Deck 2: Network Standards
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
Play
Full screen (f)
Deck 2: Network Standards
1
Most or all messages have trailers.
False
2
Network standards are also called protocols.
True
3
The ________ contains the content being delivered by a message.
A)address field
B)header
C)data field
D)trailer
A)address field
B)header
C)data field
D)trailer
C
4
If the destination host receives a segment that is incorrect,it will ________.
A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RST segment
D)None of the above.
A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RST segment
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
Standards govern ________.
A)semantics
B)syntax
C)Both A and B
D)Neither A nor B
A)semantics
B)syntax
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is NOT one of the three general parts of messages?
A)Address field.
B)Header.
C)Data field.
D)Trailer.
A)Address field.
B)Header.
C)Data field.
D)Trailer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
The header is defined as everything that comes before the data field.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
The side wishing to close a TCP segment sends a(n)________ segment.
A)SYN
B)ACK
C)FIN
D)None of the above.
A)SYN
B)ACK
C)FIN
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
How a message is organized is its ________.
A)syntax
B)semantics
C)order
D)Both A and B
A)syntax
B)semantics
C)order
D)Both A and B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
In HTTP,a server may initiate an interaction with the client.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
If the destination host does not receive a segment,it will ________.
A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RSND segment
D)None of the above.
A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RSND segment
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
Ethernet addresses are ________.
A)4 octets long
B)6 octets long
C)32 octets long
D)48 octets long
A)4 octets long
B)6 octets long
C)32 octets long
D)48 octets long
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
After the side wishing to close a TCP connection sends a FIN segment,it will ________.
A)not send any more segments
B)only send ACK segments
C)only send FIN segments
D)None of the above.
A)not send any more segments
B)only send ACK segments
C)only send FIN segments
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
Messages always have data fields.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
The meaning of a message is referred to as the message's ________.
A)protocol
B)order
C)value
D)syntax
E)semantics
A)protocol
B)order
C)value
D)syntax
E)semantics
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
A host will retransmit a TCP segment if ________.
A)it receives an ACK segment
B)it receives a NAC segment
C)it receives an RST segment.
D)None of the above.
A)it receives an ACK segment
B)it receives a NAC segment
C)it receives an RST segment.
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
"Octet" is the same as ________.
A)"bit"
B)"byte"
C)Either A or B,depending on the context.
D)Neither A nor B
A)"bit"
B)"byte"
C)Either A or B,depending on the context.
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
Host P transmits a SYN to Host Q.If host Q is willing to open the connection,it will transmit a(n)________ segment.
A)ACK
B)SYN
C)SYN/ACK
D)None of the above.
A)ACK
B)SYN
C)SYN/ACK
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Ethernet addresses are ________.
A)32 bits long
B)48 bits long
C)128 bits long
D)None of the above.
A)32 bits long
B)48 bits long
C)128 bits long
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
Headers usually are divided into fields.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
IP is reliable.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
To handle internetwork transmission control tasks that IP cannot handle,the IETF created TCP.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
How long are IP addresses?
A)32 bits.
B)48 bits.
C)20 octets.
D)32 octets.
E)128 bits.
A)32 bits.
B)48 bits.
C)20 octets.
D)32 octets.
E)128 bits.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
Routers make forward decisions based on a packet's source IP address.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
B7-22-DD-6F-C8-AB is an ________ address.
A)Ethernet
B)IP
C)Either A or B
A)Ethernet
B)IP
C)Either A or B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
Routers make packet forwarding decisions based on a packet's ________.
A)source IP address
B)destination IP address
C)Both A and B
D)Neither A nor B
A)source IP address
B)destination IP address
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
IP detects errors but does not correct them.Therefore,IP is reliable.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
UDP checks messages for errors but does not correct them.UDP is ________.
A)reliable
B)unreliable
C)Both A and B
D)Neither A nor B
A)reliable
B)unreliable
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
217.42.18.248 is an ________ address.
A)Ethernet
B)IP
C)Either A or B
A)Ethernet
B)IP
C)Either A or B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
TCP messages are called ________.
