Chapter 1 Quiz

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

In computer networking, firewall can be deployed in _______ A. Routers B. End systems C. Servers D. All of them

All of them

Before sending a packet into a datagram network, the source must determine all of the links that packet will traverse between source and destination. (difficult question)

False

In computer networking, data cannot be sent over DSL phone line. T or F?

False

In computer networks, a packet will never be dropped even the buffer on a router is full. T or F?

False

In computer networks, routers are mainly used to control sending and receiving of messages. T or F?

False

Mobile networks are more flexible than home network, therefore, routers should not be used in mobile networks. T or F?

False

On the sender side of network communications, the data will go through the network layer first and then go through the transport layer. T or F?

False

In computer networking, the process of moving packets from a router's input to the appropriate router output is defined as _______. A. Delivering B. Forwarding C. Routing D. Storing

Forwarding

What is the data unit sent/received over the Link layer in OSI model ? A. Datagram B. Segment C. Frame D. Message

Frame

Which statement is True about the traceroute command?

It traces the routing path of a packet from source destination

Which option is NOT a networking protocol? A. POP3 B. TCP C. FTP D. MBP

MBP

Which type of data cannot be sent over cable network? A. Video B. Text C. Audio D. None of them

None of them

Which device is typically used to connect an Ethernet to an Internet Service Provider (ISP). A. End System B. Data Server C. Switch D. Router

Router

Which option is NOT a source of packet delay in computer networking? A. Propagation delay B. Transmission delay C. Nodal processing D. Segment delay

Segment Delay

In the OSI model, which layer is responsible for the process to process data transfer? A. Physical layer B. Network layer C. Transport layer D. Application layer

Transport Layer

Bandwidth is actually a metric to describe the capacity of a computer network. T or F?

True

Layers four and five of the Internet protocol stack are implemented in the end systems but not in the routers in the network core. (difficult question)

True

Personal devices, such as Tablets and Cell Phones, can be treated as end systems in the context of computer networking. T or F

True

Routing and Forwarding are the two key network-core functions. T or F?

True

In networking security, _______ refers to: attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic. A. RoS B. SoS C. NoS D. DoS

DoS


Kaugnay na mga set ng pag-aaral

Townsend Chapter 14 Table 14-8 Summary of symptoms Associated With the Syndromes of Intoxication and Withdrawal

View Set

Marvel Comics: Heroes and Villians

View Set

Difference Between Agile and Waterfall

View Set