Similar documents
Business Data Networks and Security 10th Edition by Panko Test Bank

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

Network+ Guide to Networks, 6 th Edition. Chapter 2 Solutions

EE 610 Part 2: Encapsulation and network utilities

Chapter 2 Communicating Over the Network

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

Computer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Introduction to TCP/IP networking

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Network Model: Each layer has a specific function.

Computer Networks (Introduction to TCP/IP Protocols)

INSTRUCTOR S MANUAL BUSINESS DATA NETWORKS AND SECURITY, 9TH EDITION

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

TSIN02 - Internetworking

Packet Header Formats

CS-461 Internetworking. Dr. Mohamed Aboutabl

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

Network Reference Models

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Introduction to Networking. Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer

Simulation of TCP Layer

NT1210 Introduction to Networking. Unit 10

TCP /IP Fundamentals Mr. Cantu

Data & Computer Communication

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide

Process-to-Process Delivery:

Need For Protocol Architecture

Need For Protocol Architecture

ES623 Networked Embedded Systems

Chapter 5 OSI Network Layer

Operating Systems CS 571

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Internetwork Protocols

Network Architecture Models

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

User Datagram Protocol

OSI Transport Layer. objectives

ECE4110 Internetwork Programming. Introduction and Overview

Objectives. Upon completion you will be able to: Understand how the Internet came into being

Chapter 2 Network Models 2.1

TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

CHAPTER-2 IP CONCEPTS

What is a Network? TCP / IP. The ISO OSI Model. Protocols. The TCP/IP Protocol Suite. The TCP/IP Protocol Suite. Computer network.

Chapter 7. Local Area Network Communications Protocols

TSIN02 - Internetworking

ELC 537 Communication Networks

Networking Models OSI Model Created by International Organization Standardization

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Chapter 3 Protocols and the TCP/IP Suite

TSIN02 - Internetworking

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

CSCI-GA Operating Systems. Networking. Hubertus Franke

Networking Background

Review of Important Networking Concepts

4.0.1 CHAPTER INTRODUCTION

Computer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols

TSIN02 - Internetworking

Lecture 2. Computer Networks Models. Network Models 1-1

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

Hands-On Ethical Hacking and Network Defense

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Position of IP and other network-layer protocols in TCP/IP protocol suite

Chapter 2. Communicating Over The Network

Transport Layer Review

NETWORK PROGRAMMING. Instructor: Junaid Tariq, Lecturer, Department of Computer Science

Lecture (03) Networking Model (TCP/IP) Networking Standard (OSI) cont.,..

UDP, TCP, IP multicast

Defining Networks with the OSI Model. Module 2

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

Sirindhorn International Institute of Technology Thammasat University

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William

Networking Applications

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis

Configuring your VLAN. Presented by Gregory Laffoon

System Programming. Introduction to computer networks

Chapter 3: Network Protocols and Communications

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Imi :... Data:... Nazwisko:... Stron:...

TCP/IP Transport Layer Protocols, TCP and UDP

Chapter 5 Network Layer

Networking Fundamentals

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

The Transport Layer. Part 1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Interconnecting Networks with TCP/IP

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Chapter 1: Introduction

Computer Networks. Introduction to Network. Dr. Adel Gaafar Abd Elrahim

Transcription:

Link download full: Test Bank for Business Data Networks and Security 9th Edition by Panko https://digitalcontentmarket.org/download/business-data-networks-and-security-9thedition-by-panko/ Business Data Networks and Security, 9e (Panko) Chapter 2 Network Standards 1) Network standards are also called protocols. Answer: TRUE 2) Standards govern. A) semantics B) syntax nor B 3) The meaning of a message is referred to as the message's. A) protocol B) order C) value D) semantics 4) How a message is organized is its. A) syntax B) semantics C) order D) Both A and B 5) In HTTP, a server may initiate an interaction with the client. 6) Host P transmits a SYN to Host Q. If host Q is willing to open the connection, it will transmit a(n) segment. A) ACK B) SYN C) SYN/ACK 7) If the destination host does not receive a segment, it will. A) transmit an ACK segment B) transmit a NAC segment C) transmit an RSND segment 1

2

8) If the destination host receives a segment that has an error, it will. A) transmit an ACK segment B) transmit a NAC segment C) transmit an RST segment 9) A sending host will retransmit a TCP segment if. A) it receives an ACK segment B) it receives a NAC segment C) RPT 10) The side wishing to close a TCP segment sends a(n) segment. A) SYN B) ACK C) FIN 11) After the side wishing to close a TCP connection sends a FIN segment, it will. A) not send any more segments B) only send ACK segments C) only send FIN segments D) None of the above 12) Which of the following is not one of the three general parts of messages? A) Address field. B) Header. C) Data field. D) Trailer. 13) The contains the content being delivered by a message. A) address field B) header C) data field D) trailer 14) The header is defined as everything that comes before the data field. Answer: TRUE 15) Messages always have data fields. 3

16) The trailer is defined as everything that comes after the data field. Answer: TRUE 17) Most messages have trailers. 18) Headers usually are divided into fields. Answer: TRUE 19) "Octet" is the same as. A) "bit" B) "byte" C) Either A or B, depending on the context nor B 20) Ethernet addresses are. A) 32 bits long B) 48 bits long C) 128 bits long 21) Ethernet addresses are long. A) 4 octets B) 6 octets C) 32 octets D) 48 octets 22) read(s) the destination MAC address in an Ethernet frame. A) The destination host B) Switches in the network nor B 23) If the destination host finds an error in an Ethernet frame, it. A) sends back a NAK B) retransmits the frame nor B 4

24) Ethernet does. A) error detection B) error correction nor B 25) Ethernet detects errors but does not correct them. Therefore, Ethernet is reliable. 26) In an IP header, the first bit in the second row is bit. A) 0 B) 31 C) 32 27) How long are IPv4 addresses? A) 32 octets. B) 48 bits. C) 20 octets. 28) How long are IPv4 addresses? A) 4 octets. B) 6 octets. C) 20 octets. D) 32 octets. 29) Routers make forward decisions based on a packet's source IP address. 30) Routers make packet forwarding decisions based on a packet's. A) source IP address B) destination IP address C) Both A and B 31) IP is reliable. 32) IP detects errors but does not correct them. Therefore, IP is reliable. 5

33) To handle internetwork transmission control tasks that IP cannot handle, the IETF created TCP. Answer: TRUE 34) TCP messages are called. A) frames B) fragments C) packets 35) One-bit fields are called fields. A) binary B) flag C) ACK 36) If someone says that a 1-bit flag is set, this means that it is given the value. A) 0 B) 1 C) Either A or B nor B 37) If the ACK bit is set, the acknowledgement number field MUST have a value. Answer: TRUE 38) Which of the following has a header checksum field? A) TCP. B) UDP. nor B 39) UDP checks messages for errors but does not correct them. UDP is. A) reliable B) unreliable nor B 6

40) On a server, well-known port numbers indicate. A) applications B) connections with client computers C) Both A and B nor B 41) On a client, ephemeral port numbers indicate. A) applications B) connections with servers nor B 42) The range 1024 to 4999 is the usual range for port numbers. A) well-known B) ephemeral C) Both A and B 43) 6,000 is in the range for port numbers. A) well-known B) ephemeral nor B 44) An IP address, a colon, and a port number constitute a(n). A) well-known port number B) ephemeral port number C) connection D) socket 45) The application layer standard always is HTTP. 46) Which of the following layers has the most standards? A) Data link. B) Internet. C) Transport. D) Application. 7

47) Which layer has more standards? A) Internet. B) Application. C) Both of the above have about the same number of standards. 48) At which layer would you find standards for requesting videos from a video sharing site such as YouTube? A) Application. B) Transport. C) Internet. 49) At which layer would you find file transfer protocol standards for downloading files? A) Application. B) Transport. C) Internet. 50) Nearly all application standards are simple, like HTTP. 51) In HTTP, most response message header fields consist of a keyword, an equal sign, and the value for the keyword. 52) In HTTP, the end of a header field is indicated by a. A) byte position B) CRLF C) colon D) blank line 53) An HTTP request message usually has a. A) header B) data field nor B 8

54) An HTTP response message usually has a. A) trailer B) data field nor B 55) Converting application messages into bits is called. A) encapsulation B) encryption C) encoding D) conversion 56) At what layer is encoding done? A) Application. B) Transport. C) Internet. 57) How many bytes will it take to transmit "Brain Dead" without the quotation marks? A) 2 B) 3 C) 9 58) How many bytes will it take to transmit "Can you hear me now?" without the quotation marks? A) 5 B) 6 C) 10 59) Binary counting usually begins at 1. 60) In binary, 13 is 1101. What is 14? A) 1110 B) 1111 C) Neither A nor B 2 61) If you have a field with N bits, you can represent N items. 9

62) A 5-bit field can represent alternatives. A) 8 B) 16 C) 32 D) 64 63) Increasing an alternatives field length by one bit always doubles the number of alternatives it can represent. Answer: TRUE 64) A 7-bit field can represent alternatives. A) 14 B) 49 C) 128 D) 256 65) To represent 65 alternatives, your alternatives field would have to be bits long. A) 5 B) 6 C) 7 D) 8 66) The electrical signal generated by a microphone is called a(n) signal. A) binary B) digital C) analog D) Either A or B 67) A codec. A) encodes voice signals into analog signals B) encodes voice signals into binary signals C) compresses the signal D) Both B and C 68) is placing a message in the data field of another message. A) Encryption B) Vertical communication C) Layering D) Encapsulation 10

69) After the internet layer process does encapsulation, it passes the IP packet to the layer process. A) transport B) data link C) physical 70) After the data link layer process does encapsulation, it passes the IP packet to the layer process. A) physical B) internet C) transport 71) Which layer process does not do encapsulation when an application layer process transmits a message? A) Physical. B) Data link. C) Internet. D) All do encapsulation. 72) Network standards architectures break the standards functionality needed for communication into layers and define the functions of each layer. Answer: TRUE 73) Which of the following is a network standards architecture? A) ISO. B) TCP/IP. nor B 74) A corporate network can use either OSI standards at all layers or TCP/IP standards at all layers, but cannot use OSI standards at some layers and TCP/IP standards at other layers. 75) What is the dominant network standards architecture in most real firms today? A) OSI. B) TCP/IP. C) Neither A nor B 11

76) Which of the following is a standards agency for OSI? A) IETF. B) ITU-T. nor B 77) Which of the following is a network standards architecture? A) ISO. B) OSI. nor B 78) OSI is dominant at the layer. A) physical B) internet nor B 79) OSI is dominant at the layer. A) data link B) transport nor B 80) OSI is dominant at the layer. A) internet B) transport nor B 81) Which of the following is an architecture? A) IP. B) TCP. nor B 12

82) Which of the following is a standard? A) TCP/IP. B) IP. nor B 83) Which of the following is a standards agency for TCP/IP? A) ITU-T. B) IETF. C) OSI. 84) TCP/IP became dominant in corporations primarily because of. A) its use on the Internet B) its relatively simple standards, which led to low costs C) a government mandate D) All of the above 85) Most IETF documents are called. A) official internet standards B) TCP/IP standards C) RFCs 86) TCP/IP is dominant at the layer(s). A) physical B) internet nor B 87) TCP/IP is dominant at the layer(s). A) data link B) transport nor B 13

88) TCP/IP is dominant at the layer(s). A) physical B) data link nor B 89) Which standards architecture is dominant at the application layer? A) OSI. B) TCP/IP. C) IEEE. 90) Almost all applications, regardless of what standards architecture they come from, can run over TCP/IP standards at the internet and transport layers. Answer: TRUE 91) Which layer(s) of the hybrid TCP/IP OSI standards architecture normally use(s) A) Data link. B) Transport. C) Both A and B D) Neither A nor B 92) Which layer(s) of the hybrid TCP/IP OSI standards architecture normally use(s) TCP/IP standards? A) Data link. B) Transport. C) Both A and B D) Neither A nor B 93) Wireless LAN transmission normally is governed by standards. A) OSI B) TCP/IP nor B 94) Switched WAN transmission is governed by standards. A) OSI B) TCP/IP nor B 14

95) The OSI layer allows application communication to be restarted at the last rollback point. A) application B) presentation C) session 96) The OSI layer is designed to handle data formatting differences between two computers. A) application B) presentation C) session 97) The OSI layer is designed to handle compression and encryption for applications. A) application B) presentation C) session 98) The OSI presentation layer is actually used. A) to convert between file formats B) as a category for data file standards used by multiple applications nor B 99) Which of the following is NOT an OSI layer name? A) Data link. B) Internet. C) Session. D) Presentation. 100) In OSI, the presentation layer is Layer. A) 7 B) 6 C) 5 15