Chapter 1 Quiz
In computer networking, firewall can be deployed in _______ A. Routers B. End systems C. Servers D. All of them
All of them
Before sending a packet into a datagram network, the source must determine all of the links that packet will traverse between source and destination. (difficult question)
False
In computer networking, data cannot be sent over DSL phone line. T or F?
False
In computer networks, a packet will never be dropped even the buffer on a router is full. T or F?
False
In computer networks, routers are mainly used to control sending and receiving of messages. T or F?
False
Mobile networks are more flexible than home network, therefore, routers should not be used in mobile networks. T or F?
False
On the sender side of network communications, the data will go through the network layer first and then go through the transport layer. T or F?
False
In computer networking, the process of moving packets from a router's input to the appropriate router output is defined as _______. A. Delivering B. Forwarding C. Routing D. Storing
Forwarding
What is the data unit sent/received over the Link layer in OSI model ? A. Datagram B. Segment C. Frame D. Message
Frame
Which statement is True about the traceroute command?
It traces the routing path of a packet from source destination
Which option is NOT a networking protocol? A. POP3 B. TCP C. FTP D. MBP
MBP
Which type of data cannot be sent over cable network? A. Video B. Text C. Audio D. None of them
None of them
Which device is typically used to connect an Ethernet to an Internet Service Provider (ISP). A. End System B. Data Server C. Switch D. Router
Router
Which option is NOT a source of packet delay in computer networking? A. Propagation delay B. Transmission delay C. Nodal processing D. Segment delay
Segment Delay
In the OSI model, which layer is responsible for the process to process data transfer? A. Physical layer B. Network layer C. Transport layer D. Application layer
Transport Layer
Bandwidth is actually a metric to describe the capacity of a computer network. T or F?
True
Layers four and five of the Internet protocol stack are implemented in the end systems but not in the routers in the network core. (difficult question)
True
Personal devices, such as Tablets and Cell Phones, can be treated as end systems in the context of computer networking. T or F
True
Routing and Forwarding are the two key network-core functions. T or F?
True
In networking security, _______ refers to: attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic. A. RoS B. SoS C. NoS D. DoS
DoS