Deck 6: Network Communications and Protocols

Full screen (f)
exit full mode
Question
On the Internet and most LANs, connectionless protocols are used for the majority of data transfers.
Use Space or
up arrow
down arrow
to flip the card.
Question
____ is the TCP/IP protocol responsible for reliable delivery of data.

A)SPX
B)UDP
C)TCP
D)FTP
Question
____ is a nonroutable protocol.

A)NetBEUI
B)IP
C)IPX
D)SPX
Question
An IP address is divided into two distinct parts: one part designates the logical network the computer is a part of, while the remainder of the address represents the ____.

A)NIC's MAC address
B)domain name
C)host ID
D)subnet mask
Question
Internet Protocol version 4 (IPv4), or just IP, is a Transport layer protocol that provides source and destination addressing and routing for the TCP/IP suite.
Question
____ is a name-to-address resolution protocol that functionally operates at the Session layer of the OSI model.

A)DNS
B)ARP
C)ICMP
D)DHCP
Question
Class ____ addresses begin with network IDs between 128 and 191.

A)A
B)B
C)C
D)D
Question
____ uses TCP as its transport protocol.

A)NFS
B)RTP
C)TFTP
D)HTTP
Question
____ is Apple's remote file-management protocol.

A)AFP
B)NCP
C)FTP
D)SNMP
Question
TCP is a(n)____ protocol.

A)unreliable
B)best effort
C)connection-oriented
D)connectionless
Question
IP is a ____ protocol.

A)reliable
B)nonroutable
C)connection-oriented
D)connectionless
Question
One major benefit of using DHCP is the ease with which computers can be moved.
Question
____ is Novell's protocol for packet routing and forwarding.

A)IP
B)IPX
C)SPX
D)NetBIOS
Question
____ is a remote terminal emulation protocol that operates at all three upper layers and is used mostly to provide connectivity between dissimilar systems.

A)FTP
B)Telnet
C)SNMP
D)SMTP
Question
____ is a Network layer protocol used to resolve a logical (IP)address to a physical (MAC)address.

A)ICMP
B)ARP
C)DHCP
D)NAT
Question
The act of supernetting "borrows" bits from the network portion of an IP address to "lend" those bits to the host portion.
Question
____ is Novell's connection-oriented protocol used to guarantee data delivery.

A)AppleTalk
B)IPX
C)TCP
D)SPX
Question
Class A addresses are intended for use by large corporations and governments.
Question
Although installing several protocols on a machine to ensure interoperability with any operating system might be tempting, adding unnecessary protocols can have a detrimental effect on network performance.
Question
Combining two or more small networks into one larger network is one reason to subnet.
Question
____ is the message format that DOS and Windows use to share files, directories, and devices.

A)FTP
B)NetBIOS
C)SMB
D)Samba
Question
____ is an example of an IPv6 address.

A)2001:260::2ed3:340:ab
B)192.168.0.1
C)00-13-02-29-AG-6C
D)200.13.4.0/26
Question
An IPv6 address is ____ bits long.

A)32
B)64
C)128
D)256
Question
NWLink is the Microsoft implementation of the ____ protocol suite.

A)TCP/IP
B)NetBIOS and NetBEUI
C)AppleTalk
D)IPX/SPX
Question
A(n)____________________ is a grouping of eight binary digits or bits usually expressed as a decimal number.
Question
What is connectionless data delivery?
Question
The most common protocol stack is Transmission Control Protocol/Internet Protocol (TCP/IP), which is the ____________________ protocol suite.
Question
What is a connection-oriented protocol?
Question
____________________ (QoS)is a term that describes a network's capability to prioritize data packets, based on the type of information they contain (for example, voice, video, or file data)or the urgency of the information.
Question
Class ____ addresses are reserved for experimental use and cannot be used for address assignment.

A)A
B)C
C)D
D)E
Question
A subnet mask is a ____-bit number that's always assigned to a host when the IP address is assigned.

A)16
B)32
C)64
D)128
Question
The network beginning with 127 is called the ____________________ address.
Question
The reserved name localhost always corresponds to the IP address ____.

A)127.0.0.1
B)169.254.0.1
C)192.168.0.1
D)255.255.255.0
Question
____________________ is the process of dividing a single network address into two or more subnetwork addresses, each with fewer available host IDs than the original network address.
Question
An extension of NAT, called ____________________ (PAT), allows several hundred workstations to access the Internet with a single public Internet address.
Question
Class ____ networks are limited to 254 hosts per network.

A)B
B)C
C)D
D)E
Question
The default Class C subnet mask is ____.

A)255.0.0.0
B)255.255.0.0
C)255.255.255.0
D)255.255.255.128
Question
AppleTalk divides computers into ____.

A)zones
B)domains
C)groups
D)subnets
Question
______________________________ (TCP)is the primary Internet transport protocol.
Question
In an APIPA-enabled operating system, the computer assigns itself an address from the special range of addresses that begin with ____.

A)10
B)169.254
C)192.168
D)255.255
Question
Match between columns
provides data transport services
protocol
provides data transport services
protocol stack
provides data transport services
routable
provides data transport services
NetBIOS
provides data transport services
NetBEUI
provides data transport services
SMTP
provides data transport services
FTP
provides data transport services
SNMP
provides data transport services
NCP
TCP/IP's protocol used to manage and monitor network devices
protocol
TCP/IP's protocol used to manage and monitor network devices
protocol stack
TCP/IP's protocol used to manage and monitor network devices
routable
TCP/IP's protocol used to manage and monitor network devices
NetBIOS
TCP/IP's protocol used to manage and monitor network devices
NetBEUI
TCP/IP's protocol used to manage and monitor network devices
SMTP
TCP/IP's protocol used to manage and monitor network devices
FTP
TCP/IP's protocol used to manage and monitor network devices
SNMP
TCP/IP's protocol used to manage and monitor network devices
NCP
set of protocols that works cooperatively
protocol
set of protocols that works cooperatively
protocol stack
set of protocols that works cooperatively
routable
set of protocols that works cooperatively
NetBIOS
set of protocols that works cooperatively
NetBEUI
set of protocols that works cooperatively
SMTP
set of protocols that works cooperatively
FTP
set of protocols that works cooperatively
SNMP
set of protocols that works cooperatively
NCP
establishes and manages communications between computers and provides naming services
protocol
establishes and manages communications between computers and provides naming services
protocol stack
establishes and manages communications between computers and provides naming services
routable
establishes and manages communications between computers and provides naming services
NetBIOS
establishes and manages communications between computers and provides naming services
NetBEUI
establishes and manages communications between computers and provides naming services
SMTP
establishes and manages communications between computers and provides naming services
FTP
establishes and manages communications between computers and provides naming services
SNMP
establishes and manages communications between computers and provides naming services
NCP
Novell's client shells and redirectors
protocol
Novell's client shells and redirectors
protocol stack
Novell's client shells and redirectors
routable
Novell's client shells and redirectors
NetBIOS
Novell's client shells and redirectors
NetBEUI
Novell's client shells and redirectors
SMTP
Novell's client shells and redirectors
FTP
Novell's client shells and redirectors
SNMP
Novell's client shells and redirectors
NCP
TCP/IP's protocol used to provide file transfer services
protocol
TCP/IP's protocol used to provide file transfer services
protocol stack
TCP/IP's protocol used to provide file transfer services
routable
TCP/IP's protocol used to provide file transfer services
NetBIOS
TCP/IP's protocol used to provide file transfer services
NetBEUI
TCP/IP's protocol used to provide file transfer services
SMTP
TCP/IP's protocol used to provide file transfer services
FTP
TCP/IP's protocol used to provide file transfer services
SNMP
TCP/IP's protocol used to provide file transfer services
NCP
rules and procedures for communicating
protocol
rules and procedures for communicating
protocol stack
rules and procedures for communicating
routable
rules and procedures for communicating
NetBIOS
rules and procedures for communicating
NetBEUI
rules and procedures for communicating
SMTP
rules and procedures for communicating
FTP
rules and procedures for communicating
SNMP
rules and procedures for communicating
NCP
TCP/IP's protocol responsible for transferring e-mail
protocol
TCP/IP's protocol responsible for transferring e-mail
protocol stack
TCP/IP's protocol responsible for transferring e-mail
routable
TCP/IP's protocol responsible for transferring e-mail
NetBIOS
TCP/IP's protocol responsible for transferring e-mail
NetBEUI
TCP/IP's protocol responsible for transferring e-mail
SMTP
TCP/IP's protocol responsible for transferring e-mail
FTP
TCP/IP's protocol responsible for transferring e-mail
SNMP
TCP/IP's protocol responsible for transferring e-mail
NCP
term used to describe a protocol suite that functions at the Network layer
protocol
term used to describe a protocol suite that functions at the Network layer
protocol stack
term used to describe a protocol suite that functions at the Network layer
routable
term used to describe a protocol suite that functions at the Network layer
NetBIOS
term used to describe a protocol suite that functions at the Network layer
NetBEUI
term used to describe a protocol suite that functions at the Network layer
SMTP
term used to describe a protocol suite that functions at the Network layer
FTP
term used to describe a protocol suite that functions at the Network layer
SNMP
term used to describe a protocol suite that functions at the Network layer
NCP
Question
What is UDP? Mention some of its characteristics.
Question
How does TCP establish a connection?
Question
What is the role of Class D IP addresses?
Question
What are the advantages of subnetting?
Question
What is HTTP?
Question
How does DHCP work?
Question
What is ICMP?
Question
What is FTP?
Question
Why is NAT used?
Question
What are IP's reserved addresses that cannot be routed across the Internet?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/51
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Network Communications and Protocols
1
On the Internet and most LANs, connectionless protocols are used for the majority of data transfers.
False
2
____ is the TCP/IP protocol responsible for reliable delivery of data.

A)SPX
B)UDP
C)TCP
D)FTP
C
3
____ is a nonroutable protocol.

A)NetBEUI
B)IP
C)IPX
D)SPX
A
4
An IP address is divided into two distinct parts: one part designates the logical network the computer is a part of, while the remainder of the address represents the ____.

A)NIC's MAC address
B)domain name
C)host ID
D)subnet mask
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
5
Internet Protocol version 4 (IPv4), or just IP, is a Transport layer protocol that provides source and destination addressing and routing for the TCP/IP suite.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
6
____ is a name-to-address resolution protocol that functionally operates at the Session layer of the OSI model.

A)DNS
B)ARP
C)ICMP
D)DHCP
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
7
Class ____ addresses begin with network IDs between 128 and 191.

A)A
B)B
C)C
D)D
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
8
____ uses TCP as its transport protocol.

A)NFS
B)RTP
C)TFTP
D)HTTP
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
9
____ is Apple's remote file-management protocol.

A)AFP
B)NCP
C)FTP
D)SNMP
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
10
TCP is a(n)____ protocol.

A)unreliable
B)best effort
C)connection-oriented
D)connectionless
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
11
IP is a ____ protocol.

A)reliable
B)nonroutable
C)connection-oriented
D)connectionless
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
12
One major benefit of using DHCP is the ease with which computers can be moved.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
13
____ is Novell's protocol for packet routing and forwarding.

A)IP
B)IPX
C)SPX
D)NetBIOS
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
14
____ is a remote terminal emulation protocol that operates at all three upper layers and is used mostly to provide connectivity between dissimilar systems.

A)FTP
B)Telnet
C)SNMP
D)SMTP
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
15
____ is a Network layer protocol used to resolve a logical (IP)address to a physical (MAC)address.

