Deck 8: The Tcpip Protocols

Full screen (f)
exit full mode
Question
____ cover a wide range of topics in addition to Internet standards,from early discussion of new research concepts to status memos about the current state of the Internet.

A)RFQs
B)RFPs
C)RFCs
D)RFIs
Use Space or
up arrow
down arrow
to flip the card.
Question
HTTPS can use ____________________ that contain the certificate holder's public key and digital signature.
Question
Many FTP sites allow you to log in as an anonymous user,which is an open account with limited privileges,but still capable of file transfers.
Question
The Network Interface layer performs the same functions as the Data-Link layer in the ISO/OSI model.
Question
____ provides information on the state of NetBIOS-over-TCP/IP connections that exist within a Windows computer.

A)NETSTAT
B)IFCONFIG
C)TRACERT
D)NBTSTAT
Question
All TCP/IP data are packaged in units called ____.

A)blocks
B)datagrams
C)frames
D)packets
Question
DHCP is used when your system has been allocated a fixed IP address by your network administrator.
Question
The ____ uses a directed broadcast message to obtain the MAC address for a given IP address.

A)ARP
B)DNS
C)SNMP
D)SMTP
Question
____ displays protocol statistics and current TCP/IP network connections.

A)NETSTAT
B)IFCONFIG
C)TRACERT
D)NBTSTAT
Question
____ is a TCP/IP application that determines the path through the network to a destination entered by the user.

A)NETSTAT
B)IFCONFIG
C)TRACERT
D)NBTSTAT
Question
_____________________________________________ is a protocol for dynamically assigning IP addresses to devices on a network during the bootstrap process.
Question
The ____________________ layer is responsible only for sending and receiving digital data,nothing else.
Question
The Internet Protocol is unreliable due to the fact there is no guarantee the datagram will reach its destination.
Question
Each piece of an IP datagram is routed on the network using a(n)____________________.
Question
The IP datagram is transmitted on a local network to a special purpose device called a(n)____________________.
Question
A typical value for an MTU on an Ethernet network is ____ bytes.

A)500
B)1000
C)1500
D)2000
Question
The ____ provides the means to convert from a host name to an IP address and vice versa.

A)WINS
B)NDS
C)DNS
D)IPS
Question
A standard way of assigning the 64 host bits is to use the 48-bit MAC address of the host together with a fixed 8-bit FFFE code.
Question
The ____,developed by David Mills of the University of Delaware,provides a simple way to synchronize the time of multiple computers on a network (even across the Internet).

A)Internet Time Protocol
B)Network Time Protocol
C)Network Time Distribution Protocol
D)Network Proximity Protocol
Question
____ defines the format and meaning of messages exchanged by the manager and agents.

A)SNMP
B)HTTP
C)HTTPS
D)SMTP
Question
MATCHING
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Used to exchange encrypted Web pages between a client/server connection
Question
Describe protocol analyzers.
Question
MATCHING
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Allows a user to establish a terminal emulation connection on a remote computer
Question
Describe SMTP.
Question
MATCHING
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Official standards for the Internet that are published as electronic documents
Question
MATCHING
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
Question
MATCHING
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
Question
Discuss the functionality of PING.
Question
What happens when a hardware frame is sent out to a network?
Question
Describe what happens at each specific layer in the TCP/IP protocol after you click on a link to a Web site.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: The Tcpip Protocols
1
____ cover a wide range of topics in addition to Internet standards,from early discussion of new research concepts to status memos about the current state of the Internet.

A)RFQs
B)RFPs
C)RFCs
D)RFIs
C
2
HTTPS can use ____________________ that contain the certificate holder's public key and digital signature.
digital certificates
3
Many FTP sites allow you to log in as an anonymous user,which is an open account with limited privileges,but still capable of file transfers.
True
4
The Network Interface layer performs the same functions as the Data-Link layer in the ISO/OSI model.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
____ provides information on the state of NetBIOS-over-TCP/IP connections that exist within a Windows computer.

A)NETSTAT
B)IFCONFIG
C)TRACERT
D)NBTSTAT
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
All TCP/IP data are packaged in units called ____.

A)blocks
B)datagrams
C)frames
D)packets
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
DHCP is used when your system has been allocated a fixed IP address by your network administrator.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
The ____ uses a directed broadcast message to obtain the MAC address for a given IP address.

A)ARP
B)DNS
C)SNMP
D)SMTP
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
____ displays protocol statistics and current TCP/IP network connections.

A)NETSTAT
B)IFCONFIG
C)TRACERT
D)NBTSTAT
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
____ is a TCP/IP application that determines the path through the network to a destination entered by the user.

A)NETSTAT
B)IFCONFIG
C)TRACERT
D)NBTSTAT
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
_____________________________________________ is a protocol for dynamically assigning IP addresses to devices on a network during the bootstrap process.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
The ____________________ layer is responsible only for sending and receiving digital data,nothing else.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
The Internet Protocol is unreliable due to the fact there is no guarantee the datagram will reach its destination.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
Each piece of an IP datagram is routed on the network using a(n)____________________.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
The IP datagram is transmitted on a local network to a special purpose device called a(n)____________________.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
A typical value for an MTU on an Ethernet network is ____ bytes.

A)500
B)1000
C)1500
D)2000
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
The ____ provides the means to convert from a host name to an IP address and vice versa.

A)WINS
B)NDS
C)DNS
D)IPS
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
A standard way of assigning the 64 host bits is to use the 48-bit MAC address of the host together with a fixed 8-bit FFFE code.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
The ____,developed by David Mills of the University of Delaware,provides a simple way to synchronize the time of multiple computers on a network (even across the Internet).

A)Internet Time Protocol
B)Network Time Protocol
C)Network Time Distribution Protocol
D)Network Proximity Protocol
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
____ defines the format and meaning of messages exchanged by the manager and agents.

A)SNMP
B)HTTP
C)HTTPS
D)SMTP
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Used to exchange encrypted Web pages between a client/server connection
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
Describe protocol analyzers.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Allows a user to establish a terminal emulation connection on a remote computer
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
Describe SMTP.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
MATCHING
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Official standards for the Internet that are published as electronic documents
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
MATCHING
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
Discuss the functionality of PING.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
What happens when a hardware frame is sent out to a network?
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
Describe what happens at each specific layer in the TCP/IP protocol after you click on a link to a Web site.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 30 flashcards in this deck.