Coursera G.I.T.S. - Course 2 (various 16point quizes)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Using CIDR notation, the subnet mask 255.255.255.0 would be written as _______.

(NOT /8)?? [Lesson 3]!!

Which is a valid IP address?

(NOT 126.396.659.100)?? [review "IP Addresses" module]!!

In binary, 1 +1 = _____.

(NOT 2)?? [Refer to lesson 3]!!

What is the maximum decimal number possible to represent with 16 bits?

(NOT 256)?? [review Basic Binary Math]!!

Calculate how many decimal numbers a 4-bit number can represent.

(NOT 4)?? [Network Layer module]!!

Computer A wants to send some data to computer B. Computer A knows that Computer B is not on its local network, so it sends the packet to the router between Network A and Network B. Based on how many network hops have happened, how much will the TTL field be decremented by?

(NOT 6 or 8)?? [Review Basic Routing Concepts]!!

How many bits are in the checksum field in a Transmission Control Protocol (TCP) header?

(NOT 8)?? [refer to Transportation and Application Layers module]!!

What port does the File Transfer Protocol (FTP) typically listen on?

(NOT 80 or 25)?? [refer to Transportation and Application Layers module]!!

What protocol is used to discover the hardware address of a node with a certain IP address?

(NOT CIDR)?? [review "Address Resolution Protocol" module]!!

What layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model does IP use?

(NOT Data link)?? [Review videos in Introduction to Netoworking]!!

Which layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two nodes?

(NOT Data link)?? [refer to videos in Introduction to Networking]!!

What immediately follows the Start Frame Delimiter in an ethernet frame?

(NOT Frame Check Sequence)?? [Introduction to Networking]!!

What device forwards data and operates at layer three of the Transmission Control Protocol/Internet Protocol (TCP/IP) model?

(NOT Hub)?? [Introduction to Networking]!!

If a TCP socket is ready and listening for incoming connections, it's in the ______ state.

(NOT LISTEN, ESTABLISEHD, or time elapsed?)??

Which section in an ethernet frame contains the data from higher layers, such as Internet Protocol (IP) and the transport and application layers?

(NOT Preamble)??

Which field in a Transmission Control Protocol (TCP) header provides the next expected segment?

(NOT Sequence number)?? ["The Transport and Application Layers" module]!!

What does the subnet mask 255.255.255.0 tell a router?

(NOT The static IP of the gateway router)?? [Subnet Masks]!!

What does a value of one in an ACK control flag represent?

(NOT There is one more packet to be transmitted)?? [refer to Transportation and Application Layers module]!!

A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model provides this function?

(NOT Transport)?? [Refer to Introduction to Networking]!!

You open a web page and log into your email. The traffic travels over many routers. What protocol will the routers use to determine the most optimal path to forward the traffic?

(NOT a Transmission Control Protocol[TCP])?? [Introduction to Networking module]!!

A user has multiple web pages open and is using email. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for sorting the data to send email and web pages to the appropriate location?

(NOT application)?? [Introduction to Networking module]!!

What information will you find in the 16-bit field in an IP datagram?

(NOT internet Protocol version)

A network segment where only one device can communicate at a time is known as a _____.

(NOT protocol)?? [Refer to lesson 3]!!

Ports 1-1023 are known as ______ ports.

(NOT registered)?? [refer to Lesson 2]!!

You need to identify the manufacturer of a network interface. Where will you look for this information?

(NOT the first octet of a Media Access Control [MAC] address)?? [Introduction to Networking module]!!

Which octet of the subnet mask 255.255.255.0 will tell the router the corresponding host ID?

(NOT the first octet)?? [Basic Binary Math module review]!!

A router is performing basic routing functions. What will be the third step in the transmission of a packet?

(NOT the router examines the destination IP)?? [review the videos in the "Network Layer" module]!!

The Ethernet protocol functions at which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model?

(NOT transport)?? [Introduction to Networking]!!

Multiple systems try to send data at the same time. The electrical pulses sent across the cable interfere with each other. What type of network segment is being used?

A collision domain - is a network segment where only one device can communicate at a time.

Calculate how many decimal numbers a 4-bit number can represent.

16 - A bit is base two. The calculation of a 4-bit number is 2^4 = 16.

Which IP address is Class C?

192.37.48.98 - Class C addresses begin with a first octet value of 192 through 223.

When dealing with IPv4, what is the minimum IP header length?

20 bytes

How many bits long is a Autonomous System Number (ASN)?

32 - ASNs are numbers assigned to individual autonomous systems. Just like IP addresses, ASNs are 32-bit numbers. But, unlike IP addresses, they're normally referred to as just a single decimal number instead of being split out into readable bits. They are 2 or 4 bytes and 2 bytes = 16 bits.

There are ____ octets in an IP address.

4 - An octet represents eight bits, or one byte.

Which number cannot be represented by eight bits of data?

436 - Eight bits of data, or a single octet, can represent all decimal numbers from 0-255. 436 is beyond this limit.

How many Transmission Control Protocol (TCP) control flags are there?

6 [refer to Transportation and Application Layers module]!!

Something that requests data from a server is known as a ____.

A client - requests data, and a server responds to that request.

A network device that knows how to forward data along to other networks is known as a ______.

A router - allows devices on different networks to communicate with each other.

The instantiation of an endpoint in a potential TCP connection is known as a ______.

A socket - connects the networking stack of an operating system to applications. [refer back to Lesson 2]!!

A subnet ID is calculated via a ________.

A subnet mask - is also a way to determine the size of a subnet.

What is the correct term for the list of IP addresses and the MAC addresses associated with them?

ARP table - ARP is a protocol used to discover the hardware address of a node with a certain IP address.

Connection-oriented protocols protect against dropped data by forming connections and using what type of constant stream?

Acknowledgements - Connection-oriented protocols protect against dropped data with a constant stream of acknowledgements.

Interior gateway protocols are used by routers in order to share information within a single ________.

An autonomous system - is a group of networks all maintained by the same organization.

What is the fifth layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model?

Application - The fifth layer of the TCP/IP model is the application layer. The application layer focuses on application specific protocols

The transmission method that sends data to every device on a LAN is known as a _____ transmission.

Broadcast -transmissions are used to communicate with every node on a network segment. [Refer to lesson 5]!!

CIDR simplifies how routers and other network devices need to think about the parts of an IP address, but it also allows for more arbitrary network sizes. What does CIDR stand for?

CIDR, or Classless Inter-Domain Routing - expands on the concept of subnetting by using subnet masks to demarcate networks.

A connection has been terminated and no communication is possible. What is the Transmission Control Protocol (TCP) socket state?

CLOSED - The TCP socket will be in the CLOSED state when the connection has been fully terminated and no further communication is possible.

What will allow you to form point-to-point networking connections?

Cables

What is used to determine when the communications channels are clear and when a device is free to transmit data?

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is used to determine when the communications channels are clear and when a device is free to transmit data.

Which layer abstracts away the need for any other layers to care about what hardware is in use?

Data Link - One of the primary purposes of the data link layer is to essentially abstract away the need for any other layers to care about the physical layer and what hardware is in use.

What type of cable communicates binary data by changing the voltage between two ranges?

Copper

What is the term for the place one network ends and another begins?

Demarcation point - To demarcate something means to set something off. When discussing computer networking you'll often hear the term demarcation point to describe where one network or system ends and another one begins.

The concept of taking traffic that's all aimed at the same node and delivering it to the proper receiving service is known as _________.

Demultiplexing - allows traffic intended for many different services to be delivered to the same node.

When data can flow across a cable in both directions, this is known as _____ communication.

Duplex - communication occurs when data flows in both directions.

The entirety of a packet at one layer becoming the payload section at another layer is known as ________.

Encapsulation - occurs at each layer of our network stack, except for the physical layer.

What section in an ethernet frame will you find a Virtual Local Area Network (VLAN) header?

EtherType field - You may find a VLAN header in the EtherType field. This will indicate that the frame is called a VLAN frame.

What protocol communicates data between routers representing the edges of autonomous systems?

Exterior gateway -protocols are used to communicate data between routers representing the edges of autonomous systems.

An ARP broadcast is sent to the special MAC address ________.

FF:FF:FF:FF:FF:FF - ARP broadcasts are used to ask all devices on a local area network if they're associated with a specific IP address.

Using logical operators, 1 AND 0 = _____.

False - Using the AND operator, the result is only 1, or true, if both sides are also 1, or true.

What is the process of taking a single IP datagram and splitting it up into several smaller datagrams called?

Fragmentation

A Local Area Network (LAN) uses Category 6 cabling. An issue with a connection results in a network link degradation and only one device can communicate at a time. What is the connection operating at?

Half Duplex - A full duplex connection that has a connection issue will report itself to be operating as half duplex.

The number system that has 16 numerals is known as _____.

Hexadecimal - Other number systems include decimal, with 10 numerals, and binary, which only has two.

You have installed a device at the physical layer. All of the systems you connect to this device will talk to each other at the same time. What have you installed?

Hub

Ranges of IP addresses that anyone can use for their internal networks are known as ______.

Non-routable address space - can be used by anyone

Which are a type of interior gateway protocol? (Check all that apply)

Link sate routing protocols (Link state protocols get their name because each router advertises the state of the links of each of its interfaces. This information about each router is propagated to every other router on an autonomous system.) and Distance-vector protocols (A router using a distance vector protocol basically just takes its routing table, which is a list of every network known to it and how far away these networks are in terms of hops. Then the router sends this list to every neighboring router, which is basically every router directly connected to it.)

What process sends ones and zeroes across network cables?

Modulation

What is eight bits of data called?

Octet - Eight bits of data, or a single octet, can represent all decimal numbers from 0-255.

A network has the ability to direct traffic toward all of the receiving services. What provides this ability in the transport layer?

Multiplexing - in the transport layer means that nodes on a network have the ability to direct traffic toward many different receiving services.

What type of network address space allows for nodes on a network to communicate with each other, but prevents any gateway router from forwarding traffic there, and are reserved for internal networks?

Non-routable address space - allows for nodes on such a network to communicate with each other, but no gateway router will attempt to forward traffic to this type of network.

You are sending a very small amount of information that you need the listening program to respond to immediately. Which Transmission Control Protocol (TCP) flag will be used?

PSH [review "Transport and Application Layers" module]!!

On a Local Area Network, or LAN, what identification do nodes use to communicate with each other internally?

Physical MAC addresses - On a Local Area Network, or LAN, nodes can communicate with each other through their physical MAC addresses. This works well on a small scale.

A defined set of standards that computers must follow in order to communicate properly is known as a _____.

Protocols - help define standards so that different computers can communicate with each other.

What is the most common plug used with twisted pair network cables?

RJ (Registered Jack) 45

A communication between two devices is over the maximum limit of an ethernet frame size. The Transmission Control Protocol (TCP) splits up the data into segments. Which field in the header helps keep track of the many segments?

Sequence number - is used to keep track of where in a sequence of TCP segments that the packet is expected to be.

A communication sent through Transmission Control Protocol (TCP) arrives out of order. What allows the data to be put back together in the correct order?

Sequence numbers - allow the data to be put back together in the correct order.

In what order will the Transmission Control Protocol (TCP) generally send all segments?

Sequential - TCP will generally send all segments in sequential order.

QoS services are protocols that allow routers to make decisions about which IP datagram may be more important than others. Which IP header field would QoS details be found?

Service type field - These 8 bits can be used to specify details about quality of service, or QoS, technologies. The important take away about QoS is that they're services that allow routers to make decisions about which IP datagram may be more important than others.

