Deck 2: Network Standards

Full screen (f)
exit full mode
Question
The meaning of a message is referred to as the message's ________.

A)protocol
B)order
C)syntax
D)semantics
Use Space or
up arrow
down arrow
to flip the card.
Question
Host P transmits a SYN segment to Host Q.If host Q is willing to open the connection,it will transmit a(n)________ segment.

A)ACK
B)SYN
C)SYN/ACK
D)none of the above
Question
A message always has a ________.

A)header
B)data field
C)both A and B
D)neither A nor B
Question
"Octet" is the same as ________.

A)"bit"
B)"byte"
C)either A or B, depending on the context
D)neither A nor B
Question
Standards govern ________.

A)semantics
B)syntax
C)both A and B
D)neither A nor B
Question
Internet standards are published as ________.

A)RFCs
B)IETFs
C)TCP/IPs
D)Internet Protocols
Question
Standards mean the same thing as ________.

A)semantics
B)syntax
C)rules
D)protocols
Question
Which part of a message is less often in a message compared to the other two parts?

A)header
B)data field
C)trailer
D)All of the above are commonly seen in all messages.
Question
In HTTP,which program may initiate communication?

A)browser
B)Webserver program
C)both A and B
D)neither A nor B
Question
If the destination host receives a segment that has an error,it will ________.

A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RSND segment
D)none of the above
Question
How a message is organized is its ________.

A)protocol
B)order
C)syntax
D)semantics
Question
In a four-step close,which side transmits a FIN segment?

A)the side that initiates the close
B)the other side
C)either side
D)neither side
Question
In an HTTP,which one (browser or Webserver application program)transmits message first?

A)browser
B)Webserver application program
C)They transmit simultaneously.
D)It depends on the situation.
Question
A message's syntax is its ________.

A)protocol
B)message order
C)meaning
D)structure
Question
Which of the following is inside the header of messages?

A)address field
B)IP address field
C)data field
D)trailer
Question
The ________ contains the content being delivered by a message.

A)address field
B)header
C)data field
D)trailer
Question
A message's semantics is its ________.

A)protocol
B)message order
C)meaning
D)structure
Question
A sending host will retransmit a TCP segment if it ________.

A)receives an ACK segment
B)receives a NAC segment
C)receives an RPT segment
D)none of the above
Question
If a destination host does not receive a segment,it will ________.

A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RSND segment
D)none of the above
Question
After the side wishing to close a TCP connection sends a FIN segment,the other side will ________.

A)not send any more segments
B)only send ACK segments
C)only send FIN segments
D)none of the above
Question
2500 is in the range for ________ port numbers.

A)well-known
B)ephemeral
C)both A and B
D)neither A nor B
Question
The UDP ________.

A)is unreliable
B)has a checksum field
C)both A and B
D)neither A nor B
Question
TCP has six single-bit fields in headers and these single-bit fields are called ________ fields.

A)port
B)flag
C)ACK
D)binary
Question
For every conversation,a client randomly generates an ephemeral port number for ________.

A)applications
B)conversations
C)both A and B
D)neither A nor B
Question
UDP is ________.

A)reliable
B)unreliable
C)It depends on the situation.
D)none of the above
Question
________ read(s)the destination address in an Ethernet frame.

A)The destination host
B)Switches in the network
C)both A and B
D)neither A nor B
Question
TCP messages are called ________.

A)segments
B)fragments
C)packets
D)datagrams
Question
To make a forwarding decision,a router looks at the arriving packet's ________.

A)destination IP address
B)destination EUI-48 address
C)both A and B
D)MAC addresses
Question
IP is ________.

A)reliable
B)unreliable
C)semi-reliable
D)unreliable or reliable depending on the situation
Question
The UDP has ________ fields.

A)4
B)8
C)16
D)32
Question
The range of port 1024 to port 4999 is the usual range for ________ port numbers.

A)well-known
B)ephemeral
C)both A and B
D)neither A nor B
Question
EUI-48 addresses are ________.

A)32 bits long
B)48 bits long
C)128 bits long
D)Address length varies.
Question
In IP,the first bit in the second row is ________.

A)0
B)31
C)32
D)63
Question
On a server,well-known port numbers indicate ________.

A)applications
B)connections with client computers
C)both A and B
D)neither A nor B
Question
If someone says that a 1-bit flag is set,this means that it is given the value ________.

A)0
B)1
C)either A or B
D)neither A nor B
Question
If the destination host finds an error in an Ethernet frame,it ________.

A)sends back a NAK
B)sends back a ACK
C)both A and B
D)neither A nor B
Question
Ethernet does ________.

A)error detection
B)error correction
C)both A and B
D)neither A nor B
Question
How long are IPv4 addresses?

A)4 bits
B)32 bits
C)48 bits
D)128 bits
Question
How long are IPv4 addresses in octets?

A)4 octets
B)32 octets
C)48 octets
D)128 octets
Question
An EUI-48 address was formerly called a(n)________ address.

A)IPv4
B)IPv6
C)MAC
D)DNS
Question
Convert a decimal number 15 to the binary number.

A)It is a binary number.
B)1100
C)1101
D)1111
Question
An HTTP request message usually has a ________.

A)header
B)data field
C)both A and B
D)neither A nor B
Question
The destination socket is 60.171.18.22:161.The destination host is a(n)________.

A)client
B)server
C)well-known server
D)ephemeral server
Question
A 5-bit field can represent ________ alternatives or different combinations.

A)8
B)16
C)32
D)64
Question
At which layer would you find file transfer protocol (FTP)standards for downloading files from an FTP server?

A)application
B)transport
C)Internet
D)none of the above
Question
The source socket is 60.171.18.22:2707.The source is a(n)________.

A)client
B)server
C)well-known server
D)ephemeral server
Question
Converting application messages into bits is called ________.

A)encapsulation
B)encryption
C)encoding
D)exchange
Question
At which layer would you find standards for requesting videos from a video-sharing site such as YouTube?

A)application
B)transport
C)Internet
D)none of the above
Question
Which of the following layers has more standards than the other three layers?

A)data link
B)Internet
C)transport
D)application
Question
The source socket is 60.171.18.22:2707.The source host is a(n)________.

A)client
B)server
C)well-known server
D)ephemeral server
Question
Convert decimal 8 to binary.

A)100
B)1000
C)10000
D)111
Question
An HTTP response message usually has a ________.

A)trailer
B)data field
C)both A and B
D)neither A nor B
Question
Which of the following is a socket?

A)80
B)21
C)both A and B
D)neither A nor B
Question
How many bytes will it take to transmit "Brain Dead" without the quotation marks?

A)2
B)3
C)9
D)none of the above
Question
In HTTP,the end of a header field is usually indicated by a ________.

A)bit position
B)CRLF
C)colon
D)blank line
Question
In HTTP headers,the end of a header field is usually indicated by a ________.

A))
B):
C);
D)none of the above
Question
At what layer is encoding done?

A)application
B)transport
C)Internet
D)none of the above
Question
Which of the following is an integer?

A)4,307
B)45.7
C)both A and B
D)neither A nor B
Question
Convert the binary number 100 to decimal.

A)It is in decimal.
B)2
C)4
D)8
Question
The application standard is almost always ________.

A)HTTP
B)TCP
C)reliable
D)None of the above is true.
Question
________ is placing a message in the data field of another message.

A)Encoding
B)Vertical communication
C)Layering
D)Encapsulation
Question
To represent 65 alternatives,your alternatives field would have to be at least ________ bits long.

A)5
B)6
C)7
D)8
Question
The electrical signal generated by a microphone is called a(n)________ signal.

A)binary
B)digital
C)analog
D)Either A or B.
Question
A 7-bit field can represent ________ alternatives or different combinations.

A)14
B)49
C)128
D)256
Question
A codec ________.

A)encodes voice sounds into digital signals for transmission
B)encodes voice sounds into analog signals for transmission
C)encrypts the signal
D)converts binary voice signals into digital signals for transmission
Question
The five senses can be represented with a ________-bit field.

A)2
B)3
C)4
D)5
Question
Which layer process does NOT do any encapsulation when an application layer process transmits a message?

A)physical
B)data link
C)Internet
D)All layers do encapsulation.
Question
After the Internet layer process does encapsulation,it passes the IP packet to the ________ layer process.

A)transport
B)data link
C)physical
D)none of the above
Question
After the data link layer process does encapsulation,it passes the IP packet to the ________ layer process.

A)physical
B)internet
C)transport
D)none of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/69
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Network Standards
1
The meaning of a message is referred to as the message's ________.

A)protocol
B)order
C)syntax
D)semantics
D
2
Host P transmits a SYN segment to Host Q.If host Q is willing to open the connection,it will transmit a(n)________ segment.

A)ACK
B)SYN
C)SYN/ACK
D)none of the above
C
3
A message always has a ________.

A)header
B)data field
C)both A and B
D)neither A nor B
A
4
"Octet" is the same as ________.

A)"bit"
B)"byte"
C)either A or B, depending on the context
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
5
Standards govern ________.

A)semantics
B)syntax
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
6
Internet standards are published as ________.

A)RFCs
B)IETFs
C)TCP/IPs
D)Internet Protocols
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
7
Standards mean the same thing as ________.

A)semantics
B)syntax
C)rules
D)protocols
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
8
Which part of a message is less often in a message compared to the other two parts?

A)header
B)data field
C)trailer
D)All of the above are commonly seen in all messages.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
9
In HTTP,which program may initiate communication?

A)browser
B)Webserver program
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
10
If the destination host receives a segment that has an error,it will ________.

A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RSND segment
D)none of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
11
How a message is organized is its ________.

A)protocol
B)order
C)syntax
D)semantics
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
12
In a four-step close,which side transmits a FIN segment?

A)the side that initiates the close
B)the other side
C)either side
D)neither side
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
13
In an HTTP,which one (browser or Webserver application program)transmits message first?

A)browser
B)Webserver application program
C)They transmit simultaneously.
D)It depends on the situation.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
14
A message's syntax is its ________.

A)protocol
B)message order
C)meaning
D)structure
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is inside the header of messages?

A)address field
B)IP address field
C)data field
D)trailer
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
16
The ________ contains the content being delivered by a message.

A)address field
B)header
C)data field
D)trailer
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
17
A message's semantics is its ________.

A)protocol
B)message order
C)meaning
D)structure
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
18
A sending host will retransmit a TCP segment if it ________.

A)receives an ACK segment
B)receives a NAC segment
C)receives an RPT segment
D)none of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
19
If a destination host does not receive a segment,it will ________.

A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RSND segment
D)none of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
20
After the side wishing to close a TCP connection sends a FIN segment,the other side will ________.

A)not send any more segments
B)only send ACK segments
C)only send FIN segments
D)none of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
21
2500 is in the range for ________ port numbers.

A)well-known
B)ephemeral
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
22
The UDP ________.

A)is unreliable
B)has a checksum field
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
23
TCP has six single-bit fields in headers and these single-bit fields are called ________ fields.

A)port
B)flag
C)ACK
D)binary
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
24
For every conversation,a client randomly generates an ephemeral port number for ________.

A)applications
B)conversations
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
25
UDP is ________.

A)reliable
B)unreliable
C)It depends on the situation.
D)none of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
26
________ read(s)the destination address in an Ethernet frame.

A)The destination host
B)Switches in the network
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
27
TCP messages are called ________.

A)segments
B)fragments
C)packets
D)datagrams
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
28
To make a forwarding decision,a router looks at the arriving packet's ________.

A)destination IP address
B)destination EUI-48 address
C)both A and B
D)MAC addresses
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
29
IP is ________.

A)reliable
B)unreliable
C)semi-reliable
D)unreliable or reliable depending on the situation
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
30
The UDP has ________ fields.

A)4
B)8
C)16
D)32
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
31
The range of port 1024 to port 4999 is the usual range for ________ port numbers.

A)well-known
B)ephemeral
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
32
EUI-48 addresses are ________.

A)32 bits long
B)48 bits long
C)128 bits long
D)Address length varies.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
33
In IP,the first bit in the second row is ________.

A)0
B)31
C)32
D)63
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
34
On a server,well-known port numbers indicate ________.

