Deck 11: Module A: Networking Concepts

Full screen (f)
exit full mode
Question
At what core layer do you find WAN standards?

A) Single-network
B) Internet
C) Application
D) None of the above.
Use Space or
up arrow
down arrow
to flip the card.
Question
Intercepting wireless LAN transmissions is difficult.
Question
The organization that funded the creation of the Internet is ________.

A) the IETF
B) ISO
C) DARPA
D) the National Science Foundation
Question
In this book, when internet is spelled with a capital I, it means the global Internet.
Question
If two hosts are separated by seven networks, how many packets will there be along the way when a host transmits a packet to another host?

A) 1
B) 2
C) 7
D) 14
Question
Single-network core standards are for message delivery through ________.

A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
Question
User computers connect to ________ switches.

A) core
B) primary
C) workgroup
D) terminal
Question
Attackers can read signals traveling over UTP without tapping the cord.
Question
The terms octet and byte mean the same thing.
Question
Packets are carried inside frames.
Question
If two hosts are separated by five networks, how many frames will there be along the way when a host transmits a packet to another host?

A) 1
B) 2
C) 5
D) 10
Question
A device attached to a network is called a ________.

A) client
B) server
C) host
D) Neither A nor B
Question
A residential access router usually contains ________.

A) a DHCP server
B) an Ethernet switch
C) Both A and B
D) Neither A nor B
Question
A network that runs on the customer premises is a ________.

A) LAN
B) WAN
C) Both A and B
D) Neither A nor B
Question
Security problems with protocols include ________.

A) a lack of security in earlier versions
B) awkwardly added security
C) Both A and B
D) Neither A nor B
Question
Companies use carriers for WAN transmission because ________.

A) companies lack rights of way
B) carriers have extremely strong security
C) Both A and B
D) Neither A nor B
Question
Frames are messages traveling through ________.

A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
Question
When your mobile phone is on a network, it is a host.
Question
When your home PC is on a network, it is a host.
Question
In internets, different networks are connected by ________.

A) switches
B) routers
C) Both A and B
D) Neither A nor B
Question
In the IETF, a proposed standard is called a Request for Comments.
Question
A route is the path a frame takes across a single network, from the source host to the destination host, across multiple switches.
Question
Physical and data link layer standards govern transmission in ________.

A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
Question
What is the general function of the second row in the IPv4 header?

A) To give the source address
B) To give the destination address
C) To handle fragmentation and reassembly
D) None of the above.
Question
Which of the following is an OSI standards agency?

A) ISO
B) ITU-T
C) Both A and B
D) Neither A nor B
Question
The ________ layer in the hybrid TCP/IP-OSI architecture comes from OSI.

A) physical
B) transport
C) Both A and B
D) Neither A nor B
Question
Most firms actually use the ________ architecture.

A) TCP/IP
B) OSI
C) IETF
D) None of the above.
Question
In ________, signals can be read without tapping the cord.

A) UTP
B) optical fiber
C) Both A and B
D) Neither A nor B
Question
The ________ standard is designed to prevent impostors from sending false supervisory messages to switches.

A) 802.1X
B) 802.1AE
C) Both A and B
D) Neither A nor B
Question
A computer connects to the nearest switch via a ________.

A) physical link
B) data link
C) Both A and B
D) Neither A nor B
Question
The ________ layer is roughly the same in OSI and TCP/IP.

A) transport
B) session
C) Both A and B
D) Neither A nor B
Question
A ________ is the path that a frame takes across a single switched network.

A) physical link
B) data link
C) route
D) connection
Question
Which organization creates Internet standards?

A) DARPA
B) IETF
C) ISO
D) TCP
Question
Spread spectrum transmission is used in wireless LANs ________.

A) to increase transmission speed
B) for security
C) Both A and B
D) Neither A nor B
Question
The ________ field in a packet ensures that misaddressed packets will not circulate endlessly.

A) header checksum
B) TTL
C) Both A and B
D) Neither A nor B
Question
Spread spectrum transmission in wireless LANs provides security.
Question
If a router receives a packet with a TTL value of 1, what will it do?

A) Increase the TTL value to 2.
B) Keep the TTL value at 1.
C) Drop the packet.
D) None of the above.
Question
How many layers does the OSI architecture have?

A) 3
B) 5
C) 7
D) None of the above.
Question
________ is a standards architecture.

A) ISO
B) OSI
C) Both A and B
D) Neither A nor B
Question
The name of the Internet standards architecture is ________.

A) OSI
B) ISO
C) TCP/IP
D) All of the above.
Question
The IP header checksum field is used for error detection.
Question
Which of the following is true?

A) TCP works at the transport layer.
B) UDP works at the transport layer.
C) Both A and B
D) Neither A nor B
Question
In a TCP half-open DoS attack, ________.

A) the attacker sends the final ACK of a session opening
B) the attacker sends an RST segment
C) Both A and B
D) Neither A nor B
Question
A normal TCP close takes ________ segments.

A) 2
B) 3
C) 4
D) None of the above.
Question
A mask is needed to identify the size of the network part or of the combined network and subnet parts.
Question
The attacker sends a mal-formed TCP segment. The victim host sends back a TCP RST message. This exchange verifies that the victim host exists and has a certain IP address.
Question
In TCP, if a receiver receives a damaged TCP segment, it ________.

A) sends a negative acknowledgement
B) sends the segment back to the original sender
C) does nothing
D) None of the above.
Question
The subnet mask is one of the three parts of an IP address.
Question
IP options are used frequently.
Question
A flag field has the value 1.

A) The TCP segment is an acknowledgement.
B) The field is set.
C) The field is locked.
D) The router will reduce the value to 0 and drop the packet.
Question
IPsec works with ________.

A) IPv4
B) IPv6
C) Both A and B
D) Neither A nor B
Question
In an IPv4 packet, the ________ field describes the contents of the packet's data field.

A) TTL
B) header checksum
C) protocol
D) next-higher-layer
Question
The main advantage of IPv6 compared to IPv4 is ________.

A) support for more IP addresses
B) faster transmission
C) higher security
D) None of the above.
Question
A one-bit field is called a ________ field.

A) binary
B) singlet
C) TCP
D) flag
Question
An abrupt TCP close takes ________ segments.

A) 2
B) 3
C) 4
D) None of the above.
Question
TCP messages are called ________.

A) packets
B) frames
C) datagrams
D) segments
Question
A TCP session opening ends with a(n) ________ message.

A) SYN
B) FIN
C) ACK
D) URG
Question
TCP segment carries octets 4321 through 4371. What is its sequence number?

A) 4321
B) 4371
C) 4372
D) None of the above.
Question
IP addresses are 32 octets long.
Question
IPsec a general protection strategy for all internet, transport, and application protocols.
Question
TCP has a comprehensive security protocol comparable to IPsec for IP.
Question
Ping sends ________ messages and receives replies in the same protocol.

A) DNS
B) DHCP
C) ICMP
D) All of the above.
Question
________ tell the attacker that a certain IP address has a live host or router.

A) ICMP Echo replies
B) ICMP error messages
C) Both A and B
D) Neither A nor B
Question
UDP is a good protocol for applications that need reliability.
Question
ICMP ________.

A) is used in ping transmissions
B) is used for error messages
C) Both A and B
D) Neither A nor B
Question
A Windows host sends a TCP segment with source port number 1200 and destination port number 25. The sending host is a(n) ________.

A) client
B) TCP server
C) webserver
D) e-mail server
Question
TCP segment carries octets 4321 through 4371. The next segment carries no data. What is that segment's sequence number?

A) 4321
B) 4371
C) 4372
D) None of the above.
Question
________ places a relatively small traffic load on networks.

A) TCP
B) UDP
C) Both A and B
D) Neither A nor B
Question
TCP/IP's internet layer supervisory protocol is ________.

A) DNS
B) DHCP
C) ICMP
D) All of the above.
Question
To do TCP session hijacking, the attacker has to be able to predict the sequence number of the TCP segment currently being sent.
Question
Servers get ________.

A) static IP addresses
B) ephemeral IP addresses
C) dynamic IP addresses
D) None of the above.
Question
In DNS cache poisoning, an attacker replaces the IP address of a host name with another IP address.
Question
TCP electronic signatures ________.

A) do not exist
B) have automatic key exchange
C) Both A and B
D) Neither A nor B
Question
The TCP ________ field is designed to control the other party's transmission rate.

A) segment
B) flow
C) window
D) maximum
Question
________ uses options frequently.

A) IP
B) TCP
C) Both A and B
D) Neither A nor B
Question
An organization with a ________ domain name must maintain one or more DNS servers.

A) first-level
B) second-level
C) third-level
D) All of the above.
Question
TCP segment carries octets 4321 through 4371. What will be the acknowledgement number in the TCP segment that acknowledges this segment?

A) 4321
B) 4371
C) 4372
D) None of the above.
Question
DNSSEC ________.

A) is still under development
B) is widely used
C) is no longer used
D) There is no such thing as DNSSEC.
Question
Client usually get ________.

A) static IP addresses
B) ephemeral IP addresses
C) dynamic IP addresses
D) None of the above.
Question
A Windows host sends a TCP segment with source port number 1200 and destination port number 25. The receiving host is a(n) ________.

A) client
B) TCP server
C) webserver
D) e-mail server
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/91
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Module A: Networking Concepts
1
At what core layer do you find WAN standards?

A) Single-network
B) Internet
C) Application
D) None of the above.
A
2
Intercepting wireless LAN transmissions is difficult.
False
3
The organization that funded the creation of the Internet is ________.

A) the IETF
B) ISO
C) DARPA
D) the National Science Foundation
C
4
In this book, when internet is spelled with a capital I, it means the global Internet.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
5
If two hosts are separated by seven networks, how many packets will there be along the way when a host transmits a packet to another host?

A) 1
B) 2
C) 7
D) 14
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
6
Single-network core standards are for message delivery through ________.

A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
7
User computers connect to ________ switches.

A) core
B) primary
C) workgroup
D) terminal
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
8
Attackers can read signals traveling over UTP without tapping the cord.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
9
The terms octet and byte mean the same thing.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
10
Packets are carried inside frames.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
11
If two hosts are separated by five networks, how many frames will there be along the way when a host transmits a packet to another host?

A) 1
B) 2
C) 5
D) 10
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
12
A device attached to a network is called a ________.

A) client
B) server
C) host
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
13
A residential access router usually contains ________.

A) a DHCP server
B) an Ethernet switch
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
14
A network that runs on the customer premises is a ________.

A) LAN
B) WAN
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
15
Security problems with protocols include ________.

A) a lack of security in earlier versions
B) awkwardly added security
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
16
Companies use carriers for WAN transmission because ________.

A) companies lack rights of way
B) carriers have extremely strong security
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
17
Frames are messages traveling through ________.

A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
18
When your mobile phone is on a network, it is a host.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
19
When your home PC is on a network, it is a host.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
20
In internets, different networks are connected by ________.

A) switches
B) routers
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
21
In the IETF, a proposed standard is called a Request for Comments.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
22
A route is the path a frame takes across a single network, from the source host to the destination host, across multiple switches.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
23
Physical and data link layer standards govern transmission in ________.

A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
24
What is the general function of the second row in the IPv4 header?

A) To give the source address
B) To give the destination address
C) To handle fragmentation and reassembly
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is an OSI standards agency?

A) ISO
B) ITU-T
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
26
The ________ layer in the hybrid TCP/IP-OSI architecture comes from OSI.

A) physical
B) transport
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
27
Most firms actually use the ________ architecture.

A) TCP/IP
B) OSI
C) IETF
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
28
In ________, signals can be read without tapping the cord.

A) UTP
B) optical fiber
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
29
The ________ standard is designed to prevent impostors from sending false supervisory messages to switches.

A) 802.1X
B) 802.1AE
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
30
A computer connects to the nearest switch via a ________.

A) physical link
B) data link
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
31
The ________ layer is roughly the same in OSI and TCP/IP.

A) transport
B) session
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
32
A ________ is the path that a frame takes across a single switched network.

A) physical link
B) data link
C) route
D) connection
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
33
Which organization creates Internet standards?

A) DARPA
B) IETF
C) ISO
D) TCP
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
34
Spread spectrum transmission is used in wireless LANs ________.

A) to increase transmission speed
B) for security
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
35
The ________ field in a packet ensures that misaddressed packets will not circulate endlessly.

A) header checksum
B) TTL
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
36
Spread spectrum transmission in wireless LANs provides security.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
37
If a router receives a packet with a TTL value of 1, what will it do?

A) Increase the TTL value to 2.
B) Keep the TTL value at 1.
C) Drop the packet.
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
38
How many layers does the OSI architecture have?

A) 3
B) 5
C) 7
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
39
________ is a standards architecture.

A) ISO
B) OSI
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
40
The name of the Internet standards architecture is ________.

A) OSI
B) ISO
C) TCP/IP
D) All of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
41
The IP header checksum field is used for error detection.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is true?

A) TCP works at the transport layer.
B) UDP works at the transport layer.
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
43
In a TCP half-open DoS attack, ________.

A) the attacker sends the final ACK of a session opening
B) the attacker sends an RST segment
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
44
A normal TCP close takes ________ segments.

A) 2
B) 3
C) 4
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
45
A mask is needed to identify the size of the network part or of the combined network and subnet parts.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
46
The attacker sends a mal-formed TCP segment. The victim host sends back a TCP RST message. This exchange verifies that the victim host exists and has a certain IP address.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
47
In TCP, if a receiver receives a damaged TCP segment, it ________.

A) sends a negative acknowledgement
B) sends the segment back to the original sender
C) does nothing
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
48
The subnet mask is one of the three parts of an IP address.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
49
IP options are used frequently.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
50
A flag field has the value 1.

A) The TCP segment is an acknowledgement.
B) The field is set.
C) The field is locked.
D) The router will reduce the value to 0 and drop the packet.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
51
IPsec works with ________.

A) IPv4
B) IPv6
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
52
In an IPv4 packet, the ________ field describes the contents of the packet's data field.

A) TTL
B) header checksum
C) protocol
D) next-higher-layer
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
53
The main advantage of IPv6 compared to IPv4 is ________.

A) support for more IP addresses
B) faster transmission
C) higher security
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
54
A one-bit field is called a ________ field.

A) binary
B) singlet
C) TCP
D) flag
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
55
An abrupt TCP close takes ________ segments.

A) 2
B) 3
C) 4
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
56
TCP messages are called ________.

A) packets
B) frames
C) datagrams
D) segments
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
57
A TCP session opening ends with a(n) ________ message.

A) SYN
B) FIN
C) ACK
D) URG
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
58
TCP segment carries octets 4321 through 4371. What is its sequence number?

A) 4321
B) 4371
C) 4372
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
59
IP addresses are 32 octets long.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
60
IPsec a general protection strategy for all internet, transport, and application protocols.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
61
TCP has a comprehensive security protocol comparable to IPsec for IP.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
62
Ping sends ________ messages and receives replies in the same protocol.

A) DNS
B) DHCP
C) ICMP
D) All of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
63
________ tell the attacker that a certain IP address has a live host or router.

A) ICMP Echo replies
B) ICMP error messages
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
64
UDP is a good protocol for applications that need reliability.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
65
ICMP ________.

A) is used in ping transmissions
B) is used for error messages
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
66
A Windows host sends a TCP segment with source port number 1200 and destination port number 25. The sending host is a(n) ________.

A) client
B) TCP server
C) webserver
D) e-mail server
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
67
TCP segment carries octets 4321 through 4371. The next segment carries no data. What is that segment's sequence number?

A) 4321
B) 4371
C) 4372
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
68
________ places a relatively small traffic load on networks.

A) TCP
B) UDP
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
69
TCP/IP's internet layer supervisory protocol is ________.

A) DNS
B) DHCP
C) ICMP
D) All of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
70
To do TCP session hijacking, the attacker has to be able to predict the sequence number of the TCP segment currently being sent.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
71
Servers get ________.

A) static IP addresses
B) ephemeral IP addresses
C) dynamic IP addresses
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
72
In DNS cache poisoning, an attacker replaces the IP address of a host name with another IP address.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
73
TCP electronic signatures ________.

A) do not exist
B) have automatic key exchange
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
74
The TCP ________ field is designed to control the other party's transmission rate.

A) segment
B) flow
C) window
D) maximum
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
75
________ uses options frequently.

A) IP
B) TCP
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
76
An organization with a ________ domain name must maintain one or more DNS servers.

A) first-level
B) second-level
C) third-level
D) All of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
77
TCP segment carries octets 4321 through 4371. What will be the acknowledgement number in the TCP segment that acknowledges this segment?

A) 4321
B) 4371
C) 4372
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
78
DNSSEC ________.

A) is still under development
B) is widely used
C) is no longer used
D) There is no such thing as DNSSEC.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
79
Client usually get ________.

A) static IP addresses
B) ephemeral IP addresses
C) dynamic IP addresses
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
80
A Windows host sends a TCP segment with source port number 1200 and destination port number 25. The receiving host is a(n) ________.

A) client
B) TCP server
C) webserver
D) e-mail server
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 91 flashcards in this deck.