CHAPTER 13: Ethernet and TCP/IP Networking Flashcards

1
Q

The TCP/IP and OSI models are conceived and implemented as a hierarchical __________, in which each layer at the sending node contributes information that will be used by the corresponding peer layer at the receiving node.

a) rank structure
b) protocol stack
c) proprietary stack
d) communication levels

A

b) protocol stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is not part of the TCP/IP protocol suite?

a) http
b) ftp
c) SMS
d) ssh

A

c) SMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A data packet in an Ethernet network is called a(n)

a) pack.
b) frame.
c) envelope.
d) container.

A

b) frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The data link layer is divided into _____________ and ____________ sublayers.

a) medium access control; logical link control
b) physical access control; logical link control
c) medium access control; virtual link control
d) physical access control; virtual link control

A

a) medium access control; logical link control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _____________ occurs when multiple nodes access and send data simultaneously in such a way that their messages become mixed together and garbled.

a) conflict
b) collision
c) confrontation
d) commingling

A

b) collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Switched Ethernet does not actually implement the _______________ protocol, because connections are point-to-point and messages can’t become mixed together and garbled.

a) ARP
b) L2TP
c) HDLC
d) CSMA/CD

A

d) CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What protocol is used to discover the relation between an IP address and a corresponding MAC address?

a) ARP
b) L2TP
c) HDLC
d) CSMA/CD

A

a) ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The amount of time that it takes for a packet to get from one end of the network to the other is called the

a) furthest node travel time.
b) network broadcast delay.
c) network propagation delay.
d) network diameter delay time.

A

c) network propagation delay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ___________ is responsible for the addressing and routing of packets from the source end node through intermediate nodes, step by step, to their proper final destination.

a) transport
b) network layer
c) physical layer
d) Data Link Layer

A

b) network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Remember that the IP datagram may pass through different types of links. For certain types of physical layer connections, it is necessary to further divide the IP datagrams into smaller packets before they are delivered as frames to the data link layer. What are these smaller packets called?

a) pages
b) parcels
c) fragments
d) scatter grams

A

c) fragments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Although IP attempts to route every datagram to its final destination, it is a connectionless, packet switching service. IP is a(n) _____________ delivery service.

a) reliable best-effort
b) unreliable best-effort
c) reliable and guaranteed
d) unreliable but guaranteed

A

b) unreliable best-effort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Such network tools as ping and traceroute use the query services of ________ to provide the information that they report.

a) ARP
b) FTP
c) ICMP
d) HTTP

A

c) ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The purpose of the ___________ layer is to take messages from network applications and provide services that support reliable end-to-end communications.

a) network
b) physical
c) transport
d) Data Link

A

c) transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To identify the network application requesting service, the transport protocol identifies the application that created the message and the application that is to receive the message with

a) port numbers.
b) application numbers.
c) network node numbers.
d) application address numbers.

A

a) port numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

For communication between an application and the transport layer, operating systems provide an interface called a(n) ___________, which makes it easy to add a request to the communication services provided by the TCP/IP suite.

a) socket
b) named interface
c) TCP/IP association
d) service association

A

a) socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP establishes a connection at the request of a network application. To initiate a connection, TCP sends a control packet to TCP at the Web site, requesting a connection; this results in a brief back-and-forth series of requests and acknowledgments known as

a) binding.
b) collaborating
c) handshaking.
d) service handling.

A

c) handshaking.

17
Q

A connectionless protocol used instead of TCP for some applications is

a) user packet protocol.
b) user segment protocol.
c) user fragment protocol.
d) user datagram protocol.

A

d) user datagram protocol.

18
Q

An alternative to configuring individual workstations is to establish configurations dynamically when the computers connect to the network. What is this approach called?

a) NAT
b) DHCP
c) Masking
d) Dynamic NAT (DNAT)

A

b) DHCP

19
Q

What is the abbreviation for the protocol that translates domain names into IP addresses?

a) NAT
b) UDP
c) DNS
d) DHCP

A

c) DNS

20
Q

Since DNS request packets are simple and small, ______________ are used for packet transport.

a) IP packets
b) TCP packets
c) UDP datagrams
d) Ethernet frames

A

c) UDP datagrams

21
Q

Two additional benefits of DNS services are: 1) permits the use of alias names that share the same IP address and 2) ________________.

a) perform load balancing for replicated servers
b) perform authentication on requesting computers
c) lower cost associated with managing IP addresses
d) enhance performance by caching multiple requests

A

a) perform load balancing for replicated servers

22
Q

In part, ___________________ focuses on methods to reserve and prioritize channel capacity to favor packets that require special treatment.

a) DNS
b) QoS
c) TCP/IP
d) Ethernet

A

b) QoS

23
Q

The variation in delay from packet to packet is known as _________. It is a particularly important parameter in the transmission of video and audio.

a) QoS
b) jitter
c) packet delay
d) network delay propagation

A

b) jitter

24
Q

Modern routers, sometimes called ____________, can prioritize and route packets based on the packet class.

a) QoS routers
b) Edge routers
c) Gateway routers
d) DiffServ capable nodes

A

d) DiffServ capable nodes

25
Q

Which of the following is a primary measure to keep the network and system resources intact and free from the results of intrusion?

a) CAPTCHAs
b) confidentiality
c) electronic signatures
d) limiting physical access to network wiring and network equipment.

A

d) limiting physical access to network wiring and network equipment.

26
Q

Keeping the content of data traversing the network and information about the communication taking place private is known as

a) encryption.
b) authentication.
c) confidentiality.
d) nonrepudiation.

A

c) confidentiality.

27
Q

Protecting the content of data communication against changes is known as

a) integrity.
b) encryption.
c) confidentiality.
d) authentication.

A

a) integrity.

28
Q

Using encryption can be helpful in mitigating network security issues except

a) intrusion.
b) availability.
c) authentication.
d) nonrepudiation.

A

b) availability.

29
Q

Reading data in all the packets as they pass through the network is known as

a) packet sniffing.
b) switch tapping.
c) packet spoofing.
d) packet cracking.

A

a) packet sniffing.

30
Q

Symmetric key cryptography requires

a) two different keys, both private.
b) the same key be used for both encryption and decryption.
c) two different keys, one publicly available, and the other private.
d) the same key be used, one publicly available, and the other private.

A

b) the same key be used for both encryption and decryption.

31
Q

The upper _________ layers of the OSI model assume that a successful end-to-end connection is established and maintained at the transport layer. These layers are concerned with the flow of data and control between applications on the communicating nodes.

a) two
b) three
c) four
d) five

A

b) three

32
Q

The dialogue between two cooperating applications or processes at the ends of the communication link on the OSI model is known as a

a) session.
b) connection.
c) communications link.
d) time-sensitive service.

A

a) session.

33
Q

What is the name of the standard that includes the conversion of voice, as well as data, into IP data packets for transmission, as part of the specification?

a) VOIP
b) OSI LTE
c) Long Term Evolution (LTE)
d) Third generation mobile network

A

c) Long Term Evolution (LTE)

34
Q

In cellular technology, the movement of the users from cell to cell is called a

a) handoff.
b) handover.
c) cell transfer.
d) next cell transfer.

A

a) handoff.

35
Q

MPLS operates at the ____________ layer.

a) network
b) data link
c) transport
d) application

A

b) data link