FE SP22 Flashcards
An example of a protocol converter counter value is
a. ACN/NAK count
b. ACK/NAK delay
c. Bit delay
d. Data rate
A
A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?
Ethernet, IP, TCP, HTTP
What part of the URL, http:://www.cisco.com/index.html, represents the top-level DNS domain
com
Which protocols operate at the Application layer of the OSI model?
HTTP, FTP, POP, SMTP, DNS
Channel partitioning, random access, and taking turns are
MAC protocols
Which three fields are used in a UDP segment header?
Length; Source Port; Checksum
Which transport layer protocol statement is true?
A. TCP has fewer fields than UDP
B. TCP is faster than UDP
C. UDP is a best-effort delivery protocol
D. UDP provides reliability
A. OSI has 7 layers whereas TCP/IP has 4 layers
ISP is the abbreviation for? A. Routers and link-layer switches B. Internet Exchange Point C. Customer and provider D. Internet Service Provider
D
Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? A. FTP and DNS B. DNS, VoIP C. HTTP, POP3 D. DNS, HTTP
B
Which of the following would be a valid source and destination ports for a host connecting to an email server? A. Source: 25, Destination: 49152 B. Source: 80, Destination: 49152 C. Source: 49152, Destination: 25 D. Source: 49152, Destination: 80
C
Why is NAT not needed in IPv6?
A. Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks
B. Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.
C. The problems that are included by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers
D. The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet
B
How many host addresses are available on the 192.168.10.128/26 network? A. 30 B. 32 C. 60 D. 62 E. 64
E
Setting what TCP flag bit will start a handshake to terminate a TCP connection A. A B. P C. S D. F E. R
The\_\_\_addressing system is used to keep track of the millions of users A. Internet program B. Intranet protocol C. Internet protocol D. Intranet program
B
The functionalities of the presentation layer include A. Data compression B. Data encryption C. Data decryption D. All of the others
D
\_\_\_ is an unique name that identifies an email user A. Network name B. Node name C. User name D. Host name
C
In IP fragmentation with an MTU (Maximum Transmission Unit) size of 1500 bytes, a 2000-byte diagram is fragmented into \_\_\_\_\_ datagram(s) A. 1 B. 2 C. 3 D. 4
B
What function does CSMA/CA provide that CSMA/CD does not? A. Data packet collision avoidance B. Data packet collision detection C. End-to-end data packet encryption D. Data packet error checking
A
Which multiplexing technique can transmit analog signals? A. FDM (Frequency Division Multiplexing) B. Synchronous TOM C. Asynchronous TOM D. None
A
If a class B network on the internet has a subnet mask of 255.255.248.0, what is the max number of hosts per subnet? A. 2046 B. 2047 C. 1022 D. 1023
A
Which of the following is true about the IP address 192.0.0.10/24? A. The netid is 192 B. The network address is 192.0.0.0 C. The hostid is 0.10 D. The class is D E. This is a multicast address
C
In \_\_\_\_\_ a device simultaneously sends or receives data A. Full duplex mode B. Duplex mode C. Simplex mode D. Half-duplex mode
A. Full-duplex: transmission in both directions SIMULTANEOUSLY while half-duplex is not
The destination address field in an Ethernet frame is A. 6-byte long B. 4-byte long C. 16-byte long D. 48-byte long
A
Very popular browser-based email services such as Hotmail or Yahoo! Mail use \_\_\_\_\_ to transfer email between the client and the server A. SMTP B. IMAP C. POP3 D. HTTP E. FTP
B
Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data? A. internetwork B. session C. presentation D. applications E. network access
D
The DNS protocol runs over \_\_\_\_ and uses port \_\_\_\_ A. HTTP, 53 B. TCP, 51 C. UDP, 51 D. TCP, 52 E. UDP, 53
E
Which one of the following is not a function of the network layer? A. routing B. inter-networking C. congestion control D. none
D
This protocol is used by a web browser to establish a connection to a web server A. HTTP B. SSL C. IMAP D. SMTP
A. Hypertext Transfer Protocol
This protocol is used by a web browser to establish a connection to a web server A. HTTP B. SSL C. IMAP D. SMTP
A
If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host? A. 172.16.112.0 B. 172.16.0.0 C. 172.16.96.0 D. 172.16.255.0
A
How does a network server manage requests from multiple clients for different services?
A. the server uses IP addresses to identify different services
B. each request is tracked through the physical address of the client
C. the server sends all requests through a default gateway
D. Each request has a combination of source and destination port numbers, coming from a unique IP address
D
The HTTP request line contains a \_\_\_\_ method to request a document from the server A. GET B. POST C. COPY D. DEL E. PUT
A
Within a production network, what is the purpose of configuring a switch with a default gateway address?
A. hosts that are connected to the switch can use the switch default gateway address to forward packets to a remote destination
B. a switch must have a default gateway to be accessible by Telnet and SSH
C. The default gateway address is used to forward packets originating from the switch to remote networks
D. In provides a next-hop address for all traffic that flows through the switch
C
What is a feature of IMAP (Internet Message Access Protocol)?
A. upload email messages to the server
B. listens passively on port 110 for client requests
C. downloads a copy of email messages leaving the original on the server
D. none
D
What term describes the ability to use personal devices across a business or campus network? A. BYOD B. internet C. intranet D. extranet
A. Bring your own device
What happens if ACK/NAK in rdt2.0 is corrupted?
A. receiver will resend ACK/NAK after a timeout
B. sender does not know what happened at the receiver
C. sender will resend data after a timeout
D. none
B. sender không biết liệu receiver có nhận được chính xác đến last piece of transmitted data
LAN that allows their computers to share files, data, printers, and other resources are called A. usenet B. extranet C. internet D. intranet
D
Given 3 bits for sequence numbers in Selective Repeat ARQ. If the sender already set the sliding window size to be 4, what is the maximum sliding window size at the receiver? A. 3 B. 8 C. 7 D. None
D
\_\_\_\_\_is a system in which computers are inter-connected and the geographical spread may be within a building to 1km A. LAN B. WAN C. MAN D. NONE
A
In a client/server network, the user’s computer is considered the
a. host
b. server
c. website
d. client
D
what term describes a policy that allows network devices to manage the flow of data to give priority to voice & video?
a. quality of service
b. internet
c. intranet
d. extranet
A
In HTTP, the first line (the status line) in a request message is called a_____line; the first line in the response message is called the____line
a. request, status
b. request, response
c. response, request
d. response, status
A
Which of the following is a type of router defined in OSPF (Open Shortest Path First)? A. internal router B. area border router C. backbone router D. all of the others
D
A____is a system to digital message formats and rules for exchanging those messages in/between computing systems and in telecommunications
a. communication protocol
b. modem
c. DNS
d. router
A
The divisor in a cyclic code is normally called the\_\_\_\_ A. degree B. redundancy C. generator D. none
C
A service offered at a given layer can include which of the following feature(s)
a. sequencing
b. reliability
c. timing
d. all of the others
D
What is the subnetwork number of a host with an IP address of 172.16.66.0/21
a. 172.16.36.0
b. 172.16.48.0
c. 172.16.0.0
d. 172.16.64.0
D
The physical layer of the receiving device passes bits up to which higher level layer? A. application B. presentation C. network D. data-link
D
In TCP congestion control, 2 important variables the sender has to keep track of are
a. congestion window and socket number
b. congestion window and the threshold
c. threshold and receiving window
d. MSS and RTT
e. threshold and RTT
B