Module 3 - Protocols & Models Flashcards

1
Q

There are three elements to any communication, which of the below are NOT one of these elements?

a. Source (sender)
b. Destination (receiver)
c. Channel (media)
d. User (device)

A

d. User (device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

__________ are the rules that communications will follow.

a. Protocols
b. Keywords
c. Arguments
d. Commands

A

a. Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is NOT a requirement for a network protocol?

a. Message encoding
b. Message decapsulation
c. Message formatting and encapsulation
d. Message size
e. Message timing
f. Message delivery options

A

b. Message decapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is NOT a requirement for a protocol?

a. An identified sender and receiver
b. Common language and grammar
c. An identified host name and user name
d. Speed and timing of delivery
e. Confirmation or acknowledgment requirements

A

c. An identified host name and user name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____________ is the process of converting information into another acceptable form for transmission.

a. Decoding
b. Recoding
c. Encoding
d. Encapsulation

A

c. Encoding

(Decoding reverses this process to interpret the information.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Messages sent across the network are converted to ____

a. bits
b. bytes
c. gigabits
d. packets

A

a. bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The bits are encoded into a pattern of light, _______, or electrical impulses.

a. UV
b. Gamma
c. Radio
d. Sound

A

d. Sound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the correct description of Flow Control, in reference to Message Timing?

a. Manages how long a device waits when it does not hear a reply from the destination.
b. Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered.
c. Determines when someone can send a message.
d. Determines how long a message takes to travel over the network

A

b. Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the correct description of Response Timeout, in reference to Message Timing?

a. Manages how long a device waits when it does not hear a reply from the destination.
b. Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered.
c. Determines when someone can send a message.
d. Determines how long a message takes to travel over the network

A

a. Manages how long a device waits when it does not hear a reply from the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The ____________ host must decode the signals to interpret the message.

a. Source
b. End user
c. Destination
d. Initial user

A

c. Destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the correct description of Access method, in reference to Message Timing?

a. Manages how long a device waits when it does not hear a reply from the destination.
b. Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered.
c. Determines when someone can send a message.
d. Determines how long a message takes to travel over the network

A

c. Determines when someone can send a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the correct description of Unicast Message Delivery

a. One to Many (typically not all)
b. One to All
c. All to All
d. One to One

A

d. One to One

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the correct description of Multicast Message Delivery

a. One to Many (typically not all)
b. One to All
c. All to All
d. One to One

A

a. One to Many (typically not all)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the correct description of Broadcast Message Delivery

a. One to Many (typically not all)
b. One to All
c. All to All
d. One to One

A

b. One to All

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the correct description for Network Communications?

a. used for the automatic detection of devices or services
b. secure data to provide authentication, data integrity, and data encryption
c. enable two or more devices to communicate over one or more networks
d. enable routers to exchange route information, compare path information, and select best path

A

c. enable two or more devices to communicate over one or more networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the correct description for Network Security?

a. used for the automatic detection of devices or services
b. secure data to provide authentication, data integrity, and data encryption
c. enable two or more devices to communicate over one or more networks
d. enable routers to exchange route information, compare path information, and select best path

A

b. secure data to provide authentication, data integrity, and data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the correct description for Routing?

a. used for the automatic detection of devices or services
b. secure data to provide authentication, data integrity, and data encryption
c. enable two or more devices to communicate over one or more networks
d. enable routers to exchange route information, compare path information, and select best path

A

d. enable routers to exchange route information, compare path information, and select best path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the correct description for Routing?

a. used for the automatic detection of devices or services
b. secure data to provide authentication, data integrity, and data encryption
c. enable two or more devices to communicate over one or more networks
d. enable routers to exchange route information, compare path information, and select best path

A

a. used for the automatic detection of devices or services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Match the network protocol function to its description:

Addressing –>
Reliability –>
Flow Control –>
Sequencing –>
Error Detection –>
Application Interface –>

–> Process-to-process communications between network applications

–> Determines if data became corrupted during transmission

–> Uniquely labels each transmitted segment of data

–> Ensures data flows at an efficient rate

–> Provides guaranteed delivery

–> Identifies sender and receiver

A

Addressing –> Identifies sender and receiver

Reliability –> Provides guaranteed delivery

Flow Control –> Ensures data flows at an efficient rate

Sequencing –> Uniquely labels each transmitted segment of data

Error Detection –> Determines if data became corrupted during transmission

Application Interface –> Process-to-process communications between network applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Match the protocol to its function:

Hypertext Transfer Protocol (HTTP) –>
Transmission Control Protocol (TCP) –>
Internet Protocol (IP) –>
Ethernet –>

–> Governs the way a web server and a web client interact / Defines content and format

–> Manages the individual conversations / Provides guaranteed delivery / Manages flow control

–> Delivers messages from one NIC to another NIC on the same Ethernet Local Area Network (LAN)

–>Delivers messages globally from the sender to the receiver

A

Hypertext Transfer Protocol (HTTP) –> Governs the way a web server and a web client interact / Defines content and format

Transmission Control Protocol (TCP) –>Manages the individual conversations / Provides guaranteed delivery / Manages flow control

Internet Protocol (IP) –> Delivers messages globally from the sender to the receiver

Ethernet –> Delivers messages from one NIC to another NIC on the same Ethernet Local Area Network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a group of inter-related protocols necessary to perform a communication function

a. Protocol suite
b. Protocol system
c. control suite
d. control

A

a. Protocol suite

19
Q

The protocols are viewed in terms of layers:

a. Physical layers / Data layers
b. Physical layers / Network layers
c. Data layers / Transport layers
d. Higher layers / lower layers

A

d. Higher layers / lower layers

(Lower Layers- concerned with moving data and provide services to upper layers)

20
Q

Internet Protocol Suite or TCP/IP is maintained by which organisation?

a. International Organization for Standardization (ISO)
b. Internet Engineering Task Force (IETF)
c. International Telecommunications Union (ITU)
d. Apple Inc.

A

b. Internet Engineering Task Force (IETF)

21
Q

Open Systems Interconnection (OSI) protocols are maintained by which organisations (pick two)?

a. International Organization for Standardization (ISO)
b. Internet Engineering Task Force (IETF)
c. International Telecommunications Union (ITU)
d. Apple Inc.

A

a. International Organization for Standardization (ISO)

c. International Telecommunications Union (ITU)

22
Q

What OSI Model Layers do TCP/IP Protocols operate at?

a. physical, transport, and internet layers.
b. Physical, transport, and network layers.
c. application, network, and internet layers.
d. application, transport, and internet layers.

A

d. application, transport, and internet layers.

23
Q

The most common network access layer LAN protocols are:

a. Ethernet and WLAN (wireless LAN).
b. Ethernet and VLAN (virtual LAN).
c. Ethernet and WAN
d. Ethernet and PAN

A

a. Ethernet and WLAN (wireless LAN).

24
Q

______ is an open standard protocol suite that is freely available to the public and can be used by any vendor

a. DNS
b. IPv6
c. TCP/IP
d. ICMPv4

25
Q

The TCP/IP communication process starts with a web server encapsulating and sending a web page to a client, and ends with

a. A web server de-encapsulating the web page for the web browser
b. A client de-encapsulating the web page for the web browser
c. A client encapsulating the web page for the web browser
d. A web server encapsulating the web page for the User

A

b. A client de-encapsulating the web page for the web browser

26
Q

Match the Internet Standards Organisation to its description:

Internet Society (ISOC)–>
Internet Architecture Board (IAB)–>
Internet Engineering Task Force (IETF)–>
Internet Research Task Force (IRTF)–>
Internet Corporation for Assigned Names and Numbers (ICANN)–>
Internet Assigned Numbers Authority (IANA)–>

–>Promotes the open development and evolution of internet

–>Responsible for management and development of internet standards

–>Develops, updates, and maintains internet and TCP/IP technologies

–>Focused on long-term research related to internet and TCP/IP protocols

–> Oversees and manages IP address allocation, domain name management, and protocol identifiers for ICANN

–> Coordinates IP address allocation, the management of domain names, and assignment of other information

A

Internet Society (ISOC)- Promotes the open development and evolution of internet

Internet Architecture Board (IAB)- Responsible for management and development of internet standards

Internet Engineering Task Force (IETF)- Develops, updates, and maintains internet and TCP/IP technologies

Internet Research Task Force (IRTF)- Focused on long-term research related to internet and TCP/IP protocols

Internet Corporation for Assigned Names and Numbers (ICANN)- Coordinates IP address allocation, the management of domain names, and assignment of other information

Internet Assigned Numbers Authority (IANA)- Oversees and manages IP address allocation, domain name management, and protocol identifiers for ICANN

27
Q

Put the 7 layers of the OSI model in the correct order

7.
6.
5.
4.
3.
2.
1.

Network
Data Link
Physical
Transport
Session
Presentation
Application

A
  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data Link
  7. Physical
27
Q

Put the 4 layers of the TCP/IP model in the correct order

4.
3.
2.
1.

Internet
Network Access
Application
Transport

A
  1. Application
  2. Transport
  3. Internet
  4. Network access
27
Q

Match the Electronic and Communication Standards Organisation to its description:

Institute of Electrical and Electronics Engineers(IEEE) –>
Electronic Industries Alliance (EIA)
–>
Telecommunications Industry Association (TIA)–>
International Telecommunications Union-Telecommunication Standardization Sector (ITU-T) –>

–>develops standards relating to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment

–>dedicated to creating standards in power and energy, healthcare, telecommunications, and networking

–>develops communication standards in radio equipment, cellular towers, Voice over IP (VoIP) devices, satellite communications, and more

–>defines standards for video compression, Internet Protocol Television (IPTV), and broadband communications, such as a digital subscriber line (DSL)

A

Institute of Electrical and Electronics Engineers(IEEE) - dedicated to creating standards in power and energy, healthcare, telecommunications, and networking

Electronic Industries Alliance (EIA)- develops standards relating to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment

Telecommunications Industry Association (TIA)- develops communication standards in radio equipment, cellular towers, Voice over IP (VoIP) devices, satellite communications, and more

International Telecommunications Union-Telecommunication Standardization Sector (ITU-T) - defines standards for video compression, Internet Protocol Television (IPTV), and broadband communications, such as a digital subscriber line (DSL)

28
Q

Match the Protocol Data Unit (PDU) to the OSI layer:

  1. Application –> Data
  2. Presentation –> Packets
  3. Session –> Segments
  4. Transport –> Bits
  5. Network –> Frames
  6. Data Link –>
  7. Physical –>
A
  1. Application –> Data
  2. Presentation –> Data
  3. Session –> Data
  4. Transport –> Segment
  5. Network –> Packets
  6. Data Link –> Frames
  7. Physical –> Bits
29
Q

Match the Protocol Data Unit (PDU) to the TCP/IP layer:

  1. Application –> Bits / Frames
  2. Transport –> Data
  3. Internet –> Packets
  4. Network access –> Segment
A
  1. Application –> Data
  2. Transport –> Segment
  3. Internet –> Packets
  4. Network access –> Bits / Frames
30
Q

The OSI model divides the network access layer and the application layer of the TCP/IP model into multiple layers. Correctly match the OSI model to the TCP/IP model:

  1. Application 4.Application
  2. Presentation 3. Transport
  3. Session 2. Internet
  4. Transport 1. Network access
  5. Network
  6. Data Link
  7. Physical
A
  1. Application–> 4.Application
  2. Presentation–> 4.Application
  3. Session–> 4.Application
  4. Transport–>3. Transport
  5. Network–>2. Internet
  6. Data Link–>1. Network access
  7. Physical–>1. Network access
30
Q

___________ is the process of breaking up messages into smaller units. Multiplexing is the processes of taking multiple streams of segmented data and interleaving them together.

a. Segmenting
b. Separating
c. Dividing
d. Multiplying

A

a. Segmenting

31
Q

Segmenting messages has two primary benefits (pick TWO answers):

a. Decreases Server downtime
b. Increases Efficiency
c. Increases Speed
d. Decreases network traffic flow

A

b. Increases Efficiency
c. Increases Speed

32
Q

_____________ messages is the process of numbering the segments so that the message may be reassembled at the destination.

a. Detailing
b. Addressing
c. Segmenting
d. Sequencing

A

d. Sequencing

33
Q

Both the data link and network layers use addressing to deliver data from source to destination. True or False; The network layer source and destination addresses are responsible for delivering the IP packet from original source to the final destination.

34
Q

True or False; The data link layer source and destination addresses are responsible for delivering the data link frame from one network interface card (NIC) to another NIC on a different network.

A

False, The data link layer source and destination addresses are responsible for delivering the data link frame from one network interface card (NIC) to another NIC on THE SAME network.

35
Q

What is a source IP address?

a. The IP address of the sending device, final destination of the packet.
b. The IP address of the sending device, original source of the packet.
c. The MAC address of the receiving device, final destination of the packet.
d. The IP address of the receiving device, final destination of the packet.

A

b. The IP address of the sending device, original source of the packet.

36
Q

a.
b.
c.
d.

37
Q

a.
b.
c.
d.

38
Q

a.
b.
c.
d.

39
Q

a.
b.
c.
d.

40
Q

a.
b.
c.
d.

41
Q

a.
b.
c.
d.

42
Q

a.
b.
c.
d.

43
Q

a.
b.
c.
d.

44
Q

a.
b.
c.
d.