Networking II Exam 1 Ch01
List the seven layers of the ISO/OSI network reference model in ascending order, starting with Layer 1.
7: Application 6: Presentation 5: Session 4: Transport 3: Network 2: Data Link 1: Physical (Please Do Not Throw Sausage Pizza Away)
Which of the following features are typical for most protocol analyzers? (Choose all that apply.) Decodes may be applied to packets in the trace buffer. Alarms may be set to flag unusual network events or conditions. Packet filters display various statistical reports and graphs based on traffic analysis. Packet filters may be applied to incoming data before capture, or to store data after capture. Packet filters include built-in trend analysis and capacity-planning tools.
Decodes may be applied to packets in the trace buffer. Alarms may be set to flag unusual network events or conditions. Packet filters display various statistical reports and graphs based on traffic analysis. Packet filters may be applied to incoming data before capture, or to store data after capture.
True or false? A Best Current Practice (BCP) RFC is a special form of Standard RFC.
False
True or false? RFC 5000 describes how an RFC is created and what processes it must go through to become an official standard, adopted by the IETF.
False
Which organization manages Internet domain names and network addresses?
ICANN
What version of IP supports 128-bit addresses?
IPv6
The ____ is where notions of network location are addressed and where the intricacies involved in directing a PDU from sender to receiver are handled.
Network layer
The ____ includes the physical transmission medium (cables or wireless media) that any network must use to send and receive the signals that constitute the physical expression of networked communications.
Physical Layer
Which of the following steps must a Standard RFC go through to become an official standard? (Choose all that apply.) Standard (sometimes called "Internet Standard") Proposed Standard Retired Standard Historic Standard Draft Standard
Standard (sometimes called Internet Standard) Proposed Standard Draft Standard
Which of the following milestone events for TCP/IP occurred in 1983? (Choose all that apply.) The Department of Defense mandates TCP/IP as the "official ARPANET protocol." TCP/IP appears in the 4.2BSD UNIX distribution. NSF launches the NSFNET. Initial development of name server technology occurs.
The Department of Defense mandates TCP/IP as the "official ARPANET protocol." TCP/IP appears in the 4.2BSD UNIX distribution. Initial development of name server technology occurs.
On any system, only those protocol numbers for protocols that are actually in use must be defined on that system. True or false?
True
True or false? A card that runs in promiscuous mode can capture broadcast packets.
True
True or false? A divide and conquer approach permits concerns related to networking hardware to be completely separated from those related to networking software.
True
True or false? When two or more RFCs cover the same topic, they usually also share the same title.
True
Which of the following TCP/IP protocols operate at the TCP/IP Transport layer? (Choose all that apply.) ARP PPP UDP TCP ICMP
UDP TCP
Many analyzers have configurable ____ that indicate unusual network events or errors.
alarms
Which of the following components operate at the Physical layer? (Choose all that apply.) cables segmentation and reassembly network interface cards (NICs) connectors
cables network interface cards (NICs) connectors
A packet filter that's applied to incoming data in a protocol analyzer may be called a _____. (Choose all that apply.) data filter egress filter post-filter capture filter pre-filter
capture filter pre-filter
What function(s) does the Session layer provide? (Choose all that apply.) checkpoint controls data format conversions segmentation and reassembly session setup, maintenance, and tear-down
checkpoint controls session setup, maintenance, and tear-down
The Session layer includes mechanisms to maintain reliable ongoing conversations, called ____________________.
checkpoints
Which of the following activities may occur during the protocol analysis process? (Choose all that apply.) decoding packets into readable form capturing packets "off the wire" gathering statistics retransmitting captured packets for testing tapping into network communications
decoding packets into readable form capturing packets "off the wire" gathering statistics tapping into network communications
Breaking up an incoming data stream so separate portions may be delivered to the correct applications is called ____________________.
demultiplexing
True or false? The Session layer is equipped to request retransmission of all erroneous or missing PDUs when reassembly is underway, so that it can guarantee reliable delivery of data from sender to receiver.
false
Data Link layer PDUs are called ____________________.
frames
Which terms represent parts of a PDU that are always present in any PDU? (Choose all that apply.) trailer header payload checksum
header payload
Devices that operate on the Internet are generically identified as ____________________.
hosts
The ____ is the parent organization for all the various Internet boards and task forces.
internet society
The ____________________ is the parent organization for all the various Internet boards and task forces.
internet society
The term ____________________ refers to a single logical network composed of multiple physical networks, which may all be at a single physical location, or spread among multiple physical locations.
internetwork
The primary function of the OSI Model's ____________________ layer is to provide a globally unique address to every host on the Internet and paths to and from hosts.
network
The OSI Model's ____________________ layer includes the physical transmission medium (cables or wireless media) that any network must use to send and receive the signals that constitute the physical expression of networked communications.
physical
Each TCP/IP service has an associated ____________________ that uses a 16-bit number to identify a specific process or service.
port address
The TCP/IP Application layer also is known as the ____ layer because this is where the protocol stack interfaces with applications or processes on a host machine.
process
____________________ is the process of tapping into the network communications system, capturing packets that cross the network, gathering network statistics, and decoding the packets into readable form.
protocol analysis
Which of the following items represent design goals that motivated the development of TCP/IP? (Choose all that apply.) robust network architecture support for long-haul connections high performance ability of dissimilar systems to exchange data reliable delivery mechanisms
robust network architecture support for long-haul connections ability of dissimilar systems to exchange data reliable delivery mechanisms
Which of the following terms is a synonym for a dynamically assigned port address, used to service a temporary TCP/IP connection for data exchange?
socket address
Which of the following statements represent benefits of a layered approach to networking? (Choose all that apply.) takes a big problem and breaks it into a series of smaller interrelated problems permits expertise to be applied from different disciplines for different layers allows individual layers to be insulated from one another permits hardware issues to be kept separate from software issues
takes a big problem and breaks it into a series of smaller interrelated problems permits expertise to be applied from different disciplines for different layers allows individual layers to be insulated from one another permits hardware issues to be kept separate from software issues (all)
A(n) ____ is holding area for packets copied off the network.
trace buffer
Many PDUs include a characteristic closing component called ____ that provides data integrity checks for the data portion of the PDU, known as the payload.
trailer