mid Flashcards

1
Q

Why was the OSI model developed?

A

standards were needed to allow any two systems to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The _______ model shows how the network functions of a computer ought to be organized.

A

OSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The physical layer is concerned with the movement of _______ over the physical medium.

A

bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The OSI model consists of _______ layers.

A

seven

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______.

A

removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the OSI model, when data is transmitted from device A to device B, the header from A’s layer 5 is read by B’s _______ layer.

A

session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the OSI model, which layer functions as a liaison between user support layers and network support layers?

A

transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the OSI model, what is the main function of the transport layer?

A

process-to-process message delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the OSI model, encryption and decryption are functions of the ________ layer.

A

presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the OSI model, which of the following is an application layer service?

A

All of the choices are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When a host on network A sends a message to a host on network B, which address does the router look at?

A

logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ______ layer is responsible for moving frames from one hop (node) to the next.

A

data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The ______ layer adds a header to the packet coming from the upper layer that includes the logical addresses of the sender and receiver.

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The_________ layer is responsible for the delivery of a message from one process to another.

A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Internetworking Protocol (IP) is a ________ protocol.

A. Reliable
B. connection-oriented
C. reliable and connection-oriented
D. None of the choices are correct

A

None of the choices are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__________ provides full transport layer services to applications.

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The ________ address, also known as the link address, is the address of a node as defined by its LAN or WAN.

A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ethernet uses a ______ physical address that is imprinted on the network interface card (NIC).

A

6-byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following can be an Ethernet physical address?

A. 01:02:01:2C:4B
B. 07:01:02:01:2C:4B:2C
C. 07:01:02:01:2C:4B
D. None of the choices are correct

A

07:01:02:01:2C:4B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A port address in TCP/IP is ______ bits long.

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An IPv4 address is __________ bits long.

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An IPv4 address is normally represented in base ____ or dotted-decimal notation.

A

265

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In classful addressing, the IPv4 address space is divided into __________ classes.

A. 3
B. 4
C. 5
D. None of the choices are correct

A

None of the choices are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In class A, the netid is between ______________.

A

0 to 127

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In class B, the netid is between ______________.

A

128 to 191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In class C, the netid is between ______________.

A

192 to 223

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The default mask for class A is ______________.

A

255.0.0.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The default mask for class B is ______________.

A

255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The default mask for class C is ______________.

A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The default mask for class D is ______________.

A. 255.255.0.0
B. 255.0.0.0.
C. 255.255.255.0
D. None of the choices are correct

A

None of the choices are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The default mask for class E is ______________.

A. 255.255.0.0
B. 255.0.0.0.
C. 255.255.255.0
D. None of the choices are correct

A

None of the choices are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

In classless addressing, __________ is assigned to a organization.

A

a variable-length block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The number of addresses assigned to an organization in classless addressing _______.

A

must be a power of 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The first address assigned to an organization in classless addressing _______.

A

must be evenly divisible by the number of addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which address could be the beginning address of a block of 32 classless addresses?

A

2.4.6.64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which address could be the beginning address of a block of 16 classless addresses?

A. 2.4.6.5
B. 2.4.6.15
C. 2.4.6.62
D. None of the choices are correct

A

None of the choices are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which address could be the beginning address of a block of 256 classless addresses?

A

2.4.6.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the first address of a block of classless addresses if one of the addresses is 12.2.2.76/27?

A

12.2.2.64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the first address of a block of classless addresses if one of the addresses is 12.2.2.76/10?

A

12.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the first address of a block of classless addresses if one of the addresses is 12.2.2.127/28?

A

12.2.2.112

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Find the number of addresses in a block of classless addresses if one of the addresses is 12.2.2.7/24.

A

256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Find the number of addresses in a block of classless addresses if one of the addresses is 12.2.2.7/30.

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the last address of a block of classless addresses if one of the addresses is 12.2.2.127/28?

A

12.2.2.127

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the last address of a block of classless addresses if one of the addresses is 12.2.2.6/30?

