mid Flashcards

1
Q

Why was the OSI model developed?

A

standards were needed to allow any two systems to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The _______ model shows how the network functions of a computer ought to be organized.

A

OSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The physical layer is concerned with the movement of _______ over the physical medium.

A

bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The OSI model consists of _______ layers.

A

seven

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______.

A

removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the OSI model, when data is transmitted from device A to device B, the header from A’s layer 5 is read by B’s _______ layer.

A

session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the OSI model, which layer functions as a liaison between user support layers and network support layers?

A

transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the OSI model, what is the main function of the transport layer?

A

process-to-process message delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the OSI model, encryption and decryption are functions of the ________ layer.

A

presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the OSI model, which of the following is an application layer service?

A

All of the choices are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When a host on network A sends a message to a host on network B, which address does the router look at?

A

logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ______ layer is responsible for moving frames from one hop (node) to the next.

A

data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The ______ layer adds a header to the packet coming from the upper layer that includes the logical addresses of the sender and receiver.

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The_________ layer is responsible for the delivery of a message from one process to another.

A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Internetworking Protocol (IP) is a ________ protocol.

A. Reliable
B. connection-oriented
C. reliable and connection-oriented
D. None of the choices are correct

A

None of the choices are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__________ provides full transport layer services to applications.

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The ________ address, also known as the link address, is the address of a node as defined by its LAN or WAN.

A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ethernet uses a ______ physical address that is imprinted on the network interface card (NIC).

A

6-byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following can be an Ethernet physical address?

A. 01:02:01:2C:4B
B. 07:01:02:01:2C:4B:2C
C. 07:01:02:01:2C:4B
D. None of the choices are correct

A

07:01:02:01:2C:4B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A port address in TCP/IP is ______ bits long.

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An IPv4 address is __________ bits long.

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An IPv4 address is normally represented in base ____ or dotted-decimal notation.

A

265

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In classful addressing, the IPv4 address space is divided into __________ classes.

A. 3
B. 4
C. 5
D. None of the choices are correct

A

None of the choices are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In class A, the netid is between ______________.

