Exam 17: Network Protocols
Exam 1: Computer Systems Overview45 Questions
Exam 2: Operating System Overview45 Questions
Exam 3: Process Description and Control45 Questions
Exam 4: Threads45 Questions
Exam 5: Concurrency: Mutual Exclusion and Synchronization45 Questions
Exam 6: Concurrency: Deadlock and Starvation45 Questions
Exam 7: Memory Management45 Questions
Exam 8: Virtual Memory45 Questions
Exam 9: Uniprocessor Scheduling45 Questions
Exam 10: Multiprocessor and Real-Time Scheduling45 Questions
Exam 11: Io Management and Disk Scheduling45 Questions
Exam 12: File Management45 Questions
Exam 13: Embedded Operating Systems45 Questions
Exam 14: Computer Security Threats45 Questions
Exam 15: Computer Security Techniques45 Questions
Exam 16: Distributed Processing, Clientserver, and Clusters45 Questions
Exam 17: Network Protocols45 Questions
Exam 18: Distributed Process Management45 Questions
Select questions type
The network access layer is concerned with access to and routing data across a network for two end systems attached to the same network.
(True/False)
4.8/5
(33)
The Header Checksum field is used to detect errors in the header to avoid misdelivery.
(True/False)
4.9/5
(45)
__________ is implemented in all end systems and routers, and acts as a relay to move a block of data from one host, through one or more routers, to another host.
(Short Answer)
5.0/5
(35)
The Berkeley Sockets Interface is the de facto standard __________ interface for developing networking applications, spanning a wide range of operating systems.
(Short Answer)
4.8/5
(30)
_________ encrypts all traffic in both directions, provides a secure remote logon capability which enables a user at a terminal or personal computer to log on to a remote computer and function as if directly connected to that computer, and supports file transfer between the local host and a remote server.
(Short Answer)
4.8/5
(38)
The __________ is concerned with assuring that the two computer systems are active and ready for data transfer, and for keeping track of the data that are being exchanged to assure delivery.
(Short Answer)
4.7/5
(41)
__________ provides a number of functional enhancements designed to accommodate the higher speeds of today's networks and mix of data streams that are becoming more prevalent.
(Multiple Choice)
4.8/5
(41)
TCP does not provide a reliable connection for the transfer of data between applications.
(True/False)
4.8/5
(39)
The driving force behind the development of IPv6 was the need for more addresses.
(True/False)
4.9/5
(34)
With __________ delivery is not guaranteed, nor is order necessarily preserved.
(Multiple Choice)
4.8/5
(40)
Each application within a host must have an address, known as a __________ , that is unique within the host that allows the host-to-host protocol to deliver data to the proper process.
(Multiple Choice)
4.9/5
(41)
The logic for actually dealing with the network is put into a separate network access module.
(True/False)
4.8/5
(32)
When two or more computers are interconnected via a communication network, the set of computer stations is referred to as a _________ .
(Short Answer)
4.7/5
(31)
Linux supports a variety of networking architectures, in particular TCP/IP, by means of Berkeley Sockets.
(True/False)
4.9/5
(32)
Stream sockets make use of UDP, which provides a connection-oriented reliable data transfer.
(True/False)
4.9/5
(43)
A _________ looks to its users like an ordinary centralized operating system but provides the user with transparent access to the resources of a number of machines.
(Multiple Choice)
4.9/5
(35)
Each host on a network must have a unique global internet address.
(True/False)
4.8/5
(31)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)