Deck 8: The Tcpip Protocols
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
Play
Full screen (f)
Deck 8: The Tcpip Protocols
1
____ cover a wide range of topics in addition to Internet standards,from early discussion of new research concepts to status memos about the current state of the Internet.
A)RFQs
B)RFPs
C)RFCs
D)RFIs
A)RFQs
B)RFPs
C)RFCs
D)RFIs
C
2
HTTPS can use ____________________ that contain the certificate holder's public key and digital signature.
digital certificates
3
Many FTP sites allow you to log in as an anonymous user,which is an open account with limited privileges,but still capable of file transfers.
True
4
The Network Interface layer performs the same functions as the Data-Link layer in the ISO/OSI model.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
____ provides information on the state of NetBIOS-over-TCP/IP connections that exist within a Windows computer.
A)NETSTAT
B)IFCONFIG
C)TRACERT
D)NBTSTAT
A)NETSTAT
B)IFCONFIG
C)TRACERT
D)NBTSTAT
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
All TCP/IP data are packaged in units called ____.
A)blocks
B)datagrams
C)frames
D)packets
A)blocks
B)datagrams
C)frames
D)packets
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
DHCP is used when your system has been allocated a fixed IP address by your network administrator.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
The ____ uses a directed broadcast message to obtain the MAC address for a given IP address.
A)ARP
B)DNS
C)SNMP
D)SMTP
A)ARP
B)DNS
C)SNMP
D)SMTP
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
____ displays protocol statistics and current TCP/IP network connections.
A)NETSTAT
B)IFCONFIG
C)TRACERT
D)NBTSTAT
A)NETSTAT
B)IFCONFIG
C)TRACERT
D)NBTSTAT
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
____ is a TCP/IP application that determines the path through the network to a destination entered by the user.
A)NETSTAT
B)IFCONFIG
C)TRACERT
D)NBTSTAT
A)NETSTAT
B)IFCONFIG
C)TRACERT
D)NBTSTAT
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
_____________________________________________ is a protocol for dynamically assigning IP addresses to devices on a network during the bootstrap process.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
The ____________________ layer is responsible only for sending and receiving digital data,nothing else.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
The Internet Protocol is unreliable due to the fact there is no guarantee the datagram will reach its destination.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
Each piece of an IP datagram is routed on the network using a(n)____________________.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
The IP datagram is transmitted on a local network to a special purpose device called a(n)____________________.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
A typical value for an MTU on an Ethernet network is ____ bytes.
A)500
B)1000
C)1500
D)2000
A)500
B)1000
C)1500
D)2000
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
The ____ provides the means to convert from a host name to an IP address and vice versa.
A)WINS
B)NDS
C)DNS
D)IPS
A)WINS
B)NDS
C)DNS
D)IPS
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
A standard way of assigning the 64 host bits is to use the 48-bit MAC address of the host together with a fixed 8-bit FFFE code.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
The ____,developed by David Mills of the University of Delaware,provides a simple way to synchronize the time of multiple computers on a network (even across the Internet).
A)Internet Time Protocol
B)Network Time Protocol
C)Network Time Distribution Protocol
D)Network Proximity Protocol
A)Internet Time Protocol
B)Network Time Protocol
C)Network Time Distribution Protocol
D)Network Proximity Protocol
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
____ defines the format and meaning of messages exchanged by the manager and agents.
A)SNMP
B)HTTP
C)HTTPS
D)SMTP
A)SNMP
B)HTTP
C)HTTPS
D)SMTP
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Used to exchange encrypted Web pages between a client/server connection
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Used to exchange encrypted Web pages between a client/server connection
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
Describe protocol analyzers.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Allows a user to establish a terminal emulation connection on a remote computer
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Allows a user to establish a terminal emulation connection on a remote computer
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
Describe SMTP.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
MATCHING
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Official standards for the Internet that are published as electronic documents
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Official standards for the Internet that are published as electronic documents
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
Allows a user to log in to a remote computer and transfer files back and forth through simple commands
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
MATCHING
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
Match each item with a statement below.
a.Telnet session
d.RFCs
b.HTTPS
e.PING
c.FTP
A TCP/IP application that sends datagrams once every second in the hope of an echo response from the machine
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
Discuss the functionality of PING.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
What happens when a hardware frame is sent out to a network?
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
Describe what happens at each specific layer in the TCP/IP protocol after you click on a link to a Web site.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck