MIS 307 Exam 1- Lecture quizzes
The most widely used LAN protocol is: TCP-IP Ethernet DNS DHCP
Ethernet
A destination port number at the transport layer identifies which application on a computer should receive the data transmission. True or False
True
The DNS root servers have only one job: to delegate name resolution to other DNS servers. True or False
True
The data link layer accepts messages from the network layer and controls the hardware that transmits them. True or False
True
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet. physical layer packet multicast message X.25 message broadcast message application layer packet
broadcast message
The hexidecimal number 4A01 when converted to binary is: 010010100000000 0100101000010001 0100101000000001 0100101010000001
0100101000000001
Internet Message Access Protocol (IMAP) or Post Office Protocol (POP) are protocols used by a client to send messages from a mail server. True or False
False- RECEIVE
In step 5 of the DHCP process, the server sends a REQUEST (or DHCPREQUEST) packet, letting the client know that it intends to use the address. True or False
False- The client sends a REQUEST (or DHCPREQUEST) packet, letting the server know that it intends to use the address.
The top-level DNS servers delegate to hundreds of thousands of other top-level DNS servers. True or False
False- The top-level DNS servers delegate to hundreds of thousands of second-level DNS servers
TCP includes a sequence number to keep track of the total number of packets sent. True or False
False- adds sequence numbers to packets and reorders any packets that arrive in the wrong order
Digital transmission produces more errors than analog transmission. True or False
False- analog has more errors
With contention, a computer does not have to wait before it can transmit. A computer can transmit at anytime. True or False
False- have to wait otherwise have collision
DNS is normally responsible for translating IP address to host names. True or False?
False- host to IP addresses
The Internet's Transmission Control Protocol (TCP) uses the MTU to determine the minimum size of each packet in any transmission. True or False
False- minimum
An ARP entry is usually learned and is kept on a device for a certain amount of time, as long as it is being continually used. True or False
True
Because there is a limit on the length of a frame that the data link layer can transmit from node to node, the transport layer breaks up the message from the application layer into several smaller segments. True or False
True
DHCP dynamically assigns an IP address to a computer. True or False
True
For the requests from the Web browser to be understood by the Web server, they must use the same standard protocol or language. True or False
True
HTTP response status codes indicate whether a specific HTTP request has been successfully completed. True or False
True
In the OSI model, the application layer provides a set of utilities for applications and is the end user's access to the network. True or false?
True
Radio data transmission requires that each device has a radio receiver/transmitter and uses a specific frequency. True or False
True
A protocol data unit (PDU) is a term used in telecommunications that refers to: the language of data transmission information added or removed by a layer of the Internet model transport layer protocols the application layer
information added or removed by a layer of the Internet model
The application layer is the seventh layer of the Internet model and specifies the type of connection and the electrical signals that pass through it. True or false?
false- only 5 layers
Network layer functions include: providing services for an application program identifying all hosts in the network dealing with transmission errors regulating the flow of data
identifying all hosts in the network
Select a valid IPV6 address: 198.51.10.1 2001:db8:1f70:999:de8:7648:3a49:6e8 198.51.100.215 2001:db8:1f70:999:7648:3a49:6e8
2001:db8:1f70:999:de8:7648:3a49:6e8
HTTPS uses port number 80 21 143 443
443
The most common Error Detection Method is...... Parity Cyclical Redundancy Check Checksums Parity Check
Cyclical Redundancy Check
Star-Ring topology is most commonly used to implement wireless networks? True or False
False- Mesh topology
The newer form of IP, version 6 (IPv6): Is running out of address space to support the growth of the Internet Has a 20 byte header Has an increased address size from 32 bits to 128 bits Does not include version number in its header Does not include hop limit in its header
Has an increased address size from 32 bits to 128 bits
In DHCP, how does your computer finally choose an IP address? Question options: a)Sends the request to the DHCP server b)Send the request to another host on the network c)Broadcast the request on the network d)Contact the router to choose one
a)Sends the request to the DHCP server
A(n) _________ is a specially formatted request used to perform IP address to data link address resolution. Autonomous System Request Link state request HTTP request Address Resolution Protocol request Domain Service Request
Address Resolution Protocol request (ARP)
What do the twists in twisted pair cabling do to improve network communications? Reduces a specific type of interference, called EMI Resistant to interference and corrosion Data can travel longer distances Data will travel faster
Reduces a specific type of interference, called EMI
_________ is the process of determining the path that a message will travel from sending computer to receiving computer. Packetizing Addressing Routing Interfacing Broadcasting
Routing
With Client-Based Architecture, application software on the client computers contains presentation, application, and data access logic. True or false?
True
Network Address Translation (NAT): operates on a hub, usually connecting two networks together. allows you to use public IP addresses on the internal network. enables private IP networks that use unregistered IP addresses to connect to the Internet. is the feature implemented at Router to protect a network against Denial of Service attack.
enables private IP networks that use unregistered IP addresses to connect to the Internet.
The fourth layer of the OSI model is called the __________ layer. a. network b. transport c. session d. data link e. presentation
transport
Using HTTP version 1.0 a keep-alive: tells the server "please keep this connection open, I'll request more" True or False
False- 1.1
With Post Office Protocol (v3, therefore POP 3) emails remain on the mail server True or False
False- Does not remain on server
IPv6 uses 32-bit addresses as opposed to the 128-bit addresses used by IPv4 allowing for a substantially larger number of possible addresses. True or False
False- IPv6 used 128-bit addresses and IPv4 uses 32-bit addresses
In TCP/IP, the parts of the IP address that are used as the network and host addresses are fixed, so the network and host addresses can be determined without more information. True or False
False- Not FIXED
IP packets provide guaranteed delivery over the network. True or false?
False- not guaranteed
Each network interface on your computer is identified by a series of letters known as a MAC address True or False
False- numbers and letters
Polling is the process of permitting all clients to transmit or receive at any time True or False
False- periodically polls client to see if it has data to send
A physical circuit refers to the transmission characteristics of the connection, such as the speed at which data is being sent through the connection. True or False
False- physical is Cables, Wires
A URL is nothing more than the address of a given unique resource on the Web. True or False
True
What is the most common type of cabling used in networks? Multimode fiber Fiber Optic Twisted pairs Coaxial
Twisted pairs
In NDP Neighbor Solicitation does the following task; advertise their presence together with various link and Internet parameters either periodically, or in response to a Router Solicitation message. are used by nodes to respond to a Neighbor Solicitation message. are used by nodes to determine the link layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link layer address. inquire with Router Solicitation messages to locate routers on an attached link.Routers which forward packets not addressed to them generate Router Advertisements immediately upon receipt of this message rather than at their next scheduled time.
are used by nodes to determine the link layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link layer address.
An endpoint is a locally unused port number for communication a port number combination of an IP address and a port number 16-bit number used to identify specific applications
combination of an IP address and a port number