A

0 to 127

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
In class B, the netid is between ______________.
128 to 191
26
In class C, the netid is between ______________.
192 to 223
27
The default mask for class A is ______________.
255.0.0.0.
28
The default mask for class B is ______________.
255.255.0.0
29
The default mask for class C is ______________.
255.255.255.0
30
The default mask for class D is ______________. A. 255.255.0.0 B. 255.0.0.0. C. 255.255.255.0 D. None of the choices are correct
None of the choices are correct
31
The default mask for class E is ______________. A. 255.255.0.0 B. 255.0.0.0. C. 255.255.255.0 D. None of the choices are correct
None of the choices are correct
32
In classless addressing, __________ is assigned to a organization.
a variable-length block
33
The number of addresses assigned to an organization in classless addressing _______.
must be a power of 2
34
The first address assigned to an organization in classless addressing _______.
must be evenly divisible by the number of addresses
35
Which address could be the beginning address of a block of 32 classless addresses?
2.4.6.64
36
Which address could be the beginning address of a block of 16 classless addresses? A. 2.4.6.5 B. 2.4.6.15 C. 2.4.6.62 D. None of the choices are correct
None of the choices are correct
37
Which address could be the beginning address of a block of 256 classless addresses?
2.4.6.0
38
What is the first address of a block of classless addresses if one of the addresses is 12.2.2.76/27?
12.2.2.64
39
What is the first address of a block of classless addresses if one of the addresses is 12.2.2.76/10?
12.0.0.0
40
What is the first address of a block of classless addresses if one of the addresses is 12.2.2.127/28?
12.2.2.112
41
Find the number of addresses in a block of classless addresses if one of the addresses is 12.2.2.7/24.
256
42
Find the number of addresses in a block of classless addresses if one of the addresses is 12.2.2.7/30.
4
43
What is the last address of a block of classless addresses if one of the addresses is 12.2.2.127/28?
12.2.2.127
44
What is the last address of a block of classless addresses if one of the addresses is 12.2.2.6/30?
12.2.2.7
45
In fixed-length subnetting, the number of subnets must _______.
be a power of 2
46
An organization is granted a block; one address is 2.2.2.64/20. The organization needs 10 subnets. What is the subnet prefix length?
/24
47
An organization is granted a block; one address is 2.2.2.64/25. If the subnet prefix length is /28, what is the maximum number of subnets?
8
48
An organization is granted a block of classless addresses with the starting address 199.34.76.64/28. How many addresses are granted?
16
49
An organization is granted a block of classless addresses with the starting address 199.34.76.128/29. How many addresses are granted?
8
50
An organization is granted a block of classless addresses with the starting address 199.34.32.0/27. How many addresses are granted?
32
51
What is the default mask for class A in CIDR notation?
/8
52
What is the default mask for class B in CIDR notation?
/16
53
What is the default mask for class C in CIDR notation?
/24
54
In ________ addressing, when an address is given, we can find the beginning address and the range of addresses.
classful
55
In classless addressing, the ______ is another name for the common part of the address range.
prefix
56
In classless addressing, the _______ is the varying part (similar to the hostid).
suffix
57
In classless addressing, the prefix length defines the _____________.
mask
58
In a block, the prefix length is /22; what is the mask?
255.255.252.0
59
In a block, the prefix length is /15; what is the mask?
255.254.0.0
60
In a block, the mask is 255.255.192.0; what is the prefix length?
/18
61
In a block, the mask is 255.255.255.224; what is the prefix length? A. /20 B. /19 C. /20 D. None of the choices are correct
None of the choices are correct
62
Frame Relay operates in the _______.
physical and data link layers
63
Which ATM layer has a 53-byte cell as an end product?
ATM
64
The IP protocol uses the _______ sublayer.
AAL5
65
Repeaters function in the _______ layer.
physical
66
Bridges function in the _______ layers.
physical and data link
67
A bridge has access to the _______ address of a station on the same network.
physical
68
Routers function in the _______ layers.
physical, data link, and network
69
_______ has a higher transmission rate in the downstream direction than in the upstream direction.
ADSL
70
_______ is suitable for businesses that require comparable upstream and downstream data rates.
SDSL
71
_______ was designed as an alternative to the T-1 line.
HDSL
72
In an ESS the _______ station is mobile.
BSS
73
In an ESS the _______ stations are part of a wired LAN.
AP
74
SONET is a standard for _______ networks.
fiber-optic cable
75
SONET is an acronym for _______ Network.
Synchronous Optical
76
PPP is a _______ layer protocol.
physical and data link
77
When the Internet started, it was decided to make the network layer a _______ service to make it simple.
connectionless
78
In a connectionless service, each packet is forwarded based on the ________.
destination address
79
In a connection-oriented service, each packet is forwarded based on the ________.
label
80
In a _______ service, there is a relation between all packets belonging to a message.
connection-oriented
81
In _________, the whole packet is sent from the source to the destination without being divided into packets.
circuit-switching
82
In _________, the message is first divided into manageable packets before being sent.
circuit-switching
83
_________ control means including a mechanism for detecting corrupted, lost, or duplicate packets.
error
84
_________ control means regulating the amount of data a source can send without overwhelming the destination.
flow
85
______ control in a network means handling a situation in which too many packets are present in an area of the Internet.
congestion
86
A ______ packet is a special packet that can be sent from a router to the sender when the router encounters a congestion.
choke
87
A _______ is a program providing services to the ______ program.
server; client
88
A _______ is a program requesting services from a _______ .
client; server
89
________ server can process only one request at a time.
An iterative
90
________ server can process multiple requests at a time.
A concurrent
91
An interface is a set of ___________ designed to facilitate interaction between two entities.
instructions
92
Information in a computer is stored in __________ byte order.
host
93
Network programming needs information to be in __________ byte order.
network
94
In __________ representation, the least significant byte is stored in the starting address.
little-endian
95
In __________ representation, the most significant byte is stored in the starting address.
big-endian
96
Communication using UDP is usually____________.
connectionless, iterative
97
Communication using TCP is usually____________.
connection-oriented, concurrent
98
SOCK_STREAM sockets are used by ______ processes.
TCP
99
SOCK_DGRAM sockets are used by ______ processes.
UDP
100
SOCK_SEQPACKET sockets are used by ______ processes.
SCTP
101
SOCK_RAW sockets are used by ______ processes. A. UDP B. TCP C. SCTP D. None of the choices are correct
None of the choices are correct
102
_________ is a repository of information linked together from points all over the world.
The WWW
103
The WWW today is a _______ client-server service, in which a client using a browser can access a service using a server.
distributed
104
The _________ is a standard for specifying any kind of information on the Internet.
URL
105
In a URL, the _______ is the client-server program used to retrieve the document.
protocol
106
In a URL, the ______ is the computer on which the information is located.
host
107
In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon. A. path B. protocol C. host D. None of the choices are correct
None of the choices are correct
108
In a URL, the _______ is the full name of the file where the information is located.
path
109
A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.
static
110
_____________ is a language for creating Web pages.
HTML
111
A _______ document is created by a Web server whenever a browser requests the document.
dynamic
112
___________ is a technology that creates and handles dynamic documents.
CGI
113
Dynamic documents are sometimes referred to as _________ dynamic documents.
server-site
114
For many applications, we need a program or a script to be run at the client site. These are called _______________ documents.
active
115
One way to create an active document is to use __________.
Java applets.
116
Active documents are sometimes referred to as _________ dynamic documents.
client-site
117
HTTP uses the services of _________ on well-known port 80.
TCP
118
In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line. A. request; response B. response; request C. response; status D. None of the choices are correct
None of the choices are correct
119
In a ___________ connection, one TCP connection is made for each request/response.
nonpersistent
120
In a ___________connection, the server leaves the connection open for more requests after sending a response.
persistent
121
In HTTP, a _______ server is a computer that keeps copies of responses to recent requests.
proxy
122
An HTTP request message always contains _______.
a request line and a header
123
Which of the following is present in both an HTTP request line and a status line?
HTTP version number
124
The HTTP request line contains a _______ method to request a document from the server.
GET
125
A user needs to send the server some information. The request line method is _______.
POST
126
The HTTP request line contains a _______ method to get information about a document without retrieving the document itself.
HEAD
127
A response message always contains _______.
a status line and a header
128
An applet is _______ document application program.
an active
129
A ________ is part of a local hard drive, a special file with permission restrictions. A. message B. response C. an agent D. None of the choices are correct
None of the choices are correct
130
When the sender and the receiver of an email are on the same system, we need only ___________.
two UAs
131
When the sender and the receiver of an email are on different systems, we need only _____________.
two UAs and one pair of MTAs
132
When the sender is connected to the mail server via a LAN or a WAN, we need only ______________.
two UAs and two pairs of MTAs
133
When both sender and receiver are connected to a mail server via a LAN or a WAN, we need ___________________.
two UAs, two pairs of MTAs, and a pair of MAAs
134
________ provides service to the user to make the process of sending and receiving a message easier.
A UA
135
Which of the following services is not provided by a UA? A. composing messages B. reading messages C. replying messages D. all are
all are
136
There are two types of user agents: _________ and ___________.
command-driven and GUI-based
137
The ________ usually contains the sender address, the receiver address, and other information.
envelope
138
The message contains the ________ and the __________.
header; body
139
In the Internet, the email address consists of two parts: a _______ and a _______.
local part; domain name
140
_________ is a supplementary protocol that allows non-ASCII data to be sent through email.
MIME
141
The actual mail transfer is done through ____________.
MTAs
142
The formal protocol that defines the MTA client and server in the Internet is called ___________.
SMTP
143
The process of transferring a mail message occurs in ________ phases. A. two B. four C. five D. None of the choices are correct
None of the choices are correct
144
SMTP is a __________protocol.
push
145
The third stage in an email transfer needs a ________ protocol.
pull
146
The third stage in an email transfer uses a(n) ________ protocol.
MAA
147
Currently two message access protocols are available: _______ and _________.
POP3; IMAP4
148
Which part of the mail created by the UA contains the sender and receiver names?
header
149
In the _______ encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits.
base64
150
In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.
quoted-printable
151
This command identifies the recipient of the mail.
RCPT TO
152
This command identifies the sender of the message.
MAIL FROM
153
_______ is more powerful and complex than _______.
IMAP4; POP3
154
_______ is the standard mechanism provided by TCP/IP for copying a file from one host to another. A. TELNET B. SMTP C. TFTP D. none of the choices are correct
none of the choices are correct
155
FTP uses the services of ________.
TCP
156
In FTP, the well-known port ____ is used for the control connection and the well-known port ________ for the data connection.
21; 20
157
In FTP, _______ is the service type used by the IP protocol because this is an interactive connection between a user (human) and a server.
minimize delay
158
For control connection, FTP uses the __________ character set
NVT ASCII
159
During an FTP session the control connection is opened _______.
exactly once
160
During an FTP session the data connection is opened _______.
as many times as necessary
161
In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______.
data structures
162
In FTP, there are three types of _______: stream, block, and compressed.
transmission modes
163
In FTP, ASCII, EBCDIC, and image define an attribute called _______.
file type
164
In FTP, which category of commands is used to store and retrieve files?
file transfer commands
165
In FTP, which category of commands defines the port number for the data connection on the client site?
port defining commands
166
In FTP, which category of commands sets the attributes (file type, data structure, and transmission modes) of a file to be transferred?
data formatting commands
167
In FTP, which category of commands lets a user switch directories and create or delete directories?
file management commands
168
In FTP, when we _______, it is copied from the client to the server.
store a file
169
TFTP uses the services of ________.
UDP
170
In TFTP, what type of message is sent in response to an RRQ that fails to establish a connection?
ERROR
171
In TFTP, what type of message is sent to establish a connection to retrieve a file?
RRQ
172
In TFTP, which type of message is always a set number of bytes?
ACK
173
In TFTP, a connection is terminated with a _______ block.
DATA
174
An unauthorized user tries to send a file to a server using TFTP. What should be the response of the server?
ERROR
175
In TFTP, the block number on a DATA message is 22. This always means _______.
there were 21 previous blocks
176
In TFTP, connection termination is signaled by a DATA message with _______ bytes.
0 to 511
177
The flow-control mechanism in TFTP _______.
requires an ACK for every DATA message
178
In TFTP, if a duplicate DATA message is received, _______.
the receiver discards the duplicate