Deck 11: Module a Networking Concepts

Full screen (f)
exit full mode
Question
________ is either an internet layer in the TCP/IP architecture or a collection of networks that is not the global Internet.

A) A host
B) The intranet
C) The U.S. Internet
D) An access router
Use Space or
up arrow
down arrow
to flip the card.
Question
A(n) ________ is a(n) ________.

A) bit; byte
B) octet; byte
C) bit; octet
D) byte; bit
Question
A(n) ________ is any device attached to the global Internet.

A) host
B) server
C) byte
D) LAN
Question
A server, a client PC, or a PDA can be referred to as a host.
Question
What is the typical size of an access router?

A) About the size of a hardback book
B) About the size of a pack of cards
C) Approximately the size of a laptop computer
D) Approximately the size of three or four hardback books
Question
In a home network, a message sent by a PC is called a ________.

A) server
B) byte
C) frame
D) router
Question
In a typical home network, an access router connects the home network to ________.

A) an intranet
B) the Internet
C) a LAN
D) a WAN
Question
For a host on a home network to use the Internet, each host needs a(n) ________.

A) switch
B) NAT
C) IP address
D) DHCP
Question
Which of the follow is FALSE about access routers?

A) They all have an SPI firewall.
B) They provide network address translation.
C) They connect a network to another network.
D) They have a DHCP server.
Question
UTP is a ________.

A) type of router
B) network interface card
C) type of wiring
D) type of translation
Question
Which of the following is a type of twisted pair wiring?

A) STP
B) NAT
C) IP
D) DHCP
Question
Companies use carriers for WAN transmission because ________.

A) companies lack rights of way
B) they are less expensive than a LAN
C) companies can then employ fewer computer security personnel
D) it is not legal to have carriers of their own
Question
DARPA created ________.

A) home networks
B) the Internet
C) intranets
D) WANS
Question
Initially, only ________ could connect to the Internet.

A) large corporations
B) noncommercial networks
C) commercial networks
D) K-12 schools
Question
Messages that travel within a single network are called ________.

A) packets
B) switches
C) frames
D) core switches
Question
Messages that travel all the way from one computer to another across the Internet are called ________.

A) packets
B) switches
C) frames
D) core switches
Question
An internal TCP/IP internet for a company's own communication is known as a(n) ________.

A) Internet
B) ISP
C) intranet
D) LAN
Question
Internet service providers connect at centers that are usually called ________.

A) NAPs
B) PSDNs
C) switches
D) LANs
Question
Networking circuitry is usually a component that you can choose to add to your circuit board in most PCs.
Question
A home network needs an Internet access line to connect to the Internet.
Question
UTP wiring is much more expensive than is STP wiring.
Question
A home network must have an Internet access line in order to connect to the Internet.
Question
The Internet uses transmission standards that are known as the TCP/IP standards.
Question
There is no central point of control over the Internet's operation.
Question
Security that results from the inherent operation of a standard is called ________.

A) incidental security
B) defective implementation
C) transmission security
D) IPsec security
Question
________ is the main protocol for delivering packets over the Internet.

A) ISP
B) IPsec
C) IP
D) NAP
Question
________ was created to address the fact that IP originally had no security.

A) ISP
B) IPsec
C) DHCP
D) NAP
Question
The TCP standard is difficult to attack because an attacker cannot send a false TCP message unless he or she can guess the sequence number of the next message.
Question
All computer standards were initially created with security.
Question
IP was originally created with advanced security.
Question
IPsec is burdensome and not widely used.
Question
When security is added to a standard, it usually is added only to later versions of the standard.
Question
Which of the following is NOT a core layer?

A) Applications
B) Internet
C) Single-network
D) Transport
Question
Which of the following is the highest core layer?

A) Applications
B) Internet
C) Single-network
D) Transport
Question
Which of the following is the middle core layer?

A) Applications
B) Internet
C) Single-network
D) Transport
Question
Standards at the ________ govern how packets are delivered across an internet.

A) internet core layer
B) single-network layer
C) transport layer
D) applications layer
Question
Computer standards are complex.
Question
The lowest core layer is the internet core layer.
Question
Standards are divided into five core layers.
Question
The bottom layer of the TCP/IP standard is the ________.

