Application Layer (7) Past Semester Test Multiple Choice Questions Flashcards
The physical path used by a data communications message is known as the (medium | protocol | transport layer)
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
medium
Which ISO OSI layer provides process-to-process delivery?
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
Layer 4/Transport Layer
When a message moves through the protocol stack towards the physical layer, headers are (appended | removed | added | modified | rearranged)
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
added
A header added to a message at ISO OSI layer 𝑛 will be removed at the destination at layer (𝑛-1 | 𝑛 | 𝑛 +1 | 1 | 7)
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
𝑛
Manchester encoding has a transition ____________ each bit interval.
(between | in the middle of | All of the above | None of the above)
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
in the middle of
Assume ASK (Amplitude Shift Keying) is used for data transmission at 600 bps. The baud rate is (150 | 300 | 1200 | 600). ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
600
An E1 line communicates at ________.
the same speed as a T1 line | 1.5 Mbps | 2.048 Mbps | 10.000 Mbps
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
2.048 Mbps
A CRC (cyclic redundancy check) is used to ensure that data is transmitted correctly. We know that no transmission errors have occurred if the remainder (after division) is _______.
( Even | Odd | 0 | 1)
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
0
(Definition)
_________: 𝘢𝘯 𝘦𝘳𝘳𝘰𝘳-𝘥𝘦𝘵𝘦𝘤𝘵𝘪𝘯𝘨 𝘤𝘰𝘥𝘦 𝘤𝘰𝘮𝘮𝘰𝘯𝘭𝘺 𝘶𝘴𝘦𝘥 𝘪𝘯 𝘥𝘪𝘨𝘪𝘵𝘢𝘭 𝘯𝘦𝘵𝘸𝘰𝘳𝘬𝘴 𝘢𝘯𝘥 𝘴𝘵𝘰𝘳𝘢𝘨𝘦 𝘥𝘦𝘷𝘪𝘤𝘦𝘴 𝘵𝘰 𝘥𝘦𝘵𝘦𝘤𝘵 𝘢𝘤𝘤𝘪𝘥𝘦𝘯𝘵𝘢𝘭 𝘤𝘩𝘢𝘯𝘨𝘦𝘴 𝘵𝘰 𝘳𝘢𝘸 𝘥𝘢𝘵𝘢
Cyclic Redundancy Check
IEEE 802.11g (at full speed) communicates at ________.
54 Mbps | 11 Mbps | 10 Mbps | 1 Mbps | 128 kbps
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
54 Mbps
The REJ (Reject) frame of HDLC (High-level Data Link Control) will cause the (𝘗𝘳𝘦𝘷𝘪𝘰𝘶𝘴 | 𝘐𝘯𝘥𝘪𝘤𝘢𝘵𝘦𝘥 | 𝘐𝘯𝘥𝘪𝘤𝘢𝘵𝘦𝘥 𝘢𝘯𝘥 𝘢𝘭𝘭 𝘱𝘳𝘪𝘰𝘳 | 𝘐𝘯𝘥𝘪𝘤𝘢𝘵𝘦𝘥 𝘢𝘯𝘥 𝘢𝘭𝘭 𝘴𝘶𝘣𝘴𝘦𝘲𝘶𝘦𝘯𝘵) frame(s) to be resent. ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
Indicated and all subsequent
HDLC’s DISC (Disconnect) is an example of a(n) (𝘏𝘢𝘯𝘥𝘴𝘩𝘢𝘬𝘦 | 𝘜𝘯𝘯𝘶𝘮𝘣𝘦𝘳𝘦𝘥 | 𝘚𝘶𝘱𝘦𝘳𝘷𝘪𝘴𝘰𝘳𝘺 | 𝘐𝘯𝘧𝘰𝘳𝘮𝘢𝘵𝘪𝘰𝘯 | 𝘛𝘊𝘗) frame.
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
unnumbered
When no monitor’s presence is detected on an 802.5 network…
A: The hub appoints a new monitor.
B: The previous monitor resumes its duties.
C: The station with the highest priority starts acting as monitor.
D : A new monitor is elected by the remaining nodes.
E: The networks simply continues operating because it does not really need a monitor.
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
…a new monitor is elected by the remaining nodes.
In CSMA/CA the sequence of events to avoid collisions is…
A: NAV, RTS, CTS B: RTS, NAV, CTS C: NAV, CTS, RTS D: RTS, NAV, CTS E : RTS, CTS, NAV
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
RTS, CTS, NAV
Where are fragmented IP datagrams reassembled?
(𝘈𝘵 𝘵𝘩𝘦 𝘧𝘪𝘳𝘴𝘵 𝘳𝘰𝘶𝘵𝘦𝘳 𝘵𝘩𝘢𝘵 𝘯𝘰𝘵𝘪𝘤𝘦𝘴 𝘵𝘩𝘢𝘵 𝘪𝘵 𝘪𝘴 𝘧𝘳𝘢𝘨𝘮𝘦𝘯𝘵𝘦𝘥. | 𝘈𝘵 𝘵𝘩𝘦 𝘧𝘪𝘳𝘴𝘵 𝘳𝘰𝘶𝘵𝘦𝘳 𝘵𝘩𝘢𝘵 𝘤𝘢𝘯 𝘩𝘢𝘯𝘥𝘭𝘦 𝘵𝘩𝘦 𝘵𝘰𝘵𝘢𝘭 𝘐𝘗 𝘥𝘢𝘵𝘢𝘨𝘳𝘢𝘮 | 𝘈𝘵 𝘵𝘩𝘦 𝘧𝘪𝘯𝘢𝘭 𝘥𝘦𝘴𝘵𝘪𝘯𝘢𝘵𝘪𝘰𝘯.| 𝘞𝘩𝘦𝘯𝘦𝘷𝘦𝘳 𝘵𝘩𝘦 𝘛𝘛𝘓 𝘣𝘦𝘤𝘰𝘮𝘦𝘴 0. | 𝘍𝘳𝘢𝘨𝘮𝘦𝘯𝘵𝘦𝘥 𝘐𝘗 𝘥𝘢𝘵𝘢𝘨𝘳𝘢𝘮𝘴 𝘢𝘳𝘦 𝘥𝘪𝘴𝘤𝘢𝘳𝘥𝘦𝘥, 𝘳𝘢𝘵𝘩𝘦𝘳 𝘵𝘩𝘢𝘯 𝘳𝘦𝘢𝘴𝘴𝘦𝘮𝘣𝘭𝘦𝘥.)
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
At the final destination
A UTP cable used for Ethernet uses the (𝘋𝘉25 | 𝘛𝘦𝘭𝘬𝘰𝘮 | 𝘙𝘑-45 | 𝘟-45) connector.
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵
RJ-45
Manchester encoding is better than NRZ because __________
𝘈: 𝘔𝘢𝘯𝘤𝘩𝘦𝘴𝘵𝘦𝘳 𝘪𝘴 𝘴𝘦𝘭𝘧-𝘴𝘺𝘯𝘤𝘩𝘳𝘰𝘯𝘪𝘴𝘪𝘯𝘨.
𝘉: 𝘛𝘩𝘦 𝘣𝘢𝘶𝘥 𝘳𝘢𝘵𝘦 𝘰𝘧 𝘔𝘢𝘯𝘤𝘩𝘦𝘴𝘵𝘦𝘳 𝘪𝘴 𝘩𝘪𝘨𝘩𝘦𝘳 𝘵𝘩𝘢𝘯 𝘵𝘩𝘢𝘵 𝘰𝘧 𝘕𝘙𝘡.
𝘊: 𝘛𝘩𝘦 𝘣𝘢𝘶𝘥 𝘳𝘢𝘵𝘦 𝘰𝘧 𝘔𝘢𝘯𝘤𝘩𝘦𝘴𝘵𝘦𝘳 𝘪𝘴 𝘭𝘰𝘸𝘦𝘳 𝘵𝘩𝘢𝘯 𝘵𝘩𝘢𝘵 𝘰𝘧 𝘕𝘙𝘡.
𝘋: 𝘛𝘩𝘦 𝘸𝘪𝘳𝘦𝘴 𝘮𝘢𝘺 𝘣𝘦 𝘴𝘸𝘪𝘵𝘤𝘩𝘦𝘥 𝘪𝘯 𝘵𝘩𝘦 𝘤𝘢𝘴𝘦 𝘰𝘧 𝘔𝘢𝘯𝘤𝘩𝘦𝘴𝘵𝘦𝘳.
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵
A: Manchester is self-synchronising.
If a communications channel uses QAM at a baud rate of 9600, data is transmitted at (𝟷𝟸𝟶𝟶 | 𝟸𝟺𝟶𝟶 | 𝟿𝟼𝟶𝟶 | 𝟷𝟿𝟸𝟶𝟶 | 𝟸𝟾𝟾𝟶𝟶 ) bps.
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵
28800 bps
XML fits into layer ____ of the ISO/OSI model.
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵
six (presentation)
At which ISO/OSI layer are communicating applications synchronised?
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵
5/session
Layer 6 of ISO/OSI is the ______ layer.
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵
presentation
A Hamming code capable of correcting single-bit errors and using n parity bits can, at
most, contain (2ⁿ − 𝑛 − 1 | 10 | 2 x 𝑛) data bits.
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵
2ⁿ − 𝑛 − 1
If parity is used for error control, only errors that affect (𝘈 𝘴𝘪𝘯𝘨𝘭𝘦 𝘣𝘪𝘵 | 𝘈𝘯 𝘰𝘥𝘥 𝘯𝘶𝘮𝘣𝘦𝘳 𝘰𝘧 𝘣𝘪𝘵𝘴 | 𝘈𝘯 𝘦𝘷𝘦𝘯 𝘯𝘶𝘮𝘣𝘦𝘳 𝘰𝘧 𝘣𝘪𝘵𝘴) will be detected.
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵
an odd number of bits
IEEE 802.3 defines 𝘈: 𝘌𝘵𝘩𝘦𝘳𝘯𝘦𝘵 𝘉: 𝘓𝘓𝘊 𝘊: 𝘏𝘋𝘓𝘊 𝘋: 𝘛𝘰𝘬𝘦𝘯 𝘳𝘪𝘯𝘨 𝘌: 𝘔𝘰𝘳𝘦 𝘵𝘩𝘢𝘯 𝘰𝘯𝘦 𝘰𝘧 𝘵𝘩𝘦 𝘢𝘣𝘰𝘷𝘦 ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵
Ethernet
When one node polls another, it wants to know whether ____.
𝘈 : 𝘛𝘩𝘦 𝘰𝘵𝘩𝘦𝘳 𝘯𝘰𝘥𝘦 𝘩𝘢𝘴 𝘴𝘰𝘮𝘦𝘵𝘩𝘪𝘯𝘨 𝘵𝘰 𝘴𝘦𝘯𝘥.
𝘉: 𝘛𝘩𝘦 𝘰𝘵𝘩𝘦𝘳 𝘯𝘰𝘥𝘦 𝘪𝘴 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘤𝘢𝘵𝘪𝘯𝘨.
𝘊: 𝘐𝘵 𝘮𝘢𝘺 𝘴𝘦𝘯𝘥 𝘴𝘰𝘮𝘦𝘵𝘩𝘪𝘯𝘨 𝘵𝘰 𝘵𝘩𝘦 𝘰𝘵𝘩𝘦𝘳 𝘯𝘰𝘥𝘦.
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵
the other node has something to send.
IP datagrams support source routing. Source routing is…
𝘈: 𝘞𝘩𝘦𝘳𝘦 𝘵𝘩𝘦 𝘱𝘢𝘤𝘬𝘦𝘵 𝘪𝘴 𝘳𝘰𝘶𝘵𝘦𝘥 𝘣𝘢𝘤𝘬 𝘵𝘰 𝘵𝘩𝘦 𝘴𝘰𝘶𝘳𝘤𝘦.
𝘉: 𝘞𝘩𝘦𝘳𝘦 𝘢𝘭𝘭 𝘵𝘩𝘦 𝘱𝘢𝘤𝘬𝘦𝘵𝘴 𝘧𝘳𝘰𝘮 𝘵𝘩𝘦 𝘴𝘢𝘮𝘦 𝘴𝘰𝘶𝘳𝘤𝘦 𝘢𝘳𝘦 𝘢𝘭𝘭 𝘴𝘦𝘯𝘵 𝘵𝘰𝘨𝘦𝘵𝘩𝘦𝘳.
𝘊 : 𝘞𝘩𝘦𝘳𝘦 𝘵𝘩𝘦 𝘴𝘰𝘶𝘳𝘤𝘦 𝘥𝘦𝘵𝘦𝘳𝘮𝘪𝘯𝘦𝘴 𝘵𝘩𝘦 𝘳𝘰𝘶𝘵𝘦 𝘰𝘧 𝘵𝘩𝘦 𝘱𝘢𝘤𝘬𝘦𝘵.
𝘋: 𝘍𝘳𝘦𝘲𝘶𝘦𝘯𝘵𝘭𝘺 𝘶𝘴𝘦𝘥 𝘰𝘯 𝘵𝘩𝘦 𝘐𝘯𝘵𝘦𝘳𝘯𝘦𝘵.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹⁶ ᴬᵖʳⁱˡ ²⁰¹⁰
C: where the source determines the route of the packet.
The nslookup command that changes the server used for name resolution is (𝘴𝘦𝘳𝘷𝘦𝘳 | 𝘩𝘰𝘴𝘵 | 𝘳𝘰𝘰𝘵 | 𝘳𝘦𝘴𝘰𝘭𝘷𝘦 | 𝘶𝘴𝘦).
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹⁶ ᴬᵖʳⁱˡ ²⁰¹⁰
server
The routes used by EGPs (external gateway protocols) are typically determined by \_\_\_\_\_\_\_\_\_\_. 𝘈: 𝘊𝘰𝘴𝘵𝘴 𝘉: 𝘗𝘰𝘭𝘪𝘤𝘪𝘦𝘴 𝘊: 𝘏𝘰𝘱-𝘤𝘰𝘶𝘯𝘵 𝘋: 𝘐𝘈𝘕𝘈 𝘌: 𝘕𝘦𝘵𝘸𝘰𝘳𝘬 𝘐𝘯𝘧𝘰𝘳𝘮𝘢𝘵𝘪𝘰𝘯 𝘊𝘦𝘯𝘵𝘳𝘦𝘴 (𝘕𝘐𝘊𝘴)
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹⁶ ᴬᵖʳⁱˡ ²⁰¹⁰
B: Policies
If the ASCII for ‘A’ is 41₁₆ and for ‘J’ it is 4A₁₆, which character is represented by 47₁₆?
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹⁶ ᴬᵖʳⁱˡ ²⁰¹⁰
G
A domain hack occurs when _________.
𝘈 : 𝘖𝘯𝘦 𝘶𝘴𝘦𝘴 𝘱𝘢𝘳𝘵𝘴 𝘰𝘧 𝘵𝘩𝘦 𝘥𝘰𝘮𝘢𝘪𝘯 𝘯𝘢𝘮𝘦 𝘵𝘰 𝘴𝘱𝘦𝘭𝘭 𝘢 𝘸𝘰𝘳𝘥 (𝘴𝘶𝘤𝘩 𝘢𝘴 𝘥𝘦𝘭.𝘪𝘤𝘪𝘰.𝘶𝘴).
𝘉: 𝘖𝘯𝘦 𝘰𝘷𝘦𝘳𝘳𝘪𝘥𝘦𝘴 𝘵𝘩𝘦 𝘋𝘕𝘚 𝘣𝘺 𝘦𝘯𝘵𝘦𝘳𝘪𝘯𝘨 𝘪𝘯𝘧𝘰𝘳𝘮𝘢𝘵𝘪𝘰𝘯 𝘪𝘯 𝘵𝘩𝘦 𝘩𝘰𝘴𝘵𝘴 𝘧𝘪𝘭𝘦.
𝘊: 𝘖𝘯𝘦 𝘢𝘯𝘴𝘸𝘦𝘳𝘴 𝘢 𝘋𝘕𝘚 𝘲𝘶𝘦𝘳𝘺 𝘣𝘦𝘧𝘰𝘳𝘦 𝘵𝘩𝘦 𝘲𝘶𝘦𝘳𝘺 𝘩𝘢𝘴 𝘣𝘦𝘦𝘯 𝘪𝘴𝘴𝘶𝘦𝘥 𝘪𝘯 𝘵𝘩𝘦 𝘩𝘰𝘱𝘦 𝘵𝘩𝘢𝘵 𝘢𝘯 𝘶𝘯𝘴𝘶𝘴𝘱𝘦𝘤𝘵𝘪𝘯𝘨 𝘩𝘰𝘴𝘵 𝘸𝘪𝘭𝘭 𝘤𝘢𝘤𝘩𝘦 𝘵𝘩𝘦 𝘪𝘯𝘤𝘰𝘳𝘳𝘦𝘤𝘵 ‘𝘢𝘯𝘴𝘸𝘦𝘳’.
𝘋: 𝘖𝘯𝘦 𝘮𝘰𝘥𝘪𝘧𝘪𝘦𝘴 𝘢 𝘻𝘰𝘯𝘦 𝘧𝘪𝘭𝘦 𝘸𝘪𝘵𝘩𝘰𝘶𝘵 𝘢𝘶𝘵𝘩𝘰𝘳𝘪𝘴𝘢𝘵𝘪𝘰𝘯.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
𝘈 : 𝘖𝘯𝘦 𝘶𝘴𝘦𝘴 𝘱𝘢𝘳𝘵𝘴 𝘰𝘧 𝘵𝘩𝘦 𝘥𝘰𝘮𝘢𝘪𝘯 𝘯𝘢𝘮𝘦 𝘵𝘰 𝘴𝘱𝘦𝘭𝘭 𝘢 𝘸𝘰𝘳𝘥 (𝘴𝘶𝘤𝘩 𝘢𝘴 𝘥𝘦𝘭.𝘪𝘤𝘪𝘰.𝘶𝘴).
RIP (Routing Information Protocol) is based on the ________algorithm.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
Bellman-Ford
An application protocol will typically respond with a message in the _______-range when it successfully completed a request.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
200s
An application protocol will typically respond with a message in the _______-range when security or configuration errors prevented it from completing a request.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
500s
The software providing services on the internet is often known as a (𝘋æ𝘮𝘰𝘯 | 𝘚𝘱𝘪𝘳𝘪𝘵 | 𝘎𝘩𝘰𝘴𝘵 | 𝘞𝘢𝘪𝘵𝘦𝘳 | 𝘊𝘭𝘪𝘦𝘯𝘵).
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
Dæmon
To express the TLD ‘com’ as an FQDN one would write __________.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
com.
In the DNS, SOA refers to _________.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
Start of Authority
The most important routing protocol at JINX is (𝘙𝘐𝘗 | 𝘉𝘎𝘗 | 𝘖𝘚𝘗𝘍).
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
BGP (Border Gateway Protocol)
On which ISO OSI layer should the two-phase commit protocol ideally be implemented?
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
5 / session
Huffman code is used to ____________.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
compress data
RFC
(i) what phrase it abbreviates and (ii) what it is used for
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
Request for comments; Internet standards and related issues
UTF
(i) what phrase it abbreviates and (ii) what it is used for.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
Unicode Transformation Format; encoding of Unicode characters
RJ-45
(i) what phrase it abbreviates and (ii) what it is used for.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
Recommended Jack 45; plug for Ethernet
ASCII
(i) what phrase it abbreviates and (ii) what it is used for.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
American Standard Code for Information Interchange; representation of characters
SSH
(i) what phrase it abbreviates and (ii) what it is used for.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
Secure Shell; virtual terminal with encrypted communication
CINX
(i) what phrase it abbreviates and (ii) what it is used for
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
Cape Town Internet Exchange; the ISPA peering point in Cape Town
ISP
(i) what phrase it abbreviates and (ii) what it is used for
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
Internet Service Provider; a party that provides another party with access to the Internet
ICANN
(i) what phrase it abbreviates and (ii) what it is used for
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²
International Committee for Assigned Names and Numbers; body that decides about names (like TLDs)
ZADNA
(i) what phrase it abbreviates and (ii) what it is used for
.ZA Domain Name Authority; the statutory regulator and manager of the .ZA Domain
Which ISO OSI layer’s functionality can be informally described as being a ‘pipe’?
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴
4 / the transport layer
How may the information be encoded that is supplied with an HTTP POST request?
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴
Key-value pairs, with spaces replaced by a + and URL-encoding applied afterwards.
The HTTP header contains a Host field in order to support (𝘚𝘦𝘤𝘶𝘳𝘪𝘵𝘺 | 𝘝𝘪𝘳𝘵𝘶𝘢𝘭 𝘩𝘰𝘴𝘵𝘪𝘯𝘨 | 𝘏𝘛𝘔𝘓 | 𝘈𝘶𝘵𝘩𝘦𝘯𝘵𝘪𝘤𝘢𝘵𝘪𝘰𝘯 | 𝘈𝘤𝘤𝘦𝘴𝘴 𝘴𝘱𝘦𝘦𝘥).
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴
virtual hosting
Protocols designed to determine network routes usually operate on ISO OSI layer ______.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴
7 / the application layer
A DNS SOA TTL entry indicates the time ______.
𝘈: 𝘈 𝘮𝘢𝘤𝘩𝘪𝘯𝘦 𝘪𝘴 𝘢𝘭𝘭𝘰𝘸𝘦𝘥 𝘵𝘰 𝘶𝘴𝘦 𝘢 𝘳𝘦𝘴𝘰𝘭𝘷𝘦𝘥 𝘯𝘢𝘮𝘦 𝘣𝘦𝘧𝘰𝘳𝘦 𝘵𝘩𝘦 𝘯𝘢𝘮𝘦 𝘩𝘢𝘴 𝘵𝘰 𝘣𝘦 𝘳𝘦𝘴𝘰𝘭𝘷𝘦𝘥 𝘢𝘨𝘢𝘪𝘯.
𝘉: 𝘈 𝘴𝘦𝘤𝘰𝘯𝘥𝘢𝘳𝘺 𝘯𝘢𝘮𝘦 𝘴𝘦𝘳𝘷𝘦𝘳 𝘪𝘴 𝘢𝘭𝘭𝘰𝘸𝘦𝘥 𝘵𝘰 𝘶𝘴𝘦 𝘯𝘢𝘮𝘦𝘴 𝘣𝘦𝘧𝘰𝘳𝘦 𝘴𝘺𝘯𝘤𝘩𝘳𝘰𝘯𝘪𝘴𝘪𝘯𝘨 𝘸𝘪𝘵𝘩 𝘵𝘩𝘦 𝘱𝘳𝘪𝘮𝘢𝘳𝘺 𝘴𝘦𝘳𝘷𝘦𝘳
𝘊: 𝘛𝘩𝘦 𝘵𝘪𝘮𝘦 𝘢 𝘴𝘦𝘤𝘰𝘯𝘥𝘢𝘳𝘺 𝘯𝘢𝘮𝘦𝘴𝘦𝘳𝘷𝘦𝘳 𝘪𝘴 𝘢𝘭𝘭𝘰𝘸𝘦𝘥 𝘵𝘰 𝘦𝘹𝘤𝘦𝘦𝘥 𝘵𝘩𝘦 𝘵𝘪𝘮𝘦 𝘭𝘪𝘮𝘪𝘵 𝘪𝘮𝘱𝘰𝘴𝘦𝘥 𝘰𝘯 𝘪𝘵 𝘣𝘺𝘵𝘩𝘦 𝘱𝘳𝘪𝘮𝘢𝘳𝘺 𝘴𝘦𝘳𝘷𝘦𝘳 𝘪𝘧 𝘪𝘵 𝘤𝘢𝘯𝘯𝘰𝘵 𝘦𝘴𝘵𝘢𝘣𝘭𝘪𝘴𝘩 𝘤𝘰𝘯𝘵𝘢𝘤𝘵 𝘸𝘪𝘵𝘩 𝘵𝘩𝘦 𝘱𝘳𝘪𝘮𝘢𝘳𝘺 𝘴𝘦𝘳𝘷𝘦𝘳.
𝘋: 𝘛𝘩𝘦 𝘵𝘪𝘮𝘦 𝘢 𝘴𝘦𝘤𝘰𝘯𝘥𝘢𝘳𝘺 𝘯𝘢𝘮𝘦 𝘴𝘦𝘳𝘷𝘦𝘳 𝘴𝘩𝘰𝘶𝘭𝘥 𝘸𝘢𝘪𝘵 𝘵𝘰 𝘰𝘣𝘵𝘢𝘪𝘯 𝘢 𝘤𝘶𝘳𝘳𝘦𝘯𝘵 𝘤𝘰𝘱𝘺 𝘰𝘧 𝘋𝘕𝘚 𝘦𝘯𝘵𝘳𝘪𝘦𝘴 𝘢𝘧𝘵𝘦𝘳 𝘢 𝘱𝘳𝘦𝘷𝘪𝘰𝘶𝘴 𝘴𝘺𝘯𝘤𝘩𝘳𝘰𝘯𝘪𝘴𝘢𝘵𝘪𝘰𝘯 𝘢𝘵𝘵𝘦𝘮𝘱𝘵 𝘧𝘢𝘪𝘭𝘦𝘥.
𝘌: 𝘛𝘩𝘦 𝘵𝘪𝘮𝘦 𝘢 𝘤𝘭𝘪𝘦𝘯𝘵 𝘸𝘩𝘰 𝘸𝘢𝘯𝘵𝘴 𝘵𝘰 𝘳𝘦𝘴𝘰𝘭𝘷𝘦 𝘢 𝘯𝘢𝘮𝘦 𝘴𝘩𝘰𝘶𝘭𝘥 𝘸𝘢𝘪𝘵 𝘣𝘦𝘧𝘰𝘳𝘦 𝘴𝘦𝘯𝘥𝘪𝘯𝘨 𝘢𝘯𝘰𝘵𝘩𝘦𝘳 𝘳𝘦𝘴𝘰𝘭𝘶𝘵𝘪𝘰𝘯 𝘳𝘦𝘲𝘶𝘦𝘴𝘵.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴
A: A machine is allowed to use a resolved name before the name has to be resolved again.
When does a DNS zone transfer occur?
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴
When a secondary nameserver is synchronised with a primary name server.
The whois command should (eventually) query the______________ records.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴
registrar’s
(𝘓𝘢𝘯𝘋𝘳𝘰𝘪𝘥 | 𝘕𝘦𝘹𝘶𝘴 | 𝘪𝘊𝘭𝘰𝘶𝘥 | 𝘋𝘕𝘚 | 𝘐𝘔𝘋𝘉) is a useful Android app for determining information about networks.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴
LanDroid
The structure used to store data used by SNMP is known as the ______.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴
MIB (Management Information Base)
A toy “telephone” consisting of two tin cans connected by a piece of string is able to
communicate in (𝘚𝘪𝘮𝘱𝘭𝘦𝘹 | 𝘏𝘢𝘭𝘧-𝘥𝘶𝘱𝘭𝘦𝘹 | 𝘍𝘶𝘭𝘭-𝘋𝘶𝘱𝘭𝘦𝘹) mode.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴
half-duplex
In data communications, a protocol is always ___________________
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³
A : A detailed description of the rules to be followed when communicating.
Ideally, an ISO layer provides services to . . . and uses services from . . . .
𝘈: 𝘵𝘩𝘦 𝘭𝘢𝘺𝘦𝘳 𝘣𝘦𝘭𝘰𝘸 𝘪𝘵; 𝘵𝘩𝘦 𝘭𝘢𝘺𝘦𝘳 𝘢𝘣𝘰𝘷𝘦 𝘪𝘵
𝘉 : 𝘵𝘩𝘦 𝘭𝘢𝘺𝘦𝘳 𝘢𝘣𝘰𝘷𝘦 𝘪𝘵; 𝘵𝘩𝘦 𝘭𝘢𝘺𝘦𝘳 𝘣𝘦𝘭𝘰𝘸 𝘪𝘵
𝘊: 𝘪𝘵𝘴 𝘱𝘦𝘦𝘳 𝘭𝘢𝘺𝘦𝘳 𝘦𝘭𝘴𝘦𝘸𝘩𝘦𝘳𝘦 𝘪𝘯 𝘵𝘩𝘦 𝘯𝘦𝘵𝘸𝘰𝘳𝘬; 𝘵𝘩𝘦 𝘭𝘢𝘺𝘦𝘳 𝘣𝘦𝘭𝘰𝘸 𝘪𝘵
𝘋: 𝘵𝘩𝘦 𝘭𝘢𝘺𝘦𝘳 𝘣𝘦𝘭𝘰𝘸 𝘪𝘵; 𝘪𝘵𝘴 𝘱𝘦𝘦𝘳 𝘭𝘢𝘺𝘦𝘳 𝘦𝘭𝘴𝘦𝘸𝘩𝘦𝘳𝘦 𝘪𝘯 𝘵𝘩𝘦 𝘯𝘦𝘵𝘸𝘰𝘳𝘬
𝘌: 𝘢 𝘱𝘦𝘦𝘳 𝘭𝘢𝘺𝘦𝘳 𝘴𝘰𝘮𝘦𝘸𝘩𝘦𝘳𝘦 𝘪𝘯 𝘵𝘩𝘦 𝘯𝘦𝘵𝘸𝘰𝘳𝘬; 𝘢 𝘱𝘦𝘦𝘳 𝘭𝘢𝘺𝘦𝘳 𝘴𝘰𝘮𝘦𝘸𝘩𝘦𝘳𝘦 𝘪𝘯 𝘵𝘩𝘦 𝘯𝘦𝘵𝘸𝘰𝘳𝘬
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³
B: the layer above it; the layer below it
The most important routing protocol at JINX is _______.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³
BGP— Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems
Indicating where layer 2 frames start and end is known as_________________.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³
data deliniation
Zone File
The file that contains the names, addresses and related information about a domain or
subdomain in the DNS.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³
A MIME 𝚖𝚞𝚕𝚝𝚒𝚙𝚊𝚛𝚝/𝚊𝚕𝚝𝚎𝚛𝚗𝚊𝚝𝚒𝚟𝚎 message should consist of components that _________.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³
B: are the same message, encoded in different (alternative) manners.
The ____________ utility may be used to decode messages that have been captured from a
network to their original formats.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³
𝚖𝚒𝚖𝚎𝚗𝚌𝚘𝚍𝚎
𝚛𝚜𝚢𝚗𝚌 is a utility that __________.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³
C: Synchronises directories — possibly via the network.