Deck 8: The Tcpip Protocols

ملء الشاشة (f)
exit full mode
سؤال
The Network Interface layer performs the same functions as the Data-Link layer in the ISO/OSI model.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Many FTP sites allow you to log in as an anonymous user, which is an open account with limited privileges, but still capable of file transfers.
سؤال
____ cover a wide range of topics in addition to Internet standards, from early discussion of new research concepts to status memos about the current state of the Internet.

A) RFQs
B) RFPs
C) RFCs
D) RFIs
سؤال
_____________________________________________ is a protocol for dynamically assigning IP addresses to devices on a network during the bootstrap process.
سؤال
The ____________________ layer is responsible only for sending and receiving digital data, nothing else.
سؤال
All TCP/IP data are packaged in units called ____.

A) blocks
B) datagrams
C) frames
D) packets
سؤال
The ____, developed by David Mills of the University of Delaware, provides a simple way to synchronize the time of multiple computers on a network (even across the Internet).

A) Internet Time Protocol
B) Network Time Protocol
C) Network Time Distribution Protocol
D) Network Proximity Protocol
سؤال
The IP datagram is transmitted on a local network to a special purpose device called a(n) ____________________.
سؤال
Each piece of an IP datagram is routed on the network using a(n) ____________________.
سؤال
A standard way of assigning the 64 host bits is to use the 48-bit MAC address of the host together with a fixed 8-bit FFFE code.
سؤال
DHCP is used when your system has been allocated a fixed IP address by your network administrator.
سؤال
____ defines the format and meaning of messages exchanged by the manager and agents.

A) SNMP
B) HTTP
C) HTTPS
D) SMTP
سؤال
HTTPS can use ____________________ that contain the certificate holder's public key and digital signature.
سؤال
____ is a TCP/IP application that determines the path through the network to a destination entered by the user.

A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
سؤال
The Internet Protocol is unreliable due to the fact there is no guarantee the datagram will reach its destination.
سؤال
The ____ uses a directed broadcast message to obtain the MAC address for a given IP address.

A) ARP
B) DNS
C) SNMP
D) SMTP
سؤال
The ____ provides the means to convert from a host name to an IP address and vice versa.

A) WINS
B) NDS
C) DNS
D) IPS
سؤال
A typical value for an MTU on an Ethernet network is ____ bytes.

A) 500
B) 1000
C) 1500
D) 2000
سؤال
____ displays protocol statistics and current TCP/IP network connections.

A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
سؤال
____ provides information on the state of NetBIOS-over-TCP/IP connections that exist within a Windows computer.

A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
سؤال
Discuss the functionality of PING.
سؤال
Describe SMTP.
سؤال
Match between columns
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
RFCs
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
HTTPS
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
PING
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
FTP
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
Telnet session
Official standards for the Internet that are published as electronic documents
RFCs
Official standards for the Internet that are published as electronic documents
HTTPS
Official standards for the Internet that are published as electronic documents
PING
Official standards for the Internet that are published as electronic documents
FTP
Official standards for the Internet that are published as electronic documents
Telnet session
Used to exchange encrypted Web pages between a client/server connection
RFCs
Used to exchange encrypted Web pages between a client/server connection
HTTPS
Used to exchange encrypted Web pages between a client/server connection
PING
Used to exchange encrypted Web pages between a client/server connection
FTP
Used to exchange encrypted Web pages between a client/server connection
Telnet session
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
RFCs
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
HTTPS
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
PING
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
FTP
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
Telnet session
Allows a user to establish a terminal emulation connection on a remote computer
RFCs
Allows a user to establish a terminal emulation connection on a remote computer
HTTPS
Allows a user to establish a terminal emulation connection on a remote computer
PING
Allows a user to establish a terminal emulation connection on a remote computer
FTP
Allows a user to establish a terminal emulation connection on a remote computer
Telnet session
سؤال
What happens when a hardware frame is sent out to a network?
سؤال
Describe what happens at each specific layer in the TCP/IP protocol after you click on a link to a Web site.
سؤال
Describe protocol analyzers.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/26
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: The Tcpip Protocols
1
The Network Interface layer performs the same functions as the Data-Link layer in the ISO/OSI model.
True
2
Many FTP sites allow you to log in as an anonymous user, which is an open account with limited privileges, but still capable of file transfers.
True
3
____ cover a wide range of topics in addition to Internet standards, from early discussion of new research concepts to status memos about the current state of the Internet.

A) RFQs
B) RFPs
C) RFCs
D) RFIs
C
4
_____________________________________________ is a protocol for dynamically assigning IP addresses to devices on a network during the bootstrap process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
5
The ____________________ layer is responsible only for sending and receiving digital data, nothing else.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
6
All TCP/IP data are packaged in units called ____.

A) blocks
B) datagrams
C) frames
D) packets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
7
The ____, developed by David Mills of the University of Delaware, provides a simple way to synchronize the time of multiple computers on a network (even across the Internet).

A) Internet Time Protocol
B) Network Time Protocol
C) Network Time Distribution Protocol
D) Network Proximity Protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
8
The IP datagram is transmitted on a local network to a special purpose device called a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
9
Each piece of an IP datagram is routed on the network using a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
10
A standard way of assigning the 64 host bits is to use the 48-bit MAC address of the host together with a fixed 8-bit FFFE code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
11
DHCP is used when your system has been allocated a fixed IP address by your network administrator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
12
____ defines the format and meaning of messages exchanged by the manager and agents.

A) SNMP
B) HTTP
C) HTTPS
D) SMTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
13
HTTPS can use ____________________ that contain the certificate holder's public key and digital signature.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
14
____ is a TCP/IP application that determines the path through the network to a destination entered by the user.

A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
15
The Internet Protocol is unreliable due to the fact there is no guarantee the datagram will reach its destination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
16
The ____ uses a directed broadcast message to obtain the MAC address for a given IP address.

A) ARP
B) DNS
C) SNMP
D) SMTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
17
The ____ provides the means to convert from a host name to an IP address and vice versa.

A) WINS
B) NDS
C) DNS
D) IPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
18
A typical value for an MTU on an Ethernet network is ____ bytes.

A) 500
B) 1000
C) 1500
D) 2000
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
19
____ displays protocol statistics and current TCP/IP network connections.

A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
20
____ provides information on the state of NetBIOS-over-TCP/IP connections that exist within a Windows computer.

A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
21
Discuss the functionality of PING.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
22
Describe SMTP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match between columns
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
RFCs
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
HTTPS
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
PING
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
FTP
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
Telnet session
Official standards for the Internet that are published as electronic documents
RFCs
Official standards for the Internet that are published as electronic documents
HTTPS
Official standards for the Internet that are published as electronic documents
PING
Official standards for the Internet that are published as electronic documents
FTP
Official standards for the Internet that are published as electronic documents
Telnet session
Used to exchange encrypted Web pages between a client/server connection
RFCs
Used to exchange encrypted Web pages between a client/server connection
HTTPS
Used to exchange encrypted Web pages between a client/server connection
PING
Used to exchange encrypted Web pages between a client/server connection
FTP
Used to exchange encrypted Web pages between a client/server connection
Telnet session
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
RFCs
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
HTTPS
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
PING
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
FTP
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
Telnet session
Allows a user to establish a terminal emulation connection on a remote computer
RFCs
Allows a user to establish a terminal emulation connection on a remote computer
HTTPS
Allows a user to establish a terminal emulation connection on a remote computer
PING
Allows a user to establish a terminal emulation connection on a remote computer
FTP
Allows a user to establish a terminal emulation connection on a remote computer
Telnet session
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
24
What happens when a hardware frame is sent out to a network?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
25
Describe what happens at each specific layer in the TCP/IP protocol after you click on a link to a Web site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
26
Describe protocol analyzers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.