Deck 2: Network Standards

Full screen (f)
exit full mode
Question
Most or all messages have trailers.
Use Space or
up arrow
down arrow
to flip the card.
Question
Network standards are also called protocols.
Question
The ________ contains the content being delivered by a message.

A)address field
B)header
C)data field
D)trailer
Question
If the destination host receives a segment that is incorrect,it will ________.

A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RST segment
D)None of the above.
Question
Standards govern ________.

A)semantics
B)syntax
C)Both A and B
D)Neither A nor B
Question
Which of the following is NOT one of the three general parts of messages?

A)Address field.
B)Header.
C)Data field.
D)Trailer.
Question
The header is defined as everything that comes before the data field.
Question
The side wishing to close a TCP segment sends a(n)________ segment.

A)SYN
B)ACK
C)FIN
D)None of the above.
Question
How a message is organized is its ________.

A)syntax
B)semantics
C)order
D)Both A and B
Question
In HTTP,a server may initiate an interaction with the client.
Question
If the destination host does not receive a segment,it will ________.

A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RSND segment
D)None of the above.
Question
Ethernet addresses are ________.

A)4 octets long
B)6 octets long
C)32 octets long
D)48 octets long
Question
After the side wishing to close a TCP connection sends a FIN segment,it will ________.

A)not send any more segments
B)only send ACK segments
C)only send FIN segments
D)None of the above.
Question
Messages always have data fields.
Question
The meaning of a message is referred to as the message's ________.

A)protocol
B)order
C)value
D)syntax
E)semantics
Question
A host will retransmit a TCP segment if ________.

A)it receives an ACK segment
B)it receives a NAC segment
C)it receives an RST segment.
D)None of the above.
Question
"Octet" is the same as ________.

A)"bit"
B)"byte"
C)Either A or B,depending on the context.
D)Neither A nor B
Question
Host P transmits a SYN to Host Q.If host Q is willing to open the connection,it will transmit a(n)________ segment.

A)ACK
B)SYN
C)SYN/ACK
D)None of the above.
Question
Ethernet addresses are ________.

A)32 bits long
B)48 bits long
C)128 bits long
D)None of the above.
Question
Headers usually are divided into fields.
Question
IP is reliable.
Question
To handle internetwork transmission control tasks that IP cannot handle,the IETF created TCP.
Question
How long are IP addresses?

A)32 bits.
B)48 bits.
C)20 octets.
D)32 octets.
E)128 bits.
Question
Routers make forward decisions based on a packet's source IP address.
Question
B7-22-DD-6F-C8-AB is an ________ address.

A)Ethernet
B)IP
C)Either A or B
Question
Routers make packet forwarding decisions based on a packet's ________.

A)source IP address
B)destination IP address
C)Both A and B
D)Neither A nor B
Question
IP detects errors but does not correct them.Therefore,IP is reliable.
Question
UDP checks messages for errors but does not correct them.UDP is ________.

A)reliable
B)unreliable
C)Both A and B
D)Neither A nor B
Question
217.42.18.248 is an ________ address.

A)Ethernet
B)IP
C)Either A or B
Question
TCP messages are called ________.

A)frames
B)data fields
C)packets
D)segments
E)fragments
Question
In an IP header,the first bit in the second row is bit ________.

A)0
B)31
C)32
D)33
E)We cannot say.
Question
Which of the following has port numbers in its header?

A)UDP.
B)TCP.
C)Both A and B
D)Neither A nor B
Question
Well-known port numbers are associated with ________.

A)applications
B)switches
C)routers
D)None of the above.
Question
Ethernet does ________.

A)error detection
B)error correction
C)Both A and B
D)Neither A nor B
Question
In an Ethernet frame,the IP packet is carried in the ________ field.

A)source address
B)destination address
C)data
D)frame check sequence
E)None of the above.
Question
One-bit fields are called ________ fields.

A)digital
B)binary
C)flag
D)ACK
E)None of the above.
Question
Port fields are found in ________.

A)UDP headers
B)TCP headers
C)Both A and B
D)Neither A nor B
Question
If the ACK bit is set,the acknowledgement number field MUST have a value.
Question
If someone says that a 1-bit flag is set,this means that it is given the value ________.

A)0
B)1
C)Either of the above.
D)Neither of the above.
Question
Ethernet detects errors but does not correct them.Therefore,Ethernet is reliable.
Question
In HTTP,most response message header fields consist of a keyword,an equal sign,and the value for the keyword.
Question
The application layer standard always is HTTP.
Question
Converting application messages into bits is called ________.

A)encapsulation
B)encryption
C)encoding
D)conversion
Question
How many bytes will it take to transmit "Can you hear me now?" without the quotation marks?

A)5
B)6
C)9
D)10
E)None of the above.
Question
What is (are)the well-known port number(s)for HTTP?

A)20 and 21.
B)25.
C)80.
D)None of the above.
Question
Binary counting usually begins at 1.
Question
What is (are)the well-known port number(s)for FTP?

A)20 and 21.
B)25.
C)80.
D)None of the above.
Question
At which layer would you find standards for requesting videos from a video sharing site such as YouTube?

A)Application.
B)Transport.
C)Internet.
D)Data link.
E)All of the above.
Question
In HTTP,the end of a header field is indicated by a ________.

A)bit position
B)byte position
C)CRLF
D)colon
E)blank line
Question
At which layer would you find file transfer protocol standards for downloading files?

A)Application.
B)Transport.
C)Internet.
D)Data link.
E)All of the above.
Question
An HTTP response message has a ________.

A)trailer
B)data field
C)Both A and B
D)Neither A nor B
Question
A 5-bit field can represent ________ alternatives.

A)4
B)8
C)16
D)32
E)64
Question
Which of the following layers has the most standards?

A)Data link.
B)Internet.
C)Transport.
D)Application.
Question
In binary,13 is 1101.What is 14?

A)1110
B)1111
C)Neither A nor B
Question
If you have a field with N bits,you can represent N² items.
Question
An HTTP request message usually has a ________.

A)header
B)data field
C)Both A and B
D)Neither A nor B
Question
Nearly all application standards are simple,like HTTP.
Question
What is (are)the well-known port number(s)for SMTP?

A)20 and 21.
B)25.
C)80.
D)None of the above.
Question
Which layer has more standards?

A)Internet.
B)Application.
C)Both of the above have about the same number of standards.
Question
Increasing an alternatives field length by one bit always doubles the number of alternatives it can represent.
Question
Which of the following is a standards agency for OSI?

A)IETF.
B)ITU-T.
C)Both A and B
D)Neither A nor B
Question
To represent 65 alternatives,your alternatives field would have to be ________ bits long.

A)4
B)5
C)6
D)7
E)8
Question
The OSI ________ layer is designed to handle compression and encryption for applications.

A)application
B)presentation
C)session
D)data
E)All of the above.
Question
OSI is dominant at the ________ layer.

A)physical
B)internet
C)Both A and B
D)Neither A nor B
Question
________ is placing a message in the data field of another message.

A)Nesting
B)Vertical communication
C)Layering
D)Encapsulation
Question
Which of the following is a network standards architecture?

A)ISO.
B)TCP/IP.
C)Both A and B
D)Neither A nor B
Question
In what order are standards and standards architectures developed?

A)The standards architecture is developed first.
B)Individual standards are developed first.
C)They are developed simultaneously.
Question
The fact that two processes other than physical layer processes cannot communicate directly requires the use of encapsulation.
Question
The OSI ________ layer is designed to handle data formatting differences between two computers.

A)application
B)presentation
C)session
D)data
E)All of the above.
Question
Which layer process does NOT do encapsulation when an application layer process transmits a message?

A)Physical.
B)Transport.
C)Data link.
D)Internet.
E)All do encapsulation.
Question
The OSI ________ layer allows application communication to be restarted at the last rollback point.

A)application
B)presentation
C)session
D)transport
E)All of the above.
Question
After the data link layer process does encapsulation,it passes the IP packet to the ________ layer process.

A)physical
B)transport
C)data link
D)application
E)None of the above.
Question
What is the dominant network standards architecture in most real firms today?

A)OSI.
B)TCP/IP.
C)Neither A nor B
Question
OSI is dominant at the ________ layer.

A)transport
B)internet
C)Both A and B
D)Neither A nor B
Question
Network standards architectures break the standards functionality needed for communication into layers and define the functions of each layer.
Question
After the internet layer process does encapsulation,it passes the IP packet to the ________ layer process.

A)physical
B)transport
C)data link
D)application
E)None of the above.
Question
Which of the following is a network standards architecture?

A)ISO.
B)OSI.
C)Both A and B
D)Neither A nor B
Question
A corporate network can use either OSI standards at all layers or TCP-IP standards at all layers,but cannot use OSI standards at some layers and TCP-IP standards at other layers.
Question
OSI is dominant at the ________ layer.

A)data link
B)transport
C)Both A and B
D)Neither A nor B
Question
A 7-bit field can represent ________ alternatives.

A)14
B)49
C)128
D)256
E)512
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Network Standards
1
Most or all messages have trailers.
False
2
Network standards are also called protocols.
True
3
The ________ contains the content being delivered by a message.

A)address field
B)header
C)data field
D)trailer
C
4
If the destination host receives a segment that is incorrect,it will ________.

A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RST segment
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
Standards govern ________.

A)semantics
B)syntax
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is NOT one of the three general parts of messages?

A)Address field.
B)Header.
C)Data field.
D)Trailer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
The header is defined as everything that comes before the data field.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
The side wishing to close a TCP segment sends a(n)________ segment.

A)SYN
B)ACK
C)FIN
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
How a message is organized is its ________.

A)syntax
B)semantics
C)order
D)Both A and B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
In HTTP,a server may initiate an interaction with the client.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
If the destination host does not receive a segment,it will ________.

A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RSND segment
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
Ethernet addresses are ________.

A)4 octets long
B)6 octets long
C)32 octets long
D)48 octets long
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
After the side wishing to close a TCP connection sends a FIN segment,it will ________.

A)not send any more segments
B)only send ACK segments
C)only send FIN segments
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
Messages always have data fields.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
The meaning of a message is referred to as the message's ________.

A)protocol
B)order
C)value
D)syntax
E)semantics
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
A host will retransmit a TCP segment if ________.

A)it receives an ACK segment
B)it receives a NAC segment
C)it receives an RST segment.
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
"Octet" is the same as ________.

A)"bit"
B)"byte"
C)Either A or B,depending on the context.
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
Host P transmits a SYN to Host Q.If host Q is willing to open the connection,it will transmit a(n)________ segment.

A)ACK
B)SYN
C)SYN/ACK
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Ethernet addresses are ________.

A)32 bits long
B)48 bits long
C)128 bits long
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
Headers usually are divided into fields.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
IP is reliable.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
To handle internetwork transmission control tasks that IP cannot handle,the IETF created TCP.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
How long are IP addresses?

A)32 bits.
B)48 bits.
C)20 octets.
D)32 octets.
E)128 bits.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
Routers make forward decisions based on a packet's source IP address.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
B7-22-DD-6F-C8-AB is an ________ address.

A)Ethernet
B)IP
C)Either A or B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
Routers make packet forwarding decisions based on a packet's ________.

A)source IP address
B)destination IP address
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
IP detects errors but does not correct them.Therefore,IP is reliable.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
UDP checks messages for errors but does not correct them.UDP is ________.

A)reliable
B)unreliable
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
217.42.18.248 is an ________ address.

A)Ethernet
B)IP
C)Either A or B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
TCP messages are called ________.

A)frames
B)data fields
C)packets
D)segments
E)fragments
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
In an IP header,the first bit in the second row is bit ________.

A)0
B)31
C)32
D)33
E)We cannot say.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following has port numbers in its header?

A)UDP.
B)TCP.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
Well-known port numbers are associated with ________.

A)applications
B)switches
C)routers
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
Ethernet does ________.

A)error detection
B)error correction
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
In an Ethernet frame,the IP packet is carried in the ________ field.

A)source address
B)destination address
C)data
D)frame check sequence
E)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
One-bit fields are called ________ fields.

A)digital
B)binary
C)flag
D)ACK
E)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
Port fields are found in ________.

A)UDP headers
B)TCP headers
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
If the ACK bit is set,the acknowledgement number field MUST have a value.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
If someone says that a 1-bit flag is set,this means that it is given the value ________.

A)0
B)1
C)Either of the above.
D)Neither of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
Ethernet detects errors but does not correct them.Therefore,Ethernet is reliable.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
In HTTP,most response message header fields consist of a keyword,an equal sign,and the value for the keyword.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
The application layer standard always is HTTP.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
Converting application messages into bits is called ________.

A)encapsulation
B)encryption
C)encoding
D)conversion
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
How many bytes will it take to transmit "Can you hear me now?" without the quotation marks?

A)5
B)6
C)9
D)10
E)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
What is (are)the well-known port number(s)for HTTP?

A)20 and 21.
B)25.
C)80.
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
Binary counting usually begins at 1.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
What is (are)the well-known port number(s)for FTP?

A)20 and 21.
B)25.
C)80.
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
At which layer would you find standards for requesting videos from a video sharing site such as YouTube?

A)Application.
B)Transport.
C)Internet.
D)Data link.
E)All of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
In HTTP,the end of a header field is indicated by a ________.

A)bit position
B)byte position
C)CRLF
D)colon
E)blank line
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
At which layer would you find file transfer protocol standards for downloading files?

A)Application.
B)Transport.
C)Internet.
D)Data link.
E)All of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
An HTTP response message has a ________.

A)trailer
B)data field
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
A 5-bit field can represent ________ alternatives.

A)4
B)8
C)16
D)32
E)64
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following layers has the most standards?

A)Data link.
B)Internet.
C)Transport.
D)Application.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
In binary,13 is 1101.What is 14?

A)1110
B)1111
C)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
If you have a field with N bits,you can represent N² items.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
An HTTP request message usually has a ________.

A)header
B)data field
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
Nearly all application standards are simple,like HTTP.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
What is (are)the well-known port number(s)for SMTP?

A)20 and 21.
B)25.
C)80.
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
Which layer has more standards?

A)Internet.
B)Application.
C)Both of the above have about the same number of standards.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
Increasing an alternatives field length by one bit always doubles the number of alternatives it can represent.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following is a standards agency for OSI?

A)IETF.
B)ITU-T.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
To represent 65 alternatives,your alternatives field would have to be ________ bits long.

A)4
B)5
C)6
D)7
E)8
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
The OSI ________ layer is designed to handle compression and encryption for applications.

A)application
B)presentation
C)session
D)data
E)All of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
OSI is dominant at the ________ layer.

A)physical
B)internet
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
________ is placing a message in the data field of another message.

A)Nesting
B)Vertical communication
C)Layering
D)Encapsulation
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following is a network standards architecture?

A)ISO.
B)TCP/IP.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
In what order are standards and standards architectures developed?

A)The standards architecture is developed first.
B)Individual standards are developed first.
C)They are developed simultaneously.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
The fact that two processes other than physical layer processes cannot communicate directly requires the use of encapsulation.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
The OSI ________ layer is designed to handle data formatting differences between two computers.

A)application
B)presentation
C)session
D)data
E)All of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
Which layer process does NOT do encapsulation when an application layer process transmits a message?

A)Physical.
B)Transport.
C)Data link.
D)Internet.
E)All do encapsulation.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
The OSI ________ layer allows application communication to be restarted at the last rollback point.

A)application
B)presentation
C)session
D)transport
E)All of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
After the data link layer process does encapsulation,it passes the IP packet to the ________ layer process.

A)physical
B)transport
C)data link
D)application
E)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
What is the dominant network standards architecture in most real firms today?

A)OSI.
B)TCP/IP.
C)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
OSI is dominant at the ________ layer.

A)transport
B)internet
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
Network standards architectures break the standards functionality needed for communication into layers and define the functions of each layer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
After the internet layer process does encapsulation,it passes the IP packet to the ________ layer process.

A)physical
B)transport
C)data link
D)application
E)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following is a network standards architecture?

A)ISO.
B)OSI.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
A corporate network can use either OSI standards at all layers or TCP-IP standards at all layers,but cannot use OSI standards at some layers and TCP-IP standards at other layers.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
OSI is dominant at the ________ layer.

A)data link
B)transport
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
A 7-bit field can represent ________ alternatives.

A)14
B)49
C)128
D)256
E)512
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.