You get in your car after work and turn on the radio. What type of communication does the radio use?

Simplex - A radio provides one way communication, or unidirectional. This is simplex communication.

What is the process of taking a large network and splitting it up into many individual and smaller subnetworks called?

Subnetting - Subnetting is the process of taking a large network and splitting it up into many individual and smaller subnetworks, or subnets.

Select the device that will have the most network ports.

Switch

A device that connects lots of devices and remembers which ones are connected to each interface is known as a _____.

Switch - By remembering which devices are connected to each interface, a switch reduces collision domains. [Refer back to lesson 3]!!

The most common example of a connection-oriented protocol is _____

TCP

Which Transmission Control Protocol (TCP) flag is used to make sure the receiving end knows how to examine the sequence number field?

The SYN flag - is used to make sure the receiving end knows how to examine the sequence number field.

Where is the Start Frame Delimiter (SFD) found in an ethernet frame?

The last byte of the preamble - The SFD is found in the last byte of the preamble, and signals to a receiving device that the preamble is over, and that the actual frame contents will now follow.

Which field in a Transmission Control Protocol (TCP) header is not typically used in modern networking?

The urgent pointer - field is not typically used in modern networking. This field points out particular segments that might be more important than others, but is a feature of TCP that hasn't really ever been adopted.

A Transmission Control Protocol (TCP) connection is established and two devices ensure that they're speaking the same protocol. What has occured?

Three-way handshake - A three-way handshake involves segments that have SYN, SYN/ACK, and ACK which happens every time a TCP connection is established.

Why do entries in a local Address Resolution Protocol (ARP) table expire after a short amount of time?

To account for network changes -

What is the purpose of an ARP response?

To let a computer broadcasting an ARP message know what MAC address to put into the destination hardware address field - The node that wants to send data sends a broadcast ARP message to the MAC broadcast address which is all F's. When the network interface receives this ARP broadcast, it sends back what's known as an ARP response. This response message will contain the MAC address for the network interface in question.

A connection, at which layer, implies that every segment of data sent is acknowledged?

Transport - A connection at the transport layer implies that every segment of data sent is acknowledged. [The "Transport and Application Layers" module]!!

Which two protocols work at the transport layer and ensures that data gets to the right applications running on those nodes?

UDP and TCP UDP works at the transport layer and is responsible for ensuring data gets to the right applications. UDP does not provide reliable delivery. TCP works at the transport layer and is responsible for ensuring that data gets to the right applications. TCP provides reliable delivery.

The control flag that isn't really in use by modern networks is the _____ flag.

URG - flag has never seen widespread adoption, but it's still defined in every TCP header. [refer to Lesson 2]!!

UDP stands for ______.

User Datagram Protocol

HTTP is an example of a(n) ______ layer protocol.

application [lesson 3]!!

A ________ is where one network ends and another begins.

demarcation point

Ports that are generally used to establish outbound connections are known as ______ ports.

ephemeral - The exact ports used are different, depending on the operating system, but they're all known as ephemeral ports.

The OSI network model has _____ layers.

seven - Unlike our model, which focuses on five layers, the OSI model has seven layers.

Which field in a Transmission Control Protocol (TCP) header is chosen from ephemeral ports?

source port - is a high-numbered port chosen from a special section of ports known as ephemeral ports. [refer to Transportation and Application Layers module]!!

The sequence of SYN, SYN/ACK, and ACK packets is known as the _________.

three-way handshake - That series of flags is used to establish every TCP connection.


Conjuntos de estudio relacionados

Sociology chapter 9 - Gender and Sexuality

View Set

Homework #2 (Long Run Growth and Model of Production)

View Set

*EXAM* Leader as Conflict Handler and Negotiator/Chapter 14: Conflict and Negotiation

View Set

prep-u Chapter 39: Fluid, Electrolyte, and Acid-Base Balance

View Set