Deck 3: Tcpip
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 3: Tcpip
1
Network administrators and support personnel commonly use the ____ utility to verify connectivity between two points.
A) Path
B) Ping
C) SYN
D) Transport
A) Path
B) Ping
C) SYN
D) Transport
B
2
A small TCP window size produces few acknowledgments.
False
3
The ____ layer in the TCP/IP model maps to the OSI Application, Presentation, and Session layers.
A) Network Interface
B) Transport
C) Application
D) Internetwork
A) Network Interface
B) Transport
C) Application
D) Internetwork
C
4
____ is a connection-oriented protocol that allows you to connect your computer to other computers on the Internet and view Web page content.
A) SNMP
B) SMTP
C) TFTP
D) HTTP
A) SNMP
B) SMTP
C) TFTP
D) HTTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
____ is a communication method for network devices that is designed to reduce the flow of packets from their source.
A) Congestion avoidance
B) Buffering
C) Sliding windows
D) Collision avoidance
A) Congestion avoidance
B) Buffering
C) Sliding windows
D) Collision avoidance
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
The ____ layer in the TCP/IP model determines the connectionless or connection-oriented services.
A) Network Interface
B) Transport
C) Application
D) Internetwork
A) Network Interface
B) Transport
C) Application
D) Internetwork
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ protocol provides a connectionless delivery service.
A) IP
B) ICMP
C) ARP
D) RARP
A) IP
B) ICMP
C) ARP
D) RARP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
The ____ layer in the TCP/IP model is a direct equivalent to the Network layer in the OSI reference model.
A) Network Interface
B) Transport
C) Application
D) Internetwork
A) Network Interface
B) Transport
C) Application
D) Internetwork
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
The size of the TCP window determines the number of acknowledgments sent for a given data transfer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The ____ layer in the TCP/IP model handles software, or logical, addressing.
A) Network Interface
B) Application
C) Transport
D) Internetwork
A) Network Interface
B) Application
C) Transport
D) Internetwork
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The ____ layer of the TCP/IP model maps to both the Data Link and Physical layers of the OSI reference model.
A) Transport
B) Internetwork
C) Network Interface
D) Application
A) Transport
B) Internetwork
C) Network Interface
D) Application
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
The invention and evolution of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite resulted from a coordinated effort by the U.S. ____.
A) DOD
B) SRI
C) UCLS
D) IEEE
A) DOD
B) SRI
C) UCLS
D) IEEE
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
The ____ utility uses ICMP echo request/reply messages and can verify Internetwork layer (OSI-Network layer) connectivity.
A) Find
B) Path
C) Trace
D) Route
A) Find
B) Path
C) Trace
D) Route
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
____ provides the same basic functionality as RARP.
A) DHCP
B) HTTP
C) SNMP
D) IP
A) DHCP
B) HTTP
C) SNMP
D) IP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
A(n) ____ supplies the MAC address of the destination host in a unicast packet.
A) MAC frame
B) ARP reply
C) RARP request
D) RARP reply
A) MAC frame
B) ARP reply
C) RARP request
D) RARP reply
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Many network devices maintain tables of the MAC and IP addresses of other devices on the network. These tables are called ____.
A) addressing tables
B) routing tables
C) ARP tables
D) network tables
A) addressing tables
B) routing tables
C) ARP tables
D) network tables
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
Both TCP and UDP use port numbers for communications between hosts.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
The Trivial File Transfer Protocol (TFTP) sends data using a reliable connection.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
The TCP/IP model explains how the protocol suite works to provide communications.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
The TCP/IP ____ layer performs several functions, the most notable being end-to-end packet delivery, reliability, and flow control.
A) Application
B) Transport
C) Network Interface
D) Internetwork
A) Application
B) Transport
C) Network Interface
D) Internetwork
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
A router references its ____ to determine which of its interfaces is connected to the destination network.
A) ARP table
B) IP table
C) interface table
D) routing table
A) ARP table
B) IP table
C) interface table
D) routing table
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) ____ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (pings) to a target device in an attempt to crash or greatly reduce the performance of the target device.
A) SYN flood
B) ICMP flood
C) Ping of Death
D) smurf attack
A) SYN flood
B) ICMP flood
C) Ping of Death
D) smurf attack
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Briefly describe the RARP protocol.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
____ is the process of assigning unique IP addresses to devices on the network.
A) Virtual addressing
B) Network addressing
C) IP access
D) IP addressing
A) Virtual addressing
B) Network addressing
C) IP access
D) IP addressing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Briefly describe the TCP/IP Network Interface layer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
The ____________________ resolves IP addresses to MAC addresses for source hosts that know the IP address of the destination host but not the MAC address.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
How does an ARP request work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
What are the steps involved in the TCP/IP three-way handshake?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
The Cisco ____ model does not describe how communications take place. Rather, it focuses on how best to design a network, especially a relatively large network or one that is expected to grow.
A) Three-Layer Hierarchical
B) Link-state
C) Network state
D) Three-way
A) Three-Layer Hierarchical
B) Link-state
C) Network state
D) Three-way
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
A series of documents called ____________________ define, describe, and standardize the implementation and configuration of the TCP/IP protocol suite.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
The ____________________ is the messaging or e-mail transfer protocol used with TCP/IP.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Briefly describe the TCP and UDP protocols.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
____ protocols allow the routers to be updated automatically.
A) Internetwork
B) MAP
C) Routing
D) TTL
A) Internetwork
B) MAP
C) Routing
D) TTL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Briefly describe ICMP.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Describe the Distribution layer of the Cisco Three-Layer Hierarchical model.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
____________________, also known as windowing, is a method of controlling packet flow between hosts.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Compare ARP and RARP.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Before two computers can communicate over TCP, they must synchronize their ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Describe some Well Known TCP and UDP Port numbers from RFC 1700.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Trace shows the exact path a packet takes from the source to the destination. This is accomplished through the use of the ____ counter.
A) TPI
B) SYN
C) FIN
D) TTL
A) TPI
B) SYN
C) FIN
D) TTL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Describe the Core layer of the Cisco Three-Layer Hierarchical model.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck