Deck 2: Network Standards
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
Play
Full screen (f)
Deck 2: Network Standards
1
In HTTP,a server may initiate an interaction with the client.
False
2
If the destination host does not receive a segment,it will ________.
A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RSND segment
D)none of the above
A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RSND segment
D)none of the above
D
3
Which of the following is not one of the three general parts of messages?
A)address field
B)header
C)data field
D)trailer
A)address field
B)header
C)data field
D)trailer
A
4
The meaning of a message is referred to as the message's ________.
A)protocol
B)order
C)value
D)semantics
A)protocol
B)order
C)value
D)semantics
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
Ethernet MAC addresses are ________.
A)32 bits long
B)48 bits long
C)128 bits long
D)none of the above
A)32 bits long
B)48 bits long
C)128 bits long
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
The header is defined as everything that comes before the data field.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
Host P transmits a SYN to Host Q.If host Q is willing to open the connection,it will transmit a(n)________ segment.
A)ACK
B)SYN
C)SYN/ACK
D)none of the above
A)ACK
B)SYN
C)SYN/ACK
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
The ________ contains the content being delivered by a message.
A)address field
B)header
C)data field
D)trailer
A)address field
B)header
C)data field
D)trailer
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
Messages always have data fields.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Headers usually are divided into fields.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
How a message is organized is its ________.
A)syntax
B)semantics
C)order
D)both A and B
A)syntax
B)semantics
C)order
D)both A and B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
Most messages have trailers.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
If the destination host receives a segment that has an error,it will ________.
A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RST segment
D)none of the above
A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RST segment
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
Standards govern ________.
A)semantics
B)syntax
C)both A and B
D)neither A nor B
A)semantics
B)syntax
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
Network standards are also called protocols.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
The trailer is defined as everything that comes after the data field.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
The side wishing to close a TCP segment sends a(n)________ segment.
A)SYN
B)ACK
C)FIN
D)none of the above
A)SYN
B)ACK
C)FIN
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
After the side wishing to close a TCP connection sends a FIN segment,it will ________.
A)not send any more segments
B)only send ACK segments
C)only send FIN segments
D)none of the above
A)not send any more segments
B)only send ACK segments
C)only send FIN segments
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
"Octet" is the same as ________.
A)"bit"
B)"byte"
C)either A or B, depending on the context
D)neither A nor B
A)"bit"
B)"byte"
C)either A or B, depending on the context
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
A sending host will retransmit a TCP segment if ________.
A)it receives an ACK segment
B)it receives a NAC segment
C)it receives an RPT segment.
D)none of the above
A)it receives an ACK segment
B)it receives a NAC segment
C)it receives an RPT segment.
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
Ethernet does ________.
A)error detection
B)error correction
C)both A and B
D)neither A nor B
A)error detection
B)error correction
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
Ethernet detects errors but does not correct them.Therefore,Ethernet is reliable.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following has a header checksum field?
A)TCP
B)UDP
C)both A and B
D)neither A nor B
A)TCP
B)UDP
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
How long are IPv4 addresses?
A)4 octets
B)6 octets
C)20 octets
D)32 octets
A)4 octets
B)6 octets
C)20 octets
D)32 octets
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
How long are IPv4 addresses?
A)32 octets
B)48 bits
C)20 octets
D)none of the above
A)32 octets
B)48 bits
C)20 octets
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
Ethernet MAC addresses are ________ long.
A)4 octets
B)6 octets
C)32 octets
D)48 octets
A)4 octets
B)6 octets
C)32 octets
D)48 octets
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
IP detects errors but does not correct them.Therefore,IP is reliable.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
TCP messages are called ________.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
________ read(s)the destination MAC address in an Ethernet frame.
A)The destination host
B)Switches in the network
C)Both A and B
D)Neither A nor B
A)The destination host
B)Switches in the network
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
On a server,well-known port numbers indicate ________.
A)applications
B)connections with client computers
C)both A and B
D)neither A nor B
A)applications
B)connections with client computers
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
One-bit fields in headers are called ________ fields.
A)digital
B)flag
C)ACK
D)none of the above
A)digital
B)flag
C)ACK
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
If someone says that a 1-bit flag is set,this means that it is given the value ________.
A)0
B)1
C)either A or B
D)neither A nor B
A)0
B)1
C)either A or B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
Routers make forward decisions based on a packet's source IP address.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
IP is reliable.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
If the ACK bit is set,the acknowledgement number field MUST have a value.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
Routers make packet forwarding decisions based on a packet's ________.
A)source IP address
B)destination IP address
C)both A and B
A)source IP address
B)destination IP address
C)both A and B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
In an IP header,the first bit in the second row is bit ________.
A)0
B)31
C)32
D)none of the above
A)0
B)31
C)32
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
UDP checks messages for errors but does not correct them.UDP is ________.
A)reliable
B)unreliable
C)both A and B
D)neither A nor B
A)reliable
B)unreliable
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
If the destination host finds an error in an Ethernet frame,it ________.
A)sends back a NAK
B)retransmits the frame
C)both A and B
D)neither A nor B
A)sends back a NAK
B)retransmits the frame
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
To handle internetwork transmission control tasks that IP cannot handle,the IETF created TCP.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
Binary counting usually begins at 1.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
Which layer has more standards?
A)internet
B)application
C)Both of the above have about the same number of standards.
A)internet
B)application
C)Both of the above have about the same number of standards.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
At which layer would you find standards for requesting videos from a video sharing site such as YouTube?
