Chapter 3 Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are proprietary protocols? 1. Protocols developed by organizations who have control over their definition and operation. 2. A collection of protocols known as the TCP/IP protocol suite. 3. Protocols developed by private organizations to operate on any vendor hardware. 4. Protocols that can be freely used by any orgaanization or venndor

1

What is an advantage of network devices using open standard protocols? 1. A client host and a server running deifferent operating systems can successfully exchange data. 2. Competition and innovation are limited to specific types of products. 3. Network communications is confined to data transfers between devices from the same vendor. 4. Internet access can be controlled by a single ISP in each market.

1

Which three acronymus/initialisms represent standards organizations? 1. IANA 2. TCP/IP 3. IEEE 4. IETF 5. OSI 6. MAC

1, 3, 4

Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? 1. Application 2. Physical 3. Session 4. Presentation 5. Data link 6. Transport 7. Network

1, 3, 4

What type of delivery uses data link layer addresses? 1. Remote delivery 2. Local and remote delivery 3. Local delivery 4. Remote delivery using routers

3

Which PDU format is used when bits are received from the network medium by the NIC of a host? 1. File 2. Segment 3. Frame 4. Packet

3

Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model? 1. Bits 2. Frame 3. Segment 4. Packet

3

Why are open standards important in the data communications industry? 1. They are required for devices to gain access to the Internet. 2. They eliminate the threat of security breaches. 3. They enable interoperability between software and hardware from different vendors. 4. They encourage network organizations to develop proprietary software to retain their competitive edge.

3

What type of message is sent to a specific group of hosts? 1. Static 2. Unicast 3. Dynamic 4. Multicast 5. Broadcast

4

What will happen if the default gateway address is incorrectly configured on a host? 1. The host cannot communicate with other hosts in the local network. 2. The switch will not forward packets initiated by the host. 3. The host will have to use ARP to determine the correct address of the default gateway. 4. The host cannot communicate with hosts in other networks. 5. A ping from the host to 127.0.0.1 would not be successful

4

Which characteristic describes the default gateway of a host computer? 1. The logical address assigned to the switch interface connected to the router. 2. The physical address of the switch interface connected to the host computer 3. The physical address of the router interface on the same network as the host computer. 4. The logical address of the router interface on the same network as the host computer

4

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices? 1. Application 2. Presentation 3. Session 4. Transport 5. Network

4

Which message delivery option is used when all devices need to receive the same message simultaneously? 1. Duplex 2. Unicast 3. Multicast 4. Broadcast

4

Which statement is correct about network protocols? 1. Network protocols define the type of hardware thatt is used and how it is mounted in racks. 2. They only requirde forr exchange of messages between devices on remote networks. 3. Theey all function in the network access layer of TCP/IP. 4. They define how messages are exchanged between the source and the destination.

4

Which statement is true about the TCP/IP and OSI models? 1. The OSI Layer 7 and the TCP/IP application layer provide identical functions. 2. The first three OSI layers describe general services that are also provided by the TCP/IP internet layer. 3. The TCP/IP network access layer has similar functions to the OSI network layer. 4. The TCP/IP transport layer and OSI Layer 4 provide similar servicaes and functions

4

Fill in the blank. The MAC address of a PC does not change when the PC is moved to a different network because MAC address is embedded in the ______ of the PC

NIC

What type of communication will send a message to all devices on a local area network? 1. Multicast 2. Allcast 3. Broadcast 4. Unicast

3

Match the protocol function to the description while taking into consideartion that a network client is visiting a web site: 1. Preparing packets to be transmitted over the network media. 2. Managing the individual conversations between web servers and web clients. 3. Governing the way a web server and a web client interact. 4. Taking the segments from the transport protocol, encapsulating them into packets, and assigning them with appropriate addresses.

1. Network access protocol 2. Transport protocol 3. Application protocol 4. Internet protocol

At which layer of the OSI model would a physical address be encapsulated? 1. Physical layer 2. Data link layer 3. Network layer 4. Transport layer

2

If host on one network transfer file to the host on another network, what layers of the TCP/IP model would be used? 1. Only application and internet layers 2. Application, transport, internet, and network access layers 3. Only application, internet, and network access layers 4. Application, session, transport, network, data link, and physical layers 5. Only internet and network access layers 6. Only application, transport, network, data link, and physical layers

2

If the default gateway is configured incarrectly on the host, what is the impact on communications? 1. The host is unable to communicate on the local network. 2. The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks. 3. The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network. 4. There is no impact on communications

2

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly? 1. Access method 2. Flow control 3. Encapsulation 4. Response timeout

2

Which logical address is used for delivery of data to a remote network? 1. Destination MAC address 2. Destination IP address 3. Destination port number 4. Source MAC address 5. Source IP address

2

What three requirements are defined by the protocols used in network communications to allow message transmission across a network? 1. Connector specifications 2. Message encoding 3. Media selection 4. Message size 5. Delivery options 6. End-device installation

2, 4, 5

A web client is sending a request for a web page to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission? 1. Ethernet, TCP, IP, HTTP 2. Ethernet, IP, TCP, HTTP 3. HTTP, TCP, IP, Ethernet 4. HTTP, IP, TCP, Ethernet

3

At which layer of the OSI model would a logical address be added during encapsulation? 1. Data link layer 2. Transport layer 3. Network layer 4. Physical layer

3

What is an advantage of using standards to develop and implement protocols? 1. Standards provide flexibility for manufacturers to create devices that comply with unique requirements. 2. Different manufacturers are free to apply different requirements when implementing a protocol. 3. Products from differnet manufacturers can interoperate successfully. 4. A particular protocol can only be implemented by one manufacturer

3

What is the general term that is used to describe a piece of data at any layer of a networking model? 1. Frame 2. Packet 3. Protocol data unit 4. Segment

3

What is the purpose of protocols in data communications? 1. Specifying the bandwidth of the channel or medium for each type of communication. 2. Specifying the device operating systems that will support the communication 3. Providing the rules required for a specific type of communication to occur 4. Dictating the content of the message sent during communication

3

What layer of the TCP/IP protocol model determines the best path through the network? 1. Application 2. Transport 3. Internet 4. Network access

3

What process is used to place one message inside another message for transfer from the source to the destination? 1. Decoding 2. Flow control 3. Encapsulation 4. Access control

3

Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.) 1. A frame with the destination MAC address of SwitchA. 2. A packet with the destination IP address of RouterA. 3. A frame with the destination MAC address of ServerB. 4. A packet with the destination IP address of ServerB. 5. A frame with the destination MAC address of RouterA. 6. A packet with the destination IP address of RouterB

4, 5

What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.) 1. PPP 2. ARP 3. NAT 4. DHCP 5. FTP 6. DNS

4, 5, 6

Which address does a NIC use when deciding whether to accept a frame? 1. Source Ethernet address 2. Source IP address 3. Destination IP address 4. Source MAC address 5. destination MAC address

5


Ensembles d'études connexes

Accounting 2301 Exam 1 (Chapters 1-3)

View Set

Chapter 6 Business Level Strategy

View Set

Maternal-Neonatal Nursing - Intrapartum Period

View Set

Chapter 11: America Comes of Age + 10.3 (Corruption Plagues the Nation)

View Set

Chapter 17-2 Reading Guide: War Affects Society

View Set

Audit Ch 13 - PPE; depreciation and depletion

View Set

9.3 Spanish II ¿Qué? and ¿cuál?

View Set