say what is true about TCP protocol: a. It is connection oriented. b. It does not provide ordered and reliable transfer of data across network c. It is never used together with IP d. It is connectionless oriented.
Select the protocol that can be used to configure the LSP paths in a MPLS network: a. Label Distribution Protocol (LDP) b. Multiple Path Protocol (MuPa Protocol) c. Open Shortest Path First (OSPF) d. Multicast Label Assignment Protocol (MuLa Protocol).
The Open Systems Interconnection model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology, and it is built with: a. Seven layers, which are Physical, Data Link, Network, Transport, Session, Presentation and Application b. Five layers, which are Data Link, Network, Transport, Security and Application c. Two layers: Network layer and Application layer d. Seven layers, which are Physical, Data Link, Network, Transport, Security, Domain and Application.
Say what it is true about UDP protocol: a. It is connection oriented. b. It is a layer 4 protocol c. It provides ordered and reliable transfer of data across network d. It is used for internet applications such as Telnet or FTP.
The following network topology has the address 172.10.0.0/16, which of the following IP addresses is not valid for the host h1: a. 172.10.25.5 b. 172.10.15.5 c. 172.15.25.5 d. 172.10.1.5.
Mark which one of these statements is true about the VLANs: a. Different VLANs belong to the same Broadcast Domain b. VLANs are identified with a MAC Address c. VLANs only work with TCP transport d. Hosts in different VLANs need to go through a L3 router to communicate.
Spanning Tree Protocol is used: a. To provide connectionless oriented data transport b. To build the Forwarding Information Base in routers, so they are able to properly route the IP packets c. To resolve Ethernet MAC address for a given IP Address d. To avoid infinite L2 loops in path redundancy by blocking selectively ports.
Using MiniEdit we have created the following network. Indicate a valid IP address assignment for the different subnets A, B, C, D and E: a. A: 192.168.1.0/24 B: 192.168.3.0/30 C: 192.168.2.0/30 D: 192.168.3.0/24 E: 192.168.2.0/24 b. A: 192.168.1.0/30 B: 10.10.10.0/30 C: 10.10.20.0/30 D: 192.168.3.0/30 c. A: 192.168.1.0/24 B: 10.10.10.0/30 C: 10.10.20.0/30 D: 192.168.3.0/24 E: 192.168.2.0/24 d. A: 192.168.1.0/24 B: 10.10.10.0/30 C: 10.10.10.0/28 D: 192.168.3.0/24 E: 192.168.2.0/24.
Tell what it is false for an Ethernet MAC address: a. It is format is 48-bit expressed as 6 numbers b. There are two formats: 48-bit for IPv4 devices and 128-bit for IPv6 devices c. It has two parts: Organization Unit Identifier (OUI) and Device Identifier d. MAC addresses are physically attached to the device .
VxLAN Tunnelization it is an SDN protocol which: a. It is a tunnel encapsulation to provide L2 overlay networks over L3 networkss b. Uses TCP c. It is a control protocol between SDN Controller and the virtual Switches to provide tunnel encapsulation d. It is a routing protocol .
In Virtual Private Networks, which is false: a. They are used by remote users and branch offices to access corporate applications and resources. b. VPNs are supported only with MPLS tunnelization c. To ensure security VPN connections are established using an encrypted layered tunneling protocol d. VPN users typically use authentication methods.
What are the main cloud computing models? a. Infrastructure as a Service, Virtualization as a Service and Software as a Service b. Infrastructure as a Service, Platform as a Service and Software as a Service c. Computing as a Service, Storage a Service and Networking as a Service d. Infrastructure as a Service, Networking as a Service and Software as a Service.
What is false about Docker container: a. Docker is an open platform for developing, shipping, and running applications b. Docker containers become images at runtime c. Docker images become containers at runtime d. Containerized software will always run the same, regardless of the infrastructure.
Mark what it is false about vSwitches: a. vSwitches are at hypervisor level b. vSwitches only provide inter-VM communications within the same server c. vSwitches can provide one or more vNICs for each VM d. OVS is a standard vSwitch which can be used by any linux-based hypervisor.
Indicate the main components of a CDN a. PoP, cache server, network topology b. Webpages, videos, servers c. Selector, PoP, cache server d. Selector, cache server, network topology.
Indicate the main reason why operator companies use a CDN a. To reduce latency with the users b. To reduce bandwidth cost in its network c. To store content into cache servers d. All of them.
To setup a UDP session, it is required: a. To perform a two-way handshaking process b. To perform a three-way handshaking process c. All other options are incorrect d. To perform a four-way handshaking process.
What is true about MPLS? a. MPLS stands for Massive Protocol Low Service b. MPLS provides connection-oriented paths over connectionless IP networks c. MPLS cannot transport any payload type d. MPLS provides connection-oriented paths over connection-oriented IP networks.
VLAN Stacking, also known as QinQ, allows to: a. Stack different switches, so they act as one logical switch b. Extends the VLAN Trunking (802.1Q) by increasing the VLAN ID from 12-bit long to 48-bit long c. Stack the VLAN tags, supporting multiple tagging d. Extend the VLAN Trunking (802.1Q) by increasing the Tag Protocol Identifier (TPID) from 2 byte to 4 byte.
What it is false about VxLAN Tunnelization protocol? a. Uses UDP b. It is a tunnel encapsulation to provide L4 overlay networks over L3 networks c. VxLAN stands for Virtual eXtensible LAN d. It is a tunnel encapsulation to provide L2 overlay networks over L3 networks.
Consider the following network where its subnets 10.10.1.0/24, 10.10.2.0/24 and 10.10.3.0 a. Network Next Hop Metric 10.10.1.0/24 Direct 0 172.10.10.0/30 Direct 0 172.10.10.8/30 Direct 0 10.10.2.0/24 ToR3 301 172.10.10.4/30 ToR3 200 10.10.3.0/24 ToR3 201 b. Network Next Hop Metric 10.10.1.0/24 Direct 0 172.10.10.0/30 Direct 0 172.10.10.8/30 Direct 0 10.10.2.0/24 ToR2 51 172.10.10.4/30 ToR3 200 10.10.3.0/24 ToR3 201 c. Network Next Hop Metric 10.10.1.0/24 Direct 0 172.10.10.0/30 Direct 0 172.10.10.8/30 Direct 0 10.10.2.0/24 ToR3 300 172.10.10.4/30 ToR2 50 10.10.3.0/24 ToR2 150 d. Network Next Hop Metric 10.10.1.0/24 Direct 0 172.10.10.0/30 Direct 0 172.10.10.8/30 Direct 0 10.10.2.0/24 ToR2 51 172.10.10.4/30 ToR2 150 10.10.3.0/24 ToR2 151.
Link Aggregation Group is NOT used to: a. To keep connectivity between hosts in case of partial link failure b. Provide multiple links between two nodes to support more throughput c. Provides multiple links between two nodes with same characteristics (full duplex, same speed) d. Interchange routing information among the routers to set the Least Cost Path.
Which are the L2 VPN services offered by a Service Provider to enterprises and businesses: a. Virtual Private Wire Service (VPWS) and Virtual Private Routing Service (VPRN) b. Virtual Private LAN Service (VPLS) and Virtual Private Routing Service (VPRN) c. Virtual Private Wire Service (VPWS) and Virtual Private LAN Service (VPLS) and Virtual Private Routing Service (VPRN) d. Virtual Private Wire Service (VPWS) and Virtual Private LAN Service (VPLS).
Given the following code, tell what it is false about it: a. This code is a section of an ovf Description File b. This code describes a VM named GNS3 c. This code indicates the GNS3 VM image has an Ubuntu 64bit Operating System d. This code is a Dockefile to create a GNS3 Docker container.
Mark what is false about the following Openflow message: a. It corresponds to a FlowMod message sent from the RyU Controller towards the Switch b. It configures a new Flow in the Switch to set Ethernet interface port 2 as the one to use in sending frames to Ethernet MAC address 9a:1f:5a:f0:0c:3c c. It is a Openflow message version 1.0 d. It configures a new Flow in the Switch to set Ethernet interface port 0 as the one to use in sending frames to Ethernet MAC address 9a:1f:5a:f0:0c:3c.
Given the following network, indicate what it is true about these sentences: a. Switch 1 and Switch 2 must be connected with a Trunking Port b. Host 1 and Switch 1 must be connected with a Trunking Port c. Switch 1 and Switch 2 must be connected with an Access Port d. This network cannot work because a router is mandatory.
The main difference between a Symmetric Encryption and Asymmetric Encryption is: a. Symmetric Encryption uses the same key at both end peers whereas Asymmetric Encryption uses two keys at both ends. b. Asymmetric Encryption uses the same key at both end peers whereas Symmetric Encryption uses two keys at both ends c. Both Asymmetric Encryption and Symmetric Encryption uses two keys at both ends but in Asymmetric Encryption sending peer is the master and receiving peer is the slave d. Both Asymmetric Encryption and Symmetric Encryption uses two keys at both ends but in Asymmetric Encryption receiving peer is the master and sending peer is the slave.
Tell what it is true about IPSec: a. It has two modes: Transport mode and Tunnel model b. It is a layer 2 protocol c. It has two modes: Transport mode and Datagram model d. It is a layer 4 protocol.
Tell what it is false about Network Topologies: a. Ring topology provides no redundancy b. Point-To-Point topology is the simplest one, using a dedicated link between two end points c. Tree topology is hierarchical d. Bus topologies are subject to interference.
Latency in communications is relevant because: a. It measures the time it takes data to get to its destination across the network, and the its answer go back to the origin. Therefore, the smaller it is, the better. b. It measures the channel capacity c. It measures the time it takes data to get to its destination across the network, and the its answer go back to the origin. Therefore, the bigger it is, the better. d. It measures the Signal/Noise ratio.
Using the Mininet we have created the following network. a. curl -X POST -d '{"address":"192.168.1.2/24"}' http://localhost:8080/router/0000000000000001 curl -X POST -d '{"address":"10.0.1.1/30"}' http://localhost:8080/router/0000000000000001 b. curl -X POST -d '{"address":"192.168.1.1/24"}' http://localhost:8080/router/0000000000000001 curl -X POST -d '{"address":"10.0.1.1/30"}' http://localhost:8080/router/0000000000000001 c. curl -X POST -d '{"address":"192.168.1.1/24"}' http://localhost:8080/router/0000000000000001 curl -X POST -d '{"address":"10.0.1.2/30"}' http://localhost:8080/router/0000000000000001 d. curl -X POST -d '{"address":"192.168.1.2/24"}' http://localhost:8080/router/0000000000000001 curl -X POST -d '{"address":"10.0.1.2/30"}' http://localhost:8080/router/0000000000000001.
Tell what it is true about this Mininet python code: a. It creates a simple mininet topology consisting of 2 switchs and 4 hosts b. It creates a simple mininet topology consisting of 4 switchs and 1 host c. It creates a simple mininet topology consisting of 1 switch and 4 hosts d. It creates a simple mininet topology consisting of 4 switchs and 2 hosts.
Tell what it is false about this Wireshark capture: a. It is a ping of host 10.0.0.2 to host 10.0.0.5 b. It is an Ethernet 802.3 frame c. It uses a VLAN with VLAN ID 100 d. Source MAC address is de:df:d9:ee:17:0b.
Tell what it is false about DHCP Snooping: a. DHCP Snooping is configured in switches. b. With DHCP Snooping we set the trusted ports in a switch c. DHCP Snooping prevents unauthorized DHCP servers offering IP addresses to DHCP clients d. DHCP Snooping encrypts DHCP traffic between DHCP servers and DHCP clients.
Tell what is true about what by the enterprise IT team can do to avoid DHCP hacker attacks with the deployment of malicious DHCP Server: a. Configure DHCP Snooping in the enterprise PCs b. Configure DHCP Snooping in the enterprise switches c. Configure DHCP Mirroring in the enterprise switches d. Do not use DHCP.
Consider this internet connection done with a Smartphone in a typical, domestic home WiFi network. Tell what is NOT POSSIBLE among the following options: a. IP packets received in the Web Server will have the sending IP address 192.168.1.33 of the Smartphone b. WLAN subnet is 192.168.1.0/24 c. Wireless Router (HGW) does a NAT d. Wireless Router (HGW) has a Public IP Address in the Internet Service Provider (ISP) subnet 83.40.0.0/14.
Using Packet Tracer, we have created the following redundant topology with three switches and activated the Spanning Tree Protocol. a. Port Fa0/2 is Root Port b. Switch 2 has a port blocked c. Switch 2 is the Root Bridge d. Cost to reach the Root Bridge is 19.
Tell what is false about the execution and results of the following command of the Easy-RSA utility: root@ax-openvpn:/etc/openvpn/easy-rsa# ./build-key client a. It generates a Client Private Key (client.key) b. It generates a Client Certificate (client.crt) which includes the Public Client Key c. It sends a Client Certificate Request (client.csr) to the Certification Authority d. It changes the status of a Client to become a PKI Certification Authority instance.
Which are the elements which limit the network capacity: a. Both Channel Bandwidth (Hz) and Signal/Noise ratio b. Only the Signal/Noise ratio c. Only the Channel Bandwidth (Hz) d. The Channel Bandwidth (Hz), the Signal/Noise ratio and the refractive index of channel.
Diffie-Hellman Key Exchange is: a. A protocol to securely exchange cryptographic keys only over a private & secured channel b. A protocol used by OSPF to encrypt Openflow messages. c. A protocol used by RIP to encrypt Openflow messages d. A protocol to securely exchange cryptographic keys over a public, non-secured channel.
Denunciar test Consentimiento Condiciones de uso