Deck 2: Network Standards

Full screen (f)
exit full mode
Question
In HTTP,a server may initiate an interaction with the client.
Use Space or
up arrow
down arrow
to flip the card.
Question
If the destination host does not receive a segment,it will ________.

A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RSND segment
D)none of the above
Question
Which of the following is not one of the three general parts of messages?

A)address field
B)header
C)data field
D)trailer
Question
The meaning of a message is referred to as the message's ________.

A)protocol
B)order
C)value
D)semantics
Question
Ethernet MAC addresses are ________.

A)32 bits long
B)48 bits long
C)128 bits long
D)none of the above
Question
The header is defined as everything that comes before the data field.
Question
Host P transmits a SYN to Host Q.If host Q is willing to open the connection,it will transmit a(n)________ segment.

A)ACK
B)SYN
C)SYN/ACK
D)none of the above
Question
The ________ contains the content being delivered by a message.

A)address field
B)header
C)data field
D)trailer
Question
Messages always have data fields.
Question
Headers usually are divided into fields.
Question
How a message is organized is its ________.

A)syntax
B)semantics
C)order
D)both A and B
Question
Most messages have trailers.
Question
If the destination host receives a segment that has an error,it will ________.

A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RST segment
D)none of the above
Question
Standards govern ________.

A)semantics
B)syntax
C)both A and B
D)neither A nor B
Question
Network standards are also called protocols.
Question
The trailer is defined as everything that comes after the data field.
Question
The side wishing to close a TCP segment sends a(n)________ segment.

A)SYN
B)ACK
C)FIN
D)none of the above
Question
After the side wishing to close a TCP connection sends a FIN segment,it will ________.

A)not send any more segments
B)only send ACK segments
C)only send FIN segments
D)none of the above
Question
"Octet" is the same as ________.

A)"bit"
B)"byte"
C)either A or B, depending on the context
D)neither A nor B
Question
A sending host will retransmit a TCP segment if ________.

A)it receives an ACK segment
B)it receives a NAC segment
C)it receives an RPT segment.
D)none of the above
Question
Ethernet does ________.

A)error detection
B)error correction
C)both A and B
D)neither A nor B
Question
Ethernet detects errors but does not correct them.Therefore,Ethernet is reliable.
Question
Which of the following has a header checksum field?

A)TCP
B)UDP
C)both A and B
D)neither A nor B
Question
How long are IPv4 addresses?

A)4 octets
B)6 octets
C)20 octets
D)32 octets
Question
How long are IPv4 addresses?

A)32 octets
B)48 bits
C)20 octets
D)none of the above
Question
Ethernet MAC addresses are ________ long.

A)4 octets
B)6 octets
C)32 octets
D)48 octets
Question
IP detects errors but does not correct them.Therefore,IP is reliable.
Question
TCP messages are called ________.
Question
________ read(s)the destination MAC address in an Ethernet frame.

A)The destination host
B)Switches in the network
C)Both A and B
D)Neither A nor B
Question
On a server,well-known port numbers indicate ________.

A)applications
B)connections with client computers
C)both A and B
D)neither A nor B
Question
One-bit fields in headers are called ________ fields.

A)digital
B)flag
C)ACK
D)none of the above
Question
If someone says that a 1-bit flag is set,this means that it is given the value ________.

A)0
B)1
C)either A or B
D)neither A nor B
Question
Routers make forward decisions based on a packet's source IP address.
Question
IP is reliable.
Question
If the ACK bit is set,the acknowledgement number field MUST have a value.
Question
Routers make packet forwarding decisions based on a packet's ________.

A)source IP address
B)destination IP address
C)both A and B
Question
In an IP header,the first bit in the second row is bit ________.

A)0
B)31
C)32
D)none of the above
Question
UDP checks messages for errors but does not correct them.UDP is ________.

A)reliable
B)unreliable
C)both A and B
D)neither A nor B
Question
If the destination host finds an error in an Ethernet frame,it ________.

A)sends back a NAK
B)retransmits the frame
C)both A and B
D)neither A nor B
Question
To handle internetwork transmission control tasks that IP cannot handle,the IETF created TCP.
Question
Binary counting usually begins at 1.
Question
Which layer has more standards?

A)internet
B)application
C)Both of the above have about the same number of standards.
Question
At which layer would you find standards for requesting videos from a video sharing site such as YouTube?

A)application
B)transport
C)internet
D)none of the above
Question
The range 1024 to 4999 is the usual range for ________ port numbers.

A)well-known
B)ephemeral
C)both A and B
Question
An HTTP request message usually has a ________.

A)header
B)data field
C)both A and B
D)neither A nor B
Question
In binary,13 is 1101.What is 14?

A)1110
B)1111
C)neither A nor B
Question
Nearly all application standards are simple like HTTP.
Question
The application layer standard always is HTTP.
Question
At what layer is encoding done?

A)application
B)transport
C)internet
D)none of the above
Question
Converting application messages into bits is called ________.

A)encapsulation
B)encryption
C)encoding
D)conversion
Question
In HTTP,the end of a header field is indicated by a ________.

A)byte position
B)CRLF
C)colon
D)blank line
Question
An IP address,a colon,and a port number constitute a(n)________.

A)well-known port number
B)ephemeral port number
C)connection
D)socket
Question
2500 is in the range for ________ port numbers.

A)well-known
B)ephemeral
C)both A and B
D)neither A nor B
Question
At which layer would you find file transfer protocol standards for downloading files?

A)application
B)transport
C)internet
D)none of the above
Question
On a client,ephemeral port numbers indicate ________.

A)applications
B)connections with servers
C)both A and B
D)neither A nor B
Question
How many bytes will it take to transmit "Brain Dead" without the quotation marks?

A)2
B)3
C)9
D)none of the above
Question
How many bytes will it take to transmit "Can you hear me now?" without the quotation marks?

A)5
B)6
C)10
D)none of the above
Question
An HTTP response message usually has a ________.

A)trailer
B)data field
C)both A and B
D)neither A nor B
Question
In HTTP,most response message header fields consist of a keyword,an equal sign,and the value for the keyword.
Question
Which of the following layers has the most standards?

A)data link
B)internet
C)transport
D)application
Question
A corporate network can use either OSI standards at all layers or TCP/IP standards at all layers,but cannot use OSI standards at some layers and TCP/IP standards at other layers.
Question
Which of the following is a network standards architecture?

A)ISO
B)TCP/IP
C)both A and B
D)neither A nor B
Question
If you have a field with N bits,you can represent N2 items.
Question
A 7-bit field can represent ________ alternatives.

A)14
B)49
C)128
D)256
Question
A codec ________.

A)encodes voice signals into analog signals
B)encodes voice signals into binary signals
C)compresses the signal
D)both B and C
Question
To represent 65 alternatives,your alternatives field would have to be ________ bits long.

A)5
B)6
C)7
D)8
Question
OSI is dominant at the ________ layer.

A)internet
B)transport
C)both A and B
D)neither A nor B
Question
Network standards architectures break the standards functionality needed for communication into layers and define the functions of each layer.
Question
After the internet layer process does encapsulation,it passes the IP packet to the ________ layer process.

A)transport
B)data link
C)physical
D)none of the above
Question
A 5-bit field can represent ________ alternatives.

A)8
B)16
C)32
D)64
Question
After the data link layer process does encapsulation,it passes the IP packet to the ________ layer process.

A)physical
B)internet
C)transport
D)none of the above
Question
Which of the following is a network standards architecture?

A)ISO
B)OSI
C)both A and B
D)neither A nor B
Question
________ is placing a message in the data field of another message.

A)Nesting
B)Vertical communication
C)Layering
D)Encapsulation
Question
Which layer process does not do encapsulation when an application layer process transmits a message?

A)physical
B)data link
C)internet
D)All do encapsulation.
Question
Which of the following is a standards agency for OSI?

A)IETF
B)ITU-T
C)both A and B
D)neither A nor B
Question
OSI is dominant at the ________ layer.

A)physical
B)internet
C)both A and B
D)neither A nor B
Question
OSI is dominant at the ________ layer.

A)data link
B)transport
C)both A and B
D)neither A nor B
Question
The electrical signal generated by a microphone is called a(n)________ signal.

A)binary
B)digital
C)analog
D)either A or B
Question
What is the dominant network standards architecture in most real firms today?

A)OSI
B)TCP/IP
C)neither A nor B
Question
Increasing an alternatives field length by one bit always doubles the number of alternatives it can represent.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Network Standards
1
In HTTP,a server may initiate an interaction with the client.
False
2
If the destination host does not receive a segment,it will ________.

A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RSND segment
D)none of the above
D
3
Which of the following is not one of the three general parts of messages?

A)address field
B)header
C)data field
D)trailer
A
4
The meaning of a message is referred to as the message's ________.

A)protocol
B)order
C)value
D)semantics
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
Ethernet MAC addresses are ________.

A)32 bits long
B)48 bits long
C)128 bits long
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
The header is defined as everything that comes before the data field.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
Host P transmits a SYN to Host Q.If host Q is willing to open the connection,it will transmit a(n)________ segment.

A)ACK
B)SYN
C)SYN/ACK
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
The ________ contains the content being delivered by a message.

A)address field
B)header
C)data field
D)trailer
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
Messages always have data fields.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Headers usually are divided into fields.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
How a message is organized is its ________.

A)syntax
B)semantics
C)order
D)both A and B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
Most messages have trailers.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
If the destination host receives a segment that has an error,it will ________.

A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RST segment
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
Standards govern ________.

A)semantics
B)syntax
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Network standards are also called protocols.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
The trailer is defined as everything that comes after the data field.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
The side wishing to close a TCP segment sends a(n)________ segment.

A)SYN
B)ACK
C)FIN
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
After the side wishing to close a TCP connection sends a FIN segment,it will ________.

A)not send any more segments
B)only send ACK segments
C)only send FIN segments
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
"Octet" is the same as ________.

A)"bit"
B)"byte"
C)either A or B, depending on the context
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
A sending host will retransmit a TCP segment if ________.

A)it receives an ACK segment
B)it receives a NAC segment
C)it receives an RPT segment.
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
Ethernet does ________.

A)error detection
B)error correction
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
Ethernet detects errors but does not correct them.Therefore,Ethernet is reliable.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following has a header checksum field?

A)TCP
B)UDP
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
How long are IPv4 addresses?

A)4 octets
B)6 octets
C)20 octets
D)32 octets
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
How long are IPv4 addresses?

A)32 octets
B)48 bits
C)20 octets
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
Ethernet MAC addresses are ________ long.

A)4 octets
B)6 octets
C)32 octets
D)48 octets
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
IP detects errors but does not correct them.Therefore,IP is reliable.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
TCP messages are called ________.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
________ read(s)the destination MAC address in an Ethernet frame.

A)The destination host
B)Switches in the network
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
On a server,well-known port numbers indicate ________.

A)applications
B)connections with client computers
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
One-bit fields in headers are called ________ fields.

A)digital
B)flag
C)ACK
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
If someone says that a 1-bit flag is set,this means that it is given the value ________.

A)0
B)1
C)either A or B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
Routers make forward decisions based on a packet's source IP address.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
IP is reliable.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
If the ACK bit is set,the acknowledgement number field MUST have a value.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
Routers make packet forwarding decisions based on a packet's ________.

A)source IP address
B)destination IP address
C)both A and B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
In an IP header,the first bit in the second row is bit ________.

A)0
B)31
C)32
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
UDP checks messages for errors but does not correct them.UDP is ________.

A)reliable
B)unreliable
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
If the destination host finds an error in an Ethernet frame,it ________.

A)sends back a NAK
B)retransmits the frame
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
To handle internetwork transmission control tasks that IP cannot handle,the IETF created TCP.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
Binary counting usually begins at 1.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
Which layer has more standards?

A)internet
B)application
C)Both of the above have about the same number of standards.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
At which layer would you find standards for requesting videos from a video sharing site such as YouTube?

A)application
B)transport
C)internet
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
The range 1024 to 4999 is the usual range for ________ port numbers.

A)well-known
B)ephemeral
C)both A and B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
An HTTP request message usually has a ________.

A)header
B)data field
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
In binary,13 is 1101.What is 14?

A)1110
B)1111
C)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
Nearly all application standards are simple like HTTP.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
The application layer standard always is HTTP.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
At what layer is encoding done?

A)application
B)transport
C)internet
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
Converting application messages into bits is called ________.

A)encapsulation
B)encryption
C)encoding
D)conversion
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
In HTTP,the end of a header field is indicated by a ________.

A)byte position
B)CRLF
C)colon
D)blank line
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
An IP address,a colon,and a port number constitute a(n)________.

A)well-known port number
B)ephemeral port number
C)connection
D)socket
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
2500 is in the range for ________ port numbers.

A)well-known
B)ephemeral
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
At which layer would you find file transfer protocol standards for downloading files?

A)application
B)transport
C)internet
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
On a client,ephemeral port numbers indicate ________.

A)applications
B)connections with servers
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
How many bytes will it take to transmit "Brain Dead" without the quotation marks?

A)2
B)3
C)9
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
How many bytes will it take to transmit "Can you hear me now?" without the quotation marks?

A)5
B)6
C)10
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
An HTTP response message usually has a ________.

A)trailer
B)data field
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
In HTTP,most response message header fields consist of a keyword,an equal sign,and the value for the keyword.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following layers has the most standards?

A)data link
B)internet
C)transport
D)application
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
A corporate network can use either OSI standards at all layers or TCP/IP standards at all layers,but cannot use OSI standards at some layers and TCP/IP standards at other layers.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is a network standards architecture?

A)ISO
B)TCP/IP
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
If you have a field with N bits,you can represent N2 items.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
A 7-bit field can represent ________ alternatives.

A)14
B)49
C)128
D)256
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
A codec ________.

A)encodes voice signals into analog signals
B)encodes voice signals into binary signals
C)compresses the signal
D)both B and C
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
To represent 65 alternatives,your alternatives field would have to be ________ bits long.

A)5
B)6
C)7
D)8
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
OSI is dominant at the ________ layer.

A)internet
B)transport
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
Network standards architectures break the standards functionality needed for communication into layers and define the functions of each layer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
After the internet layer process does encapsulation,it passes the IP packet to the ________ layer process.

A)transport
B)data link
C)physical
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
A 5-bit field can represent ________ alternatives.

A)8
B)16
C)32
D)64
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
After the data link layer process does encapsulation,it passes the IP packet to the ________ layer process.

A)physical
B)internet
C)transport
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following is a network standards architecture?

A)ISO
B)OSI
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
________ is placing a message in the data field of another message.

A)Nesting
B)Vertical communication
C)Layering
D)Encapsulation
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
Which layer process does not do encapsulation when an application layer process transmits a message?

A)physical
B)data link
C)internet
D)All do encapsulation.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following is a standards agency for OSI?

A)IETF
B)ITU-T
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
OSI is dominant at the ________ layer.

A)physical
B)internet
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
OSI is dominant at the ________ layer.

A)data link
B)transport
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
The electrical signal generated by a microphone is called a(n)________ signal.

A)binary
B)digital
C)analog
D)either A or B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
What is the dominant network standards architecture in most real firms today?

A)OSI
B)TCP/IP
C)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
Increasing an alternatives field length by one bit always doubles the number of alternatives it can represent.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.