A)applications
B)connections with client computers
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
35
If someone says that a 1-bit flag is set,this means that it is given the value ________.

A)0
B)1
C)either A or B
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
36
If the destination host finds an error in an Ethernet frame,it ________.

A)sends back a NAK
B)sends back a ACK
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
37
Ethernet does ________.

A)error detection
B)error correction
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
38
How long are IPv4 addresses?

A)4 bits
B)32 bits
C)48 bits
D)128 bits
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
39
How long are IPv4 addresses in octets?

A)4 octets
B)32 octets
C)48 octets
D)128 octets
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
40
An EUI-48 address was formerly called a(n)________ address.

A)IPv4
B)IPv6
C)MAC
D)DNS
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
41
Convert a decimal number 15 to the binary number.

A)It is a binary number.
B)1100
C)1101
D)1111
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
42
An HTTP request message usually has a ________.

A)header
B)data field
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
43
The destination socket is 60.171.18.22:161.The destination host is a(n)________.

A)client
B)server
C)well-known server
D)ephemeral server
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
44
A 5-bit field can represent ________ alternatives or different combinations.

A)8
B)16
C)32
D)64
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
45
At which layer would you find file transfer protocol (FTP)standards for downloading files from an FTP server?

A)application
B)transport
C)Internet
D)none of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
46
The source socket is 60.171.18.22:2707.The source is a(n)________.

A)client
B)server
C)well-known server
D)ephemeral server
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
47
Converting application messages into bits is called ________.

A)encapsulation
B)encryption
C)encoding
D)exchange
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
48
At which layer would you find standards for requesting videos from a video-sharing site such as YouTube?

A)application
B)transport
C)Internet
D)none of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following layers has more standards than the other three layers?

A)data link
B)Internet
C)transport
D)application
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
50
The source socket is 60.171.18.22:2707.The source host is a(n)________.

A)client
B)server
C)well-known server
D)ephemeral server
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
51
Convert decimal 8 to binary.

A)100
B)1000
C)10000
D)111
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
52
An HTTP response message usually has a ________.

A)trailer
B)data field
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following is a socket?

A)80
B)21
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
54
How many bytes will it take to transmit "Brain Dead" without the quotation marks?

A)2
B)3
C)9
D)none of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
55
In HTTP,the end of a header field is usually indicated by a ________.

A)bit position
B)CRLF
C)colon
D)blank line
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
56
In HTTP headers,the end of a header field is usually indicated by a ________.

A))
B):
C);
D)none of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
57
At what layer is encoding done?

A)application
B)transport
C)Internet
D)none of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is an integer?

A)4,307
B)45.7
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
59
Convert the binary number 100 to decimal.

A)It is in decimal.
B)2
C)4
D)8
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
60
The application standard is almost always ________.

A)HTTP
B)TCP
C)reliable
D)None of the above is true.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
61
________ is placing a message in the data field of another message.

A)Encoding
B)Vertical communication
C)Layering
D)Encapsulation
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
62
To represent 65 alternatives,your alternatives field would have to be at least ________ bits long.

A)5
B)6
C)7
D)8
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
63
The electrical signal generated by a microphone is called a(n)________ signal.

A)binary
B)digital
C)analog
D)Either A or B.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
64
A 7-bit field can represent ________ alternatives or different combinations.

A)14
B)49
C)128
D)256
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
65
A codec ________.

A)encodes voice sounds into digital signals for transmission
B)encodes voice sounds into analog signals for transmission
C)encrypts the signal
D)converts binary voice signals into digital signals for transmission
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
66
The five senses can be represented with a ________-bit field.

A)2
B)3
C)4
D)5
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
67
Which layer process does NOT do any encapsulation when an application layer process transmits a message?

A)physical
B)data link
C)Internet
D)All layers do encapsulation.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
68
After the Internet layer process does encapsulation,it passes the IP packet to the ________ layer process.

A)transport
B)data link
C)physical
D)none of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
69
After the data link layer process does encapsulation,it passes the IP packet to the ________ layer process.

A)physical
B)internet
C)transport
D)none of the above
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 69 flashcards in this deck.