Deck 8: The Tcpip Protocols

Full screen (f)
exit full mode
Question
The Network Interface layer performs the same functions as the Data-Link layer in the ISO/OSI model.
Use Space or
up arrow
down arrow
to flip the card.
Question
Many FTP sites allow you to log in as an anonymous user, which is an open account with limited privileges, but still capable of file transfers.
Question
____ cover a wide range of topics in addition to Internet standards, from early discussion of new research concepts to status memos about the current state of the Internet.

A) RFQs
B) RFPs
C) RFCs
D) RFIs
Question
_____________________________________________ is a protocol for dynamically assigning IP addresses to devices on a network during the bootstrap process.
Question
The ____________________ layer is responsible only for sending and receiving digital data, nothing else.
Question
All TCP/IP data are packaged in units called ____.

A) blocks
B) datagrams
C) frames
D) packets
Question
The ____, developed by David Mills of the University of Delaware, provides a simple way to synchronize the time of multiple computers on a network (even across the Internet).

A) Internet Time Protocol
B) Network Time Protocol
C) Network Time Distribution Protocol
D) Network Proximity Protocol
Question
The IP datagram is transmitted on a local network to a special purpose device called a(n) ____________________.
Question
Each piece of an IP datagram is routed on the network using a(n) ____________________.
Question
A standard way of assigning the 64 host bits is to use the 48-bit MAC address of the host together with a fixed 8-bit FFFE code.
Question
DHCP is used when your system has been allocated a fixed IP address by your network administrator.
Question
____ defines the format and meaning of messages exchanged by the manager and agents.

A) SNMP
B) HTTP
C) HTTPS
D) SMTP
Question
HTTPS can use ____________________ that contain the certificate holder's public key and digital signature.
Question
____ is a TCP/IP application that determines the path through the network to a destination entered by the user.

A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
Question
The Internet Protocol is unreliable due to the fact there is no guarantee the datagram will reach its destination.
Question
The ____ uses a directed broadcast message to obtain the MAC address for a given IP address.

A) ARP
B) DNS
C) SNMP
D) SMTP
Question
The ____ provides the means to convert from a host name to an IP address and vice versa.

A) WINS
B) NDS
C) DNS
D) IPS
Question
A typical value for an MTU on an Ethernet network is ____ bytes.

A) 500
B) 1000
C) 1500
D) 2000
Question
____ displays protocol statistics and current TCP/IP network connections.

A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
Question
____ provides information on the state of NetBIOS-over-TCP/IP connections that exist within a Windows computer.

A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
Question
Discuss the functionality of PING.
Question
Describe SMTP.
Question
Match between columns
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
RFCs
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
HTTPS
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
PING
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
FTP
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
Telnet session
Official standards for the Internet that are published as electronic documents
RFCs
Official standards for the Internet that are published as electronic documents
HTTPS
Official standards for the Internet that are published as electronic documents
PING
Official standards for the Internet that are published as electronic documents
FTP
Official standards for the Internet that are published as electronic documents
Telnet session
Used to exchange encrypted Web pages between a client/server connection
RFCs
Used to exchange encrypted Web pages between a client/server connection
HTTPS
Used to exchange encrypted Web pages between a client/server connection
PING
Used to exchange encrypted Web pages between a client/server connection
FTP
Used to exchange encrypted Web pages between a client/server connection
Telnet session
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
RFCs
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
HTTPS
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
PING
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
FTP
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
Telnet session
Allows a user to establish a terminal emulation connection on a remote computer
RFCs
Allows a user to establish a terminal emulation connection on a remote computer
HTTPS
Allows a user to establish a terminal emulation connection on a remote computer
PING
Allows a user to establish a terminal emulation connection on a remote computer
FTP
Allows a user to establish a terminal emulation connection on a remote computer
Telnet session
Question
What happens when a hardware frame is sent out to a network?
Question
Describe what happens at each specific layer in the TCP/IP protocol after you click on a link to a Web site.
Question
Describe protocol analyzers.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/26
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: The Tcpip Protocols
1
The Network Interface layer performs the same functions as the Data-Link layer in the ISO/OSI model.
True
2
Many FTP sites allow you to log in as an anonymous user, which is an open account with limited privileges, but still capable of file transfers.
True
3
____ cover a wide range of topics in addition to Internet standards, from early discussion of new research concepts to status memos about the current state of the Internet.

A) RFQs
B) RFPs
C) RFCs
D) RFIs
C
4
_____________________________________________ is a protocol for dynamically assigning IP addresses to devices on a network during the bootstrap process.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
5
The ____________________ layer is responsible only for sending and receiving digital data, nothing else.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
6
All TCP/IP data are packaged in units called ____.

A) blocks
B) datagrams
C) frames
D) packets
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
7
The ____, developed by David Mills of the University of Delaware, provides a simple way to synchronize the time of multiple computers on a network (even across the Internet).

A) Internet Time Protocol
B) Network Time Protocol
C) Network Time Distribution Protocol
D) Network Proximity Protocol
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
8
The IP datagram is transmitted on a local network to a special purpose device called a(n) ____________________.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
9
Each piece of an IP datagram is routed on the network using a(n) ____________________.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
10
A standard way of assigning the 64 host bits is to use the 48-bit MAC address of the host together with a fixed 8-bit FFFE code.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
11
DHCP is used when your system has been allocated a fixed IP address by your network administrator.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
12
____ defines the format and meaning of messages exchanged by the manager and agents.

A) SNMP
B) HTTP
C) HTTPS
D) SMTP
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
13
HTTPS can use ____________________ that contain the certificate holder's public key and digital signature.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
14
____ is a TCP/IP application that determines the path through the network to a destination entered by the user.

A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
15
The Internet Protocol is unreliable due to the fact there is no guarantee the datagram will reach its destination.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
16
The ____ uses a directed broadcast message to obtain the MAC address for a given IP address.

A) ARP
B) DNS
C) SNMP
D) SMTP
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
17
The ____ provides the means to convert from a host name to an IP address and vice versa.

A) WINS
B) NDS
C) DNS
D) IPS
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
18
A typical value for an MTU on an Ethernet network is ____ bytes.

A) 500
B) 1000
C) 1500
D) 2000
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
19
____ displays protocol statistics and current TCP/IP network connections.

A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
20
____ provides information on the state of NetBIOS-over-TCP/IP connections that exist within a Windows computer.

A) NETSTAT
B) IFCONFIG
C) TRACERT
D) NBTSTAT
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
21
Discuss the functionality of PING.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
22
Describe SMTP.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
23
Match between columns
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
RFCs
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
HTTPS
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
PING
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
FTP
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
Telnet session
Official standards for the Internet that are published as electronic documents
RFCs
Official standards for the Internet that are published as electronic documents
HTTPS
Official standards for the Internet that are published as electronic documents
PING
Official standards for the Internet that are published as electronic documents
FTP
Official standards for the Internet that are published as electronic documents
Telnet session
Used to exchange encrypted Web pages between a client/server connection
RFCs
Used to exchange encrypted Web pages between a client/server connection
HTTPS
Used to exchange encrypted Web pages between a client/server connection
PING
Used to exchange encrypted Web pages between a client/server connection
FTP
Used to exchange encrypted Web pages between a client/server connection
Telnet session
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
RFCs
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
HTTPS
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
PING
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
FTP
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
Telnet session
Allows a user to establish a terminal emulation connection on a remote computer
RFCs
Allows a user to establish a terminal emulation connection on a remote computer
HTTPS
Allows a user to establish a terminal emulation connection on a remote computer
PING
Allows a user to establish a terminal emulation connection on a remote computer
FTP
Allows a user to establish a terminal emulation connection on a remote computer
Telnet session
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
24
What happens when a hardware frame is sent out to a network?
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
25
Describe what happens at each specific layer in the TCP/IP protocol after you click on a link to a Web site.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
26
Describe protocol analyzers.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 26 flashcards in this deck.