Deck 14: The Internet Protocol

ملء الشاشة (f)
exit full mode
سؤال
________ is the foundation on which all of the internet based protocols and internetworking is based.

A)Datagram
B)IP
C)TCP
D)VPN
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A static table is more flexible than a dynamic table in responding to both error and congestion conditions.
سؤال
Priority could be assigned on a message basis or on a connection basis.
سؤال
A next generation IP,known as ________,provides longer address fields and more functionality than the current IP.

A)IPv6
B)IPv5
C)IPv3
D)IPv4
سؤال
The driving motivation for the adoption of a new version of IP was the limitation imposed by the 32-bit address field in IPv4.
سؤال
If dynamic or alternate routing is used the potential exists for a datagram to loop indefinitely through the internet.
سؤال
In 1994 the Internet Architecture Board issued a report titled "Security in the Internet Architecture" that stated that the general consensus was that the Internet was secure and there were no areas of security concern.
سؤال
Time to Live is similar to a hop count.
سؤال
A connectionless internet service is not good for connectionless transport protocols because it imposes unnecessary overhead.
سؤال
Data are transmitted over an internet in packets from a source system to a destination across a path involving a single network and routers.
سؤال
IP does not guarantee that all data will be delivered or that the data that are delivered will arrive in the proper order.
سؤال
In IPv6 fragmentation may only be performed by routers along a packet's delivery path.
سؤال
Flow control allows routers and receiving stations to limit the rate at which they receive data.
سؤال
The process in which a protocol may need to divide a block received from a higher layer into multiple blocks of some smaller bounded size is called ________.

A)reassembly
B)subnetting
C)fragmentation
D)downsizing
سؤال
The format of the Destination Options Header is the same as that of the Hop-by-Hop Options Header.
سؤال
A Class C network is defined as few networks,each with many hosts.
سؤال
IP attaches a header to upper layer data to form an IP ________.

A)layer
B)packet
C)subnet
D)datagram
سؤال
The counterpart of fragmentation is reassembly.
سؤال
A protocol is concerned with exchanging data between two entities.
سؤال
For virtually all protocols data are transferred in blocks called ________.

A)PDUs
B)segments
C)NSAPs
D)datagrams
سؤال
A ________ operates at layer 3 of the OSI architecture and routes packets between potentially different networks..
سؤال
The most widely used protocol for internetworking is the ________.
سؤال
Although it is intended to ultimately be replaced,________ is currently the standard IP used in TCP/IP networks.
سؤال
An IS used to connect two LANs that use similar LAN protocols and acts as an address filter,picking up packets from one LAN that are intended for a destination on another LAN and passing those packets on,is a ________.

A)router
B)bridge
C)broadcast
D)end system
سؤال
The effect of the ________ is to erase the portion of the host field that refers to an actual host on a subnet,leaving the network number and the subnet number.

A)echo reply
B)checksum
C)subnet mask
D)address mask
سؤال
Which of the following is NOT an enhancement of IPv6 over IPv4?

A)improved error recovery
B)address autoconfiguration
C)support for resource allocation
D)expanded address space
سؤال
A function performed by a receiving entity to limit the amount or rate of data that is sent by a transmitting entity is ________.

A)flow control
B)error control
C)transmission control
D)data control
سؤال
Starting with a 32-bit block consisting of four 8-bit fields,the ________ contains a list of one or more intermediate nodes to be visited on the way to a packet's destination.
سؤال
In the IPv4 Header ________ specifies how long,in seconds,a datagram is allowed to remain in the internet.
سؤال
An internet consists of multiple separate networks that are interconnected by ________.
سؤال
The ________ is a means of uniquely identifying an end-system-originated datagram.

A)protocol layer number
B)source address
C)Data Unit Identifier
D)protocol identifier
سؤال
IPv6 allows three types of addresses: unicast,anycast,and ________.
سؤال
The ________ primitive is used to request transmission of a data unit.

A)Send
B)Source Routing
C)Transmit
D)Request
سؤال
A device used to provide a communications path and perform the necessary relaying and routing functions so that data can be exchanged between devices attached to different networks in the internet is an ________.
سؤال
An entity may transmit data to another entity in such a way that each PDU is treated independently of all prior PDUs.This is known as ________ data transfer.
سؤال
A device attached to one of the networks of an internet that is used to support end user applications or services is ________.

A)an end system
B)a router
C)a subnet
D)an intermediate system
سؤال
The principal feature of ________ is that it can encrypt and/or authenticate all traffic at the IP level.

A)TCP/UDP
B)IAB
C)VPN
D)IPSec
سؤال
A hop-by-hop option that is used to send IPv6 packets with payloads longer than 65,535 octets is ________.

A)PAD1
B)fragmentation
C)jumbo payload
D)PADN
سؤال
A ________ consists of a set of computers that interconnect by means of a relatively unsecure network and makes use of encryption and special protocols to provide security.
سؤال
In IPv6 ________ may only be performed by source nodes,not by routers,along a packet's delivery path.

A)bridging
B)reassembly
C)fragmentation
D)ordered delivery
سؤال
The IP standard specifies that a compliant implementation must also implement ________,which provides a means for transferring messages from routers and other hosts to a host.Because these messages are transmitted in IP datagrams, their delivery is not guaranteed and their use cannot be considered reliable.
سؤال
IP addresses are usually written in ________ notation,with a decimal number representing each of the octets of the 32-bit address.
سؤال
The services to be provided across adjacent protocol layers are expressed in terms of ________ and parameters.
سؤال
IPv6 addresses are ________ bits in length.
سؤال
The source and destination address fields in the IP header each contain a 32-bit global internet address,generally consisting of a network identifier and a _______.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: The Internet Protocol
1
________ is the foundation on which all of the internet based protocols and internetworking is based.