A) subnet access layer
B) single-network core layer
C) application layer
D) transport layer
Question
________ is a standards architecture.

A) ISO
B) OSI
C) ITU-T
D) IETF
Question
The ________ is roughly the same in OSI and TCP/IP.

A) subnet access layer
B) single-network core layer
C) application layer
D) transport layer
Question
Most firms use the ________.

A) hybrid TCP/IP-OSI standards architecture
B) OSI application standards
C) UTP links
D) optical fiber
Question
The IETF is the standards agency for the Internet.
Question
IETF documents are publicly available at no charge to the public.
Question
OSI divides three core layers into a total of seven layers.
Question
Hybrid architecture uses TCP/IP standards at the physical and data link layers and OSI standards at the internet and transport layers.
Question
A popular transmission medium for longer distances is ________.

A) TCP/IP
B) twisted pair
C) UTP
D) optical fiber
Question
________ uses radio waves.

A) Wireless
B) TCP/IP
C) Optical fiber
D) UTP
Question
The ________ LAN standard is designed to limit switch-to-switch communication to authenticated switches.

A) 802.1AE
B) 802.1X
C) TCP/IP
D) IPsec
Question
Radio signaling is considered very complex.
Question
In fiber optic transmission, signals have three different states, 0, 1, and 2.
Question
Ethernet dominates LAN standards.
Question
The IETF divided the internetworking core layer into two layers-________.

A) the internet and transport layers
B) the subnet access and transport layers
C) the single-network core and transport layers
D) the application and internet layers
Question
The main standard at the internet layer is the Internet Protocol.
Question
An IP header normally is shown by drawing several rows, with ________ in each row.

A) 32 bytes
B) 64 bits
C) 32 bits
D) 8 bytes
Question
An IP header is divided into smaller units called ________.

A) fields
B) bytes
C) packets
D) switches
Question
The ________ field has a value ________.

A) of 0 or 1
B) between 0 and 2
C) between 0 and 56
D) between 0 and 255
Question
A value of 1 in the ________ field indicates that the data field contains an ICMP message.

A) TTL
B) header checksum
C) data
D) protocol
Question
The ________ field allows the receiver to find errors.

A) TTL
B) header checksum
C) data
D) protocol
Question
A packet is a long stream of 1s and 0s.
Question
IP fragmentation is common.
Question
A subnet can only have one host.
Question
IP was created in the early 1980s.
Question
In TCP, ending a conversation normally takes ________.

A) two messages
B) three messages
C) four messages
D) six messages
Question
What does a reliable protocol do?

A) Detects every second error in a system
B) Detects and corrects errors
C) Only corrects errors, another node detects the errors
D) Detects user error and correct many of them
Question
If a flag field is not set, that means its value is ________.

A) 0
B) 1
C) 56
D) 256
Question
________ is a well-known port number for web-server programs.

A) TCP Port 80
B) TCP Port 25
C) TCP Port 21
D) TCP Port 1023
Question
________ uses options extensively.

A) IPsec
B) A LAN
C) TCP
D) A WAN
Question
An unreliable protocol does not detect and correct errors.
Question
TCP is considered a reliable protocol.
Question
ICMP messages are delivered in the data fields of ________.

A) frames
B) supervisory frames
C) IP packets
D) IPv4s
Question
DNS servers for ________ domains can include .com, .edu, and .CA.

A) fourth-level
B) third-level
C) second-level
D) top-level
Question
RIP, OSPF, and BGP are ________.

A) static IP addresses
B) dynamic host configuration protocols
C) supervisory protocols
D) dynamic routing protocols
Question
Many ICMP messages are error messages.
Question
The best-know ICMP message types are the ICMP echo and echo reply messages.
Question
Which of the following is NOT a popular transfer standard for e-mail?

A) POP
B) IMAP
C) SMTP
D) DHCP
Question
The ________ standard can be used in place of both FTP and Telnet while providing high security.

A) SSH
B) HTTP
C) HTML
D) DHCP
Question
Most applications share the same application layer standard.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/79
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Module a Networking Concepts
1
________ is either an internet layer in the TCP/IP architecture or a collection of networks that is not the global Internet.

A) A host
B) The intranet
C) The U.S. Internet
D) An access router
The intranet
2
A(n) ________ is a(n) ________.

A) bit; byte
B) octet; byte
C) bit; octet
D) byte; bit
octet; byte
3
A(n) ________ is any device attached to the global Internet.

A) host
B) server
C) byte
D) LAN
host
4
A server, a client PC, or a PDA can be referred to as a host.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
5
What is the typical size of an access router?

A) About the size of a hardback book
B) About the size of a pack of cards
C) Approximately the size of a laptop computer
D) Approximately the size of three or four hardback books
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
6
In a home network, a message sent by a PC is called a ________.

A) server
B) byte
C) frame
D) router
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
7
In a typical home network, an access router connects the home network to ________.

A) an intranet
B) the Internet
C) a LAN
D) a WAN
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
8
For a host on a home network to use the Internet, each host needs a(n) ________.

A) switch
B) NAT
C) IP address
D) DHCP
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the follow is FALSE about access routers?

A) They all have an SPI firewall.
B) They provide network address translation.
C) They connect a network to another network.
D) They have a DHCP server.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
10
UTP is a ________.

A) type of router
B) network interface card
C) type of wiring
D) type of translation
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is a type of twisted pair wiring?

A) STP
B) NAT
C) IP
D) DHCP
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
12
Companies use carriers for WAN transmission because ________.

A) companies lack rights of way
B) they are less expensive than a LAN
C) companies can then employ fewer computer security personnel
D) it is not legal to have carriers of their own
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
13
DARPA created ________.

A) home networks
B) the Internet
C) intranets
D) WANS
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
14
Initially, only ________ could connect to the Internet.

A) large corporations
B) noncommercial networks
C) commercial networks
D) K-12 schools
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
15
Messages that travel within a single network are called ________.

A) packets
B) switches
C) frames
D) core switches
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
16
Messages that travel all the way from one computer to another across the Internet are called ________.

A) packets
B) switches
C) frames
D) core switches
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
17
An internal TCP/IP internet for a company's own communication is known as a(n) ________.

A) Internet
B) ISP
C) intranet
D) LAN
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
18
Internet service providers connect at centers that are usually called ________.

A) NAPs
B) PSDNs
C) switches
D) LANs
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
19
Networking circuitry is usually a component that you can choose to add to your circuit board in most PCs.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
20
A home network needs an Internet access line to connect to the Internet.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
21
UTP wiring is much more expensive than is STP wiring.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
22
A home network must have an Internet access line in order to connect to the Internet.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
23
The Internet uses transmission standards that are known as the TCP/IP standards.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
24
There is no central point of control over the Internet's operation.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
25
Security that results from the inherent operation of a standard is called ________.

A) incidental security
B) defective implementation
C) transmission security
D) IPsec security
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
26
________ is the main protocol for delivering packets over the Internet.

A) ISP
B) IPsec
C) IP
D) NAP
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
27
________ was created to address the fact that IP originally had no security.

A) ISP
B) IPsec
C) DHCP
D) NAP
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
28
The TCP standard is difficult to attack because an attacker cannot send a false TCP message unless he or she can guess the sequence number of the next message.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
29
All computer standards were initially created with security.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
30
IP was originally created with advanced security.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
31
IPsec is burdensome and not widely used.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
32
When security is added to a standard, it usually is added only to later versions of the standard.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is NOT a core layer?

A) Applications
B) Internet
C) Single-network
D) Transport
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is the highest core layer?

A) Applications
B) Internet
C) Single-network
D) Transport
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is the middle core layer?

A) Applications
B) Internet
C) Single-network
D) Transport
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
36
Standards at the ________ govern how packets are delivered across an internet.

A) internet core layer
B) single-network layer
C) transport layer
D) applications layer
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
37
Computer standards are complex.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
38
The lowest core layer is the internet core layer.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
39
Standards are divided into five core layers.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
40
The bottom layer of the TCP/IP standard is the ________.

