networking final study guide
Given the IP Address 192.168.112.1. Each network requires between 35 and 60 hosts. What is the mask bit?
/26
IP Address assigned is 192.168.87.0. The number of subnets needed is 8. What is the mask bit?
/27
Match the description to the network classification 1. spans multiple cities or countries 2. spans a region near an individual 3. spans a building or campus 4. spans a large metropolitan area or city
1. WAN 2. PAN 3. LAN 4. MAN
Match the description with the network topology. 1. all computers attached to single cable 2. direct connection between each pair of computers 3. all are connected on a closed loop 4. all devices are directly connected to central point
1. bus 2. mesh 3. ring 4. star
Match the mode of communication with the type of communication channel 1. walkie-talkies 2. radios 3. cell phones 4. tv's 5. ham radios 6. skype 7. hi def tv 8. telephone land lines
1. half-duplex 2. simplex 3. full-duplex 4. simplex 5. half-duplex 6. full-duplex 7. simplex 8. full-duplex
Match the Personal Area Network technologies with common communication uses/requirements 1. Used in industry and in the scientific and medical devices 2. Frequently used in television/entertainment remote controls 3. Requires line-of-sight 4. Often used with headset for cell phones 5. Used in environments where electromagnetic interference may be present
1. ism wireless 2. infraRed 3. infraRed 4. bluetooth 5. ism wireless
Match the security problem with its definition. 1. Gaining control of a computer system and uses system to perpetrate a crime 2. Making false or exaggerated claims about services or goods 3. Masquerading as a well-known site in order to obtain personal information 4. Deceiving a user into investing money or abetting a crime 5. Loss of intellectual or other valuable proprietary business information 6. Intentionally blocking or hindering business activities and commerce
1. loss of control 2. misrepresentation 3. phishing 4. scams 5. loss of data 6. denial of service
Match the security technique to the purpose. 1. Encryption 2. Firewalls and Intrusion Detection Systems 3. Digital Signatures 4. Virtual Private Networks 5. Hashing 6. Digital Certificates
1. privacy 2. site integrity 3. message authentication 4. data privacy 5. data integrity 6. sender authentication
How many bits does an IPv6 address occupy?
128-bits
Given the subnet 192.168.42.0/28, how many subnets can be created?
16
Given the IP Address 192.168.112.1. Each network requires between 35 and 60 hosts. What is the subnet address ID of the first network?
192.168.112.0
Given the IP Address 192.168.112.0. Each network requires between 35 and 60 hosts. What is the range of host address on the first subnet?
192.168.112.1 - 192.168.112.62
Given the IP Address 192.168.112.1. Each network requires between 35 and 60 hosts. What is the broadcast address of the first subnet?
192.168.112.63
Which of the following subnet IDs belong to 192.168.212.0/26?
192.168.212.0 192.168.212.64 192.168.212.128 192.168.212.192
IP Address assigned is 192.168.87.0. The number of subnets needed is 8. What is the first subnet address ID?
192.168.87.0
IP Address assigned is 192.168.87.0. The number of subnets needed is 8. What is the range of host addresses on the first subnet?
192.168.87.1 - 192.168.87.30
IP Address assigned is 192.168.87.0. The number of subnets needed is 8. What is the broadcast address of the first subnet?
192.168.87.31
Binary is a base ___ numbering system and uses the digits 0 and 1.
2
Given the IP Address 192.168.112.1. Each network requires between 35 and 60 hosts. What is the subnet mask?
255.255.255.192
What is the subnet mask for IP Address 192.168.212.0/26?
255.255.255.192
IP Address assigned is 192.168.87.0. The number of subnets needed is 8. What is the subnet mask?
255.255.255.224
Given the subnet 192.168.42.0/28, what is the subnet mask?
255.255.255.240
IP Address assigned is 192.168.87.0. The number of subnets needed is 8. What is the maximum number of hosts per subnet?
30
Given the IP Address 192.168.112.1. Each network requires between 35 and 60 hosts. What is the maximun number of subnets that can be created to fulfil the host requirements?
4
A byte is defined as
8 bits
Which is the correct form for creating a hyperlink in HTML?
<a href= "http://www.uc.edu" > University of Cincinnati</a>
How is an email link created in HTML?
<a href= "mailto:[email protected]">
Which is the correct tag to make text bold?
<b>
How is a single blank line inserted in HTML?
<br />
Which is the correct HTML tag for inserting a line break?
<br />
Select the correct tag for the largest header in HTML
<h1>
Which is the correct HTML tag for making text italic?