A)Datagram
B)IP
C)TCP
D)VPN
B
2
A static table is more flexible than a dynamic table in responding to both error and congestion conditions.
False
3
Priority could be assigned on a message basis or on a connection basis.
True
4
A next generation IP,known as ________,provides longer address fields and more functionality than the current IP.

A)IPv6
B)IPv5
C)IPv3
D)IPv4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
The driving motivation for the adoption of a new version of IP was the limitation imposed by the 32-bit address field in IPv4.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
If dynamic or alternate routing is used the potential exists for a datagram to loop indefinitely through the internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
In 1994 the Internet Architecture Board issued a report titled "Security in the Internet Architecture" that stated that the general consensus was that the Internet was secure and there were no areas of security concern.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
Time to Live is similar to a hop count.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
A connectionless internet service is not good for connectionless transport protocols because it imposes unnecessary overhead.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
Data are transmitted over an internet in packets from a source system to a destination across a path involving a single network and routers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
IP does not guarantee that all data will be delivered or that the data that are delivered will arrive in the proper order.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
In IPv6 fragmentation may only be performed by routers along a packet's delivery path.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
Flow control allows routers and receiving stations to limit the rate at which they receive data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
The process in which a protocol may need to divide a block received from a higher layer into multiple blocks of some smaller bounded size is called ________.

A)reassembly
B)subnetting
C)fragmentation
D)downsizing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
The format of the Destination Options Header is the same as that of the Hop-by-Hop Options Header.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
A Class C network is defined as few networks,each with many hosts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
IP attaches a header to upper layer data to form an IP ________.

A)layer
B)packet
C)subnet
D)datagram
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
The counterpart of fragmentation is reassembly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
A protocol is concerned with exchanging data between two entities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
For virtually all protocols data are transferred in blocks called ________.

A)PDUs
B)segments
C)NSAPs
D)datagrams
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
A ________ operates at layer 3 of the OSI architecture and routes packets between potentially different networks..
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
The most widely used protocol for internetworking is the ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
Although it is intended to ultimately be replaced,________ is currently the standard IP used in TCP/IP networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
An IS used to connect two LANs that use similar LAN protocols and acts as an address filter,picking up packets from one LAN that are intended for a destination on another LAN and passing those packets on,is a ________.

A)router
B)bridge
C)broadcast
D)end system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
The effect of the ________ is to erase the portion of the host field that refers to an actual host on a subnet,leaving the network number and the subnet number.

A)echo reply
B)checksum
C)subnet mask
D)address mask
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following is NOT an enhancement of IPv6 over IPv4?

A)improved error recovery
B)address autoconfiguration
C)support for resource allocation
D)expanded address space
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
A function performed by a receiving entity to limit the amount or rate of data that is sent by a transmitting entity is ________.

A)flow control
B)error control
C)transmission control
D)data control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
Starting with a 32-bit block consisting of four 8-bit fields,the ________ contains a list of one or more intermediate nodes to be visited on the way to a packet's destination.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
In the IPv4 Header ________ specifies how long,in seconds,a datagram is allowed to remain in the internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
An internet consists of multiple separate networks that are interconnected by ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
The ________ is a means of uniquely identifying an end-system-originated datagram.

A)protocol layer number
B)source address
C)Data Unit Identifier
D)protocol identifier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
IPv6 allows three types of addresses: unicast,anycast,and ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
The ________ primitive is used to request transmission of a data unit.

A)Send
B)Source Routing
C)Transmit
D)Request
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
A device used to provide a communications path and perform the necessary relaying and routing functions so that data can be exchanged between devices attached to different networks in the internet is an ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
An entity may transmit data to another entity in such a way that each PDU is treated independently of all prior PDUs.This is known as ________ data transfer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
A device attached to one of the networks of an internet that is used to support end user applications or services is ________.

A)an end system
B)a router
C)a subnet
D)an intermediate system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
The principal feature of ________ is that it can encrypt and/or authenticate all traffic at the IP level.

A)TCP/UDP
B)IAB
C)VPN
D)IPSec
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
A hop-by-hop option that is used to send IPv6 packets with payloads longer than 65,535 octets is ________.

A)PAD1
B)fragmentation
C)jumbo payload
D)PADN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
A ________ consists of a set of computers that interconnect by means of a relatively unsecure network and makes use of encryption and special protocols to provide security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
In IPv6 ________ may only be performed by source nodes,not by routers,along a packet's delivery path.

A)bridging
B)reassembly
C)fragmentation
D)ordered delivery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
The IP standard specifies that a compliant implementation must also implement ________,which provides a means for transferring messages from routers and other hosts to a host.Because these messages are transmitted in IP datagrams, their delivery is not guaranteed and their use cannot be considered reliable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
IP addresses are usually written in ________ notation,with a decimal number representing each of the octets of the 32-bit address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
The services to be provided across adjacent protocol layers are expressed in terms of ________ and parameters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
IPv6 addresses are ________ bits in length.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
The source and destination address fields in the IP header each contain a 32-bit global internet address,generally consisting of a network identifier and a _______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.