Student Edition | Instructor Edition | Information Center | Home
TCP/IP Protocol Suite, 3/e
Student Edition
PowerPoint Present...
Animations
Solutions
Chapter 1 Quiz
Chapter 2 Quiz
Chapter 3 Quiz
Chapter 4 Quiz
Chapter 5 Quiz
Chapter 6 Quiz
Chapter 7 Quiz
Chapter 8 Quiz
Chapter 9 Quiz
Chapter 10 Quiz
Chapter 11 Quiz
Chapter 12 Quiz
Chapter 13 Quiz
Chapter 14 Quiz
Chapter 15 Quiz
Chapter 16 Quiz
Chapter 17 Quiz
Chapter 18 Quiz
Chapter 19 Quiz
Chapter 20 Quiz
Chapter 21 Quiz
Chapter 22 Quiz
Chapter 23 Quiz
Chapter 24 Quiz
Chapter 25 Quiz
Chapter 26 Quiz
Chapter 27 Quiz
Chapter 28 Quiz

Feedback
Help Center




Chapter 26 Quiz



1

Private networks, hybrid networks, and virtual private networks can provide _________ for organizations
A)efficiency
B)privacy
C)a and b
D)none of the above
2

Both private and hybrid networks have a major drawback: _________.
A)lack of privacy
B)cost
C)both a and b
D)none of the above
3

A _______ network allows an organization to have its own private internet and, at the same time, access the global Internet.
A)private
B)public
C)hybrid
D)none of the above
4

When an organization uses a private network, it _______________.
A)needs to obtain a block of addresses from the Internet authorities
B)can use a block of addresses without permission from the Internet authorities
C)needs to register the block of addresses being used.
D)none of the above
5

VPN is a network that is _______ but ________.
A)private; public
B)private; virtual
C)public; virtual
D)none of the above
6

A VPN is physically ________ but virtually ________.
A)public; private
B)private; public
C)public; hybrid
D)none of the above
7

VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________.
A)SSL; tunneling
B)IPSec; SSL
C)IPSec; tunneling
D)none of the above
8

____________ means that each IP datagram destined for private use in the organization must be encapsulated in another datagram.
A)Multicasting
B)Broadcasting
C)Tunneling
D)none of the above
9

__________ technology allows a site to use a set of private addresses for internal communication and a set of global Internet addresses for communication with another site.
A)VPN
B)NAT
C)both a and b
D)none of the above
10

Using _______, all of the outgoing packets go through the corresponding router, which replaces the source address in the packet with the appropriate global address.
A)VPN
B)NAT
C)both a and b
D)none of the above
11

An _______ is a private network with no external access that uses the TCP/IP protocol suite.
A)extranet
B)internet
C)intranet
D)none of the above
12

An _______ is a private network with limited external access that uses the TCP/IP protocol suite.
A)extranet
B)internet
C)intranet
D)none of the above
13

A _______ network is totally isolated from the global Internet.
A)private
B)hybrid
C)virtual private
D)none of the above
14

A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication.
A)private
B)hybrid
C)virtual private
D)none of the above
15

A VPN can use _______ to guarantee privacy.
A)IPSec
B)tunneling
C)both a and b
D)none of the above
16

Tunneling is a technique in which the IP datagram is first _______ and then _______.
A)encapsulated in another datagram; encrypted
B)encrypted; encapsulated in another datagram
C)authenticated; encrypted
D)encrypted; authenticated
17

_______ is a technology using a set of global Internet addresses and a set of private addresses.
A)VPN
B)ISP
C)NAT
D)none of the above
18

On a network that uses NAT, the _______ has a translation table.
A)bridge
B)router
C)server
D)none of the above
19

On a network that uses NAT, _______ initiates the communication.
A)an external host
B)an internal host
C)the router
D)none of the above
20

On a network that uses NAT, the router can use _______ global address(es).
A)1
B)2
C)a pool of
D)none of the above