Which protocol carries messages such as destination Unreachable, Time
Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply,
Timestamp, Information Request, Information Reply, Address Request, and
Address Reply?
* ICMP
* UDP
* TCP
* TFTP

1 Answer

Answer :

Correct answer: A
ICMP (Internet Control Message Protocol) is a network layer internet protocol
described in RFC # 792. ICMP reports IP packet information such as destination
Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo,
Echo Reply, Timestamp, Information Request, Information Reply, Address Request,
and Address Reply.

Related questions

Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP

Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : When the router runs out of buffer space, this is called ________. * Source Quench * Redirect * Information Request * Low Memory

Last Answer : Correct answer: A Source quench is the process where the destination router, or end internetworking device will “quench” the date from the “source”, or the source router. This usually happens when the destination router runs out of buffer space to process packets.

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits

Description : 7.How does traceroute work? A. It uses an ICMP destination-unreachable message to elicit the name of a router. B. It sends a specially crafted IP packet to a router to locate the number of hops from ... the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Last Answer : D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Description : Which protocol does switch use at the layer 2 for finding MAC address? a. ICMP b. UDP c. ARP d. TCP

Last Answer : c. ARP

Description : ICMP messagesare divided into two broad categories: _____________. A) query and error reporting messages B) request and response messages C) request and reply messages D) noneof the above

Last Answer : query and error reporting messages

Description : What do you mean by TCP and UDP?

Last Answer : TCP stands for Transfer control protocol and UDP stands for User Datagrams protocol and TCP is a connection-oriented protocol and UDP is a Connectionless protocol.

Description : When using access lists, what does a Cisco router check first? * To see if the packet is routable or bridgeable * The destination address * The source address * The packet contents

Last Answer : Correct answer: A The first thing checked is to see if the packet is routable or bridgeable. If it is not, the packet will be dropped.

Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP

Last Answer : C. port

Description : ICMP (Internet Control Message Protocol) is A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... to monitor computers D. a protocol that handles error andcontrol messages E. None of the above

Last Answer : a protocol that handles error andcontrol messages

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP) iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration Protocol (DHCP) v) ... C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : In the TCP/IP protocol suite, which one of the following is NOT part of the IP header? a. Fragment Offset b. Source IP address c. Destination IP address d. Destination port number

Last Answer : d. Destination port number

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Which protocol does hackers use to make their system seems as your system or another allowed host on your network? a. SNMP protocol b. TCP protocol c. ARP protocol d. ICMP protocol

Last Answer : c. ARP protocol

Description : HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... used to monitor computers D. a protocol that handles error andcontrol messages E. None of the above

Last Answer : a protocol used to monitor computers

Description : Which processes does TCP, but not UDP, use? a. Windowing b. Acknowledgements c. Both a and b d. Destination Port

Last Answer : c. Both a and b

Description : Explain the different Layers of TCP/IP Model.

Last Answer : Application Layer, Transport Layer, Network or Internet Layer, Network interface layer.

Description : What do you mean by the TCP/IP Model?

Last Answer : TCP/IP stands for Transmission control protocol and Internet protocol. It describes how the data will get transmitted and routed from end to end communication. 

Description : When you join a new " social networking site " that is asking for your home address before you can become a member, how can you be sure this information will not be used inappropriatly?

Last Answer : Here's one option: When this happens, open a new tab and do a google search with the following. Type the name of the site in question and then type the word review after it (e.g mastersofhearts.com review) ... your gut likes the most. A review will, of course, tell you if the site is legit or not.

Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25

Last Answer : b. TCP, 80

Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP

Last Answer : c. TCP

Description : State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new transport protocol at the same layer as TCP and ... , 3. false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : D. 1.false, 2. true, 3. true

Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server

Last Answer : A. electronic mail, server (storage)

Description : Which is a link layer protocol? a) ARP b) TCP c) UDP d) HTTP

Last Answer : b) TCP

Description : Which protocol is used to link all the devices in the IoT? A. TCP/IP B. Network C. UDP D. HTTP

Last Answer : A. TCP/IP 

Description : What are the key elements of the protocol?

Last Answer : There are three key elements of the protocol: Syntax: Describe the format of the data. Semantics: Describes the meaning of each section. Timings: Explain the timing that how fast the data can be sent.

Description : What do you mean by SLIP protocol?

Last Answer : SLIP stands for Serial Line Interface Protocol. It is used for sending IP datagram over a network in a single line.

Description : How many access lists are allowed per interface? * One per port, per protocol * Two per port, per protocol * Unlimited * Router interface +1 per port.

Last Answer : Correct answer: A Only one access list is allowed per interface. An access list must have conditions that test true for all packets that use the access list.

Description : Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Last Answer : OSI Layers Physical layer: ensures a safe and efficient travel of data; consists of electronic circuits for data transmission etc. Data link layer: in charge of data encapsulation ... mails. -SNMP (Simple Network Management Protocol) allows the management of the network. 

Description : ………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : ........ is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : D) Internet Control Message Protocol (ICMP)

Description : ........... is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address? * RARP * ARP * RIP * IGRP

Last Answer : Correct answer: A ARP (Address Resolution Protocol) maps an IP address to the MAC address, RARP (Reverse Address Resolution Protocol) maps the MAC address to the IP address. ARP and RARP work at the internet layer of the Internet Model or the network layer of the OSI model.

Description : Which IP Address Class can have 16 million subnets but support 254 hosts? * Class C * Class A * Class B * Class D

Last Answer : Correct answer: A Possible Subnets IP Address Class Possible Hosts

Description : Which IP Address Class is INCORRECTLY paired with its range of network numbers? * Class A addresses include 192.0.0.0 through 223.255.255.0 * Class A addresses include 1.0.0.0 through 126.0.0.0 * Class B ... 192.0.0.0 through 223.255.255.0 * Class D addresses include 224.0.0.0 through 239.255.255.0

Last Answer : 1

Description : You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary? * 10101100 00010000 * 00000010 10100000 * 10101100 00000000 * 11100000 11110000

Last Answer : Correct answer: A To find the network address, convert the IP address to binary-10101100 000100000 00000010 10100000-then ANDed it with the subnet mask-11111111 11111111 00000000 00000000. The rest is ... that the class of an address can be determined by the numerical value of the first octet

Description : Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many hosts are available? * 254 * 510 * 126 * 16,372

Last Answer : 254

Description : You have an IP host address of 201.222.5.121 and a subnet mask of 255.255.255.248. What is the broadcast address? * 201.222.5.127 * 201.222.5.120 * 201.222.5.121 * 201.222.5.122

Last Answer : Correct answer: A The easiest way to calculate this is to subtract 255.255.255.248 (subnet mask) from 255.255.255.255, this equals 7. Convert the address 201.222.5.121 to binary- ... mask 255.255.255.248 to binary-11111111 11111111 11111111 11111000. AND them together to get: 11001001 1101111

Description : You are given the following address: 15.16.193.6/21. Determine the subnet mask, address class, subnet address, and broadcast address. * 255.255.248.0, A, 15.16.192.0, 15.16.199.255 * 255.255.248.0, B, 15.16.192.0, ... 0, A, 15.16.199.255, 14.15.192.0 * 255.255.242.0, A, 15.16.192.0, 15.16.199.255

Last Answer : Correct answer: A,B & D Subnet addresses in this situation are all in multiples of 8. In this example, 201.222.5.16 is the subnet, 201.22.5.31 is the broadcast address. The rest are valid host IDs on subnet 201.222.5.16.

Description : You are given the following address: 128.16.32.13/30. Determine the subnet mask, address class, subnet address, and broadcast address. * 255.255.255.252, B,128.16.32.12, 128.16.32.15 * 255.255.255.252, C,128.16.32.12 ... , B,128.16.32.15, 128.16.32.12 * 255.255.255.248, B,128.16.32.12, 128.16.32.15

Last Answer : Correct answer: A * 255.255.255.248,

Description : You are given the following address: 153.50.6.27/25. Determine the subnet mask, address class, subnet address, and broadcast address. * 255.255.255.128, B,153.50.6.0, 153.50.6.127 * 255.255.255.128, C,153.50.6.0, 153 ... .128, C,153.50.6.127, 153.50.6.0 * 255.255.255.224, C,153.50.6.0, 153.50.6.127

Last Answer : Correct answer: A 255.255.255.224,

Description : When configuring the subnet mask for an IP address, which formats can be used? * dotted-decimal. * Hexadecimal * Bit-count * Octal * Binary

Last Answer : Correct answer: A, B &C

Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above

Last Answer : SMTP

Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?  (a) FTP (b) SNMP (c) SMTP (d) RPC

Last Answer : SMTP is used for transferring electronic mail messages from one machine to another.

Description : Windows explorer is not working , what might be the problem and how you will fix?

Last Answer : If The successful login is not letting the administrator to enter into the starting screen , then there will be missing of the browseui.dll,that file should be reinstalled to get the windows explorer working back.