A

12.2.2.7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

In fixed-length subnetting, the number of subnets must _______.

A

be a power of 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

An organization is granted a block; one address is 2.2.2.64/20. The organization needs 10 subnets. What is the subnet prefix length?

A

/24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

An organization is granted a block; one address is 2.2.2.64/25. If the subnet prefix length is /28, what is the maximum number of subnets?

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

An organization is granted a block of classless addresses with the starting address 199.34.76.64/28. How many addresses are granted?

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

An organization is granted a block of classless addresses with the starting address 199.34.76.128/29. How many addresses are granted?

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

An organization is granted a block of classless addresses with the starting address 199.34.32.0/27. How many addresses are granted?

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is the default mask for class A in CIDR notation?

A

/8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is the default mask for class B in CIDR notation?

A

/16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is the default mask for class C in CIDR notation?

A

/24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

In ________ addressing, when an address is given, we can find the beginning address and the range of addresses.

A

classful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

In classless addressing, the ______ is another name for the common part of the address range.

A

prefix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

In classless addressing, the _______ is the varying part (similar to the hostid).

A

suffix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

In classless addressing, the prefix length defines the _____________.

A

mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

In a block, the prefix length is /22; what is the mask?

A

255.255.252.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

In a block, the prefix length is /15; what is the mask?

A

255.254.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

In a block, the mask is 255.255.192.0; what is the prefix length?

A

/18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

In a block, the mask is 255.255.255.224; what is the prefix length?

A. /20
B. /19
C. /20
D. None of the choices are correct

A

None of the choices are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Frame Relay operates in the _______.

A

physical and data link layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which ATM layer has a 53-byte cell as an end product?

A

ATM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

The IP protocol uses the _______ sublayer.

A

AAL5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Repeaters function in the _______ layer.

A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Bridges function in the _______ layers.

A

physical and data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

A bridge has access to the _______ address of a station on the same network.

A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Routers function in the _______ layers.

A

physical, data link, and network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

_______ has a higher transmission rate in the downstream direction than in the upstream direction.

A

ADSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

_______ is suitable for businesses that require comparable upstream and downstream data rates.

A

SDSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

_______ was designed as an alternative to the T-1 line.

A

HDSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

In an ESS the _______ station is mobile.

A

BSS

73
Q

In an ESS the _______ stations are part of a wired LAN.

A

AP

74
Q

SONET is a standard for _______ networks.

A

fiber-optic cable

75
Q

SONET is an acronym for _______ Network.

A

Synchronous Optical

76
Q

PPP is a _______ layer protocol.

A

physical and data link

77
Q

When the Internet started, it was decided to make the network layer a _______ service to make it simple.

A

connectionless

78
Q

In a connectionless service, each packet is forwarded based on the ________.

A

destination address

79
Q

In a connection-oriented service, each packet is forwarded based on the ________.

A

label

80
Q

In a _______ service, there is a relation between all packets belonging to a message.

A

connection-oriented

81
Q

In _________, the whole packet is sent from the source to the destination without being divided into packets.

A

circuit-switching

82
Q

In _________, the message is first divided into manageable packets before being sent.

A

circuit-switching

83
Q

_________ control means including a mechanism for detecting corrupted, lost, or duplicate packets.

A

error

84
Q

_________ control means regulating the amount of data a source can send without overwhelming the destination.

A

flow

85
Q

______ control in a network means handling a situation in which too many packets are present in an area of the Internet.

A

congestion

86
Q

A ______ packet is a special packet that can be sent from a router to the sender when the router encounters a congestion.

A

choke

87
Q

A _______ is a program providing services to the ______ program.

A

server; client

88
Q

A _______ is a program requesting services from a _______ .

A

client; server

89
Q

________ server can process only one request at a time.

A

An iterative

90
Q

________ server can process multiple requests at a time.

A

A concurrent

91
Q

An interface is a set of ___________ designed to facilitate interaction between two entities.

A

instructions

92
Q

Information in a computer is stored in __________ byte order.

A

host

93
Q

Network programming needs information to be in __________ byte order.

A

network

94
Q

In __________ representation, the least significant byte is stored in the starting address.

A

little-endian

95
Q

In __________ representation, the most significant byte is stored in the starting address.

A

big-endian

96
Q

Communication using UDP is usually____________.

A

connectionless, iterative

97
Q

Communication using TCP is usually____________.

A

connection-oriented, concurrent

98
Q

SOCK_STREAM sockets are used by ______ processes.

A

TCP

99
Q

SOCK_DGRAM sockets are used by ______ processes.

A

UDP

100
Q

SOCK_SEQPACKET sockets are used by ______ processes.

A

SCTP

101
Q

SOCK_RAW sockets are used by ______ processes.

A. UDP
B. TCP
C. SCTP
D. None of the choices are correct

A

None of the choices are correct

102
Q

_________ is a repository of information linked together from points all over the world.

A

The WWW

103
Q

The WWW today is a _______ client-server service, in which a client using a browser can access a service using a server.

A

distributed

104
Q

The _________ is a standard for specifying any kind of information on the Internet.

A

URL

105
Q

In a URL, the _______ is the client-server program used to retrieve the document.

A

protocol

106
Q

In a URL, the ______ is the computer on which the information is located.

A

host

107
Q

In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon.

A. path
B. protocol
C. host
D. None of the choices are correct

A

None of the choices are correct

108
Q

In a URL, the _______ is the full name of the file where the information is located.

A

path

109
Q

A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.

A

static

110
Q

_____________ is a language for creating Web pages.

A

HTML

111
Q

A _______ document is created by a Web server whenever a browser requests the document.

A

dynamic

112
Q

___________ is a technology that creates and handles dynamic documents.

A

CGI

113
Q

Dynamic documents are sometimes referred to as _________ dynamic documents.

A

server-site

114
Q

For many applications, we need a program or a script to be run at the client site. These are called _______________ documents.

A

active

115
Q

One way to create an active document is to use __________.

A

Java applets.

116
Q

Active documents are sometimes referred to as _________ dynamic documents.

A

client-site

117
Q

HTTP uses the services of _________ on well-known port 80.

A

TCP

118
Q

In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.

A. request; response
B. response; request
C. response; status
D. None of the choices are correct

A

None of the choices are correct

119
Q

In a ___________ connection, one TCP connection is made for each request/response.

A

nonpersistent

120
Q

In a ___________connection, the server leaves the connection open for more requests after sending a response.

A

persistent

121
Q

In HTTP, a _______ server is a computer that keeps copies of responses to recent requests.

A

proxy

122
Q

An HTTP request message always contains _______.

A

a request line and a header

123
Q

Which of the following is present in both an HTTP request line and a status line?

A

HTTP version number

124
Q

The HTTP request line contains a _______ method to request a document from the server.

A

GET

125
Q

A user needs to send the server some information. The request line method is _______.

A

POST

126
Q

The HTTP request line contains a _______ method to get information about a document without retrieving the document itself.

A

HEAD

127
Q

A response message always contains _______.

A

a status line and a header

128
Q

An applet is _______ document application program.

A

an active

129
Q

A ________ is part of a local hard drive, a special file with permission restrictions.

A. message
B. response
C. an agent
D. None of the choices are correct

A

None of the choices are correct

130
Q

When the sender and the receiver of an email are on the same system, we need only ___________.

A

two UAs

131
Q

When the sender and the receiver of an email are on different systems, we need only _____________.

A

two UAs and one pair of MTAs

132
Q

When the sender is connected to the mail server via a LAN or a WAN, we need only ______________.

A

two UAs and two pairs of MTAs

133
Q

When both sender and receiver are connected to a mail server via a LAN or a WAN, we need ___________________.

A

two UAs, two pairs of MTAs, and a pair of MAAs

134
Q

________ provides service to the user to make the process of sending and receiving a message easier.

A

A UA

135
Q

Which of the following services is not provided by a UA?

A. composing messages
B. reading messages
C. replying messages
D. all are

A

all are

136
Q

There are two types of user agents: _________ and ___________.

A

command-driven and GUI-based

137
Q

The ________ usually contains the sender address, the receiver address, and other information.

A

envelope

138
Q

The message contains the ________ and the __________.

A

header; body

139
Q

In the Internet, the email address consists of two parts: a _______ and a _______.

A

local part; domain name

140
Q

_________ is a supplementary protocol that allows non-ASCII data to be sent through email.

A

MIME

141
Q

The actual mail transfer is done through ____________.

A

MTAs

142
Q

The formal protocol that defines the MTA client and server in the Internet is called ___________.

A

SMTP

143
Q

The process of transferring a mail message occurs in ________ phases.

A. two
B. four
C. five
D. None of the choices are correct

A

None of the choices are correct

144
Q

SMTP is a __________protocol.

A

push

145
Q

The third stage in an email transfer needs a ________ protocol.

A

pull

146
Q

The third stage in an email transfer uses a(n) ________ protocol.

A

MAA

147
Q

Currently two message access protocols are available: _______ and _________.

A

POP3; IMAP4

148
Q

Which part of the mail created by the UA contains the sender and receiver names?

A

header

149
Q

In the _______ encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits.

A

base64

150
Q

In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.

A

quoted-printable

151
Q

This command identifies the recipient of the mail.

A

RCPT TO

152
Q

This command identifies the sender of the message.

A

MAIL FROM

153
Q

_______ is more powerful and complex than _______.

A

IMAP4; POP3

154
Q

_______ is the standard mechanism provided by TCP/IP for copying a file from one host to another.

A. TELNET
B. SMTP
C. TFTP
D. none of the choices are correct

A

none of the choices are correct

155
Q

FTP uses the services of ________.

A

TCP

156
Q

In FTP, the well-known port ____ is used for the control connection and the well-known port ________ for the data connection.

A

21; 20

157
Q

In FTP, _______ is the service type used by the IP protocol because this is an interactive connection between a user (human) and a server.

A

minimize delay

158
Q

For control connection, FTP uses the __________ character set

A

NVT ASCII

159
Q

During an FTP session the control connection is opened _______.

A

exactly once

160
Q

During an FTP session the data connection is opened _______.

A

as many times as necessary

161
Q

In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______.

A

data structures

162
Q

In FTP, there are three types of _______: stream, block, and compressed.

A

transmission modes

163
Q

In FTP, ASCII, EBCDIC, and image define an attribute called _______.

A

file type

164
Q

In FTP, which category of commands is used to store and retrieve files?

A

file transfer commands

165
Q

In FTP, which category of commands defines the port number for the data connection on the client site?

A

port defining commands

166
Q

In FTP, which category of commands sets the attributes (file type, data structure, and transmission modes) of a file to be transferred?

A

data formatting commands

167
Q

In FTP, which category of commands lets a user switch directories and create or delete directories?

A

file management commands

168
Q

In FTP, when we _______, it is copied from the client to the server.

A

store a file

169
Q

TFTP uses the services of ________.

A

UDP

170
Q

In TFTP, what type of message is sent in response to an RRQ that fails to establish a connection?

A

ERROR

171
Q

In TFTP, what type of message is sent to establish a connection to retrieve a file?

A

RRQ

172
Q

In TFTP, which type of message is always a set number of bytes?

A

ACK

173
Q

In TFTP, a connection is terminated with a _______ block.

A

DATA

174
Q

An unauthorized user tries to send a file to a server using TFTP. What should be the response of the server?

A

ERROR

175
Q

In TFTP, the block number on a DATA message is 22. This always means _______.

A

there were 21 previous blocks

176
Q

In TFTP, connection termination is signaled by a DATA message with _______ bytes.

A

0 to 511

177
Q

The flow-control mechanism in TFTP _______.

A

requires an ACK for every DATA message

178
Q

In TFTP, if a duplicate DATA message is received, _______.

A

the receiver discards the duplicate