COS 332 July Exam 2022 Flashcards
A layer in the protocol stack generally provides services for…
the layer above it.
Name two directory access protocols
- LDAP
- X.500
The primary metric used by interior gateway protocols is…
cost
A Network Information Centre (NIC)…
- provides information about the current status of an ISP’s network
- allocates IP addresses to ISPs and some other organizations
Bootstrapping
An example of a DHCP protocol which is used by networking administration to give IP addresses to each member of that network for participating with other networking devices by the main server.
On which ISO OSI layers does error checking primarily occur?
2, 4, and 7
To organize and rearrange various X11 windows on a display, one needs…
A window manager at the X11 server
Name a data stream that generally works better with an unreliable layer 4 protocol
Audio
When writing an application that will be a server in a client-server architecture, the open socket in the applications would…
wait for connections.
UTF-8 is deemed to be self-synchronising because…
If a transmission error occurs, the recipient will be able to determine where a new character starts
A multipart MIME representation uses a ‘boundary’ to indicate..
the start of a new part.
A multipart MIME representation boundary contains…
A random string of characters
TCP attempts to reduce data loss on a network under the assumption that . . . is the primary cause of data loss.
congestion
IPng is currently referred to as…
IPv6
20.15.1.1 would have been a class . . . network address.
A
Multicasting
How routers within an organization typically discover other routers on OSI layer 3.
IPv4 addresses are typically used…
in routing tables, to identify a network.
The IPv4 private network address ranges.
10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
In a routing table, the entry 0.0.0.0/0
identifies the default gateway
If a router sends a destination unreachable ICMP message, the value of the ICMP code field will:
explain the reason the destination is unreachable.
In networking, ‘tunneling’ refers to
encapsulating packets of one protocol in packets of another protocol, where the second protocol was not designed to carry packets of the former protocol.
A BBS (bulletin board system) was mostly used for
Uploading and downloading software
The nom.za domain is intended to allow…
individuals to register subdomains within it.
IANA’s website
The place to obtain an authoritative list of TLD registries from.
This ISO OSI layer is useful in web conferencing, in which the streams of audio and video must be synchronous.
Layer 5
EGPs
Exterior Gateway Protocols - The class of protocols used for routing between autonomous systems
In a client-server model, interaction between the client and the server is best characterized as…
the exchange of requests and responses
For X11 output, one can generally control the size of the displayed window through the . . . parameter
Geometry
If MIME is deemed to be a data communications protocol, it would fit best on . . . of the ISO OSI model
Layer 6
Fieldata
An old character encoding scheme
Which person worked as the RFC-editor in the early years of the internet?
Jon Postel
Accept-Charset
A header used by an HTTP header to indicate the character encodings it is able to handle
Name 3 ASN.1 constructors.
- CHOICE
- SEQUENCE
- SET
Base64 is a popular content transfer encoding that represents…
arbitrary data using 7-bit ASCII values.
Reliable protocols are usually …
connection-oriented
A window advertisement in a TCP segment indicates…
the available memory in the receive buffer of the sender
When port classifications are sorted from the class containing the lowest port numbers to the class containing the highest port numbers, the resulting order would be…
Well-known, Registered, Dynamic
The notion of ‘port forwarding’ is important in the context of
NAT boxes
Zero suppression in IPv6
One continuous sequence of zero-valued field in any address may be omitted, and the omission is indicated using two adjacent colons.
IPSEC
A standard that is useful in the encryption of messages on each link between routers
Name five (5) fields in a TCP header
- Destination Port
- Source Port
- Sequence Number (SEQ)
- Acknowledgement Number (ACK)
- Window
The RIR which manages Africa.
AFRINIC
The RIR which manages Asia and the Pacific.
APNIC
The RIR which manages North America.
ARIN
The RIR which manages Latin America.
LACNIC
The RIR which manages Europe, the Middle East and parts of Central Asia.
RIPE
NAT Box
A NAT box connects an internal network to en external network
Class A IP address range
1.0.0.0 - 127.0.0.0
Class B IP address range
128.0.0.0 - 191.255.0.0
Class C IP address range
192.0.0.0 - 223.255.255.0
Class D IP address range
224.0.0.0 - 239.255.255.255
Class E IP address range
240.0.0.0 - 255.255.255.255