<i>
Which are correct tags for sizing an image?
<img src= "Imagename.format" alt= "ImageTitle" width= "360" height= "280" />
Which is the correct HTML for inserting an image?
<img src= "imagename.format" alt= "ImageName"/>
What is the correct HTML tag for creating a checkbox?
<input type= "checkbox"/>
How are numbered lists created in HTML?
<ol>
Which tags are tags used with tables in HTML?
<table> <tr><td>
Which is the correct HTML used to right-align the contents of a cell in a table?
<td align= "right" >
How are bulleted lists created in HTML?
<ul>
Which of the following statements are true concerning XML?
Allows a user to specify a data format Describes the structure of the data and allows tag names to be created Has embedded tags similar to HTML
In the TCP 3-way handshake the following are all true except
CLR is used to clear a connection of congestion
How are colors represented in HTML?
Colors are represented as HEX values in two-digit pairs
Why are computers based on a binary numbering system?
Computers only understand "on/off"
Data transfer defines the following actions in the application-layer protocol:
Error handling Interaction termination Message syntax and semantics Interaction between server and client
Which of the following describes characteristics of HTML.
HTML permits a hyperlink to be embedded in an object HTML allows a browser to adapt the web page to the underlying display hardware HTML allows a document to include images, audio, video, and text Markup language used to display complex web pages
What does HTML stand for?
HyperText Markup Language
Which two Internet protocols allow a client to identify a server?
IP address and port number
A packet sent across a TCP/IP Internet is called a(n)
IP datagram
What is the purpose of the <!--> tag?
Insert a comment
What does the <hr /> tag create?
Inserts a horizontal line
Select the four major HTTP request types.
PUT GET POST HEAD
What is the purpose of version information in HTTP?
Permits protocols to change and still preserve backwards compatibility Allows servers to choose highest version of the protocol that is understood by both sender and receiver
How can HTML source code be viewed in an IE browser?
Right-click page and select "View Source"
Which cabling is best suited for manufacturing areas with high levels of background radiation?
STP
List the details an application protocol must specify.
Syntax and semantics of the message that can be exchanged Whether the server or the client initiates the interaction Actions to be taken when an error occurs How the two sides know when to end the communication
Data representation defines the following actions in the application-layer protocol:
Syntax of data items Translation of integers, characters and files between computers
Which organization is responsible for the Web standards?
The World Wide Web Consortium
Random electromagnetic radiation generated by devices such as electric motors can interfere with communication that uses radio transmission or electrical energy sent over wires.
True
The most common form of unguided communication mechanisms consist of wireless networking technologies that use electromagnetic energy in the Radio Frequency range.
True
What are the advantages of Geostationary Earth Orbit satellites?
a minimum of three satellites are need to provide basic world-wide coverage can reach terrain that is unfeasible for other kinds of transmission media 24/7 availability
The stream model refers to
a sequence of bytes flowing from one application program to another
The need for the newer version of IP addressing include all except
ability to send multicast messages
The three building blocks of a wireless LAN are
access point switch or router to connect wired network to access point wireless hosts or nodes
What is the purpose of the Dynamic Host Configuration Protocol (DHCP)?
allows a computer to move to a new network and obtain configuration data without manually making the changes
Domain Name System (DNS)
allows each organization to assign names to computer provides a service that maps human-readable symbolic names to computer addresses
Like User Datagram Protocol (UDP), TCP is a connection orientated because
applications must request that TCP form a connection before they can transfer data and close the connection when transfer is complete
Select the key aspects that make CRC an important part of data networking.
arbitrary message length quick hardware implementation excellent error detection
Which of the following is NOT true concerning a Media Access Control address?
assigned by IEEE
The transmission timing can occur at any time with an arbitrary delay between the transmission of two data items
asynchronous
Bit is derived from
binary digits
A mechanism used to connect two LAN segments and forward frames from one segment to another.
bridge
Narrowband technologies include all except the following
cable modem technologies
In a message model, each message delivered will never be
combined with multiple messages
Which Internet service operates similar to a telephone call?
connection-oriented
The Ethernet frame format contains the following three individual fields
crc header payload
Any phenomenon where a signal transmitted on one circuit or channel of a transmission system that creates an undesired effect in another circuit or channel is called
crosstalk
To avoid creating bottlenecks in network connections, peer-to-peer service is implemented. Peer-to-peer architecture is defined as
data distributed equally among a set a server and each client request is sent to the appropriate server
Broadband technologies include all except the following
dialup telephone connections
What are the three sources of transmission errors?
