Deck 8: Tcp / Ip

Full screen (f)
exit full mode
Question
Protocol architectures are a set of complementary protocol modules governing communication between entities in a network.
Use Space or
up arrow
down arrow
to flip the card.
Question
OSI is another standardized architecture that is often used to describe communications functions but is now rarely implemented.
Question
Standards can be developed simultaneously for protocols at each layer of the architecture.
Question
Wireless networking brings:

A)increased security risks
B)management headaches
C)increased demands on support staff
D)all of the above
Question
WLAN standards have been designed to replace Ethernet.
Question
TCP / IP is a protocol architecture.
Question
EOIP encourages the development of IP applications for all major types of business data as well as IP-based,or IP-compliant,telecommunications transport.
Question
The TCP / IP architecture contains ________ layers.

A)two
B)three
C)four
D)five
Question
The key elements of a protocol are:

A)syntax,structure,timing
B)syntax,semantics,structure
C)structure,semantics,format
D)format,syntax,semantics
Question
Which of the following is a commonly used set of standards for computer communications?

A)SLA
B)ISO
C)POP
D)TCP / IP
Question
The System Network Architecture of IBM is a proprietary layered protocol architecture.
Question
Wireless networks cannot be deployed without the aid of the network administrators.
Question
A router is a more complex intermediate system than a bridge.
Question
________ is a Cisco proprietary product.

A)VoIP
B)SKINNY
C)SMTP
D)SIP
Question
IP is also becoming the language of the telephone system.
Question
The network access layer contains the logic needed to support the various user applications.
Question
LANs and WANs are usually isolated entities.
Question
UDP provides guaranteed delivery of messages.
Question
When two or more computers are interconnected via a communication network,the set of computer stations is referred to as a "computer connection".
Question
There are many protocols and technologies to select from when building an entire communication system.
Question
The ________ layer covers the physical interface between a data transmission device and a transmission medium or network.

A)physical
B)transport
C)application
D)network
Question
The newer IPv6 specification uses addresses to identify hosts that consist of:

A)128 bits
B)64 bits
C)32 bits
D)16 bits
Question
A device that connects networks with differing addressing schemes,packet sizes and interfaces is called a ___________.

A)hub
B)router
C)switch
D)repeater
Question
The ________ layer is concerned with the exchange of data between a computer and the network to which it is attached.

A)transport
B)application
C)network access
D)physical
Question
Transport PDUs are typically called ________.

A)channels
B)segments
C)bridges
D)frames
Question
In 1995 the Internet Engineering Task Force issued a specification for a next-generation IP; this specification was turned into a standard in 1996 known as _________.
Question
________ is an Internet-based standard and is the framework for developing a complete range of computer communications standards.
Question
Two protocol architectures have served as the basis for the development of interoperable protocol standards: the OSI reference model and the ________.
Question
The current IP specification uses addresses to identify hosts that consist of:

A)16 bits
B)64 bits
C)32 bits
D)128 bits
Question
The standard network management protocol for TCP / IP networks is _________.
Question
A _________ is a device that connects two networks and whose primary function is to relay data from one network to the other on a route from the source to the destination end system.
Question
The combination of data from the next higher layer and control information is known as a __________.
Question
__________ networking brings with it the advantages of connectivity without being tethered,faster / lower cost deployment and the connection of geographically remote sites.
Question
The ________ layer contains the logic needed to support the various user applications.

A)network access
B)physical
C)application
D)transport
Question
The network access protocol appends a network access header to the data it receives from the transport layer,creating a network access PDU,typically called a __________.
Question
An error detection code is also referred to as a frame check sequence or a ________.
Question
IP appends a header of control information to each segment to form a(n)__________.

A)IP datagram
B)end system
C)checksum
D)port
Question
The ________ supports a basic electronic mail facility by providing a mechanism for transferring messages among separate hosts.

A)SNMP
B)SSH
C)HTTP
D)SMTP
Question
The _________ is used to send files from one system to another under user command.

A)UDP
B)SMTP
C)FTP
D)SSH
Question
For most applications running as part of the TCP / IP architecture,the transport layer protocol is _________.
Question
________ provides a secure remote logon capability,which enables a user at a terminal or personal computer to logon to a remote computer and function as if directly connected to that computer.
Question
_________ connects client systems to Web servers on the Internet and its primary function is to establish a connection with the server and send HTML pages back to the user's browser.
Question
Subnetworks are connected by devices referred to as __________,which provide a communications path and perform the necessary relaying and routing functions so that data can be exchanged between devices attached to different subnetworks in the internet.
Question
Features of ________ include mailing lists,return receipts,and forwarding.
Question
A _________ is a facility that provides a data transfer service among devices attached to the network.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Tcp / Ip
1
Protocol architectures are a set of complementary protocol modules governing communication between entities in a network.
True
2
OSI is another standardized architecture that is often used to describe communications functions but is now rarely implemented.
True
3
Standards can be developed simultaneously for protocols at each layer of the architecture.
True
4
Wireless networking brings:

A)increased security risks
B)management headaches
C)increased demands on support staff
D)all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
WLAN standards have been designed to replace Ethernet.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
TCP / IP is a protocol architecture.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
EOIP encourages the development of IP applications for all major types of business data as well as IP-based,or IP-compliant,telecommunications transport.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
The TCP / IP architecture contains ________ layers.

A)two
B)three
C)four
D)five
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
The key elements of a protocol are:

A)syntax,structure,timing
B)syntax,semantics,structure
C)structure,semantics,format
D)format,syntax,semantics
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is a commonly used set of standards for computer communications?

A)SLA
B)ISO
C)POP
D)TCP / IP
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
The System Network Architecture of IBM is a proprietary layered protocol architecture.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Wireless networks cannot be deployed without the aid of the network administrators.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
A router is a more complex intermediate system than a bridge.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
________ is a Cisco proprietary product.

A)VoIP
B)SKINNY
C)SMTP
D)SIP
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
IP is also becoming the language of the telephone system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
The network access layer contains the logic needed to support the various user applications.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
LANs and WANs are usually isolated entities.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
UDP provides guaranteed delivery of messages.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
When two or more computers are interconnected via a communication network,the set of computer stations is referred to as a "computer connection".
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
There are many protocols and technologies to select from when building an entire communication system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
The ________ layer covers the physical interface between a data transmission device and a transmission medium or network.

A)physical
B)transport
C)application
D)network
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
The newer IPv6 specification uses addresses to identify hosts that consist of:

A)128 bits
B)64 bits
C)32 bits
D)16 bits
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
A device that connects networks with differing addressing schemes,packet sizes and interfaces is called a ___________.

A)hub
B)router
C)switch
D)repeater
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
The ________ layer is concerned with the exchange of data between a computer and the network to which it is attached.

A)transport
B)application
C)network access
D)physical
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
Transport PDUs are typically called ________.

A)channels
B)segments
C)bridges
D)frames
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
In 1995 the Internet Engineering Task Force issued a specification for a next-generation IP; this specification was turned into a standard in 1996 known as _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
________ is an Internet-based standard and is the framework for developing a complete range of computer communications standards.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
Two protocol architectures have served as the basis for the development of interoperable protocol standards: the OSI reference model and the ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The current IP specification uses addresses to identify hosts that consist of:

A)16 bits
B)64 bits
C)32 bits
D)128 bits
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The standard network management protocol for TCP / IP networks is _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
A _________ is a device that connects two networks and whose primary function is to relay data from one network to the other on a route from the source to the destination end system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The combination of data from the next higher layer and control information is known as a __________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
__________ networking brings with it the advantages of connectivity without being tethered,faster / lower cost deployment and the connection of geographically remote sites.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
The ________ layer contains the logic needed to support the various user applications.

A)network access
B)physical
C)application
D)transport
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
The network access protocol appends a network access header to the data it receives from the transport layer,creating a network access PDU,typically called a __________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
An error detection code is also referred to as a frame check sequence or a ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
IP appends a header of control information to each segment to form a(n)__________.

A)IP datagram
B)end system
C)checksum
D)port
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The ________ supports a basic electronic mail facility by providing a mechanism for transferring messages among separate hosts.

A)SNMP
B)SSH
C)HTTP
D)SMTP
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
The _________ is used to send files from one system to another under user command.

A)UDP
B)SMTP
C)FTP
D)SSH
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
For most applications running as part of the TCP / IP architecture,the transport layer protocol is _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
________ provides a secure remote logon capability,which enables a user at a terminal or personal computer to logon to a remote computer and function as if directly connected to that computer.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
_________ connects client systems to Web servers on the Internet and its primary function is to establish a connection with the server and send HTML pages back to the user's browser.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
Subnetworks are connected by devices referred to as __________,which provide a communications path and perform the necessary relaying and routing functions so that data can be exchanged between devices attached to different subnetworks in the internet.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Features of ________ include mailing lists,return receipts,and forwarding.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
A _________ is a facility that provides a data transfer service among devices attached to the network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.