A)ICMP
B)ARP
C)DHCP
D)NAT
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
16
The act of supernetting "borrows" bits from the network portion of an IP address to "lend" those bits to the host portion.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
17
____ is Novell's connection-oriented protocol used to guarantee data delivery.

A)AppleTalk
B)IPX
C)TCP
D)SPX
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
18
Class A addresses are intended for use by large corporations and governments.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
19
Although installing several protocols on a machine to ensure interoperability with any operating system might be tempting, adding unnecessary protocols can have a detrimental effect on network performance.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
20
Combining two or more small networks into one larger network is one reason to subnet.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
21
____ is the message format that DOS and Windows use to share files, directories, and devices.

A)FTP
B)NetBIOS
C)SMB
D)Samba
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
22
____ is an example of an IPv6 address.

A)2001:260::2ed3:340:ab
B)192.168.0.1
C)00-13-02-29-AG-6C
D)200.13.4.0/26
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
23
An IPv6 address is ____ bits long.

A)32
B)64
C)128
D)256
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
24
NWLink is the Microsoft implementation of the ____ protocol suite.

A)TCP/IP
B)NetBIOS and NetBEUI
C)AppleTalk
D)IPX/SPX
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
25
A(n)____________________ is a grouping of eight binary digits or bits usually expressed as a decimal number.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
26
What is connectionless data delivery?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
27
The most common protocol stack is Transmission Control Protocol/Internet Protocol (TCP/IP), which is the ____________________ protocol suite.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
28
What is a connection-oriented protocol?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
29
____________________ (QoS)is a term that describes a network's capability to prioritize data packets, based on the type of information they contain (for example, voice, video, or file data)or the urgency of the information.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
30
Class ____ addresses are reserved for experimental use and cannot be used for address assignment.

A)A
B)C
C)D
D)E
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
31
A subnet mask is a ____-bit number that's always assigned to a host when the IP address is assigned.

A)16
B)32
C)64
D)128
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
32
The network beginning with 127 is called the ____________________ address.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
33
The reserved name localhost always corresponds to the IP address ____.

A)127.0.0.1
B)169.254.0.1
C)192.168.0.1
D)255.255.255.0
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
34
____________________ is the process of dividing a single network address into two or more subnetwork addresses, each with fewer available host IDs than the original network address.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
35
An extension of NAT, called ____________________ (PAT), allows several hundred workstations to access the Internet with a single public Internet address.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
36
Class ____ networks are limited to 254 hosts per network.

A)B
B)C
C)D
D)E
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
37
The default Class C subnet mask is ____.

A)255.0.0.0
B)255.255.0.0
C)255.255.255.0
D)255.255.255.128
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
38
AppleTalk divides computers into ____.

A)zones
B)domains
C)groups
D)subnets
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
39
______________________________ (TCP)is the primary Internet transport protocol.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
40
In an APIPA-enabled operating system, the computer assigns itself an address from the special range of addresses that begin with ____.

A)10
B)169.254
C)192.168
D)255.255
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
provides data transport services
protocol
provides data transport services
protocol stack
provides data transport services
routable
provides data transport services
NetBIOS
provides data transport services
NetBEUI
provides data transport services
SMTP
provides data transport services
FTP
provides data transport services
SNMP
provides data transport services
NCP
TCP/IP's protocol used to manage and monitor network devices
protocol
TCP/IP's protocol used to manage and monitor network devices
protocol stack
TCP/IP's protocol used to manage and monitor network devices
routable
TCP/IP's protocol used to manage and monitor network devices
NetBIOS
TCP/IP's protocol used to manage and monitor network devices
NetBEUI
TCP/IP's protocol used to manage and monitor network devices
SMTP
TCP/IP's protocol used to manage and monitor network devices
FTP
TCP/IP's protocol used to manage and monitor network devices
SNMP
TCP/IP's protocol used to manage and monitor network devices
NCP
set of protocols that works cooperatively
protocol
set of protocols that works cooperatively
protocol stack
set of protocols that works cooperatively
routable
set of protocols that works cooperatively
NetBIOS
set of protocols that works cooperatively
NetBEUI
set of protocols that works cooperatively
SMTP
set of protocols that works cooperatively
FTP
set of protocols that works cooperatively
SNMP
set of protocols that works cooperatively
NCP
establishes and manages communications between computers and provides naming services
protocol
establishes and manages communications between computers and provides naming services
protocol stack
establishes and manages communications between computers and provides naming services
routable
establishes and manages communications between computers and provides naming services
NetBIOS
establishes and manages communications between computers and provides naming services
NetBEUI
establishes and manages communications between computers and provides naming services
SMTP
establishes and manages communications between computers and provides naming services
FTP
establishes and manages communications between computers and provides naming services
SNMP
establishes and manages communications between computers and provides naming services
NCP
Novell's client shells and redirectors
protocol
Novell's client shells and redirectors
protocol stack
Novell's client shells and redirectors
routable
Novell's client shells and redirectors
NetBIOS
Novell's client shells and redirectors
NetBEUI
Novell's client shells and redirectors
SMTP
Novell's client shells and redirectors
FTP
Novell's client shells and redirectors
SNMP
Novell's client shells and redirectors
NCP
TCP/IP's protocol used to provide file transfer services
protocol
TCP/IP's protocol used to provide file transfer services
protocol stack
TCP/IP's protocol used to provide file transfer services
routable
TCP/IP's protocol used to provide file transfer services
NetBIOS
TCP/IP's protocol used to provide file transfer services
NetBEUI
TCP/IP's protocol used to provide file transfer services
SMTP
TCP/IP's protocol used to provide file transfer services
FTP
TCP/IP's protocol used to provide file transfer services
SNMP
TCP/IP's protocol used to provide file transfer services
NCP
rules and procedures for communicating
protocol
rules and procedures for communicating
protocol stack
rules and procedures for communicating
routable
rules and procedures for communicating
NetBIOS
rules and procedures for communicating
NetBEUI
rules and procedures for communicating
SMTP
rules and procedures for communicating
FTP
rules and procedures for communicating
SNMP
rules and procedures for communicating
NCP
TCP/IP's protocol responsible for transferring e-mail
protocol
TCP/IP's protocol responsible for transferring e-mail
protocol stack
TCP/IP's protocol responsible for transferring e-mail
routable
TCP/IP's protocol responsible for transferring e-mail
NetBIOS
TCP/IP's protocol responsible for transferring e-mail
NetBEUI
TCP/IP's protocol responsible for transferring e-mail
SMTP
TCP/IP's protocol responsible for transferring e-mail
FTP
TCP/IP's protocol responsible for transferring e-mail
SNMP
TCP/IP's protocol responsible for transferring e-mail
NCP
term used to describe a protocol suite that functions at the Network layer
protocol
term used to describe a protocol suite that functions at the Network layer
protocol stack
term used to describe a protocol suite that functions at the Network layer
routable
term used to describe a protocol suite that functions at the Network layer
NetBIOS
term used to describe a protocol suite that functions at the Network layer
NetBEUI
term used to describe a protocol suite that functions at the Network layer
SMTP
term used to describe a protocol suite that functions at the Network layer
FTP
term used to describe a protocol suite that functions at the Network layer
SNMP
term used to describe a protocol suite that functions at the Network layer
NCP
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
42
What is UDP? Mention some of its characteristics.
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
43
How does TCP establish a connection?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
44
What is the role of Class D IP addresses?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
45
What are the advantages of subnetting?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
46
What is HTTP?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
47
How does DHCP work?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
48
What is ICMP?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
49
What is FTP?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
50
Why is NAT used?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
51
What are IP's reserved addresses that cannot be routed across the Internet?
Unlock Deck
Unlock for access to all 51 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 51 flashcards in this deck.