A)frames
B)data fields
C)packets
D)segments
E)fragments
A)frames
B)data fields
C)packets
D)segments
E)fragments
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
In an IP header,the first bit in the second row is bit ________.
A)0
B)31
C)32
D)33
E)We cannot say.
A)0
B)31
C)32
D)33
E)We cannot say.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following has port numbers in its header?
A)UDP.
B)TCP.
C)Both A and B
D)Neither A nor B
A)UDP.
B)TCP.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
Well-known port numbers are associated with ________.
A)applications
B)switches
C)routers
D)None of the above.
A)applications
B)switches
C)routers
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
Ethernet does ________.
A)error detection
B)error correction
C)Both A and B
D)Neither A nor B
A)error detection
B)error correction
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
In an Ethernet frame,the IP packet is carried in the ________ field.
A)source address
B)destination address
C)data
D)frame check sequence
E)None of the above.
A)source address
B)destination address
C)data
D)frame check sequence
E)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
One-bit fields are called ________ fields.
A)digital
B)binary
C)flag
D)ACK
E)None of the above.
A)digital
B)binary
C)flag
D)ACK
E)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
Port fields are found in ________.
A)UDP headers
B)TCP headers
C)Both A and B
D)Neither A nor B
A)UDP headers
B)TCP headers
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
If the ACK bit is set,the acknowledgement number field MUST have a value.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
If someone says that a 1-bit flag is set,this means that it is given the value ________.
A)0
B)1
C)Either of the above.
D)Neither of the above.
A)0
B)1
C)Either of the above.
D)Neither of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
Ethernet detects errors but does not correct them.Therefore,Ethernet is reliable.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
In HTTP,most response message header fields consist of a keyword,an equal sign,and the value for the keyword.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
The application layer standard always is HTTP.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
Converting application messages into bits is called ________.
A)encapsulation
B)encryption
C)encoding
D)conversion
A)encapsulation
B)encryption
C)encoding
D)conversion
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
How many bytes will it take to transmit "Can you hear me now?" without the quotation marks?
A)5
B)6
C)9
D)10
E)None of the above.
A)5
B)6
C)9
D)10
E)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
What is (are)the well-known port number(s)for HTTP?
A)20 and 21.
B)25.
C)80.
D)None of the above.
A)20 and 21.
B)25.
C)80.
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
Binary counting usually begins at 1.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
What is (are)the well-known port number(s)for FTP?
A)20 and 21.
B)25.
C)80.
D)None of the above.
A)20 and 21.
B)25.
C)80.
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
At which layer would you find standards for requesting videos from a video sharing site such as YouTube?
A)Application.
B)Transport.
C)Internet.
D)Data link.
E)All of the above.
A)Application.
B)Transport.
C)Internet.
D)Data link.
E)All of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
In HTTP,the end of a header field is indicated by a ________.
A)bit position
B)byte position
C)CRLF
D)colon
E)blank line
A)bit position
B)byte position
C)CRLF
D)colon
E)blank line
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
At which layer would you find file transfer protocol standards for downloading files?
A)Application.
B)Transport.
C)Internet.
D)Data link.
E)All of the above.
A)Application.
B)Transport.
C)Internet.
D)Data link.
E)All of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
An HTTP response message has a ________.
A)trailer
B)data field
C)Both A and B
D)Neither A nor B
A)trailer
B)data field
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
A 5-bit field can represent ________ alternatives.
A)4
B)8
C)16
D)32
E)64
A)4
B)8
C)16
D)32
E)64
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following layers has the most standards?
A)Data link.
B)Internet.
C)Transport.
D)Application.
A)Data link.
B)Internet.
C)Transport.
D)Application.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
In binary,13 is 1101.What is 14?
A)1110
B)1111
C)Neither A nor B
A)1110
B)1111
C)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
If you have a field with N bits,you can represent N² items.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
An HTTP request message usually has a ________.
A)header
B)data field
C)Both A and B
D)Neither A nor B
A)header
B)data field
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
Nearly all application standards are simple,like HTTP.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
What is (are)the well-known port number(s)for SMTP?
A)20 and 21.
B)25.
C)80.
D)None of the above.
A)20 and 21.
B)25.
C)80.
D)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
Which layer has more standards?
A)Internet.
B)Application.
C)Both of the above have about the same number of standards.
A)Internet.
B)Application.
C)Both of the above have about the same number of standards.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
Increasing an alternatives field length by one bit always doubles the number of alternatives it can represent.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following is a standards agency for OSI?
A)IETF.
B)ITU-T.
C)Both A and B
D)Neither A nor B
A)IETF.
B)ITU-T.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
To represent 65 alternatives,your alternatives field would have to be ________ bits long.
A)4
B)5
C)6
D)7
E)8
A)4
B)5
C)6
D)7
E)8
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
The OSI ________ layer is designed to handle compression and encryption for applications.
A)application
B)presentation
C)session
D)data
E)All of the above.
A)application
B)presentation
C)session
D)data
E)All of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
OSI is dominant at the ________ layer.
A)physical
B)internet
C)Both A and B
D)Neither A nor B
A)physical
B)internet
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
________ is placing a message in the data field of another message.
A)Nesting
B)Vertical communication
C)Layering
D)Encapsulation
A)Nesting
B)Vertical communication
C)Layering
D)Encapsulation
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following is a network standards architecture?
A)ISO.
B)TCP/IP.
C)Both A and B
D)Neither A nor B
A)ISO.
B)TCP/IP.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
In what order are standards and standards architectures developed?
A)The standards architecture is developed first.
B)Individual standards are developed first.
C)They are developed simultaneously.
A)The standards architecture is developed first.
B)Individual standards are developed first.
C)They are developed simultaneously.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
The fact that two processes other than physical layer processes cannot communicate directly requires the use of encapsulation.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
The OSI ________ layer is designed to handle data formatting differences between two computers.
A)application
B)presentation
C)session
D)data
E)All of the above.
A)application
B)presentation
C)session
D)data
E)All of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
Which layer process does NOT do encapsulation when an application layer process transmits a message?
A)Physical.
B)Transport.
C)Data link.
D)Internet.
E)All do encapsulation.
A)Physical.
B)Transport.
C)Data link.
D)Internet.
E)All do encapsulation.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
The OSI ________ layer allows application communication to be restarted at the last rollback point.
A)application
B)presentation
C)session
D)transport
E)All of the above.
A)application
B)presentation
C)session
D)transport
E)All of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
After the data link layer process does encapsulation,it passes the IP packet to the ________ layer process.
A)physical
B)transport
C)data link
D)application
E)None of the above.
A)physical
B)transport
C)data link
D)application
E)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
What is the dominant network standards architecture in most real firms today?
A)OSI.
B)TCP/IP.
C)Neither A nor B
A)OSI.
B)TCP/IP.
C)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
OSI is dominant at the ________ layer.
A)transport
B)internet
C)Both A and B
D)Neither A nor B
A)transport
B)internet
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
Network standards architectures break the standards functionality needed for communication into layers and define the functions of each layer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
After the internet layer process does encapsulation,it passes the IP packet to the ________ layer process.
A)physical
B)transport
C)data link
D)application
E)None of the above.
A)physical
B)transport
C)data link
D)application
E)None of the above.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following is a network standards architecture?
A)ISO.
B)OSI.
C)Both A and B
D)Neither A nor B
A)ISO.
B)OSI.
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
A corporate network can use either OSI standards at all layers or TCP-IP standards at all layers,but cannot use OSI standards at some layers and TCP-IP standards at other layers.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
OSI is dominant at the ________ layer.
A)data link
B)transport
C)Both A and B
D)Neither A nor B
A)data link
B)transport
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
A 7-bit field can represent ________ alternatives.
A)14
B)49
C)128
D)256
E)512
A)14
B)49
C)128
D)256
E)512
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck