TE FA21 Flashcards

1
Q

What is a characteristic of UDP?
A. UDP datagrams take the same path and arrive in the correct order at the destination
B. Applications that use UDP are always considered unreliable
C. UDP reassembles the received datagrams in the order they were received
D. UDP only passes data to the network when the destination is ready to receive the data

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following IP addresses belong to the network 100.10.245.0/24?
A. 100.0.245.1
B. 100.0.0.1
C. 100.10.245.0
D. 100.10.245.1
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why would a layer 2 switch need an IP address?
A. to enable the switch to send broadcast frames to attached PCs
B. to enable the switch to function as a default gateway
C. to enable the switch to be managed remotely
D. to enable the switch to receive frames from attached PCs

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Given a generator polynomial g(x) = x^3+x+1. Consider the info sequence 1001. By CRC method, what is the resulted code word for transmission?
A. 1010110
B. 1001111
C. 1001000
D. 1001110
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a distance vector routing, if a link fails

a. all routers immediately update their link database and recalculate their shortest path
b. neighboring routers exchange routing tables that may use failed links
c. routers set link distance to infinity and floods the network with an updated packet
d. all

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which switching type will allow the communication devices in the provider network to be shared and only allocated to an individual subscriber during data transfer?

a. dedicated switched lines
b. circuit-switched
c. packet-switched
d. frame-switched

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which protocol glues the network of networks together as the Internet?
A. TCP
B. UDP
C. IP
D. none
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What term describes a computing model where server software runs on dedicated computers?

a. client/server
b. internet
c. intranet
d. extranet

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ability of P2P networks to handle many peers is called

a. scalebility
b. multiplexing
c. multi-peer
d. self-controlled

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?

a. fault tolerance
b. scalability
c. security
d. QoS (quality of service)

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of network traffic requires QoS?

a. email
b. online purchasing
c. video conferencing
d. wiki

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the security requirement in the case of DoS?

a. privacy
b. availability
c. integrity
d. none

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
TCP flag bit will start
A. A
B. P 
C. S
D. F
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can be used to identify the process?

a. both the IP address of the host running that process and the port associated with that process
b. port associated with that process
c. process ID assigned by server
d. name of the application running on the host

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the binary equivalent of the following polynomial arithmetic x^7+x^6+x^5+x^2+1?

a. 11011101
b. 11100111
c. 11100101
d. 11101101

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The checksum of 0000 and 0000 is

a. 0101
b. 1010
c. 1111
d. 0000

17
Q

In CSMA/CD, to continue the transmission process we use a/an

a. signal
b. access point
c. loop
d. station

18
Q

In CSMA/CD, how long will it take a collision to be detected and resolved?

a. round-trip propagation delay
b. one propagation delay
c. none
d. one frame transmission time

19
Q

Which of the following is the pipelining protocol?
A. selective repeat
B. sliding window
C. premature timeout
D. stop and wait automatic repeat request

20
Q
The destination address field in an Ethernet frame is
A. 6-byte long
B. 4-byte long
C. 16-byte long
D. 48-byte long
21
Q
The network layer concerns with
A. bits
B. frames
C. packets
D. none of the others
22
Q

What is an example of network communication that uses the client-server model?
A. a user uses eMule to download a file that is shared by a friend after the file location is determined
B. a workstation initiates an ARP to find the Mac address of a receiving host
D. a workstation initiates a DNS request when the user types www.cisco.comin the address bar of a web brower

23
Q

What do the client/server and peer-to-peer network models have in common
A. both models have dedicated servers
B. both models support devices in server and client roles
C. both models require the use of TCP/IP-based protocols
D. both models are used only in the wired network enviroment

24
Q
Which of the basic elements of ARQ is associated with negative acknowledgment?
A. timeout mechanism
b. NAKs
C. error detecting code
D. ACKs
25
Q
Anetwork administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?
A. physical layer
B. presentation layer
C. data link layer
D. network layer
26
Q

When a TCP client initiates a three-way handshake with a sequence number x, what will be the acknowledgement number when the TCP server replies?
A. x
B. x+1
C. x+y (where y is the sequence number proposed by TCP server)
D. none of the others

27
Q

Which scenario describes a function provided by the transport layer?
A. a student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network
B. a student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header
C. a student has two web browser windows open in order to access two websites. The transport layer ensures the correct web page is delivered to the correct browser window
D. a corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the website

28
Q
Which of these is the name for the capacity of a medium to carry data?
A. bandwidth
B. throughput
C. goodput
D. none of the others
29
Q
Application layer is implemented in
A. end system
B. NIC
C. ethernet
D. none of the others
30
Q

Which statement is correct about network protocols?
A. network protocols define the type of hardware that is used and how it is mounted in racks
B. they define how messages are exchanged between the source and the destination
C. they all function in the network access layer of TCP/IP
D. they are only required for exchange of messages between devices on remote networks

31
Q
Upon which of the following condition is token bucket and leaky bucket the same?
A. token bucket size is infinite
B. token bucket size is zero
C. leaky bucket size is infinite
D. leaky bucket size is zero
32
Q

What is an advantage of network devices using open standard protocols?
A. network communications is confined to data transfers between devices from the same vendor
B. a client host and a server running different operating systems can successfully exchange date
C. internet access can be controlled by a single ISP in each market
D. competition and innovation are limited to specific types of products

33
Q

The time-to-live(TTL) field in the datagram is included to insure that datagrams___
A. do not return to the source
B. to reach the destination on time
C. to discard when desired
D. do not contest the network
E. do not circulate forever in the network

34
Q
The DNS pro tocol runs over\_\_\_\_ and uses port\_\_\_
A. HTTP ... 53
B. TCP ... 51
C. UDP ... 51
D. TCP ... 52
E. UDP ... 53
35
Q

Which of following statements are true for two-dimensional parity error detection?
A. it can detect all single bit errors in an information frame
B. it can correct all single bit errors in an information frame
C. it can detect all double bot errors in an information frame
D. all of the others

36
Q

Which of following statement are true for HDLC?
A. supports various data transfer modes
B. supports multi-point links and point to point links
C. implements error control and flow control mechanisms
D. all of the others

37
Q
At which OSI layer is a source IP address added to a PDU during the encapsulation process?
A. network layer 
B. data link layer
C. transport layer
D. application