OMIS 460 Midterm Ch. 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Standards govern ________. A) semantics B) syntax C) both A and B D) neither A nor B

C) both A and B

The UDP ________. A) is unreliable B) has a checksum field C) both A and B D) neither A nor B

C) both A and B

________ read(s) the destination address in an Ethernet frame. A) The destination host B) Switches in the network C) both A and B D) neither A nor B

C) both A and B

The ________ contains the content being delivered by a message. A) address field B) header C) data field D) trailer

C) data field

Convert a decimal number 15 to the binary number. A) It is a binary number. B) 1100 C) 1101 D) 1111

D) 1111

_______ is placing a message in the data field of another message. A) Encoding B) Vertical communication C) Layering D) Encapsulation

D) Encapsulation

The application standard is almost always ________. A) HTTP B) TCP C) reliable D) None of the above is true.

D) None of the above is true.

Which of the following layers has more standards than the other three layers? A) data link B) Internet C) transport D) application

D) application

A codec ________. A) encodes voice sounds into digital signals for transmission B) encodes voice sounds into analog signals for transmission C) encrypts the signal D) converts binary voice signals into digital signals for transmission

D) converts binary voice signals into digital signals for transmission

If the destination host finds an error in an Ethernet frame, it ________. A) sends back a NAK B) sends back a ACK C) both A and B D) neither A nor B

D) neither A nor B

Which of the following is a socket? A) 80 B) 21 C) both A and B D) neither A nor B

D) neither A nor B

A sending host will retransmit a TCP segment if it ________. A) receives an ACK segment B) receives a NAC segment C) receives an RPT segment D) none of the above

D) none of the above

How many bytes will it take to transmit "Brain Dead" without the quotation marks? A) 2 B) 3 C) 9 D) none of the above

D) none of the above

If a destination host does not receive a segment, it will ________. A) transmit an ACK segment B) transmit a NAC segment C) transmit an RSND segment D) none of the above

D) none of the above

In HTTP headers, the end of a header field is usually indicated by a ________. A) . B) : C) ; D) none of the above

D) none of the above

Standards mean the same thing as ________. A) semantics B) syntax C) rules D) protocols

D) protocols

The meaning of a message is referred to as the message's ________. A) protocol B) order C) syntax D) semantics

D) semantics

A message's syntax is its ________. A) protocol B) message order C) meaning D) structure

D) structure

"Octet" is the same as ________. A) "bit" B) "byte" C) either A or B, depending on the context D) neither A nor B

B) "byte"

If someone says that a 1-bit flag is set, this means that it is given the value ________. A) 0 B) 1 C) either A or B D) neither A nor B

B) 1

Convert decimal 8 to binary. A) 100 B) 1000 C) 10000 D) 111

B) 1000

The five senses can be represented with a ________-bit field. A) 2 B) 3 C) 4 D) 5

B) 3

How long are IPv4 addresses? A) 4 bits B) 32 bits C) 48 bits D) 128 bits

B) 32 bits

EUI-48 addresses are ________. A) 32 bits long B) 48 bits long C) 128 bits long D) Address length varies.

B) 48 bits long

In HTTP, the end of a header field is usually indicated by a ________. A) bit position B) CRLF C) colon D) blank line

B) CRLF

For every conversation, a client randomly generates an ephemeral port number for ________. A) applications B) conversations C) both A and B D) neither A nor B

B) conversations

An HTTP response message usually has a ________. A) trailer B) data field C) both A and B D) neither A nor B

B) data field

After the Internet layer process does encapsulation, it passes the IP packet to the ________ layer process. A) transport B) data link C) physical D) none of the above

B) data link

2500 is in the range for ________ port numbers. A) well-known B) ephemeral C) both A and B D) neither A nor B

B) ephemeral

The range of port 1024 to port 4999 is the usual range for ________ port numbers. A) well-known B) ephemeral C) both A and B D) neither A nor B

B) ephemeral

TCP has six single-bit fields in headers and these single-bit fields are called ________ fields. A) port B) flag C) ACK D) binary

B) flag

After the side wishing to close a TCP connection sends a FIN segment, the other side will ________. A) not send any more segments B) only send ACK segments C) only send FIN segments D) none of the above

B) only send ACK segments

The destination socket is 60.171.18.22:161. The destination host is a(n) ________. A) client B) server C) well-known server D) ephemeral server

B) server

IP is ________. A) reliable B) unreliable C) semi-reliable D) unreliable or reliable depending on the situation

B) unreliable

UDP is ________. A) reliable B) unreliable C) It depends on the situation. D) none of the above

B) unreliable

The UDP has ________ fields. A) 4 B) 8 C) 16 D) 32

A) 4

How long are IPv4 addresses in octets? A) 4 octets B) 32 octets C) 48 octets D) 128 octets

A) 4 octets

Which of the following is an integer? A) 4,307 B) 45.7 C) both A and B D) neither A nor B

A) 4,307

Internet standards are published as ________. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols

A) RFCs

Which of the following is inside the header of messages? A) address field B) IP address field C) data field D) trailer

A) address field

At what layer is encoding done? A) application B) transport C) Internet D) none of the above

A) application

At which layer would you find file transfer protocol (FTP) standards for downloading files from an FTP server? A) application B) transport C) Internet D) none of the above

A) application

At which layer would you find standards for requesting videos from a video-sharing site such as YouTube? A) application B) transport C) Internet D) none of the above

A) application

On a server, well-known port numbers indicate ________. A) applications B) connections with client computers C) both A and B D) neither A nor B

A) applications

In HTTP, which program may initiate communication? A) browser B) Webserver program C) both A and B D) neither A nor B

A) browser

In an HTTP, which one (browser or Webserver application program) transmits message first? A) browser B) Webserver application program C) They transmit simultaneously. D) It depends on the situation.

A) browser

The source socket is 60.171.18.22:2707. The source host is a(n) ________. A) client B) server C) well-known server D) ephemeral server

A) client

The source socket is 60.171.18.22:2707. The source is a(n) ________. A) client B) server C) well-known server D) ephemeral server

A) client

To make a forwarding decision, a router looks at the arriving packet's ________. A) destination IP address B) destination EUI-48 address C) both A and B D) MAC addresses

A) destination IP address

Ethernet does ________. A) error detection B) error correction C) both A and B D) neither A nor B

A) error detection

A message always has a ________. A) header B) data field C) both A and B D) neither A nor B

A) header

An HTTP request message usually has a ________. A) header B) data field C) both A and B D) neither A nor B

A) header

After the data link layer process does encapsulation, it passes the IP packet to the ________ layer process. A) physical B) internet C) transport D) none of the above

A) physical

Which layer process does NOT do any encapsulation when an application layer process transmits a message? A) physical B) data link C) Internet D) All layers do encapsulation.

A) physical

TCP messages are called ________. A) segments B) fragments C) packets D) datagrams

A) segments

A 7-bit field can represent ________ alternatives or different combinations. A) 14 B) 49 C) 128 D) 256

C) 128

A 5-bit field can represent ________ alternatives or different combinations. A) 8 B) 16 C) 32 D) 64

C) 32

In IP, the first bit in the second row is ________. A) 0 B) 31 C) 32 D) 63

C) 32

Convert the binary number 100 to decimal. A) It is in decimal. B) 2 C) 4 D) 8

C) 4

To represent 65 alternatives, your alternatives field would have to be at least ________ bits long. A) 5 B) 6 C) 7 D) 8

C) 7

An EUI-48 address was formerly called a(n) ________ address. A) IPv4 B) IPv6 C) MAC D) DNS

C) MAC

Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment. A) ACK B) SYN C) SYN/ACK D) none of the above

C) SYN/ACK

The electrical signal generated by a microphone is called a(n) ________ signal. A) binary B) digital C) analog D) Either A or B.

C) analog

In a four-step close, which side transmits a FIN segment? A) the side that initiates the close B) the other side C) either side D) neither side

C) either side

Converting application messages into bits is called ________. A) encapsulation B) encryption C) encoding D) exchange

C) encoding

A message's semantics is its ________. A) protocol B) message order C) meaning D) structure

C) meaning

How a message is organized is its ________. A) protocol B) order C) syntax D) semantics

C) syntax

Which part of a message is less often in a message compared to the other two parts? A) header B) data field C) trailer D) All of the above are commonly seen in all messages.

C) trailer

If the destination host receives a segment that has an error, it will ________. A) transmit an ACK segment B) transmit a NAC segment C) transmit an RSND segment D) none of the above

C) transmit an RSND segment


Conjuntos de estudio relacionados

Chapter 7-2 Jewish Beliefs and Texts

View Set

Physics Chapter 4 Review Questions

View Set

incentive stock options (ISOs) non qualified stock options (NQSOs)

View Set

Antonomia y fisiologia genera Chp. 6 (milady)

View Set