A) subnet access layer
B) single-network core layer
C) application layer
D) transport layer
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
41
________ is a standards architecture.

A) ISO
B) OSI
C) ITU-T
D) IETF
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
42
The ________ is roughly the same in OSI and TCP/IP.

A) subnet access layer
B) single-network core layer
C) application layer
D) transport layer
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
43
Most firms use the ________.

A) hybrid TCP/IP-OSI standards architecture
B) OSI application standards
C) UTP links
D) optical fiber
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
44
The IETF is the standards agency for the Internet.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
45
IETF documents are publicly available at no charge to the public.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
46
OSI divides three core layers into a total of seven layers.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
47
Hybrid architecture uses TCP/IP standards at the physical and data link layers and OSI standards at the internet and transport layers.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
48
A popular transmission medium for longer distances is ________.

A) TCP/IP
B) twisted pair
C) UTP
D) optical fiber
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
49
________ uses radio waves.

A) Wireless
B) TCP/IP
C) Optical fiber
D) UTP
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
50
The ________ LAN standard is designed to limit switch-to-switch communication to authenticated switches.

A) 802.1AE
B) 802.1X
C) TCP/IP
D) IPsec
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
51
Radio signaling is considered very complex.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
52
In fiber optic transmission, signals have three different states, 0, 1, and 2.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
53
Ethernet dominates LAN standards.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
54
The IETF divided the internetworking core layer into two layers-________.

A) the internet and transport layers
B) the subnet access and transport layers
C) the single-network core and transport layers
D) the application and internet layers
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
55
The main standard at the internet layer is the Internet Protocol.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
56
An IP header normally is shown by drawing several rows, with ________ in each row.

A) 32 bytes
B) 64 bits
C) 32 bits
D) 8 bytes
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
57
An IP header is divided into smaller units called ________.

A) fields
B) bytes
C) packets
D) switches
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
58
The ________ field has a value ________.

A) of 0 or 1
B) between 0 and 2
C) between 0 and 56
D) between 0 and 255
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
59
A value of 1 in the ________ field indicates that the data field contains an ICMP message.

A) TTL
B) header checksum
C) data
D) protocol
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
60
The ________ field allows the receiver to find errors.

A) TTL
B) header checksum
C) data
D) protocol
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
61
A packet is a long stream of 1s and 0s.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
62
IP fragmentation is common.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
63
A subnet can only have one host.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
64
IP was created in the early 1980s.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
65
In TCP, ending a conversation normally takes ________.

A) two messages
B) three messages
C) four messages
D) six messages
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
66
What does a reliable protocol do?

A) Detects every second error in a system
B) Detects and corrects errors
C) Only corrects errors, another node detects the errors
D) Detects user error and correct many of them
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
67
If a flag field is not set, that means its value is ________.

A) 0
B) 1
C) 56
D) 256
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
68
________ is a well-known port number for web-server programs.

A) TCP Port 80
B) TCP Port 25
C) TCP Port 21
D) TCP Port 1023
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
69
________ uses options extensively.

A) IPsec
B) A LAN
C) TCP
D) A WAN
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
70
An unreliable protocol does not detect and correct errors.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
71
TCP is considered a reliable protocol.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
72
ICMP messages are delivered in the data fields of ________.

A) frames
B) supervisory frames
C) IP packets
D) IPv4s
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
73
DNS servers for ________ domains can include .com, .edu, and .CA.

A) fourth-level
B) third-level
C) second-level
D) top-level
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
74
RIP, OSPF, and BGP are ________.

A) static IP addresses
B) dynamic host configuration protocols
C) supervisory protocols
D) dynamic routing protocols
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
75
Many ICMP messages are error messages.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
76
The best-know ICMP message types are the ICMP echo and echo reply messages.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following is NOT a popular transfer standard for e-mail?

A) POP
B) IMAP
C) SMTP
D) DHCP
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
78
The ________ standard can be used in place of both FTP and Telnet while providing high security.

A) SSH
B) HTTP
C) HTML
D) DHCP
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
79
Most applications share the same application layer standard.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 79 flashcards in this deck.