Deck 8: Network Communications

Full screen (f)
exit full mode
Question
The TCP/IP suite consists of only two protocols: Transmission Control Protocol and Internet Protocol.
Use Space or
up arrow
down arrow
to flip the card.
Question
The sequence in which packets are received at the destination can be different from the sequence in which they are sent.
Question
TCP is a connectionless protocol.
Question
TCP focuses on transfer time for data packets.
Question
By default, the ping command sends an Echo Request every second until you press Ctrl+C.
Question
The ____ layer consists of cables or other connection media.

A) Physical
B) Data Link
C) Transport
D) Internet
Question
When a message travels from one computer to the next, it starts at the ____ layer.

A) Physical
B) Transport
C) Application
D) Internet
Question
The Application layer receives packets from the ____ layer and opens them to convert the message back to its original form.

A) Data Link
B) Transport
C) Physical
D) Internet
Question
The most important protocol at the Internet layer is ____.

A) IP
B) ICMP
C) TCP
D) UDP
Question
When a fast transfer rate of data packets is more important than an error-free and accurate transfer, ____ can be used.

A) IP
B) ICMP
C) TCP
D) UDP
Question
Which layer sits on top of the TCP/IP model?

A) Application
B) Network
C) Physical
D) Transport
Question
What protocol exists in the TCP/IP model's Application layer?

A) UDP
B) ICMP
C) SMTP
D) IP
Question
A(n) ____ is a unique number that identifies a computer or device on a TCP/IP network.

A) port number
B) port address
C) IP address
D) tag number
Question
The format of an IP address is four numbers separated by ____.

A) spaces
B) dashes
C) colons
D) periods
Question
The ifconfig command is an administrative utility, so you must have ____ privileges to use it.

A) administrator
B) root
C) supervisor
D) owner
Question
Two to the power of three (2<sup>3</sup>) is ____.

A) six
B) eight
C) nine
D) 32
Question
What is the binary equivalent of the decimal number 112?

A) 00000111
B) 00111100
C) 01110000
D) 11100000
Question
Which term refers to transmitting to multiple destinations from a single source?

A) tunneling
B) multicasting
C) multisourcing
D) looping
Question
Which IP address class is used for experimentation?

A) Class A
B) Class B
C) Class D
D) Class E
Question
What IP address is the local host for every computer?

A) 1.1.1.1
B) 1.0.0.127
C) 127.0.0.1
D) 255.255.255.255
Question
What command is used to configure NICs?

A) ifconfig
B) niconfig
C) ping
D) config
Question
Which subnet mask is used for a Class C network?

A) 255.0.0.0
B) 255.255.255.0
C) 0.255.255.255
D) 0.0.0.255
Question
How do you restart a Linux computer?

A) Type restart and press Enter.
B) Type reboot and press Enter.
C) Type exit and press Enter.
D) Type recycle and press Enter.
Question
By default, which ping command option can only be used by the root user?

A) -c n
B) -f
C) -q
D) -w n
Question
Which ping command option forces the ping command to send packets without displaying statistics onscreen until after the ping has stopped?

A) -c n
B) -f
C) -q
D) -w n
Question
____________________ are packages of data to be routed through a network.
Question
The ____________________ layer is responsible for delivering data from one location to another on the network.
Question
A(n) ____________________ represents a single binary value.
Question
The ping command uses ____________________ to send an Echo Request packet to a specified network device on the network and waits for a reply.
Question
Match each statement with an item

-A connectionless protocol that uses IP to get packets from one computer to another.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Question
Match each statement with an item

-A connectionless protocol used for sending and receiving requests between the client and server on a network.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Question
Match each statement with an item

-A protocol used to generate IP error messages.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Question
Match each statement with an item

-A protocol used to send e-mail in user-level client applications.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Question
Match each statement with an item

-A virtual terminal protocol for connecting to a remote computer.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Question
Match each statement with an item

-A protocol used to map a fully qualified domain name with an IP address.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Question
Match each statement with an item

-A connection-oriented protocol responsible for keeping track of packets and reassembling them into a single file after they have all arrived.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Question
Match each statement with an item

-A protocol used to move files from one computer to another efficiently and accurately.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Question
Match each statement with an item

-A protocol that handles the delivery of data as packets.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Question
Describe how the protocols in the TCP/IP suite are organized and list the layers.
Question
Define fragmentation and explain why it is used.
Question
Describe the binary numbering system.
Question
Why is it important to understand how to convert decimal numbers to binary numbers?
Question
What are the parts of an IP address?
Question
How do computers communicate with other computers on the same network and on different networks?
Question
Describe a Class A network.
Question
Describe a Class B network.
Question
Describe a Class C network.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/47
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Network Communications
1
The TCP/IP suite consists of only two protocols: Transmission Control Protocol and Internet Protocol.
False
2
The sequence in which packets are received at the destination can be different from the sequence in which they are sent.
True
3
TCP is a connectionless protocol.
False
4
TCP focuses on transfer time for data packets.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
5
By default, the ping command sends an Echo Request every second until you press Ctrl+C.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
6
The ____ layer consists of cables or other connection media.

A) Physical
B) Data Link
C) Transport
D) Internet
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
7
When a message travels from one computer to the next, it starts at the ____ layer.

A) Physical
B) Transport
C) Application
D) Internet
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
8
The Application layer receives packets from the ____ layer and opens them to convert the message back to its original form.

A) Data Link
B) Transport
C) Physical
D) Internet
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
9
The most important protocol at the Internet layer is ____.

A) IP
B) ICMP
C) TCP
D) UDP
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
10
When a fast transfer rate of data packets is more important than an error-free and accurate transfer, ____ can be used.

A) IP
B) ICMP
C) TCP
D) UDP
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
11
Which layer sits on top of the TCP/IP model?

A) Application
B) Network
C) Physical
D) Transport
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
12
What protocol exists in the TCP/IP model's Application layer?

A) UDP
B) ICMP
C) SMTP
D) IP
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
13
A(n) ____ is a unique number that identifies a computer or device on a TCP/IP network.

A) port number
B) port address
C) IP address
D) tag number
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
14
The format of an IP address is four numbers separated by ____.

A) spaces
B) dashes
C) colons
D) periods
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
15
The ifconfig command is an administrative utility, so you must have ____ privileges to use it.

A) administrator
B) root
C) supervisor
D) owner
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
16
Two to the power of three (2<sup>3</sup>) is ____.

A) six
B) eight
C) nine
D) 32
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
17
What is the binary equivalent of the decimal number 112?

A) 00000111
B) 00111100
C) 01110000
D) 11100000
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
18
Which term refers to transmitting to multiple destinations from a single source?

A) tunneling
B) multicasting
C) multisourcing
D) looping
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
19
Which IP address class is used for experimentation?

A) Class A
B) Class B
C) Class D
D) Class E
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
20
What IP address is the local host for every computer?

A) 1.1.1.1
B) 1.0.0.127
C) 127.0.0.1
D) 255.255.255.255
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
21
What command is used to configure NICs?

A) ifconfig
B) niconfig
C) ping
D) config
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
22
Which subnet mask is used for a Class C network?

A) 255.0.0.0
B) 255.255.255.0
C) 0.255.255.255
D) 0.0.0.255
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
23
How do you restart a Linux computer?

A) Type restart and press Enter.
B) Type reboot and press Enter.
C) Type exit and press Enter.
D) Type recycle and press Enter.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
24
By default, which ping command option can only be used by the root user?

A) -c n
B) -f
C) -q
D) -w n
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
25
Which ping command option forces the ping command to send packets without displaying statistics onscreen until after the ping has stopped?

A) -c n
B) -f
C) -q
D) -w n
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
26
____________________ are packages of data to be routed through a network.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
27
The ____________________ layer is responsible for delivering data from one location to another on the network.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
28
A(n) ____________________ represents a single binary value.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
29
The ping command uses ____________________ to send an Echo Request packet to a specified network device on the network and waits for a reply.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
30
Match each statement with an item

-A connectionless protocol that uses IP to get packets from one computer to another.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
31
Match each statement with an item

-A connectionless protocol used for sending and receiving requests between the client and server on a network.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
32
Match each statement with an item

-A protocol used to generate IP error messages.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
33
Match each statement with an item

-A protocol used to send e-mail in user-level client applications.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
34
Match each statement with an item

-A virtual terminal protocol for connecting to a remote computer.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
35
Match each statement with an item

-A protocol used to map a fully qualified domain name with an IP address.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
36
Match each statement with an item

-A connection-oriented protocol responsible for keeping track of packets and reassembling them into a single file after they have all arrived.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
37
Match each statement with an item

-A protocol used to move files from one computer to another efficiently and accurately.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
38
Match each statement with an item

-A protocol that handles the delivery of data as packets.

A) ICMP
B) UDP
C) IP
D) TCP
E) Telnet
F) FTP
G) SMTP
H) DNS
I) HTTP
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
39
Describe how the protocols in the TCP/IP suite are organized and list the layers.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
40
Define fragmentation and explain why it is used.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
41
Describe the binary numbering system.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
42
Why is it important to understand how to convert decimal numbers to binary numbers?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
43
What are the parts of an IP address?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
44
How do computers communicate with other computers on the same network and on different networks?
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
45
Describe a Class A network.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
46
Describe a Class B network.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
47
Describe a Class C network.
Unlock Deck
Unlock for access to all 47 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 47 flashcards in this deck.