IT Quiz 1
"Enter Deep" in a CDN (Content Distribution Network) is to build large clusters at a smaller number for the content deliveries.
False
A DoS (Denial of Service) attack collects private information.
False
A POP3 Server maintains user state information across POP3 sessions.
False
A browser requests a Web page that consists of some text and three images. For this page, the browser will send one request message and receive four response messages.
False
A router runs all 5 layers of the protocol stack.
False
A server can use cookies to determine a user's postal address without the user's consent.
False
A transport layer packet is called a "datagram".
False
A transport layer packet is called a "message"
False
A transport layer packet is called a "message".
False
A transport layer segment encapsulates the transport layer header and a network-layer datagram.
False
An Ethernet switch is responsible for routing and forwarding packets.
False
Assume a 2-link network with the transmission rates R1 = 2 Mbps, and R2 = 1 Mbps, the throughput of the end-to-end transmission is 2 Mbps.
False
At the network core, there are inter-connected end systems.
False
BitTorrent is an application layer protocol that is based on Client-Server architecture.
False
Checksum at the Sender side is the 1's complement of the sum of all the 16-bit words in the segment including the checksum.
False
Checksum is used to handle packet loss.
False
Clients can directly communicate to each other in a Client-Server architecture.
False
DNS (Domain Name System) uses a centralized database to keep the mappings of domain names and IP addresses.
False
DNS (Domain Name System) uses the TCP services with port number 53
False
DNS is implemented with a pure Client-Server architecture.
False
DNS runs over TCP.
False
GET /index.html HTTP/1.1 Host: people.uwplatt.edu Connection: close User-Agent: mOZILLA/5.0 Accept-Language: en-us,en;q=0.5 The above HTTP Request message indicates a HTTP persistent connection.
False
HTTP defines how a web page is interpreted by a client.
False
HTTP encapsulates all objects in a single response message.
False
HTTP response messages never have an empty message body.
False
If the traffic intensity approaches 1, the queuing delay decreases.
False
If the traffic intensity at the router is close to zero, packet loss could happen.
False
In RDT, a timeout event must be added to the Receiver to handle packet loss.
False
In the Internet Protocol Stack, the Application Layer uses the services provided by the Link Layer directly.
False
It takes 10 milliseconds to propagate 1 Bit over a link with the distance of 1,000 meters and a propagation speed of 1,000 Kilometers/second.
False
It takes the router 10 milliseconds to push a 1,000-bit packet onto a link with 1,000 Kbps transmission rate.
False
One of the advantages of a Client-Server architecture is self-scalability.
False
One of the reasons to use UDP over TCP is data integrity.
False
SMTP is used by a user agent, such as Outlook app, to access the mail box in a mail server.
False
SSL (Secure Sockets Layer) is implemented at the Transport layer.
False
SSL (Secure Sockets Layer) provides host-to-host security services.
False
Skype is implemented with a pure P2P architecture.
False
Suppose 10 connections traverse the same link of rate 1 Gbps. Suppose that the client access links all have rate 5 Mbps. Then the maximum throughput for each connection is 100 Mbps.
False
Suppose host A sends host B one segment with sequence number 38 and 4 bytes of data. Then in this same segment the acknowledgement number is necessarily 42.
False
Suppose that host A wants to send data over TCP to host B, and host B wants to send data to host A over TCP. Two separate TCP connections - one for each direction - are needed.
False
TCP is an application layer protocol.
False
The Internet is a circuit-switched network where the resources needed along a path for communication are reserved for the duration of the communication session.
False
The Internet provides its applications two types of services, a TDM service and a FDM service.
False
The Link Layer is at the bottom of the Internet protocol stack.
False
The PUT method of the HTTP is used when the browser requests an object.
False
The client process passes the stream of data through the socket, and the data is directed to the network layer without buffering.
False
The default mode of HTTP uses non-persistent connections.
False
The header length of an UDP segment is 20 bytes.
False
The packet at the Link Layer is called a "segment".
False
The propagation delay depends on the length of the packet.
False
The size of the TCP RcvWindow never changes throughout the duration of the connection.
False
UDP is a connection-oriented Transport Layer service.
False
UDP is a reliable data transfer protocol.
False
When a client contacts a TCP server at port number 5520, the client uses the same port number for the communication.
False
When a host makes DNS query, the query is first sent to a root DNS server.
False
With a TCP connection, you could have more than one Receiver simultaneously.
False
With a packet-switched network, we can guarantee a certain amount of end-to-end bandwidth.
False
A IMAP Server maintains user state information across IMAP sessions.
True
A TCP socket is identified by a four-tuple: (source IP address, source port number, destination IP address, destination port number).
True
A false source address is known as IP spoofing.
True
A host on the Internet is the end system running the network applications.
True
An IMAP Server maintains a consistent folder hierarchy that can be accessed from any compute.
True
An IMAP Server maintains a consistent folder hierarchy that can be accessed from any computer.
True
An authoritative DNS server is an organization's own DNS server.
True
Arriving TCP segments with different source IPs or source port numbers will be directed to two different sockets.
True
Bandwidth flooding is a type of DoS (Denial of Service) attacks.
True
Conditional GET method of HTTP allows a web cache to verify if an object is up to date.
True
Consider a queue preceding a transmission link of rate R. Suppose a packet arrives to the queue periodically every 1/a seconds. Also suppose all packets are of length L. Then the queuing delay is small and bounded as long as aL < R.
True
Consider an incoming link with a transmission rate 100 Mbps to router A, and an outgoing link with a transmission rate 1.5 Mbps leaving router A. Packet loss could happen after a period of time.
True
Ethernet LANs can have transmission rates up to 10Gbps.
True
FM radio and broadcast TV are examples of "push" systems.
True
HTTP uses TCP as the underlying protocol.
True
MSS is the maximum amount of application-layer data in the segment.
True
Normally, video conferencing is Loss-tolerant.
True
One of the reasons to use UDP over TCP is finer application-level control over what data is sent and when.
True
One of the reasons to use UDP over TCP is small packet header overhead.
True
Packet Loss could happen when the arrival rate to the router is greater than the router transmission rate.
True
Pipelined Reliable Data Transfer protocols allow the Sender to send multiple packets without waiting for acknowledgments.
True
Queuing Delay occurs when the arrival rate of packets to the router exceeds the output link capacity.
True
Routers do not maintain TCP connection states.
True
TCP provides a connection-oriented service.
True
TCP provides guaranteed in-order delivery of data to the receiver.
True
Telnet is implemented with a pure Client-Server architecture.
True
The "default domain name server" is the local DNS server.
True
The GET method of the HTTP is used when the browser requests an object.
True
Web servers are end systems.
True
With SMTP, it is possible to send multiple mail messages over the same TCP connection.
True
You should use UDP if you are developing an application, which needs to transmit the data from a remote client to a server as fast as possible.
True
eBay is a Client-Server architecture.
True
GET /index.html HTTP/1.1 Host: people.uwplatt.edu Connection: close User-Agent: mOZILLA/5.0 Accept-Language: en-us,en;q=0.5 The above HTTP Request message indicates a HTTP persistent connection.
false
Checksum is used to detect bit errors in a transmitted packet.
true