Deck 11: Module a Networking Concepts
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/79
Play
Full screen (f)
Deck 11: Module a Networking Concepts
1
________ is either an internet layer in the TCP/IP architecture or a collection of networks that is not the global Internet.
A) A host
B) The intranet
C) The U.S. Internet
D) An access router
A) A host
B) The intranet
C) The U.S. Internet
D) An access router
The intranet
2
A(n) ________ is a(n) ________.
A) bit; byte
B) octet; byte
C) bit; octet
D) byte; bit
A) bit; byte
B) octet; byte
C) bit; octet
D) byte; bit
octet; byte
3
A(n) ________ is any device attached to the global Internet.
A) host
B) server
C) byte
D) LAN
A) host
B) server
C) byte
D) LAN
host
4
A server, a client PC, or a PDA can be referred to as a host.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
5
What is the typical size of an access router?
A) About the size of a hardback book
B) About the size of a pack of cards
C) Approximately the size of a laptop computer
D) Approximately the size of three or four hardback books
A) About the size of a hardback book
B) About the size of a pack of cards
C) Approximately the size of a laptop computer
D) Approximately the size of three or four hardback books
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
6
In a home network, a message sent by a PC is called a ________.
A) server
B) byte
C) frame
D) router
A) server
B) byte
C) frame
D) router
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
7
In a typical home network, an access router connects the home network to ________.
A) an intranet
B) the Internet
C) a LAN
D) a WAN
A) an intranet
B) the Internet
C) a LAN
D) a WAN
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
8
For a host on a home network to use the Internet, each host needs a(n) ________.
A) switch
B) NAT
C) IP address
D) DHCP
A) switch
B) NAT
C) IP address
D) DHCP
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the follow is FALSE about access routers?
A) They all have an SPI firewall.
B) They provide network address translation.
C) They connect a network to another network.
D) They have a DHCP server.
A) They all have an SPI firewall.
B) They provide network address translation.
C) They connect a network to another network.
D) They have a DHCP server.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
10
UTP is a ________.
A) type of router
B) network interface card
C) type of wiring
D) type of translation
A) type of router
B) network interface card
C) type of wiring
D) type of translation
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is a type of twisted pair wiring?
A) STP
B) NAT
C) IP
D) DHCP
A) STP
B) NAT
C) IP
D) DHCP
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
12
Companies use carriers for WAN transmission because ________.
A) companies lack rights of way
B) they are less expensive than a LAN
C) companies can then employ fewer computer security personnel
D) it is not legal to have carriers of their own
A) companies lack rights of way
B) they are less expensive than a LAN
C) companies can then employ fewer computer security personnel
D) it is not legal to have carriers of their own
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
13
DARPA created ________.
A) home networks
B) the Internet
C) intranets
D) WANS
A) home networks
B) the Internet
C) intranets
D) WANS
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
14
Initially, only ________ could connect to the Internet.
A) large corporations
B) noncommercial networks
C) commercial networks
D) K-12 schools
A) large corporations
B) noncommercial networks
C) commercial networks
D) K-12 schools
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
15
Messages that travel within a single network are called ________.
A) packets
B) switches
C) frames
D) core switches
A) packets
B) switches
C) frames
D) core switches
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
16
Messages that travel all the way from one computer to another across the Internet are called ________.
A) packets
B) switches
C) frames
D) core switches
A) packets
B) switches
C) frames
D) core switches
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
17
An internal TCP/IP internet for a company's own communication is known as a(n) ________.
A) Internet
B) ISP
C) intranet
D) LAN
A) Internet
B) ISP
C) intranet
D) LAN
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
18
Internet service providers connect at centers that are usually called ________.
A) NAPs
B) PSDNs
C) switches
D) LANs
A) NAPs
B) PSDNs
C) switches
D) LANs
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
19
Networking circuitry is usually a component that you can choose to add to your circuit board in most PCs.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
20
A home network needs an Internet access line to connect to the Internet.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
21
UTP wiring is much more expensive than is STP wiring.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
22
A home network must have an Internet access line in order to connect to the Internet.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
23
The Internet uses transmission standards that are known as the TCP/IP standards.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
24
There is no central point of control over the Internet's operation.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
25
Security that results from the inherent operation of a standard is called ________.
A) incidental security
B) defective implementation
C) transmission security
D) IPsec security
A) incidental security
B) defective implementation
C) transmission security
D) IPsec security
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
26
________ is the main protocol for delivering packets over the Internet.
A) ISP
B) IPsec
C) IP
D) NAP
A) ISP
B) IPsec
C) IP
D) NAP
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
27
________ was created to address the fact that IP originally had no security.
A) ISP
B) IPsec
C) DHCP
D) NAP
A) ISP
B) IPsec
C) DHCP
D) NAP
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
28
The TCP standard is difficult to attack because an attacker cannot send a false TCP message unless he or she can guess the sequence number of the next message.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
29
All computer standards were initially created with security.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
30
IP was originally created with advanced security.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
31
IPsec is burdensome and not widely used.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
32
When security is added to a standard, it usually is added only to later versions of the standard.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is NOT a core layer?
A) Applications
B) Internet
C) Single-network
D) Transport
A) Applications
B) Internet
C) Single-network
D) Transport
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is the highest core layer?
A) Applications
B) Internet
C) Single-network
D) Transport
A) Applications
B) Internet
C) Single-network
D) Transport
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is the middle core layer?
A) Applications
B) Internet
C) Single-network
D) Transport
A) Applications
B) Internet
C) Single-network
D) Transport
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
36
Standards at the ________ govern how packets are delivered across an internet.
A) internet core layer
B) single-network layer
C) transport layer
D) applications layer
A) internet core layer
B) single-network layer
C) transport layer
D) applications layer
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
37
Computer standards are complex.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
38
The lowest core layer is the internet core layer.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
39
Standards are divided into five core layers.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
40
The bottom layer of the TCP/IP standard is the ________.
A) subnet access layer
B) single-network core layer
C) application layer
D) transport layer
A) subnet access layer
B) single-network core layer
C) application layer
D) transport layer
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
41
________ is a standards architecture.
A) ISO
B) OSI
C) ITU-T
D) IETF
A) ISO
B) OSI
C) ITU-T
D) IETF
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
42
The ________ is roughly the same in OSI and TCP/IP.
A) subnet access layer
B) single-network core layer
C) application layer
D) transport layer
A) subnet access layer
B) single-network core layer
C) application layer
D) transport layer
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
43
Most firms use the ________.
A) hybrid TCP/IP-OSI standards architecture
B) OSI application standards
C) UTP links
D) optical fiber
A) hybrid TCP/IP-OSI standards architecture
B) OSI application standards
C) UTP links
D) optical fiber
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
44
The IETF is the standards agency for the Internet.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
45
IETF documents are publicly available at no charge to the public.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
46
OSI divides three core layers into a total of seven layers.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
47
Hybrid architecture uses TCP/IP standards at the physical and data link layers and OSI standards at the internet and transport layers.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
48
A popular transmission medium for longer distances is ________.
A) TCP/IP
B) twisted pair
C) UTP
D) optical fiber
A) TCP/IP
B) twisted pair
C) UTP
D) optical fiber
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
49
________ uses radio waves.
A) Wireless
B) TCP/IP
C) Optical fiber
D) UTP
A) Wireless
B) TCP/IP
C) Optical fiber
D) UTP
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
50
The ________ LAN standard is designed to limit switch-to-switch communication to authenticated switches.
A) 802.1AE
B) 802.1X
C) TCP/IP
D) IPsec
A) 802.1AE
B) 802.1X
C) TCP/IP
D) IPsec
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
51
Radio signaling is considered very complex.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
52
In fiber optic transmission, signals have three different states, 0, 1, and 2.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
53
Ethernet dominates LAN standards.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
54
The IETF divided the internetworking core layer into two layers-________.
A) the internet and transport layers
B) the subnet access and transport layers
C) the single-network core and transport layers
D) the application and internet layers
A) the internet and transport layers
B) the subnet access and transport layers
C) the single-network core and transport layers
D) the application and internet layers
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
55
The main standard at the internet layer is the Internet Protocol.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
56
An IP header normally is shown by drawing several rows, with ________ in each row.
A) 32 bytes
B) 64 bits
C) 32 bits
D) 8 bytes
A) 32 bytes
B) 64 bits
C) 32 bits
D) 8 bytes
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
57
An IP header is divided into smaller units called ________.
A) fields
B) bytes
C) packets
D) switches
A) fields
B) bytes
C) packets
D) switches
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
58
The ________ field has a value ________.
A) of 0 or 1
B) between 0 and 2
C) between 0 and 56
D) between 0 and 255
A) of 0 or 1
B) between 0 and 2
C) between 0 and 56
D) between 0 and 255
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
59
A value of 1 in the ________ field indicates that the data field contains an ICMP message.
A) TTL
B) header checksum
C) data
D) protocol
A) TTL
B) header checksum
C) data
D) protocol
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
60
The ________ field allows the receiver to find errors.
A) TTL
B) header checksum
C) data
D) protocol
A) TTL
B) header checksum
C) data
D) protocol
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
61
A packet is a long stream of 1s and 0s.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
62
IP fragmentation is common.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
63
A subnet can only have one host.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
64
IP was created in the early 1980s.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
65
In TCP, ending a conversation normally takes ________.
A) two messages
B) three messages
C) four messages
D) six messages
A) two messages
B) three messages
C) four messages
D) six messages
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
66
What does a reliable protocol do?
A) Detects every second error in a system
B) Detects and corrects errors
C) Only corrects errors, another node detects the errors
D) Detects user error and correct many of them
A) Detects every second error in a system
B) Detects and corrects errors
C) Only corrects errors, another node detects the errors
D) Detects user error and correct many of them
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
67
If a flag field is not set, that means its value is ________.
A) 0
B) 1
C) 56
D) 256
A) 0
B) 1
C) 56
D) 256
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
68
________ is a well-known port number for web-server programs.
A) TCP Port 80
B) TCP Port 25
C) TCP Port 21
D) TCP Port 1023
A) TCP Port 80
B) TCP Port 25
C) TCP Port 21
D) TCP Port 1023
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
69
________ uses options extensively.
A) IPsec
B) A LAN
C) TCP
D) A WAN
A) IPsec
B) A LAN
C) TCP
D) A WAN
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
70
An unreliable protocol does not detect and correct errors.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
71
TCP is considered a reliable protocol.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
72
ICMP messages are delivered in the data fields of ________.
A) frames
B) supervisory frames
C) IP packets
D) IPv4s
A) frames
B) supervisory frames
C) IP packets
D) IPv4s
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
73
DNS servers for ________ domains can include .com, .edu, and .CA.
A) fourth-level
B) third-level
C) second-level
D) top-level
A) fourth-level
B) third-level
C) second-level
D) top-level
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
74
RIP, OSPF, and BGP are ________.
A) static IP addresses
B) dynamic host configuration protocols
C) supervisory protocols
D) dynamic routing protocols
A) static IP addresses
B) dynamic host configuration protocols
C) supervisory protocols
D) dynamic routing protocols
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
75
Many ICMP messages are error messages.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
76
The best-know ICMP message types are the ICMP echo and echo reply messages.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following is NOT a popular transfer standard for e-mail?
A) POP
B) IMAP
C) SMTP
D) DHCP
A) POP
B) IMAP
C) SMTP
D) DHCP
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
78
The ________ standard can be used in place of both FTP and Telnet while providing high security.
A) SSH
B) HTTP
C) HTML
D) DHCP
A) SSH
B) HTTP
C) HTML
D) DHCP
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
79
Most applications share the same application layer standard.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck