Application Layer (7) Past Semester Test Multiple Choice Questions Flashcards

1
Q

The physical path used by a data communications message is known as the (medium | protocol | transport layer)
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴

A

medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which ISO OSI layer provides process-to-process delivery?

ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴

A

Layer 4/Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When a message moves through the protocol stack towards the physical layer, headers are (appended | removed | added | modified | rearranged)
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴

A

added

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A header added to a message at ISO OSI layer 𝑛 will be removed at the destination at layer (𝑛-1 | 𝑛 | 𝑛 +1 | 1 | 7)
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴

A

𝑛

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Manchester encoding has a transition ____________ each bit interval.

(between | in the middle of | All of the above | None of the above)
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴

A

in the middle of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Assume ASK (Amplitude Shift Keying) is used for data transmission at 600 bps. The baud rate is (150 | 300 | 1200 | 600).
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
A

600

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An E1 line communicates at ________.

the same speed as a T1 line | 1.5 Mbps | 2.048 Mbps | 10.000 Mbps
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴

A

2.048 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A CRC (cyclic redundancy check) is used to ensure that data is transmitted correctly. We know that no transmission errors have occurred if the remainder (after division) is _______.

( Even | Odd | 0 | 1)
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(Definition)
_________: 𝘢𝘯 𝘦𝘳𝘳𝘰𝘳-𝘥𝘦𝘵𝘦𝘤𝘵𝘪𝘯𝘨 𝘤𝘰𝘥𝘦 𝘤𝘰𝘮𝘮𝘰𝘯𝘭𝘺 𝘶𝘴𝘦𝘥 𝘪𝘯 𝘥𝘪𝘨𝘪𝘵𝘢𝘭 𝘯𝘦𝘵𝘸𝘰𝘳𝘬𝘴 𝘢𝘯𝘥 𝘴𝘵𝘰𝘳𝘢𝘨𝘦 𝘥𝘦𝘷𝘪𝘤𝘦𝘴 𝘵𝘰 𝘥𝘦𝘵𝘦𝘤𝘵 𝘢𝘤𝘤𝘪𝘥𝘦𝘯𝘵𝘢𝘭 𝘤𝘩𝘢𝘯𝘨𝘦𝘴 𝘵𝘰 𝘳𝘢𝘸 𝘥𝘢𝘵𝘢

A

Cyclic Redundancy Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IEEE 802.11g (at full speed) communicates at ________.

54 Mbps | 11 Mbps | 10 Mbps | 1 Mbps | 128 kbps
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴

A

54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
The REJ (Reject) frame of HDLC (High-level Data Link Control) will cause the (𝘗𝘳𝘦𝘷𝘪𝘰𝘶𝘴 | 𝘐𝘯𝘥𝘪𝘤𝘢𝘵𝘦𝘥 | 𝘐𝘯𝘥𝘪𝘤𝘢𝘵𝘦𝘥 𝘢𝘯𝘥 𝘢𝘭𝘭 𝘱𝘳𝘪𝘰𝘳 | 𝘐𝘯𝘥𝘪𝘤𝘢𝘵𝘦𝘥 𝘢𝘯𝘥 𝘢𝘭𝘭 𝘴𝘶𝘣𝘴𝘦𝘲𝘶𝘦𝘯𝘵) frame(s) to be resent.
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴
A

Indicated and all subsequent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HDLC’s DISC (Disconnect) is an example of a(n) (𝘏𝘢𝘯𝘥𝘴𝘩𝘢𝘬𝘦 | 𝘜𝘯𝘯𝘶𝘮𝘣𝘦𝘳𝘦𝘥 | 𝘚𝘶𝘱𝘦𝘳𝘷𝘪𝘴𝘰𝘳𝘺 | 𝘐𝘯𝘧𝘰𝘳𝘮𝘢𝘵𝘪𝘰𝘯 | 𝘛𝘊𝘗) frame.
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴

A

unnumbered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When no monitor’s presence is detected on an 802.5 network…

A: The hub appoints a new monitor.
B: The previous monitor resumes its duties.
C: The station with the highest priority starts acting as monitor.
D : A new monitor is elected by the remaining nodes.
E: The networks simply continues operating because it does not really need a monitor.
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴

A

…a new monitor is elected by the remaining nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In CSMA/CA the sequence of events to avoid collisions is…

A: NAV, RTS, CTS
B: RTS, NAV, CTS
C: NAV, CTS, RTS
D: RTS, NAV, CTS
E : RTS, CTS, NAV

ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴

A

RTS, CTS, NAV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where are fragmented IP datagrams reassembled?

(𝘈𝘵 𝘵𝘩𝘦 𝘧𝘪𝘳𝘴𝘵 𝘳𝘰𝘶𝘵𝘦𝘳 𝘵𝘩𝘢𝘵 𝘯𝘰𝘵𝘪𝘤𝘦𝘴 𝘵𝘩𝘢𝘵 𝘪𝘵 𝘪𝘴 𝘧𝘳𝘢𝘨𝘮𝘦𝘯𝘵𝘦𝘥. | 𝘈𝘵 𝘵𝘩𝘦 𝘧𝘪𝘳𝘴𝘵 𝘳𝘰𝘶𝘵𝘦𝘳 𝘵𝘩𝘢𝘵 𝘤𝘢𝘯 𝘩𝘢𝘯𝘥𝘭𝘦 𝘵𝘩𝘦 𝘵𝘰𝘵𝘢𝘭 𝘐𝘗 𝘥𝘢𝘵𝘢𝘨𝘳𝘢𝘮 | 𝘈𝘵 𝘵𝘩𝘦 𝘧𝘪𝘯𝘢𝘭 𝘥𝘦𝘴𝘵𝘪𝘯𝘢𝘵𝘪𝘰𝘯.| 𝘞𝘩𝘦𝘯𝘦𝘷𝘦𝘳 𝘵𝘩𝘦 𝘛𝘛𝘓 𝘣𝘦𝘤𝘰𝘮𝘦𝘴 0. | 𝘍𝘳𝘢𝘨𝘮𝘦𝘯𝘵𝘦𝘥 𝘐𝘗 𝘥𝘢𝘵𝘢𝘨𝘳𝘢𝘮𝘴 𝘢𝘳𝘦 𝘥𝘪𝘴𝘤𝘢𝘳𝘥𝘦𝘥, 𝘳𝘢𝘵𝘩𝘦𝘳 𝘵𝘩𝘢𝘯 𝘳𝘦𝘢𝘴𝘴𝘦𝘮𝘣𝘭𝘦𝘥.)
ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᶠʳᵒᵐ ³ ᴹᵃʸ ²⁰⁰⁴

A

At the final destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A UTP cable used for Ethernet uses the (𝘋𝘉25 | 𝘛𝘦𝘭𝘬𝘰𝘮 | 𝘙𝘑-45 | 𝘟-45) connector.
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵

A

RJ-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Manchester encoding is better than NRZ because __________
𝘈: 𝘔𝘢𝘯𝘤𝘩𝘦𝘴𝘵𝘦𝘳 𝘪𝘴 𝘴𝘦𝘭𝘧-𝘴𝘺𝘯𝘤𝘩𝘳𝘰𝘯𝘪𝘴𝘪𝘯𝘨.
𝘉: 𝘛𝘩𝘦 𝘣𝘢𝘶𝘥 𝘳𝘢𝘵𝘦 𝘰𝘧 𝘔𝘢𝘯𝘤𝘩𝘦𝘴𝘵𝘦𝘳 𝘪𝘴 𝘩𝘪𝘨𝘩𝘦𝘳 𝘵𝘩𝘢𝘯 𝘵𝘩𝘢𝘵 𝘰𝘧 𝘕𝘙𝘡.
𝘊: 𝘛𝘩𝘦 𝘣𝘢𝘶𝘥 𝘳𝘢𝘵𝘦 𝘰𝘧 𝘔𝘢𝘯𝘤𝘩𝘦𝘴𝘵𝘦𝘳 𝘪𝘴 𝘭𝘰𝘸𝘦𝘳 𝘵𝘩𝘢𝘯 𝘵𝘩𝘢𝘵 𝘰𝘧 𝘕𝘙𝘡.
𝘋: 𝘛𝘩𝘦 𝘸𝘪𝘳𝘦𝘴 𝘮𝘢𝘺 𝘣𝘦 𝘴𝘸𝘪𝘵𝘤𝘩𝘦𝘥 𝘪𝘯 𝘵𝘩𝘦 𝘤𝘢𝘴𝘦 𝘰𝘧 𝘔𝘢𝘯𝘤𝘩𝘦𝘴𝘵𝘦𝘳.
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵

A

A: Manchester is self-synchronising.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

If a communications channel uses QAM at a baud rate of 9600, data is transmitted at (𝟷𝟸𝟶𝟶 | 𝟸𝟺𝟶𝟶 | 𝟿𝟼𝟶𝟶 | 𝟷𝟿𝟸𝟶𝟶 | 𝟸𝟾𝟾𝟶𝟶 ) bps.
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵

A

28800 bps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

XML fits into layer ____ of the ISO/OSI model.

ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵

A

six (presentation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

At which ISO/OSI layer are communicating applications synchronised?
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵

A

5/session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Layer 6 of ISO/OSI is the ______ layer.

ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵

A

presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A Hamming code capable of correcting single-bit errors and using n parity bits can, at
most, contain (2ⁿ − 𝑛 − 1 | 10 | 2 x 𝑛) data bits.
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵

A

2ⁿ − 𝑛 − 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

If parity is used for error control, only errors that affect (𝘈 𝘴𝘪𝘯𝘨𝘭𝘦 𝘣𝘪𝘵 | 𝘈𝘯 𝘰𝘥𝘥 𝘯𝘶𝘮𝘣𝘦𝘳 𝘰𝘧 𝘣𝘪𝘵𝘴 | 𝘈𝘯 𝘦𝘷𝘦𝘯 𝘯𝘶𝘮𝘣𝘦𝘳 𝘰𝘧 𝘣𝘪𝘵𝘴) will be detected.
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵

A

an odd number of bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
IEEE 802.3 defines 
𝘈: 𝘌𝘵𝘩𝘦𝘳𝘯𝘦𝘵
𝘉: 𝘓𝘓𝘊
𝘊: 𝘏𝘋𝘓𝘊
𝘋: 𝘛𝘰𝘬𝘦𝘯 𝘳𝘪𝘯𝘨
𝘌: 𝘔𝘰𝘳𝘦 𝘵𝘩𝘢𝘯 𝘰𝘯𝘦 𝘰𝘧 𝘵𝘩𝘦 𝘢𝘣𝘰𝘷𝘦
ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵
A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

When one node polls another, it wants to know whether ____.
𝘈 : 𝘛𝘩𝘦 𝘰𝘵𝘩𝘦𝘳 𝘯𝘰𝘥𝘦 𝘩𝘢𝘴 𝘴𝘰𝘮𝘦𝘵𝘩𝘪𝘯𝘨 𝘵𝘰 𝘴𝘦𝘯𝘥.
𝘉: 𝘛𝘩𝘦 𝘰𝘵𝘩𝘦𝘳 𝘯𝘰𝘥𝘦 𝘪𝘴 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘤𝘢𝘵𝘪𝘯𝘨.
𝘊: 𝘐𝘵 𝘮𝘢𝘺 𝘴𝘦𝘯𝘥 𝘴𝘰𝘮𝘦𝘵𝘩𝘪𝘯𝘨 𝘵𝘰 𝘵𝘩𝘦 𝘰𝘵𝘩𝘦𝘳 𝘯𝘰𝘥𝘦.

ᶠʳᵒᵐ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᴬᵖʳⁱˡ ²⁰⁰⁵

A

the other node has something to send.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

IP datagrams support source routing. Source routing is…
𝘈: 𝘞𝘩𝘦𝘳𝘦 𝘵𝘩𝘦 𝘱𝘢𝘤𝘬𝘦𝘵 𝘪𝘴 𝘳𝘰𝘶𝘵𝘦𝘥 𝘣𝘢𝘤𝘬 𝘵𝘰 𝘵𝘩𝘦 𝘴𝘰𝘶𝘳𝘤𝘦.
𝘉: 𝘞𝘩𝘦𝘳𝘦 𝘢𝘭𝘭 𝘵𝘩𝘦 𝘱𝘢𝘤𝘬𝘦𝘵𝘴 𝘧𝘳𝘰𝘮 𝘵𝘩𝘦 𝘴𝘢𝘮𝘦 𝘴𝘰𝘶𝘳𝘤𝘦 𝘢𝘳𝘦 𝘢𝘭𝘭 𝘴𝘦𝘯𝘵 𝘵𝘰𝘨𝘦𝘵𝘩𝘦𝘳.
𝘊 : 𝘞𝘩𝘦𝘳𝘦 𝘵𝘩𝘦 𝘴𝘰𝘶𝘳𝘤𝘦 𝘥𝘦𝘵𝘦𝘳𝘮𝘪𝘯𝘦𝘴 𝘵𝘩𝘦 𝘳𝘰𝘶𝘵𝘦 𝘰𝘧 𝘵𝘩𝘦 𝘱𝘢𝘤𝘬𝘦𝘵.
𝘋: 𝘍𝘳𝘦𝘲𝘶𝘦𝘯𝘵𝘭𝘺 𝘶𝘴𝘦𝘥 𝘰𝘯 𝘵𝘩𝘦 𝘐𝘯𝘵𝘦𝘳𝘯𝘦𝘵.

ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹⁶ ᴬᵖʳⁱˡ ²⁰¹⁰

A

C: where the source determines the route of the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The nslookup command that changes the server used for name resolution is (𝘴𝘦𝘳𝘷𝘦𝘳 | 𝘩𝘰𝘴𝘵 | 𝘳𝘰𝘰𝘵 | 𝘳𝘦𝘴𝘰𝘭𝘷𝘦 | 𝘶𝘴𝘦).
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹⁶ ᴬᵖʳⁱˡ ²⁰¹⁰

A

server

28
Q
The routes used by EGPs (external gateway protocols) are typically determined by \_\_\_\_\_\_\_\_\_\_.
𝘈: 𝘊𝘰𝘴𝘵𝘴
𝘉: 𝘗𝘰𝘭𝘪𝘤𝘪𝘦𝘴
𝘊: 𝘏𝘰𝘱-𝘤𝘰𝘶𝘯𝘵
𝘋: 𝘐𝘈𝘕𝘈
𝘌: 𝘕𝘦𝘵𝘸𝘰𝘳𝘬 𝘐𝘯𝘧𝘰𝘳𝘮𝘢𝘵𝘪𝘰𝘯 𝘊𝘦𝘯𝘵𝘳𝘦𝘴 (𝘕𝘐𝘊𝘴)

ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹⁶ ᴬᵖʳⁱˡ ²⁰¹⁰

A

B: Policies

29
Q

If the ASCII for ‘A’ is 41₁₆ and for ‘J’ it is 4A₁₆, which character is represented by 47₁₆?

ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹⁶ ᴬᵖʳⁱˡ ²⁰¹⁰

A

G

30
Q

A domain hack occurs when _________.
𝘈 : 𝘖𝘯𝘦 𝘶𝘴𝘦𝘴 𝘱𝘢𝘳𝘵𝘴 𝘰𝘧 𝘵𝘩𝘦 𝘥𝘰𝘮𝘢𝘪𝘯 𝘯𝘢𝘮𝘦 𝘵𝘰 𝘴𝘱𝘦𝘭𝘭 𝘢 𝘸𝘰𝘳𝘥 (𝘴𝘶𝘤𝘩 𝘢𝘴 𝘥𝘦𝘭.𝘪𝘤𝘪𝘰.𝘶𝘴).
𝘉: 𝘖𝘯𝘦 𝘰𝘷𝘦𝘳𝘳𝘪𝘥𝘦𝘴 𝘵𝘩𝘦 𝘋𝘕𝘚 𝘣𝘺 𝘦𝘯𝘵𝘦𝘳𝘪𝘯𝘨 𝘪𝘯𝘧𝘰𝘳𝘮𝘢𝘵𝘪𝘰𝘯 𝘪𝘯 𝘵𝘩𝘦 𝘩𝘰𝘴𝘵𝘴 𝘧𝘪𝘭𝘦.
𝘊: 𝘖𝘯𝘦 𝘢𝘯𝘴𝘸𝘦𝘳𝘴 𝘢 𝘋𝘕𝘚 𝘲𝘶𝘦𝘳𝘺 𝘣𝘦𝘧𝘰𝘳𝘦 𝘵𝘩𝘦 𝘲𝘶𝘦𝘳𝘺 𝘩𝘢𝘴 𝘣𝘦𝘦𝘯 𝘪𝘴𝘴𝘶𝘦𝘥 𝘪𝘯 𝘵𝘩𝘦 𝘩𝘰𝘱𝘦 𝘵𝘩𝘢𝘵 𝘢𝘯 𝘶𝘯𝘴𝘶𝘴𝘱𝘦𝘤𝘵𝘪𝘯𝘨 𝘩𝘰𝘴𝘵 𝘸𝘪𝘭𝘭 𝘤𝘢𝘤𝘩𝘦 𝘵𝘩𝘦 𝘪𝘯𝘤𝘰𝘳𝘳𝘦𝘤𝘵 ‘𝘢𝘯𝘴𝘸𝘦𝘳’.
𝘋: 𝘖𝘯𝘦 𝘮𝘰𝘥𝘪𝘧𝘪𝘦𝘴 𝘢 𝘻𝘰𝘯𝘦 𝘧𝘪𝘭𝘦 𝘸𝘪𝘵𝘩𝘰𝘶𝘵 𝘢𝘶𝘵𝘩𝘰𝘳𝘪𝘴𝘢𝘵𝘪𝘰𝘯.

ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

𝘈 : 𝘖𝘯𝘦 𝘶𝘴𝘦𝘴 𝘱𝘢𝘳𝘵𝘴 𝘰𝘧 𝘵𝘩𝘦 𝘥𝘰𝘮𝘢𝘪𝘯 𝘯𝘢𝘮𝘦 𝘵𝘰 𝘴𝘱𝘦𝘭𝘭 𝘢 𝘸𝘰𝘳𝘥 (𝘴𝘶𝘤𝘩 𝘢𝘴 𝘥𝘦𝘭.𝘪𝘤𝘪𝘰.𝘶𝘴).

31
Q

RIP (Routing Information Protocol) is based on the ________algorithm.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

Bellman-Ford

32
Q

An application protocol will typically respond with a message in the _______-range when it successfully completed a request.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

200s

33
Q

An application protocol will typically respond with a message in the _______-range when security or configuration errors prevented it from completing a request.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

500s

34
Q

The software providing services on the internet is often known as a (𝘋æ𝘮𝘰𝘯 | 𝘚𝘱𝘪𝘳𝘪𝘵 | 𝘎𝘩𝘰𝘴𝘵 | 𝘞𝘢𝘪𝘵𝘦𝘳 | 𝘊𝘭𝘪𝘦𝘯𝘵).
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

Dæmon

35
Q

To express the TLD ‘com’ as an FQDN one would write __________.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

com.

36
Q

In the DNS, SOA refers to _________.

ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

Start of Authority

37
Q

The most important routing protocol at JINX is (𝘙𝘐𝘗 | 𝘉𝘎𝘗 | 𝘖𝘚𝘗𝘍).
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

BGP (Border Gateway Protocol)

38
Q

On which ISO OSI layer should the two-phase commit protocol ideally be implemented?
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

5 / session

39
Q

Huffman code is used to ____________.

ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

compress data

40
Q

RFC
(i) what phrase it abbreviates and (ii) what it is used for
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

Request for comments; Internet standards and related issues

41
Q

UTF
(i) what phrase it abbreviates and (ii) what it is used for.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

Unicode Transformation Format; encoding of Unicode characters

42
Q

RJ-45
(i) what phrase it abbreviates and (ii) what it is used for.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

Recommended Jack 45; plug for Ethernet

43
Q

ASCII
(i) what phrase it abbreviates and (ii) what it is used for.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

American Standard Code for Information Interchange; representation of characters

44
Q

SSH
(i) what phrase it abbreviates and (ii) what it is used for.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

Secure Shell; virtual terminal with encrypted communication

45
Q

CINX
(i) what phrase it abbreviates and (ii) what it is used for
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

Cape Town Internet Exchange; the ISPA peering point in Cape Town

46
Q

ISP
(i) what phrase it abbreviates and (ii) what it is used for
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

Internet Service Provider; a party that provides another party with access to the Internet

47
Q

ICANN
(i) what phrase it abbreviates and (ii) what it is used for
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ¹¹ ᵃᵖʳⁱˡ ²⁰¹²

A

International Committee for Assigned Names and Numbers; body that decides about names (like TLDs)

48
Q

ZADNA

(i) what phrase it abbreviates and (ii) what it is used for

A

.ZA Domain Name Authority; the statutory regulator and manager of the .ZA Domain

49
Q

Which ISO OSI layer’s functionality can be informally described as being a ‘pipe’?
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴

A

4 / the transport layer

50
Q

How may the information be encoded that is supplied with an HTTP POST request?
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴

A

Key-value pairs, with spaces replaced by a + and URL-encoding applied afterwards.

51
Q

The HTTP header contains a Host field in order to support (𝘚𝘦𝘤𝘶𝘳𝘪𝘵𝘺 | 𝘝𝘪𝘳𝘵𝘶𝘢𝘭 𝘩𝘰𝘴𝘵𝘪𝘯𝘨 | 𝘏𝘛𝘔𝘓 | 𝘈𝘶𝘵𝘩𝘦𝘯𝘵𝘪𝘤𝘢𝘵𝘪𝘰𝘯 | 𝘈𝘤𝘤𝘦𝘴𝘴 𝘴𝘱𝘦𝘦𝘥).
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴

A

virtual hosting

52
Q

Protocols designed to determine network routes usually operate on ISO OSI layer ______.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴

A

7 / the application layer

53
Q

A DNS SOA TTL entry indicates the time ______.
𝘈: 𝘈 𝘮𝘢𝘤𝘩𝘪𝘯𝘦 𝘪𝘴 𝘢𝘭𝘭𝘰𝘸𝘦𝘥 𝘵𝘰 𝘶𝘴𝘦 𝘢 𝘳𝘦𝘴𝘰𝘭𝘷𝘦𝘥 𝘯𝘢𝘮𝘦 𝘣𝘦𝘧𝘰𝘳𝘦 𝘵𝘩𝘦 𝘯𝘢𝘮𝘦 𝘩𝘢𝘴 𝘵𝘰 𝘣𝘦 𝘳𝘦𝘴𝘰𝘭𝘷𝘦𝘥 𝘢𝘨𝘢𝘪𝘯.
𝘉: 𝘈 𝘴𝘦𝘤𝘰𝘯𝘥𝘢𝘳𝘺 𝘯𝘢𝘮𝘦 𝘴𝘦𝘳𝘷𝘦𝘳 𝘪𝘴 𝘢𝘭𝘭𝘰𝘸𝘦𝘥 𝘵𝘰 𝘶𝘴𝘦 𝘯𝘢𝘮𝘦𝘴 𝘣𝘦𝘧𝘰𝘳𝘦 𝘴𝘺𝘯𝘤𝘩𝘳𝘰𝘯𝘪𝘴𝘪𝘯𝘨 𝘸𝘪𝘵𝘩 𝘵𝘩𝘦 𝘱𝘳𝘪𝘮𝘢𝘳𝘺 𝘴𝘦𝘳𝘷𝘦𝘳
𝘊: 𝘛𝘩𝘦 𝘵𝘪𝘮𝘦 𝘢 𝘴𝘦𝘤𝘰𝘯𝘥𝘢𝘳𝘺 𝘯𝘢𝘮𝘦𝘴𝘦𝘳𝘷𝘦𝘳 𝘪𝘴 𝘢𝘭𝘭𝘰𝘸𝘦𝘥 𝘵𝘰 𝘦𝘹𝘤𝘦𝘦𝘥 𝘵𝘩𝘦 𝘵𝘪𝘮𝘦 𝘭𝘪𝘮𝘪𝘵 𝘪𝘮𝘱𝘰𝘴𝘦𝘥 𝘰𝘯 𝘪𝘵 𝘣𝘺𝘵𝘩𝘦 𝘱𝘳𝘪𝘮𝘢𝘳𝘺 𝘴𝘦𝘳𝘷𝘦𝘳 𝘪𝘧 𝘪𝘵 𝘤𝘢𝘯𝘯𝘰𝘵 𝘦𝘴𝘵𝘢𝘣𝘭𝘪𝘴𝘩 𝘤𝘰𝘯𝘵𝘢𝘤𝘵 𝘸𝘪𝘵𝘩 𝘵𝘩𝘦 𝘱𝘳𝘪𝘮𝘢𝘳𝘺 𝘴𝘦𝘳𝘷𝘦𝘳.
𝘋: 𝘛𝘩𝘦 𝘵𝘪𝘮𝘦 𝘢 𝘴𝘦𝘤𝘰𝘯𝘥𝘢𝘳𝘺 𝘯𝘢𝘮𝘦 𝘴𝘦𝘳𝘷𝘦𝘳 𝘴𝘩𝘰𝘶𝘭𝘥 𝘸𝘢𝘪𝘵 𝘵𝘰 𝘰𝘣𝘵𝘢𝘪𝘯 𝘢 𝘤𝘶𝘳𝘳𝘦𝘯𝘵 𝘤𝘰𝘱𝘺 𝘰𝘧 𝘋𝘕𝘚 𝘦𝘯𝘵𝘳𝘪𝘦𝘴 𝘢𝘧𝘵𝘦𝘳 𝘢 𝘱𝘳𝘦𝘷𝘪𝘰𝘶𝘴 𝘴𝘺𝘯𝘤𝘩𝘳𝘰𝘯𝘪𝘴𝘢𝘵𝘪𝘰𝘯 𝘢𝘵𝘵𝘦𝘮𝘱𝘵 𝘧𝘢𝘪𝘭𝘦𝘥.
𝘌: 𝘛𝘩𝘦 𝘵𝘪𝘮𝘦 𝘢 𝘤𝘭𝘪𝘦𝘯𝘵 𝘸𝘩𝘰 𝘸𝘢𝘯𝘵𝘴 𝘵𝘰 𝘳𝘦𝘴𝘰𝘭𝘷𝘦 𝘢 𝘯𝘢𝘮𝘦 𝘴𝘩𝘰𝘶𝘭𝘥 𝘸𝘢𝘪𝘵 𝘣𝘦𝘧𝘰𝘳𝘦 𝘴𝘦𝘯𝘥𝘪𝘯𝘨 𝘢𝘯𝘰𝘵𝘩𝘦𝘳 𝘳𝘦𝘴𝘰𝘭𝘶𝘵𝘪𝘰𝘯 𝘳𝘦𝘲𝘶𝘦𝘴𝘵.

ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴

A

A: A machine is allowed to use a resolved name before the name has to be resolved again.

54
Q

When does a DNS zone transfer occur?

ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴

A

When a secondary nameserver is synchronised with a primary name server.

55
Q

The whois command should (eventually) query the______________ records.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴

A

registrar’s

56
Q

(𝘓𝘢𝘯𝘋𝘳𝘰𝘪𝘥 | 𝘕𝘦𝘹𝘶𝘴 | 𝘪𝘊𝘭𝘰𝘶𝘥 | 𝘋𝘕𝘚 | 𝘐𝘔𝘋𝘉) is a useful Android app for determining information about networks.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴

A

LanDroid

57
Q

The structure used to store data used by SNMP is known as the ______.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴

A

MIB (Management Information Base)

58
Q

A toy “telephone” consisting of two tin cans connected by a piece of string is able to
communicate in (𝘚𝘪𝘮𝘱𝘭𝘦𝘹 | 𝘏𝘢𝘭𝘧-𝘥𝘶𝘱𝘭𝘦𝘹 | 𝘍𝘶𝘭𝘭-𝘋𝘶𝘱𝘭𝘦𝘹) mode.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ⁹ ᵃᵖʳⁱˡ ²⁰¹⁴

A

half-duplex

59
Q

In data communications, a protocol is always ___________________

ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³

A

A : A detailed description of the rules to be followed when communicating.

60
Q

Ideally, an ISO layer provides services to . . . and uses services from . . . .
𝘈: 𝘵𝘩𝘦 𝘭𝘢𝘺𝘦𝘳 𝘣𝘦𝘭𝘰𝘸 𝘪𝘵; 𝘵𝘩𝘦 𝘭𝘢𝘺𝘦𝘳 𝘢𝘣𝘰𝘷𝘦 𝘪𝘵
𝘉 : 𝘵𝘩𝘦 𝘭𝘢𝘺𝘦𝘳 𝘢𝘣𝘰𝘷𝘦 𝘪𝘵; 𝘵𝘩𝘦 𝘭𝘢𝘺𝘦𝘳 𝘣𝘦𝘭𝘰𝘸 𝘪𝘵
𝘊: 𝘪𝘵𝘴 𝘱𝘦𝘦𝘳 𝘭𝘢𝘺𝘦𝘳 𝘦𝘭𝘴𝘦𝘸𝘩𝘦𝘳𝘦 𝘪𝘯 𝘵𝘩𝘦 𝘯𝘦𝘵𝘸𝘰𝘳𝘬; 𝘵𝘩𝘦 𝘭𝘢𝘺𝘦𝘳 𝘣𝘦𝘭𝘰𝘸 𝘪𝘵
𝘋: 𝘵𝘩𝘦 𝘭𝘢𝘺𝘦𝘳 𝘣𝘦𝘭𝘰𝘸 𝘪𝘵; 𝘪𝘵𝘴 𝘱𝘦𝘦𝘳 𝘭𝘢𝘺𝘦𝘳 𝘦𝘭𝘴𝘦𝘸𝘩𝘦𝘳𝘦 𝘪𝘯 𝘵𝘩𝘦 𝘯𝘦𝘵𝘸𝘰𝘳𝘬
𝘌: 𝘢 𝘱𝘦𝘦𝘳 𝘭𝘢𝘺𝘦𝘳 𝘴𝘰𝘮𝘦𝘸𝘩𝘦𝘳𝘦 𝘪𝘯 𝘵𝘩𝘦 𝘯𝘦𝘵𝘸𝘰𝘳𝘬; 𝘢 𝘱𝘦𝘦𝘳 𝘭𝘢𝘺𝘦𝘳 𝘴𝘰𝘮𝘦𝘸𝘩𝘦𝘳𝘦 𝘪𝘯 𝘵𝘩𝘦 𝘯𝘦𝘵𝘸𝘰𝘳𝘬

ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³

A

B: the layer above it; the layer below it

61
Q

The most important routing protocol at JINX is _______.

ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³

A

BGP— Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems

62
Q

Indicating where layer 2 frames start and end is known as_________________.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³

A

data deliniation

63
Q

Zone File

A

The file that contains the names, addresses and related information about a domain or
subdomain in the DNS.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³

64
Q

A MIME 𝚖𝚞𝚕𝚝𝚒𝚙𝚊𝚛𝚝/𝚊𝚕𝚝𝚎𝚛𝚗𝚊𝚝𝚒𝚟𝚎 message should consist of components that _________.

ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³

A

B: are the same message, encoded in different (alternative) manners.

65
Q

The ____________ utility may be used to decode messages that have been captured from a
network to their original formats.
ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³

A

𝚖𝚒𝚖𝚎𝚗𝚌𝚘𝚍𝚎

66
Q

𝚛𝚜𝚢𝚗𝚌 is a utility that __________.

ᶠʳᵒᵐ ᵗʰᵉ ˢᵉᵐᵉˢᵗᵉʳ ᵗᵉˢᵗ ᵒⁿ ²⁹ ᵃᵖʳⁱˡ ²⁰¹³

A

C: Synchronises directories — possibly via the network.