distortion interference attenuation
Characteristcs of server software are typically all except
does not require a powerful computer hardware
The way software displays an IP addresses for easy understanding by humans.
dotted decimal notation
The type of routing used by most routers on the Internet is
dynamic
Terms used to measure the Electromagnetic Spectrum include all the following except
electric charge in amperes
Select the three types of data errors in data communication systems.
erasure single bit error burst error
A license is required to operate transmissions equipment in all wireless networks.
false
A router is used to connect two Wide Area Networks (WAN) provided that both networks use the same technology and protocols.
false
Access technologies that handle the last mile problem are defined as connections to from the service provider to the subscriber at the greatest physical distance from the service provider.
false
Address Resolution Protocol forms a conceptual boundary in the protocol stack- layers below ARP use IP addresses, and layers above ARP use MAC addresses.
false
All encryption keys require that the encryption key and the decryption key remain secret.
false
Any IPv6 address that ends with 96 zero bits contains an IPv4 address.
false
Broadband interference is easier to block than narrowband frequency interference.
false
Classless Inter-Domain Routing (CIDR) is used for routing data through the Internet.
false
Communication between two parties on a circuit switched network is affected by communication between other parties sharing a common medium.
false
DSL technology is the most widely used high-speed data communication used in the business community.
false
Data transmissions can NOT be converted from parallel to serial.
false
Hardware failure accounts for the bulk of all delay and loss transmissions.
false
IPv4 is being replaced by IPv6 due to a variety of flaws associated with the original IPv4 address schema.
false
ISDN is the most popular data networking service offered by an Internet service provider.
false
In both circuit switched and packet switched models a sender must perform initialization before communication begins and notification when communication terminates.
false
In parallel transmission, the number of wires are always in multiples of eight.
false
Interior Gateway Protocols and Exterior Gateway Protocols use routing metrics to ensure traffic is directed through the Internet by the shortest hop-count metric.
false
Length specification is a minor concern in the development and implementation of LAN technology.
false
Like IPv4, IPv6 is a connection orientation protocol.
false
Low Earth Orbit Satellites are defined as below 2000 Kilometers, having a short propagation delay, and easy to track.
false
Noise occurs only in wireless communication devices.
false
Parallel transmission sends one bit at a time over a transmission medium.
false
Replay errors occur when a duplicate packet arrives causing packets to arrive out of sequence.
false
Routers, unlike other devices on a network, use all five layers of the TCP/IP reference model.
false
Signal strength must be increase in order to send signals across greater distances on a LAN.
false
Synchronous Optical Network (SONET) defines a narrow set of standards used for digital transmission.
false
The frame header contains information to process the frame and holds up to 64 Kbytes of data.
false
The purpose of subnet masks (address masks) is to "hide" a computer on the network.
false
The technique known as sliding window is a flow control that permits a steady stream of data to be continuously transmitted on the Internet.
false
Twisted pair Ethernet uses RJ45 connectors and are interchangeable with the jacks used to connect telephones.
false
When using TCP/IP, the size of a datagram sent across the Internet is determined by the TCP/IP protocol.
false
The three basic purposes of the Network Interface Card (NIC) is
for frame recognition to handle address recognition for CRC computation
Signal transmissions fall into two broad classes
guided and unguided
What is the term used to describe a computer that connects to the Internet and runs applications?
host computer
What are benefits in using optical fiber over copper wiring?
immune to electrical noise higher bandwidth less signal attenuation
Which layer of the TCP/IP reference model specifies the format of packets sent across the Internet?
internet
The IP address scheme guarantees that each computer on the Internet
is assigned a unique address
Characteristics of client software are typically all except
is invoked automatically when a system boots
The transmission timing occurs at regular intervals with a fixed gap between the transmission of two data items
isochronous
Serial transmission can be divided into the following classifications:
isochronous synchronous asynchronous
Why does light travel around a bend in an optical fiber?
light reflects when the angle of incidence is greater than the critical angle
The IP address 127.0.0.1 is commonly used to test network applications and is called a
loopback address
Address resolution is
mapping between a protocol address and a hardware address
A host that connects to multiple networks is called
multi-homed
Random electromagnetic radiation is called
noise
Which of the following is not a type of wireless technology?
optical
What is the purpose of the TIME TO LIVE field in the IP header?
prevents a datagram from circulating forever in a circular path
Which of the following is NOT a media that uses light energy to carry information?
