Deck 3: Using Network Communication Protocols
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 3: Using Network Communication Protocols
1
For two computers to fully communicate, they must use the same protocol.
True
2
____ was the first protocol developed as a means for IBM, DEC, and other host computers to communicate.
A)NCP
B)TCP
C)IP
D)NetBEUI
A)NCP
B)TCP
C)IP
D)NetBEUI
A
3
You can assign a network number to a computer or any other host on the network.
False
4
If you have generated the IP address 165.100.18.44/18 by using CIDR, what is the number of bits needed for the host identifier?
A)14
B)18
C)44
D)100
A)14
B)18
C)44
D)100
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
The required header length of a TCP frame must be divisible by 32.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Each network node has a ____-bit address, which, when used with its 48-bit MAC address, enables network communications and accurate delivery of a packet.
A)16
B)32
C)48
D)64
A)16
B)32
C)48
D)64
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
AppleTalk Phase II supports as many as ____ nodes on a single logical network.
A)100
B)150
C)253
D)300
A)100
B)150
C)253
D)300
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ enables a packet to reach different subnetworks on a LAN and different networks on a WAN.
A)IP
B)TCP
C)DNS
D)FTP
A)IP
B)TCP
C)DNS
D)FTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Packets that begin with ____ in the first octet are used for network testing.
A)1
B)126
C)127
D)128
A)1
B)126
C)127
D)128
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
FTP cannot transfer a portion of a file or records within a file.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The ____ field in a TCP frame header consists of the number of bytes that can be transmitted before the sender receives an acknowledgment of receipt.
A)flags/control
B)checksum
C)padding
D)window
A)flags/control
B)checksum
C)padding
D)window
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
TCP/IP consists of nearly ____ nonproprietary protocols that interconnect computer systems efficiently and reliably.
A)100
B)200
C)300
D)500
A)100
B)200
C)300
D)500
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Telnet uses TCP port ____ at the sender and receiver for dedicated communications.
A)21
B)22
C)23
D)80
A)21
B)22
C)23
D)80
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
The ____ protocol is connectionless and is intended for the transfer of small files when data transmission errors are not critical and there is no need for security.
A)TFTP
B)NFS
C)NCP
D)FTP
A)TFTP
B)NFS
C)NCP
D)FTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The Network layer equivalent in TCP/IP is TCP.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
____, specified in RFC 793,was initially designed for point-to-point communications between computers on the same network.
A)IP
B)TCP
C)NCP
D)UDP
A)IP
B)TCP
C)NCP
D)UDP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
A ____ communication sends a message to all points on a specific network.
A)multicast
B)unicast
C)simulcast
D)broadcast
A)multicast
B)unicast
C)simulcast
D)broadcast
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
The ____ protocol is used by network-monitoring applications that do not require the same level of reliability as offered by TCP.
A)IP
B)UDP
C)FTP
D)NCP
A)IP
B)UDP
C)FTP
D)NCP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
The ____ field in an IP packet header contains information that prevents a packet from continuously circulating around a network.
A)flags
B)fragment Offset
C)time to live (TTL)
D)protocol
A)flags
B)fragment Offset
C)time to live (TTL)
D)protocol
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Today, ____ remains the LAN protocol of preference for NetWare 6 and above.
A)IPX/SPX
B)XNS
C)NetBEUI
D)TCP/IP
A)IPX/SPX
B)XNS
C)NetBEUI
D)TCP/IP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Identify four capabilities included in the properties of a LAN protocol.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
The _________________________ is a TCP/IP service that converts a computer or domain name to an IP address or that converts an IP address to a computer or domain name.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
What is IP addressing and why is it important?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
The number of data bytes transmitted in a frame is called the ____________________ window.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A ____ is a logical grouping of network resources such as computers, printers, and network devices.
A)container
B)class
C)range
D)domain
A)container
B)class
C)range
D)domain
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What are the disadvantages and advantages of UDP (User Datagram Protocol)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
________________________________________ enables remote communications to networks, intranets, virtual private networks, and extranets by way of the Internet.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Describe how zones help organize the tables used by DNS servers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Identify five advantages of TCP/IP (Transmission Control Protocol/Internet Protocol)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
____________________ is the time it takes for networked information to travel from the transmitting device to the receiving device.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
The ____ protocol enables the sending node to obtain the MAC addresses of the intended recipient before packets are sent.
A)SNMP
B)DHCP
C)ARP
D)SMTP
A)SNMP
B)DHCP
C)ARP
D)SMTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
When a TCP segment is formatted with additional IP header information, the entire unit is called a(n)____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
There are 13 ____ servers on the Internet that are used to find TLDs, for example, .com or .net.
A)parent
B)root
C)primary DNS
D)secondary DNS
A)parent
B)root
C)primary DNS
D)secondary DNS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
____ enables the establishment of a Web connection and provides for the exchange of resources, such as displaying Web pages in your browser.
A)Telnet
B)HTTP
C)FTP
D)SMTP
A)Telnet
B)HTTP
C)FTP
D)SMTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are the advantages and disadvantages of having multiple LAN protocols?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
The ____ protocol sets up the fastest communications route between different kinds of telecommunications-based WANs.
A)PPP
B)PPTP
C)SS7
D)L2TP
A)PPP
B)PPTP
C)SS7
D)L2TP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
The ____ protocol supports connection authentication and encryption for security.
A)SLIP
B)NCP
C)CSLIP
D)PPP
A)SLIP
B)NCP
C)CSLIP
D)PPP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Describe an advantage of FTP over TFTP and NFS.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
How are Ethernet and token ring access methods facilitated in AppleTalk Phase II networks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are five prominent features of IPv6 (IP version 6)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
How is the Dynamic Host Configuration Protocol (DHCP)used?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck