Where would network testing be included in an IP packet?
* IP Options field
* Identification field
* Type of Service field
* Reservation field

1 Answer

Answer :

Correct answer: A
The following are the fields in an IP segment, their length, and their definitions:
VERS (Version number - 16 bits)
HLEN (Number of 32-bit words in the header - 4 bits)
Type of Server (How the datagram should be handled - 32 bits)
Total Length (Total length of header and data - 32 bits)
Identification (Provide fragmentation of datagrams to allow different MTUs in the
internet - 4 bits)
Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4
bits)
Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the
internet - 6 bits)
TTL (Time-To-Live - 6 bits)
Protocol (Upper layer protocol sending the datagram - 16 bits)
Header Checksum )Integrity check on the header - 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others - 4 bits)
Data (4 bits).

Related questions

Description : What field tells the Internet layer how to handle an IP packet? * Type of Service * IdentificationFlags * Frag Offset

Last Answer : Correct answer: A The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type of ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? * Identification * Flags * Frag Offset * Type of Service * Total Length

Last Answer : Correct answer: A, B & C The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) ... Address (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP

Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : How do I determine which, if any, static IP addresses are being used on my home WiFi network?

Last Answer : Check the status page of your Router setup.

Description : Which IP Address Class is INCORRECTLY paired with its range of network numbers? * Class A addresses include 192.0.0.0 through 223.255.255.0 * Class A addresses include 1.0.0.0 through 126.0.0.0 * Class B ... 192.0.0.0 through 223.255.255.0 * Class D addresses include 224.0.0.0 through 239.255.255.0

Last Answer : 1

Description : You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary? * 10101100 00010000 * 00000010 10100000 * 10101100 00000000 * 11100000 11110000

Last Answer : Correct answer: A To find the network address, convert the IP address to binary-10101100 000100000 00000010 10100000-then ANDed it with the subnet mask-11111111 11111111 00000000 00000000. The rest is ... that the class of an address can be determined by the numerical value of the first octet

Description : What's a good packet sniffer for OS X?

Last Answer : answer:Here are some that I really like: Eavesdrop: http://www.baurhome.net/software/eavesdrop/ Ettercap: http://ettercap.sourceforge.net/ KisMAC: http://kismac.macpirate.ch/about.php I still have yet to find a remarkably fast packet sniffer, but these are certainly satisfactory.

Description : When using access lists, what does a Cisco router check first? * To see if the packet is routable or bridgeable * The destination address * The source address * The packet contents

Last Answer : Correct answer: A The first thing checked is to see if the packet is routable or bridgeable. If it is not, the packet will be dropped.

Description : What are the two types of access lists that can be configured on a Cisco router? * Standard * Extended * Filtering * Packet

Last Answer : Correct answer: A & B The access lists are standard and extended. Standard access lists for IP check the source address of packets that could be routed. Extended access lists can check the source and destination packet plus check for specific protocols, port numbers, etc

Description : "Local area connection doesn't have a valid IP configuration" on Windows 7; Why?

Last Answer : Have you tried disabling and enabling the LAN connection in control panel > network connections? This is the first thing I would try. Then if that doesn’t work it might be a faulty Ethernet cable. Lastly, the drivers you are using for you NIC card might be incorrect since you let windows pick them.

Description : Explain the different Layers of TCP/IP Model.

Last Answer : Application Layer, Transport Layer, Network or Internet Layer, Network interface layer.

Description : What do you mean by the TCP/IP Model?

Last Answer : TCP/IP stands for Transmission control protocol and Internet protocol. It describes how the data will get transmitted and routed from end to end communication. 

Description : There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address? * RARP * ARP * RIP * IGRP

Last Answer : Correct answer: A ARP (Address Resolution Protocol) maps an IP address to the MAC address, RARP (Reverse Address Resolution Protocol) maps the MAC address to the IP address. ARP and RARP work at the internet layer of the Internet Model or the network layer of the OSI model.

Description : Which IP Address Class can have 16 million subnets but support 254 hosts? * Class C * Class A * Class B * Class D

Last Answer : Correct answer: A Possible Subnets IP Address Class Possible Hosts

Description : You have an IP host address of 201.222.5.121 and a subnet mask of 255.255.255.248. What is the broadcast address? * 201.222.5.127 * 201.222.5.120 * 201.222.5.121 * 201.222.5.122

Last Answer : Correct answer: A The easiest way to calculate this is to subtract 255.255.255.248 (subnet mask) from 255.255.255.255, this equals 7. Convert the address 201.222.5.121 to binary- ... mask 255.255.255.248 to binary-11111111 11111111 11111111 11111000. AND them together to get: 11001001 1101111

Description : When configuring the subnet mask for an IP address, which formats can be used? * dotted-decimal. * Hexadecimal * Bit-count * Octal * Binary

Last Answer : Correct answer: A, B &C

Description : What's going on with my home network/phone lines?

Last Answer : I would borrow or purchase a telco toner generator . I bought the toner generator and the wand for like $40 at home depot. You plug the telephone jack into any phone or network port ... tell what is really connected to what. This method would probably be more accurate than using two Macbooks.

Description : Messy network cables?

Last Answer : Not for ethernet. The only standards I've seen that are still deployed are for fiber jumpers, where multimode is orange and single mode is yellow. There are different ends for fiber optic jumpers as well, they are ... standard and is just what we've done in one place to keep a grasp on what's what.

Description : In what ways have you used your (social) network to accomplish a task that normally wouldn't have been possible?

Last Answer : I used it to advertise this video. http://www.youtube.com/watch?v=yiqkrz83fos

Description : if i get a network hard drive will i be able to access it from anywhere?

Last Answer : answer:OS X Leopard will add easier networking and backup options, and if you get a new AirPort Extreme Base Station, your external hard drive can be attached to it and becomes a part of your network. Those items will be my next big Apple purchase, probably in the early part of next year. :)

Description : How do I hook up Xbox Live to a wired network?

Last Answer : I am pretty sure you just plug the Ethernet wire from your Xbox to your router. Then it should connect to the internet.

Description : Using MacBook Pro as Network Bridge?

Last Answer : answer:If you have cable/dsl or any other high speed internet connection, I would suggest installing a router and just plugging your macbook and your 360 into the built in switch. Using the bridging method will add more headache than the money you’d save on a router/switch solution.

Description : What is the maximum segment length of a 100Base-FX network?

Last Answer : The maximum segment length will be 412 meters. 

Description : What is the role of IEEE in the world of computer network?

Last Answer : IEEE full form is the Institute of Electrical and electronic Engineer which is used to define and develop the standards which will be used over the network.

Description : What are the types of mode available in Network? 

Last Answer : Data transferring mode in a computer network will be of three types: Simplex, Half-Duplex and Full Duplex.

Description : What do you mean by Network Topology?

Last Answer : A network topology is a physical structure of the network which defines how the computers or node will be connected to each other.

Description : What do you mean by Network?

Last Answer : Set of devices connected to each other over the physical medium is known as a computer network. For example the Internet.

Description : is another kind of fiber optic network with active star for switching. A) S/NET B) SW/NET C) NET/SW D) FS/NET

Last Answer : A) S/NET

Description : . A network that needs human beings to manually route signals is called.... A) Fiber Optic Network B) Bus Network C) T-switched network D) Ring network

Last Answer : C) T-switched network

Description : Which of the following are the network services?

Last Answer : All of the above

Description : 1. The computer network is

Last Answer : C) Both of the above

Description : Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Last Answer : OSI Layers Physical layer: ensures a safe and efficient travel of data; consists of electronic circuits for data transmission etc. Data link layer: in charge of data encapsulation ... mails. -SNMP (Simple Network Management Protocol) allows the management of the network. 

Description : Which field is used to define the user’s default shell?

Last Answer : command-The last field, called either command or login command, is used to specify what shell the user will use when he logs in.

Description : Which of the following is an application layer service?

Last Answer : C) Mail service

Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : the IP address of therouter found inthe routing table

Description : In _______delivery, both thedeliverer of the IP packet and the destination are on the same network. A) aconnectionless B) a direct C) an indirect D) none of the above

Last Answer : a direct

Description : When you ping theloopback address,a packet is sent where? A. On the network B. Down through thelayers of the IP architecture and then up thelayers again C. Across the wire D. through the loopback dongle E. None of the above

Last Answer : Down through thelayers of the IP architecture and then up thelayers again

Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way

Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way

Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These

Last Answer : a) Internet Control Message Protocol

Description : 7.How does traceroute work? A. It uses an ICMP destination-unreachable message to elicit the name of a router. B. It sends a specially crafted IP packet to a router to locate the number of hops from ... the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Last Answer : D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Description : A packet whose destination is outside the local TCP/IP network segment is sent to .............. (1) File server (2) DNS server (3) DHCP server (4) Default gateway

Last Answer : Answer: 4 

Description : FDDI used which type of physical topology?

Last Answer : B) Ring

Description : The function of IP adress is …………………………………………. A. host identification B. network interface identification C. location addressing D. all of the above

Last Answer : D. all of the above

Description : An IP address serves which among the following principal functions: a) Host or network interface identification b) Location Addressing c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : An IP address serves which among the following principal functions: a) Host or network interface identification b) Location Addressing c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : The IP packet that carries an IGMP packet has a value of _______ in its protocol field. A) 3 B) 2 C) 1 D) noneof the above

Last Answer : 2

Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields

Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token