radio waves
Colon Hexadecimal Notation is used to
reduced the number of characters used to write an address
An analog device used to propagate LAN signals over long distances.
repeater
The basic hardware component used to connect heterogeneous (diverse) networks is a
router
Why do organizations seldom use a single router to connect all its networks?
router processor speed may be insufficient and redundancy improves Internet reliability
Transport protocols use _____________ to handle out-of-order packets deliveries and duplicate packets
sequencing
Describe the client-server model of interaction
server starts first and awaits contact by the client
Which are two common ways to protect against EMI?
shielding and moving device away from source of interference
The type of routing used most by Internet hosts is
static
Name the two basic Internet communication paradigms
stream and message
The transmission timing occurs continuously with no gap between the transmission of two data items.
synchronous
What procedure is followed when a checksum error is detected?
the datagram is discarded immediately
Circuit switching provides
the illusion of an isolated physical path between a sender and a receiver
An IP address that contains all zeros is used to indicate
this computer
A URL contains information
to specify a web page that uses separator characters to display the protocol, computer name, document name, and parameters
The purpose of Name Resolution is
translate a domain name into an address
Which layer of the TCP/IP reference model specifies the message and procedures that are used to ensure reliable transfer
transport
A communication system that allows arbitrary pairs of computers to communicate is called universal service.
true
A typical residential subscriber receives much more information than the subscriber sends. Internet access technologies are designed to transfer more data in one direction than the other.
true
A virtual packet is hardware independent and each host or router on the Internet contains protocol software that recognizes these Internet packets.
true
All Internet routing protocols fall into either Interior Gateway Protocols or Exterior Gateway Protocols.
true
An IP address does not identify a specific computer.
true
An Internet address (IPv4) is a unique 32-bit number assigned to a host and used for all communications with the host.
true
Because IP is central to all Internet communication, changing IP requires a change to the entire Internet.
true
Each packet of data that crosses the Internet travels independently and contains information that identifies the intended recipient.
true
Electromagnetic Radiation has two fluctuating fields- one is electric and one magnetic.
true
IEEE 802.11 standard applies only to wireless equipment.
true
In order for an organization to ensure security, a firewall must be placed at EACH Internet connection.
true
In order to make universal service possible across diverse networks, protocol software is required on both the computers and the routers used on the Internet.
true
In the US, a digital circuit leased from a telephone company follows the same digital transmission standards that the phone company uses to transport digital phone calls and are referred to as the T-series standards.
true
Interferences and disturbances in communication systems are both naturally occuring and man-made.
true
Internally, computers and communication hardware uses parallel transmission.
true
Light used to "see" an object must have a wavelength about the same size or smaller than the object being viewed.
true
Noise is virtually unavoidable and can never be eliminated completely from wireless communication channels.
true
Only the first portion of a destination address is used when forwarding a packet across a WAN. When the packet reaches the switch to which the destination computer attaches, the second part of the address is used to forward the packet to the correct local computer.
true
Packet switching forms the basis of the Internet.
true
Serial transmission sends one bit at a time over a transmission medium.
true
Synchronous Transport Signal (STS) are a series of standards for digital trunk high-capacity circuits.
true
TCP/IP is the most widely used protocol suite on the Internet.
true
The Internet Corporation for Assigned Names and Numbers (ICANN) handles IP address assignment and dispute resolution.
true
The appropriate response to congestion consists of reducing the rate at which packets are being transmitted.
true
The designation 100BaseT uses Cat 5E cabling and runs at 100Mbps
true
The electromagnetic spectrum covers a wide range of wavelengths and photon energies.
true
The expense of packet switched technologies depend on the distances they span.
true
The fundamental delivery method used on the Internet is connectionless service.
true
The goal of a Wide Area Network (WAN) is to allow as many computers as possible to send packets simultaneously.
true
The purpose of spread spectrum techniques is to increase overall performance and make transmissions more immune to noise in a wireless environment.
true
Transport protocols do more than detect errors; transport protocols employ techniques that can repair or circumvent problems.
true
Zero compression eliminates long runs of zeroes in IPv6 addressing.
true
The IEEE addressing scheme support the following three address types
unicast, broadcast, multicast
IPv6 has the following address types
unicast, multicast, and anycast
Connections provided by TCP are achieved in software and are called
virtual connections
The terms client and server arose from
which side initiates contact
To control the flow of data, TCP uses a ____________ to measures in bytes the amount of buffer space available.
window
An optimization that replaces sequences of zeroes in an IPv6 addresses is called
zero compression