A)application
B)transport
C)internet
D)none of the above
A)application
B)transport
C)internet
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
The range 1024 to 4999 is the usual range for ________ port numbers.
A)well-known
B)ephemeral
C)both A and B
A)well-known
B)ephemeral
C)both A and B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
An HTTP request message usually has a ________.
A)header
B)data field
C)both A and B
D)neither A nor B
A)header
B)data field
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
In binary,13 is 1101.What is 14?
A)1110
B)1111
C)neither A nor B
A)1110
B)1111
C)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
Nearly all application standards are simple like HTTP.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
The application layer standard always is HTTP.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
At what layer is encoding done?
A)application
B)transport
C)internet
D)none of the above
A)application
B)transport
C)internet
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
Converting application messages into bits is called ________.
A)encapsulation
B)encryption
C)encoding
D)conversion
A)encapsulation
B)encryption
C)encoding
D)conversion
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
In HTTP,the end of a header field is indicated by a ________.
A)byte position
B)CRLF
C)colon
D)blank line
A)byte position
B)CRLF
C)colon
D)blank line
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
An IP address,a colon,and a port number constitute a(n)________.
A)well-known port number
B)ephemeral port number
C)connection
D)socket
A)well-known port number
B)ephemeral port number
C)connection
D)socket
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
2500 is in the range for ________ port numbers.
A)well-known
B)ephemeral
C)both A and B
D)neither A nor B
A)well-known
B)ephemeral
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
At which layer would you find file transfer protocol standards for downloading files?
A)application
B)transport
C)internet
D)none of the above
A)application
B)transport
C)internet
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
On a client,ephemeral port numbers indicate ________.
A)applications
B)connections with servers
C)both A and B
D)neither A nor B
A)applications
B)connections with servers
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
How many bytes will it take to transmit "Brain Dead" without the quotation marks?
A)2
B)3
C)9
D)none of the above
A)2
B)3
C)9
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
How many bytes will it take to transmit "Can you hear me now?" without the quotation marks?
A)5
B)6
C)10
D)none of the above
A)5
B)6
C)10
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
An HTTP response message usually has a ________.
A)trailer
B)data field
C)both A and B
D)neither A nor B
A)trailer
B)data field
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
In HTTP,most response message header fields consist of a keyword,an equal sign,and the value for the keyword.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following layers has the most standards?
A)data link
B)internet
C)transport
D)application
A)data link
B)internet
C)transport
D)application
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
A corporate network can use either OSI standards at all layers or TCP/IP standards at all layers,but cannot use OSI standards at some layers and TCP/IP standards at other layers.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is a network standards architecture?
A)ISO
B)TCP/IP
C)both A and B
D)neither A nor B
A)ISO
B)TCP/IP
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
If you have a field with N bits,you can represent N2 items.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
A 7-bit field can represent ________ alternatives.
A)14
B)49
C)128
D)256
A)14
B)49
C)128
D)256
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
A codec ________.
A)encodes voice signals into analog signals
B)encodes voice signals into binary signals
C)compresses the signal
D)both B and C
A)encodes voice signals into analog signals
B)encodes voice signals into binary signals
C)compresses the signal
D)both B and C
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
To represent 65 alternatives,your alternatives field would have to be ________ bits long.
A)5
B)6
C)7
D)8
A)5
B)6
C)7
D)8
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
OSI is dominant at the ________ layer.
A)internet
B)transport
C)both A and B
D)neither A nor B
A)internet
B)transport
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
Network standards architectures break the standards functionality needed for communication into layers and define the functions of each layer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
After the internet layer process does encapsulation,it passes the IP packet to the ________ layer process.
A)transport
B)data link
C)physical
D)none of the above
A)transport
B)data link
C)physical
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
A 5-bit field can represent ________ alternatives.
A)8
B)16
C)32
D)64
A)8
B)16
C)32
D)64
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
After the data link layer process does encapsulation,it passes the IP packet to the ________ layer process.
A)physical
B)internet
C)transport
D)none of the above
A)physical
B)internet
C)transport
D)none of the above
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following is a network standards architecture?
A)ISO
B)OSI
C)both A and B
D)neither A nor B
A)ISO
B)OSI
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
________ is placing a message in the data field of another message.
A)Nesting
B)Vertical communication
C)Layering
D)Encapsulation
A)Nesting
B)Vertical communication
C)Layering
D)Encapsulation
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
Which layer process does not do encapsulation when an application layer process transmits a message?
A)physical
B)data link
C)internet
D)All do encapsulation.
A)physical
B)data link
C)internet
D)All do encapsulation.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following is a standards agency for OSI?
A)IETF
B)ITU-T
C)both A and B
D)neither A nor B
A)IETF
B)ITU-T
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
OSI is dominant at the ________ layer.
A)physical
B)internet
C)both A and B
D)neither A nor B
A)physical
B)internet
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
OSI is dominant at the ________ layer.
A)data link
B)transport
C)both A and B
D)neither A nor B
A)data link
B)transport
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
The electrical signal generated by a microphone is called a(n)________ signal.
A)binary
B)digital
C)analog
D)either A or B
A)binary
B)digital
C)analog
D)either A or B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
What is the dominant network standards architecture in most real firms today?
A)OSI
B)TCP/IP
C)neither A nor B
A)OSI
B)TCP/IP
C)neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
Increasing an alternatives field length by one bit always doubles the number of alternatives it can represent.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck