FE SP22 Flashcards

1
Q

An example of a protocol converter counter value is

a. ACN/NAK count
b. ACK/NAK delay
c. Bit delay
d. Data rate

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?

A

Ethernet, IP, TCP, HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What part of the URL, http:://www.cisco.com/index.html, represents the top-level DNS domain

A

com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which protocols operate at the Application layer of the OSI model?

A

HTTP, FTP, POP, SMTP, DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Channel partitioning, random access, and taking turns are

A

MAC protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which three fields are used in a UDP segment header?

A

Length; Source Port; Checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which transport layer protocol statement is true?
A. TCP has fewer fields than UDP
B. TCP is faster than UDP
C. UDP is a best-effort delivery protocol
D. UDP provides reliability

A

A. OSI has 7 layers whereas TCP/IP has 4 layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
ISP is the abbreviation for?
A. Routers and link-layer switches
B. Internet Exchange Point
C. Customer and provider
D. Internet Service Provider
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead?
A. FTP and DNS
B. DNS, VoIP
C. HTTP, POP3
D. DNS, HTTP
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following would be a valid source and destination ports for a host connecting to an email server?
A. Source: 25, Destination: 49152 
B. Source: 80, Destination: 49152 
C. Source: 49152, Destination: 25
D. Source: 49152, Destination: 80
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is NAT not needed in IPv6?
A. Because IPv6 has integrated security, there is no need to hide the IPv6 addresses of internal networks
B. Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.
C. The problems that are included by NAT applications are solved because the IPv6 header improves packet handling by intermediate routers
D. The end-to-end connectivity problems that are caused by NAT are solved because the number of routes increases with the number of nodes that are connected to the Internet

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
How many host addresses are available on the 192.168.10.128/26 network?
A. 30
B. 32
C. 60
D. 62
E. 64
A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Setting what TCP flag bit will start a handshake to terminate a TCP connection
A. A
B. P
C. S
D. F
E. R
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
The\_\_\_addressing system is used to keep track of the millions of users
A. Internet program
B. Intranet protocol
C. Internet protocol
D. Intranet program
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
The functionalities of the presentation layer include
A. Data compression
B. Data encryption
C. Data decryption
D. All of the others
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
\_\_\_ is an unique name that identifies an email user
A. Network name
B. Node name
C. User name
D. Host name
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
In IP fragmentation with an MTU (Maximum Transmission Unit) size of 1500 bytes, a 2000-byte diagram is fragmented into \_\_\_\_\_ datagram(s)
A. 1
B. 2
C. 3
D. 4
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
What function does CSMA/CA provide that CSMA/CD does not?
A. Data packet collision avoidance
B. Data packet collision detection
C. End-to-end data packet encryption
D. Data packet error checking
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Which multiplexing technique can transmit analog signals?
A. FDM (Frequency Division Multiplexing)
B. Synchronous TOM
C. Asynchronous TOM
D. None
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
If a class B network on the internet has a subnet mask of 255.255.248.0, what is the max number of hosts per subnet?
A. 2046
B. 2047
C. 1022
D. 1023
21
Q
Which of the following is true about the IP address 192.0.0.10/24?
A. The netid is 192
B. The network address is 192.0.0.0
C. The hostid is 0.10
D. The class is D
E. This is a multicast address
22
Q
In \_\_\_\_\_ a device simultaneously sends or receives data
A. Full duplex mode
B. Duplex mode
C. Simplex mode
D. Half-duplex mode
A

A. Full-duplex: transmission in both directions SIMULTANEOUSLY while half-duplex is not

23
Q
The destination address field in an Ethernet frame is
A. 6-byte long
B. 4-byte long
C. 16-byte long
D. 48-byte long
24
Q
Very popular browser-based email services such as Hotmail or Yahoo! Mail use \_\_\_\_\_ to transfer email between the client and the server
A. SMTP
B. IMAP
C. POP3
D. HTTP
E. FTP
25
Q
Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?
A. internetwork
B. session
C. presentation
D. applications
E. network access
26
Q
The DNS protocol runs over \_\_\_\_ and uses port \_\_\_\_
A. HTTP, 53
B. TCP, 51
C. UDP, 51
D. TCP, 52
E. UDP, 53
27
Q
Which one of the following is not a function of the network layer?
A. routing
B. inter-networking
C. congestion control 
D. none
28
Q
This protocol is used by a web browser to establish a connection to a web server
A. HTTP
B. SSL
C. IMAP
D. SMTP
A

A. Hypertext Transfer Protocol

29
Q
This protocol is used by a web browser to establish a connection to a web server
A. HTTP
B. SSL
C. IMAP
D. SMTP
30
Q
If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host?
A. 172.16.112.0
B. 172.16.0.0
C. 172.16.96.0
D. 172.16.255.0
31
Q

How does a network server manage requests from multiple clients for different services?
A. the server uses IP addresses to identify different services
B. each request is tracked through the physical address of the client
C. the server sends all requests through a default gateway
D. Each request has a combination of source and destination port numbers, coming from a unique IP address

32
Q
The HTTP request line contains a \_\_\_\_ method to request a document from the server
A. GET
B. POST
C. COPY
D. DEL
E. PUT
33
Q

Within a production network, what is the purpose of configuring a switch with a default gateway address?
A. hosts that are connected to the switch can use the switch default gateway address to forward packets to a remote destination
B. a switch must have a default gateway to be accessible by Telnet and SSH
C. The default gateway address is used to forward packets originating from the switch to remote networks
D. In provides a next-hop address for all traffic that flows through the switch

34
Q

What is a feature of IMAP (Internet Message Access Protocol)?
A. upload email messages to the server
B. listens passively on port 110 for client requests
C. downloads a copy of email messages leaving the original on the server
D. none

35
Q
What term describes the ability to use personal devices across a business or campus network?
A. BYOD
B. internet
C. intranet
D. extranet
A

A. Bring your own device

36
Q

What happens if ACK/NAK in rdt2.0 is corrupted?
A. receiver will resend ACK/NAK after a timeout
B. sender does not know what happened at the receiver
C. sender will resend data after a timeout
D. none

A

B. sender không biết liệu receiver có nhận được chính xác đến last piece of transmitted data

37
Q
LAN that allows their computers to share files, data, printers, and other resources are called
A. usenet
B. extranet
C. internet
D. intranet
38
Q
Given 3 bits for sequence numbers in Selective Repeat ARQ. If the sender already set the sliding window size to be 4, what is the maximum sliding window size at the receiver?
A. 3
B. 8
C. 7
D. None
39
Q
\_\_\_\_\_is a system in which computers are inter-connected and the geographical spread may be within a building to 1km
A. LAN
B. WAN
C. MAN
D. NONE
40
Q

In a client/server network, the user’s computer is considered the

a. host
b. server
c. website
d. client

41
Q

what term describes a policy that allows network devices to manage the flow of data to give priority to voice & video?

a. quality of service
b. internet
c. intranet
d. extranet

42
Q

In HTTP, the first line (the status line) in a request message is called a_____line; the first line in the response message is called the____line

a. request, status
b. request, response
c. response, request
d. response, status

43
Q
Which of the following is a type of router defined in OSPF (Open Shortest Path First)?
A. internal router
B. area border router
C. backbone router
D. all of the others
44
Q

A____is a system to digital message formats and rules for exchanging those messages in/between computing systems and in telecommunications

a. communication protocol
b. modem
c. DNS
d. router

45
Q
The divisor in a cyclic code is normally called the\_\_\_\_
A. degree
B. redundancy
C. generator
D. none
46
Q

A service offered at a given layer can include which of the following feature(s)

a. sequencing
b. reliability
c. timing
d. all of the others

47
Q

What is the subnetwork number of a host with an IP address of 172.16.66.0/21

a. 172.16.36.0
b. 172.16.48.0
c. 172.16.0.0
d. 172.16.64.0

48
Q
The physical layer of the receiving device passes bits up to which higher level layer?
A. application
B. presentation
C. network
D. data-link
49
Q

In TCP congestion control, 2 important variables the sender has to keep track of are

a. congestion window and socket number
b. congestion window and the threshold
c. threshold and receiving window
d. MSS and RTT
e. threshold and RTT