Deck 11: Module A: Networking Concepts
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/91
Play
Full screen (f)
Deck 11: Module A: Networking Concepts
1
At what core layer do you find WAN standards?
A) Single-network
B) Internet
C) Application
D) None of the above.
A) Single-network
B) Internet
C) Application
D) None of the above.
A
2
Intercepting wireless LAN transmissions is difficult.
False
3
The organization that funded the creation of the Internet is ________.
A) the IETF
B) ISO
C) DARPA
D) the National Science Foundation
A) the IETF
B) ISO
C) DARPA
D) the National Science Foundation
C
4
In this book, when internet is spelled with a capital I, it means the global Internet.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
5
If two hosts are separated by seven networks, how many packets will there be along the way when a host transmits a packet to another host?
A) 1
B) 2
C) 7
D) 14
A) 1
B) 2
C) 7
D) 14
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
6
Single-network core standards are for message delivery through ________.
A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
7
User computers connect to ________ switches.
A) core
B) primary
C) workgroup
D) terminal
A) core
B) primary
C) workgroup
D) terminal
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
8
Attackers can read signals traveling over UTP without tapping the cord.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
9
The terms octet and byte mean the same thing.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
10
Packets are carried inside frames.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
11
If two hosts are separated by five networks, how many frames will there be along the way when a host transmits a packet to another host?
A) 1
B) 2
C) 5
D) 10
A) 1
B) 2
C) 5
D) 10
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
12
A device attached to a network is called a ________.
A) client
B) server
C) host
D) Neither A nor B
A) client
B) server
C) host
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
13
A residential access router usually contains ________.
A) a DHCP server
B) an Ethernet switch
C) Both A and B
D) Neither A nor B
A) a DHCP server
B) an Ethernet switch
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
14
A network that runs on the customer premises is a ________.
A) LAN
B) WAN
C) Both A and B
D) Neither A nor B
A) LAN
B) WAN
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
15
Security problems with protocols include ________.
A) a lack of security in earlier versions
B) awkwardly added security
C) Both A and B
D) Neither A nor B
A) a lack of security in earlier versions
B) awkwardly added security
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
16
Companies use carriers for WAN transmission because ________.
A) companies lack rights of way
B) carriers have extremely strong security
C) Both A and B
D) Neither A nor B
A) companies lack rights of way
B) carriers have extremely strong security
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
17
Frames are messages traveling through ________.
A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
18
When your mobile phone is on a network, it is a host.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
19
When your home PC is on a network, it is a host.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
20
In internets, different networks are connected by ________.
A) switches
B) routers
C) Both A and B
D) Neither A nor B
A) switches
B) routers
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
21
In the IETF, a proposed standard is called a Request for Comments.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
22
A route is the path a frame takes across a single network, from the source host to the destination host, across multiple switches.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
23
Physical and data link layer standards govern transmission in ________.
A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
24
What is the general function of the second row in the IPv4 header?
A) To give the source address
B) To give the destination address
C) To handle fragmentation and reassembly
D) None of the above.
A) To give the source address
B) To give the destination address
C) To handle fragmentation and reassembly
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is an OSI standards agency?
A) ISO
B) ITU-T
C) Both A and B
D) Neither A nor B
A) ISO
B) ITU-T
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
26
The ________ layer in the hybrid TCP/IP-OSI architecture comes from OSI.
A) physical
B) transport
C) Both A and B
D) Neither A nor B
A) physical
B) transport
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
27
Most firms actually use the ________ architecture.
A) TCP/IP
B) OSI
C) IETF
D) None of the above.
A) TCP/IP
B) OSI
C) IETF
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
28
In ________, signals can be read without tapping the cord.
A) UTP
B) optical fiber
C) Both A and B
D) Neither A nor B
A) UTP
B) optical fiber
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
29
The ________ standard is designed to prevent impostors from sending false supervisory messages to switches.
A) 802.1X
B) 802.1AE
C) Both A and B
D) Neither A nor B
A) 802.1X
B) 802.1AE
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
30
A computer connects to the nearest switch via a ________.
A) physical link
B) data link
C) Both A and B
D) Neither A nor B
A) physical link
B) data link
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
31
The ________ layer is roughly the same in OSI and TCP/IP.
A) transport
B) session
C) Both A and B
D) Neither A nor B
A) transport
B) session
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
32
A ________ is the path that a frame takes across a single switched network.
A) physical link
B) data link
C) route
D) connection
A) physical link
B) data link
C) route
D) connection
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
33
Which organization creates Internet standards?
A) DARPA
B) IETF
C) ISO
D) TCP
A) DARPA
B) IETF
C) ISO
D) TCP
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
34
Spread spectrum transmission is used in wireless LANs ________.
A) to increase transmission speed
B) for security
C) Both A and B
D) Neither A nor B
A) to increase transmission speed
B) for security
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
35
The ________ field in a packet ensures that misaddressed packets will not circulate endlessly.
A) header checksum
B) TTL
C) Both A and B
D) Neither A nor B
A) header checksum
B) TTL
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
36
Spread spectrum transmission in wireless LANs provides security.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
37
If a router receives a packet with a TTL value of 1, what will it do?
A) Increase the TTL value to 2.
B) Keep the TTL value at 1.
C) Drop the packet.
D) None of the above.
A) Increase the TTL value to 2.
B) Keep the TTL value at 1.
C) Drop the packet.
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
38
How many layers does the OSI architecture have?
A) 3
B) 5
C) 7
D) None of the above.
A) 3
B) 5
C) 7
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
39
________ is a standards architecture.
A) ISO
B) OSI
C) Both A and B
D) Neither A nor B
A) ISO
B) OSI
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
40
The name of the Internet standards architecture is ________.
A) OSI
B) ISO
C) TCP/IP
D) All of the above.
A) OSI
B) ISO
C) TCP/IP
D) All of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
41
The IP header checksum field is used for error detection.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is true?
A) TCP works at the transport layer.
B) UDP works at the transport layer.
C) Both A and B
D) Neither A nor B
A) TCP works at the transport layer.
B) UDP works at the transport layer.
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
43
In a TCP half-open DoS attack, ________.
A) the attacker sends the final ACK of a session opening
B) the attacker sends an RST segment
C) Both A and B
D) Neither A nor B
A) the attacker sends the final ACK of a session opening
B) the attacker sends an RST segment
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
44
A normal TCP close takes ________ segments.
A) 2
B) 3
C) 4
D) None of the above.
A) 2
B) 3
C) 4
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
45
A mask is needed to identify the size of the network part or of the combined network and subnet parts.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
46
The attacker sends a mal-formed TCP segment. The victim host sends back a TCP RST message. This exchange verifies that the victim host exists and has a certain IP address.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
47
In TCP, if a receiver receives a damaged TCP segment, it ________.
A) sends a negative acknowledgement
B) sends the segment back to the original sender
C) does nothing
D) None of the above.
A) sends a negative acknowledgement
B) sends the segment back to the original sender
C) does nothing
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
48
The subnet mask is one of the three parts of an IP address.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
49
IP options are used frequently.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
50
A flag field has the value 1.
A) The TCP segment is an acknowledgement.
B) The field is set.
C) The field is locked.
D) The router will reduce the value to 0 and drop the packet.
A) The TCP segment is an acknowledgement.
B) The field is set.
C) The field is locked.
D) The router will reduce the value to 0 and drop the packet.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
51
IPsec works with ________.
A) IPv4
B) IPv6
C) Both A and B
D) Neither A nor B
A) IPv4
B) IPv6
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
52
In an IPv4 packet, the ________ field describes the contents of the packet's data field.
A) TTL
B) header checksum
C) protocol
D) next-higher-layer
A) TTL
B) header checksum
C) protocol
D) next-higher-layer
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
53
The main advantage of IPv6 compared to IPv4 is ________.
A) support for more IP addresses
B) faster transmission
C) higher security
D) None of the above.
A) support for more IP addresses
B) faster transmission
C) higher security
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
54
A one-bit field is called a ________ field.
A) binary
B) singlet
C) TCP
D) flag
A) binary
B) singlet
C) TCP
D) flag
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
55
An abrupt TCP close takes ________ segments.
A) 2
B) 3
C) 4
D) None of the above.
A) 2
B) 3
C) 4
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
56
TCP messages are called ________.
A) packets
B) frames
C) datagrams
D) segments
A) packets
B) frames
C) datagrams
D) segments
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
57
A TCP session opening ends with a(n) ________ message.
A) SYN
B) FIN
C) ACK
D) URG
A) SYN
B) FIN
C) ACK
D) URG
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
58
TCP segment carries octets 4321 through 4371. What is its sequence number?
A) 4321
B) 4371
C) 4372
D) None of the above.
A) 4321
B) 4371
C) 4372
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
59
IP addresses are 32 octets long.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
60
IPsec a general protection strategy for all internet, transport, and application protocols.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
61
TCP has a comprehensive security protocol comparable to IPsec for IP.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
62
Ping sends ________ messages and receives replies in the same protocol.
A) DNS
B) DHCP
C) ICMP
D) All of the above.
A) DNS
B) DHCP
C) ICMP
D) All of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
63
________ tell the attacker that a certain IP address has a live host or router.
A) ICMP Echo replies
B) ICMP error messages
C) Both A and B
D) Neither A nor B
A) ICMP Echo replies
B) ICMP error messages
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
64
UDP is a good protocol for applications that need reliability.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
65
ICMP ________.
A) is used in ping transmissions
B) is used for error messages
C) Both A and B
D) Neither A nor B
A) is used in ping transmissions
B) is used for error messages
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
66
A Windows host sends a TCP segment with source port number 1200 and destination port number 25. The sending host is a(n) ________.
A) client
B) TCP server
C) webserver
D) e-mail server
A) client
B) TCP server
C) webserver
D) e-mail server
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
67
TCP segment carries octets 4321 through 4371. The next segment carries no data. What is that segment's sequence number?
A) 4321
B) 4371
C) 4372
D) None of the above.
A) 4321
B) 4371
C) 4372
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
68
________ places a relatively small traffic load on networks.
A) TCP
B) UDP
C) Both A and B
D) Neither A nor B
A) TCP
B) UDP
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
69
TCP/IP's internet layer supervisory protocol is ________.
A) DNS
B) DHCP
C) ICMP
D) All of the above.
A) DNS
B) DHCP
C) ICMP
D) All of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
70
To do TCP session hijacking, the attacker has to be able to predict the sequence number of the TCP segment currently being sent.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
71
Servers get ________.
A) static IP addresses
B) ephemeral IP addresses
C) dynamic IP addresses
D) None of the above.
A) static IP addresses
B) ephemeral IP addresses
C) dynamic IP addresses
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
72
In DNS cache poisoning, an attacker replaces the IP address of a host name with another IP address.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
73
TCP electronic signatures ________.
A) do not exist
B) have automatic key exchange
C) Both A and B
D) Neither A nor B
A) do not exist
B) have automatic key exchange
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
74
The TCP ________ field is designed to control the other party's transmission rate.
A) segment
B) flow
C) window
D) maximum
A) segment
B) flow
C) window
D) maximum
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
75
________ uses options frequently.
A) IP
B) TCP
C) Both A and B
D) Neither A nor B
A) IP
B) TCP
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
76
An organization with a ________ domain name must maintain one or more DNS servers.
A) first-level
B) second-level
C) third-level
D) All of the above.
A) first-level
B) second-level
C) third-level
D) All of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
77
TCP segment carries octets 4321 through 4371. What will be the acknowledgement number in the TCP segment that acknowledges this segment?
A) 4321
B) 4371
C) 4372
D) None of the above.
A) 4321
B) 4371
C) 4372
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
78
DNSSEC ________.
A) is still under development
B) is widely used
C) is no longer used
D) There is no such thing as DNSSEC.
A) is still under development
B) is widely used
C) is no longer used
D) There is no such thing as DNSSEC.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
79
Client usually get ________.
A) static IP addresses
B) ephemeral IP addresses
C) dynamic IP addresses
D) None of the above.
A) static IP addresses
B) ephemeral IP addresses
C) dynamic IP addresses
D) None of the above.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
80
A Windows host sends a TCP segment with source port number 1200 and destination port number 25. The receiving host is a(n) ________.
A) client
B) TCP server
C) webserver
D) e-mail server
A) client
B) TCP server
C) webserver
D) e-mail server
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck