Deck 8: The Tcpip Protocols
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/26
Play
Full screen (f)
Deck 8: The Tcpip Protocols
1
The Network Interface layer performs the same functions as the Data-Link layer in the ISO/OSI model.
True
2
Many FTP sites allow you to log in as an anonymous user, which is an open account with limited privileges, but still capable of file transfers.
True
3
____ cover a wide range of topics in addition to Internet standards, from early discussion of new research concepts to status memos about the current state of the Internet.
A) RFQs
B) RFPs
C) RFCs
D) RFIs
A) RFQs
B) RFPs
C) RFCs
D) RFIs
C
4
_____________________________________________ is a protocol for dynamically assigning IP addresses to devices on a network during the bootstrap process.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
5
The ____________________ layer is responsible only for sending and receiving digital data, nothing else.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
6
All TCP/IP data are packaged in units called ____.
A) blocks
B) datagrams
C) frames
D) packets
A) blocks
B) datagrams
C) frames
D) packets
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
7
The ____, developed by David Mills of the University of Delaware, provides a simple way to synchronize the time of multiple computers on a network (even across the Internet).
A) Internet Time Protocol
B) Network Time Protocol
C) Network Time Distribution Protocol
D) Network Proximity Protocol
A) Internet Time Protocol
B) Network Time Protocol
C) Network Time Distribution Protocol
D) Network Proximity Protocol
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
8
The IP datagram is transmitted on a local network to a special purpose device called a(n) ____________________.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
9
Each piece of an IP datagram is routed on the network using a(n) ____________________.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
10
A standard way of assigning the 64 host bits is to use the 48-bit MAC address of the host together with a fixed 8-bit FFFE code.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
11
DHCP is used when your system has been allocated a fixed IP address by your network administrator.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
12
____ defines the format and meaning of messages exchanged by the manager and agents.
A) SNMP
B) HTTP
C) HTTPS
D) SMTP
A) SNMP
B) HTTP
C) HTTPS
D) SMTP
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
13
HTTPS can use ____________________ that contain the certificate holder's public key and digital signature.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
14
____ is a TCP/IP application that determines the path through the network to a destination entered by the user.
A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
15
The Internet Protocol is unreliable due to the fact there is no guarantee the datagram will reach its destination.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
16
The ____ uses a directed broadcast message to obtain the MAC address for a given IP address.
A) ARP
B) DNS
C) SNMP
D) SMTP
A) ARP
B) DNS
C) SNMP
D) SMTP
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
17
The ____ provides the means to convert from a host name to an IP address and vice versa.
A) WINS
B) NDS
C) DNS
D) IPS
A) WINS
B) NDS
C) DNS
D) IPS
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
18
A typical value for an MTU on an Ethernet network is ____ bytes.
A) 500
B) 1000
C) 1500
D) 2000
A) 500
B) 1000
C) 1500
D) 2000
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
19
____ displays protocol statistics and current TCP/IP network connections.
A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
20
____ provides information on the state of NetBIOS-over-TCP/IP connections that exist within a Windows computer.
A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
21
Discuss the functionality of PING.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
22
Describe SMTP.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
23
Match between columns
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
24
What happens when a hardware frame is sent out to a network?
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
25
Describe what happens at each specific layer in the TCP/IP protocol after you click on a link to a Web site.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
26
Describe protocol analyzers.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck