Computer Networks Quiz Compilation Weeks 10-15

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/30

flashcard set

Earn XP

Description and Tags

This flashcard set covers key concepts and questions from the Computer Networks lectures spanning weeks 10 to 15, including topics related to data planes, routing, network security, and various protocols.

Last updated 4:22 AM on 12/8/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

31 Terms

1
New cards

What is the main function of the data plane of the network layer?

Move packets from router inputs to appropriate outputs.

2
New cards

Given the following forwarding table, what is the outgoing link interface for the destination address 11001000 00010111 00011000 10101010?

1.

3
New cards

If a packet needs to be sent to every host in the network, which transmission mode should be used?

Broadcast.

4
New cards

In the subnet 1.2.3.4/24, how many IP addresses are available?

256.

5
New cards

Which header field cannot be used to define a pattern in OpenFlow?

Destination domain name.

6
New cards

In the abstraction of a network, how are routers and links represented?

Routers as vertices and links as edges.

7
New cards

What is not a good choice for the cost of a link in network representation?

Type of transmission media.

8
New cards

What is the updated value for D(d) after adding c to N' using Dijkstra's algorithm?

17.

9
New cards

What is node a's distance to e after updating its distance vector from node b and d?

60.

10
New cards

What is not a reason for hierarchical routing?

To find shorter paths.

11
New cards

What is the standard inter-AS routing protocol in the Internet?

BGP.

12
New cards

What is not an advantage of SDN?

Scalable routing.

13
New cards

What protocol does the router use to send an error notification back to the source when the TTL value is decremented to zero?

ICMP

14
New cards

Which service is not provided by the link layer?

Forwarding.

15
New cards

How many bits of transmission errors can be detected by CRC using a 4-bit generator?

3.

16
New cards

Does CSMA (Carrier sensing multiple access) completely eliminate collisions?

False.

17
New cards

What protocol is used to translate an IP address to a MAC address?

ARP.

18
New cards

What is the destination MAC address when A sends a packet to B and the frame is transmitted between A and R?

E6-E9-00-17-BB-4B.

19
New cards

Which of the following is not a feature of Ethernet?

Collision avoidance.

20
New cards

What does the Ethernet switch do if the destination MAC address is not in the switch table?

Broadcast packet.

21
New cards

What is not a reason to set up a VLAN?

Insufficient bandwidth.

22
New cards

What is the name of the security requirement to ensure messages are not altered without detection?

Message integrity.

23
New cards

How many possible keys does the monoalphabetic cipher have?

26!.

24
New cards

Which of the following is not a feature of RSA?

Faster than symmetric key cryptography.

25
New cards

What is the number called that is used only once to prevent replay attacks in authentication protocols?

Nonce.

26
New cards

What is not true about hash functions?

It is impossible to find two inputs that will generate the same output.

27
New cards

Which key should Alice use to generate her signature when sending a secure email to Bob with PGP?

Alice's private key.

28
New cards

Which of the following protocols cannot be protected by SSL/TLS?

ICMP.

29
New cards

What is the destination IP address after R1 finishes processing the packet and forwards it to the next hop in the IPsec tunnel mode?

193.68.2.23.

30
New cards

What security hole was introduced by the stream cipher RC4 used in WEP?

RC4 encrypts the message a byte at a time.

31
New cards

What threat cannot be prevented by the firewall at a company’s main router?

An employee tries to access unauthorized data on the file server from his/her office desktop.