MIS 410 CH2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

C) 4

57) Convert the binary number 100 to decimal. A) It is in decimal. B) 2 C) 4 D) 8

D) protocols

2) Standards mean the same thing as ________. A) semantics B) syntax C) rules D) protocols

B) "byte"

20) "Octet" is the same as ________. A) "bit" B) "byte" C) either A or B, depending on the context D) neither A nor B

B) flag

32) TCP has six single-bit fields in headers and these single-bit fields are called ________ fields. A) port B) flag C) ACK D) binary

B) 1

33) If someone says that a 1-bit flag is set, this means that it is given the value ________. A) 0 B) 1 C) either A or B D) neither A nor B

A) 4

34) The UDP has ________ fields. A) 4 B) 8 C) 16 D) 32

C) both A and B

35) The UDP ________. A) is unreliable B) has a checksum field C) both A and B D) neither A nor B

B) unreliable

36) UDP is ________. A) reliable B) unreliable C) It depends on the situation. D) none of the above

A) applications

37) On a server, well-known port numbers indicate ________. A) applications B) connections with client computers C) both A and B D) neither A nor B

A) RFCs

1) Internet standards are published as ________. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols

C) SYN/ACK

10) Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment. A) ACK B) SYN C) SYN/ACK D) none of the above

D) none of the above

11) If a destination host does not receive a segment, it will ________. A) transmit an ACK segment B) transmit a NAC segment C) transmit an RSND segment D) none of the above

C) transmit an RSND segment

12) If the destination host receives a segment that has an error, it will ________. A) transmit an ACK segment B) transmit a NAC segment C) transmit an RSND segment D) none of the above

D) none of the above

13) A sending host will retransmit a TCP segment if it ________. A) receives an ACK segment B) receives a NAC segment C) receives an RPT segment D) none of the above

C) either side

14) In a four-step close, which side transmits a FIN segment? A) the side that initiates the close B) the other side C) either side D) neither side

B) only send ACK segments

15) After the side wishing to close a TCP connection sends a FIN segment, the other side will ________. A) not send any more segments B) only send ACK segments C) only send FIN segments D) none of the above

A) address field

16) Which of the following is inside the header of messages? A) address field B) IP address field C) data field D) trailer

C) data field

17) The ________ contains the content being delivered by a message. A) address field B) header C) data field D) trailer

A) header

18) A message always has a ________. A) header B) data field C) both A and B D) neither A nor B

C) trailer

19) Which part of a message is less often in a message compared to the other two parts? A) header B) data field C) trailer D) All of the above are commonly seen in all messages.

B) 48 bits long

21) EUI-48 addresses are ________. A) 32 bits long B) 48 bits long C) 128 bits long D) Address length varies.

C) MAC

22) An EUI-48 address was formerly called a(n) ________ address. A) IPv4 B) IPv6 C) MAC D) DNS

C) both A and B

23) ________ read(s) the destination address in an Ethernet frame. A) The destination host B) Switches in the network C) both A and B D) neither A nor B

D) neither A nor B

24) If the destination host finds an error in an Ethernet frame, it ________. A) sends back a NAK B) sends back a ACK C) both A and B D) neither A nor B

A) error detection

25) Ethernet does ________. A) error detection B) error correction C) both A and B D) neither A nor B

C) 32

26) In IP, the first bit in the second row is ________. A) 0 B) 31 C) 32 D) 63

B) 32 bits

27) How long are IPv4 addresses? A) 4 bits B) 32 bits C) 48 bits D) 128 bits

A) 4 octets

28) How long are IPv4 addresses in octets? A) 4 octets B) 32 octets C) 48 octets D) 128 octets

A) destination IP address

29) To make a forwarding decision, a router looks at the arriving packet's ________. A) destination IP address B) destination EUI-48 address C) both A and B D) MAC addresses

C) both A and B

3) Standards govern ________. A) semantics B) syntax C) both A and B D) neither A nor B

B) unreliable

30) IP is ________. A) reliable B) unreliable C) semi-reliable D) unreliable or reliable depending on the situation

A) segments

31) TCP messages are called ________. A) segments B) fragments C) packets D) datagrams

B) conversations

38) For every conversation, a client randomly generates an ephemeral port number for ________. A) applications B) conversations C) both A and B D) neither A nor B

B) ephemeral

39) The range of port 1024 to port 4999 is the usual range for ________ port numbers. A) well-known B) ephemeral C) both A and B D) neither A nor B

D) semantics

4) The meaning of a message is referred to as the message's ________. A) protocol B) order C) syntax D) semantics

B) ephemeral

40) 2500 is in the range for ________ port numbers. A) well-known B) ephemeral C) both A and B D) neither A nor B

A) client

41) The source socket is 60.171.18.22:2707. The source is a(n) ________. A) client B) server C) well-known server D) ephemeral server

D) neither A nor B

42) Which of the following is a socket? A) 80 B) 21 C) both A and B D) neither A nor B

A) client

43) The source socket is 60.171.18.22:2707. The source host is a(n) ________. A) client B) server C) well-known server D) ephemeral server

B) server

44) The destination socket is 60.171.18.22:161. The destination host is a(n) ________. A) client B) server C) well-known server D) ephemeral server

D) None of the above is true.

45) The application standard is almost always ________. A) HTTP B) TCP C) reliable D) None of the above is true.

D) application

46) Which of the following layers has more standards than the other three layers? A) data link B) Internet C) transport D) application

A) application

47) At which layer would you find standards for requesting videos from a video-sharing site such as YouTube? A) application B) transport C) Internet D) none of the above

A) application

48) At which layer would you find file transfer protocol (FTP) standards for downloading files from an FTP server? A) application B) transport C) Internet D) none of the above

D) none of the above

49) In HTTP headers, the end of a header field is usually indicated by a ________. A) . B) : C) ; D) none of the above

C) syntax

5) How a message is organized is its ________. A) protocol B) order C) syntax D) semantics

B) CRLF

50) In HTTP, the end of a header field is usually indicated by a ________. A) bit position B) CRLF C) colon D) blank line

A) header

51) An HTTP request message usually has a ________. A) header B) data field C) both A and B D) neither A nor B

B) data field

52) An HTTP response message usually has a ________. A) trailer B) data field C) both A and B D) neither A nor B

C) encoding

53) Converting application messages into bits is called ________. A) encapsulation B) encryption C) encoding D) exchange

A) application

54) At what layer is encoding done? A) application B) transport C) Internet D) none of the above

D) none of the above

55) How many bytes will it take to transmit "Brain Dead" without the quotation marks? A) 2 B) 3 C) 9 D) none of the above

A) 4,307

56) Which of the following is an integer? A) 4,307 B) 45.7 C) both A and B D) neither A nor B

D) 1111

58) Convert a decimal number 15 to the binary number. A) It is a binary number. B) 1100 C) 1101 D) 1111

B) 1000

59) Convert decimal 8 to binary. A) 100 B) 1000 C) 10000 D) 111

C)Meaning

6) A message's semantics is its ________. A) protocol B) message order C)Meaning D) structure

C) 32

60) A 5-bit field can represent ________ alternatives or different combinations. A) 8 B) 16 C) 32 D) 64

C) 128

61) A 7-bit field can represent ________ alternatives or different combinations. A) 14 B) 49 C) 128 D) 256

C) 7

62) To represent 65 alternatives, your alternatives field would have to be at least ________ bits long. A) 5 B) 6 C) 7 D) 8

B) 3

63) The five senses can be represented with a ________-bit field. A) 2 B) 3 C) 4 D) 5

C) analog

64) The electrical signal generated by a microphone is called a(n) ________ signal. A) binary B) digital C) analog D) Either A or B.

D) converts binary voice signals into digital signals for transmission

65) A codec ________. A) encodes voice sounds into digital signals for transmission B) encodes voice sounds into analog signals for transmission C) encrypts the signal D) converts binary voice signals into digital signals for transmission

D) Encapsulation

66) ________ is placing a message in the data field of another message. A) Encoding B) Vertical communication C) Layering D) Encapsulation

B) data link

67) After the Internet layer process does encapsulation, it passes the IP packet to the ________ layer process. A) transport B) data link C) physical D) none of the above

A) physical

68) After the data link layer process does encapsulation, it passes the IP packet to the ________ layer process. A) physical B) internet C) transport D) none of the above

A) physical

69) Which layer process does NOT do any encapsulation when an application layer process transmits a message? A) physical B) data link C) Internet D) All layers do encapsulation.

D) structure

7) A message's syntax is its ________. A) protocol B) message order C) meaning D) structure

A) browser

8) In an HTTP, which one (browser or Webserver application program) transmits message first? A) browser B) Webserver application program C) They transmit simultaneously. D) It depends on the situation.

A) browser

9) In HTTP, which program may initiate communication? A) browser B) Webserver program C) both A and B D) neither A nor B


Ensembles d'études connexes

Marketing, the core-Berkoweitz-Chapter 4

View Set

Test 2- Lord Of The Flies- Chapters 5,6,7

View Set

2.) Culture, Individualism versus Collectivism, Cultural Imperialism

View Set

Module 11 control systems and fundamentals review and supplement questions

View Set

Nomenclature and Writing Chemical Formulas

View Set

Chapter 6: Challenges to Effective Drug Therapy

View Set

ch 5 Central Tendency and Variability

View Set

ATI HealthAssess 2.0 Head to toe assessment Learning Module Test

View Set