Exam 17: Network Protocols

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The network access layer is concerned with access to and routing data across a network for two end systems attached to the same network.

(True/False)
4.8/5
(33)

The TCP/IP protocol architecture contains _________ layers.

(Short Answer)
4.8/5
(34)

The Header Checksum field is used to detect errors in the header to avoid misdelivery.

(True/False)
4.9/5
(45)

__________ is implemented in all end systems and routers, and acts as a relay to move a block of data from one host, through one or more routers, to another host.

(Short Answer)
5.0/5
(35)

The Berkeley Sockets Interface is the de facto standard __________ interface for developing networking applications, spanning a wide range of operating systems.

(Short Answer)
4.8/5
(30)

TELNET makes use of sockets.

(True/False)
4.8/5
(34)

_________ encrypts all traffic in both directions, provides a secure remote logon capability which enables a user at a terminal or personal computer to log on to a remote computer and function as if directly connected to that computer, and supports file transfer between the local host and a remote server.

(Short Answer)
4.8/5
(38)

The __________ is concerned with assuring that the two computer systems are active and ready for data transfer, and for keeping track of the data that are being exchanged to assure delivery.

(Short Answer)
4.7/5
(41)

__________ provides a number of functional enhancements designed to accommodate the higher speeds of today's networks and mix of data streams that are becoming more prevalent.

(Multiple Choice)
4.8/5
(41)

TCP does not provide a reliable connection for the transfer of data between applications.

(True/False)
4.8/5
(39)

The driving force behind the development of IPv6 was the need for more addresses.

(True/False)
4.9/5
(34)

With __________ delivery is not guaranteed, nor is order necessarily preserved.

(Multiple Choice)
4.8/5
(40)

Each application within a host must have an address, known as a __________ , that is unique within the host that allows the host-to-host protocol to deliver data to the proper process.

(Multiple Choice)
4.9/5
(41)

The logic for actually dealing with the network is put into a separate network access module.

(True/False)
4.8/5
(32)

When two or more computers are interconnected via a communication network, the set of computer stations is referred to as a _________ .

(Short Answer)
4.7/5
(31)

Linux supports a variety of networking architectures, in particular TCP/IP, by means of Berkeley Sockets.

(True/False)
4.9/5
(32)

Stream sockets make use of UDP, which provides a connection-oriented reliable data transfer.

(True/False)
4.9/5
(43)

A _________ looks to its users like an ordinary centralized operating system but provides the user with transparent access to the resources of a number of machines.

(Multiple Choice)
4.9/5
(35)

Each host on a network must have a unique global internet address.

(True/False)
4.8/5
(31)

The _________ provides a basic electronic mail facility.

(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)