cs355

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Classful Addressing: Number of IP Addresses What is the total number of distinct Class B IPv4 addresses?

2^14 x 2^16

IPv6 Colon-Hex Notation Without Zero Compression, how many colons should appear in the Colon-Hex notation for an IPv6 address?

7.0

JavaScript mixed addition In JavaScript, what are the respective values of 3 + 4 + "5" and 3 + 4 + +"5"

75 and 12

OAuth In the OAuth, "secure access delegation" process, AS stands for which of the following?

Authorization Server

Hashing As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not include information previously shared / agreed upon by the sender and receiver.)

B Hash result H D Message M

Data Compression: Image/Video File Formats Which of the following file formats for images and video are generally considered "lossy"?

A GIF C JPEG E MPEG

Data Compression Which of the following are lossless data-compression schemes?

A Huffman Coding B Lempel-Ziv-Welch C Run-Length Encoding

SSH Which of the following SSH message components get encrypted?

B Padding C Type D Data E CRC

Linear Predictive Coding For which type of data is the technique "Linear Predictive Coding" particularly well suited?

Audio

Data Compression Techniques Which of these underlying data compression techniques are considered "lossless"?

B Run-Length Encoding C Arithmetic Encoding E Huffman Coding G Lempel-Ziv-Welch

Virtual Private Networks (VPNs) Which are associated with Virtual Private Networks

B increased latency D Increased fragmentation

IGP Which is NOT an example of an Interior Gateway Protocol?

Border Gateway Protocol (BGP)

Styling Hierarchy Organize the styling options in increasing order of priority (lowest on top, highest on bottom)

Browser External style-sheet Internal style-sheet Inline

Data Compression: Audio File Formats Which of the following file formats for audio are generally considered "lossless"?

C ALAC E FLAC F WAV

Run Length Encoding: Application For which types of data would run-length encoding be well suited?

C An advertisement sent by fax D Image of chalk writing on blackboard E Image of black writing on whiteboard

Classful Address Class To which class does the (classful) address 220.221.222.223 belong?

Class C

Classful Address Class To which class does the (classful) address 223.1.2.3 belong?

Class C

Client-Server Architecture In a Client-Server architecture, which can initiate a connection?

Client

Handing Real-Time Data Which two of the following tasks, required for handling real-time data, is provided by Transmission Control Protocol (TCP)? (Hint: go back to lecture on TCP or read ahead in the slides...)

D Error control E Congestion control

QoS and IP Packet Which header element in the IP packet is most closely associated with QoS?

DSCP

Port Notation What is the highest possible port number, specified in Hexadecimal?

FFFF

JavaScript files Which best describes how many JavaScript files can be referenced in an HTML file?

0 or more

JPEG Compression What is the sequence of channels (steps) in JPEG Compression and Decompression

1 A Transformer 2 C Quantizer 3 B Encoder 4 D Decoder 5 F Dequantizer 6 E Inverse Transformer

Stop-and-Wait In the Stop-and-Wait flow-control protocol, what best describes the sender's (S) and receiver's (R) respective window sizes?

S = 1, R = 1

Multi-homing protocol Which protocol provides multi-homing and redundant paths to increase resilience and reliability?

SCTP

Network Topology Which network topology is most associated with ethernet media 10/100/100-BASE?

Star

Resource Reservation Protocol (RSVP) With which TCP/IP layer is the RSVP most associated?

Transport

Socket Interface Position The "socket interface" generally sits atop which of the following five layers of the TCP/IP network model.

Transport

SP20 - Logical/Physical Connections Which layers use logical rather than physical connections?

Transport Network Application

Best-Effort Delivery Which protocol(s) should be considered only "Best-Effort Delivery" (as opposed to "Reliable")?

UDP, IP

Multi-Protocol Label Switching (MPLS) Which is not true of Multi-Protocol Label Switching

Uses long network addresses to precisely identify network nodes

Deep Packet Inspection What is Deep Packet Inspection most likely to search for?

Virus

IP-in-IP Tunneling Which best describes the security technique IP-in-IP Tunneling?

an encrypted IP datagram is encapsulated inside an unencrypted IP datagram

Multi-Tier Architecture What is the maximum number of tiers allowed in an architecture

arbitrarily many

Huffman Decoding Assuming the Huffman tree below, what is the decoding of the binary string 111011100011011100010

astute

SP20 - Stream Paradigm Which is/are characteristic of the "stream paradigm"?

connection-oriented sends sequences of individual bits arbitary length transfer

JavaScript: Change HTML Which syntax should be used to change the HTML of an element with id "lion" to "tiger"?

document.getElementById("lion").innerHTML= "tiger"

IGMP Purpose What is the purpose of the protocol IGMP?

establish multicast memberships for hosts and adjacent routers

Get IP address in Java Which method should be used - in conjunction with the class in the previous question - to get a IPv4 address from a domain name?

getByName(domain_name)

Get current device address Which method should be used in java - in conjunction with the aforementioned class - to determine the IPv4 address of the current device?

getLocalHost()

HTML Input Tag Which is not a type of input tag in HTML

meta

JSON Data Types In JavaScript Object Notation (JSON), a value may be which of the following data types?

null boolean JSON object

JavaScript Data Types Which are valid (primitive) datatypes in JavaScript?

number string boolean null undefined symbol

CAT-n cables What best describes the primary difference between categories of Ethernet cables (CAT-n)?

speed

SAX Which is not characteristic of the "Simple API for XML" (SAX)?

supports random-access to the document

DOM Referencing Object Which is not a referencing object in the Document Object Model (DOM)?

tag

MAC Address Which best describes the division of bits in a MAC address of a network interface controller?

the prefix represents the manufacturer and the suffix represents the device

XML Well-Formed Which feature of XML does not directly contribute to it being well-formed?

the structure matches a document-type definition

Font Hierachy In the CSS line "font-family: f1, f2, f3", what is usage of f1, f2, and f3

use f1 if available, otherwise f2, otherwise f3

Delay-Throughput Product Suppose the delay-throughput product for mobile service is 600 kb and the throughput is 6Mb/s. What is the delay?

.1 s

Arithmetic Encoding Consider the simple alphabet ​[A,B,C,D] with corresponding probabilities of occurrence of ​[.1, .2, .3,.4]. What are the beginning and ending points of the interval associated with the string CAD in the data compression technique "Arithmetic Encoding"?

.318 or .33

Interval to Binary Which binary representation - interpreted as a fraction - corresponds to a number in the interval ​[.4321, .4567)

0111

Port Numbers Match the port number range with its description

1 0-1023 D well-known ports 2 1024-49151 C registered ports 3 49152-65535 A ephemeral ports 4 65536-1048575 B imaginary ports

Fine-Grain QOS Match the Fine-Grain QoS acronym with its description

1 ABR D flow agrees to use whatever bit rate is available 2 CBR B data enters the flow at a fixed bit rate 3 UBR C no bit rate is specified 4 VBR A data enters the flow within specified statistical bounds

Delay Match the type of delay with its description

1 Access Delay D time to enter to transmission medium 2 Propagation Delay A time for signal to travel across transmission medium 3 Queuing Delay E time packet spends in router waiting for selection 4 Server Delay B time for server to respond to a request 5 Switching Delay C time for router to forward a packet once selected

Software Development Methodologies Match the software development methodology with its description

1 Agile B adaptive approach that responds favorably to changes and allows for direct communication to maintain transparency 2 Waterfall C strict linear approach with very distinct stages and deadlines 3 Lean D low-budget approach adapted from manufacturing to software development 4 Spiral E start with smaller scale problems; explore issues and risk; and gradually increase size and complexity 5 Rational Unified Process A rigid approach with focus on precise documentation

Signals Match the term with the definition

1 Amplitude B extent of movement of signal from mean position to extreme 2 Frequency A the number of signal waves that pass a fixed place in a given amount of time 3 Period D time required to complete one full cycle of a pattern 4 Digital E signal represent data as a sequence of discrete values 5 Analog C continuous signal that contains constant fluctuations

QoS Algorithm What is the order of the four main steps of a QoS algorithm?

1 B Classification and Policing 2 D Forwarding Computation 3 C Output Queueing 4 A Traffic Scheduling

Network Topologies What are the network topologies illustrated from left to right?

1 B Star 2 C Mesh 3 D Bus 4 E Ring 5 A Fully Connected

Transmission Match the term with its description

1 Bandwidth A amount of data that can be transmitted in a channel in a fixed amount of time 2 Throughput C amount of data that actually gets transmitted through the channel in a fixed amount of time 3 Goodput B amount of usable data that actually gets transmitted through the channel in a fixed amount of time

Hackers Match the hacker hat-color with its description

1 Black D penetrate systems with malicious or criminal intent 2 White B assess vulnerabilities before they are exposed by malicious hackers 3 Red E security consultants who offer hacking services for assessing vulnerabilities 4 Blue A consultants from outside the computer industry who looks for exploits that need to be fixed 5 Gray C may violate ethical standards with their hacking but do not have malicious intent

Data Protection Principles In the context of data protection, match the acronym CIA with what it stands for:

1 C C Confidentiality 2 I F Integrity 3 A E Availability

Software Design Considerations, Part I Match the design consideration with its description

1 Compatibility E operates with older or other products 2 Extensibility F new capabilities can be easily added 3 Modularity C comprises well-defined independent components 4 Fault-tolerance D resistant to component failure 5 Maintainability A easy to apply bug fixes or functional modifications 6 Durability B software can endure for a sufficiently long time

Client-Side Socket Program for UDP What is a typical sequence of commands for the client-side socket program for UDP?

1 D makeRequest() 2 A sendRequest() 3 E getResponse() 4 C useResponse() 5 B close()

Character Sets Match the character set with the (minimum) number of bits required to support it

1 Decimal E 4 2 Binary H 1 3 ASCII C 7 4 English Alphabet (uppercase) I 5 5 Octal A 3 6 UTF-16 D 16 7 Base-64 G 6 8 Hexadecimal F 4 9 Extended ASCII B 8

Private Key Encryption In Private Key Encryption, who knows the encryption and decryption keys?

1 Encryption Kay B Sender and Receiver 2 Decryption Key E Sender and Receiver

Digital Signatures For Digital Signatures, who knows the encryption and decryption keys?

1 Encryption Kay C Sender only 2 Decryption Key F Entire world

Public Key Encryption In Public Key Encryption, who knows the encryption and decryption keys?

1 Encryption Kay F Entire world 2 Decryption Key A Receiver only

FCAPS Match the letter with the represented task

1 F C error detection and correction 2 C D structuring and operating network 3 A E billing and accounting 4 P A assess and optimize resource utilization 5 S B defend against cyber attacks

Security Techniques Match the security technique with its purpose

1 Hashing G data integrity 2 Encryption B privacy 3 Digital Signature E message authentication 4 Digital Certificate F sender authentication 5 Firewall A site integrity 6 Intrusion Detection Sysem C site integrity 7 Deep Packet Inspection H site integrity 8 Virtual Private Network D Data confidentiality

Data Compression Match the data compression name with the underlying technique

1 Huffman Coding B Statistical 2 Lempel-Ziv-Welch C Dictionary 3 Run-Length Coding A Sequence

Data Compression Approaches Match the data compression name with the underlying approach

1 Huffman Coding A Statistical 2 Lempel-Ziv-Welch B Dictionary 3 Run-Length Coding C Sequence 4 Arithmetic Encoding F Interval 5 Delta Modulation D Differences 6 JPEG E Quantization

Wireless Standards Match the wireless standard with its name

1 IEEE 802.11 BWireless Local Area Network (WLAN / WiFi) 2 IEEE 802.15 A Wireless Personal-Area Network (WPAN) 3 IEEE 802.16 C Worldwide Interoperability for Microwave Access (WiMax)

Rational Unified Process (RUP) Match the project development phase with its description

1 Inception C scope the system sufficiently to determine cost and budget 2 Elaboration B domain analysis; define architecture; identify and mitigate risk items such that the project starts to take shape 3 Construction A build the software system; develop components and features; covers most of the coding 4 Transition D move system into production; train users; beta testing against user expectations; check that quality matches that required

MVP What does MVP stand for in the MVP framework?

1 M I Model 2 V G View 3 P F Presenter

Major Security Problems Match the security problem with its description

1 Phishing E masquerading as a well-known site to obtain a user's personal information 2 Misrepresentation B making false or exaggerated claims about goods or services or delivering fake or inferior products 3 Scams D trickery intended to deceive naive users into investing money or abetting a crime 4 Denial of Service A intentionally blocking a particular Internet site to hinder business activities 5 Loss of Control F intruder gains control of a user's computer and uses it to perpetuate a crime 6 Loss of Data C loss of intellectual property or other valuable proprietary information

Data Validation For a three-tier architecture, match the layer of data validation with its specific benefit

1 Presentation Layer C quickly catches obvious data errors and thereby avoids unnecessary and expensive interactions with other layers 2 Middle Layer A groups data validation with other business logic 3 Data-Access (Database) Layer B prevents bad data being persistently stored regardless of how it got there

Security Protocols Match the security protocol with its description

1 Pretty Good Privacy (PGP) A encrypt data before transmission 2 Secure Shell (SSH) E remote login protocol with encryption 3 Secure Socket layer (SSL) C authentication and confidentiality for web-based financial transactions 4 HTTP Security (HTTPS) F web request protocol combined with SSH/TSL 5 IP security (IPsecurity) B security used with IP datagrams 6 Wired Equivalent Privacy (WEP) D standard for WiFi transmissions

Software Development Activities Per the slides and assuming a linear process (one pass through the development cycle), what is a likely order of the following software development activities?

1 Processes 2 Requirements Analysis 3 Design 4 Engineering 5 Construction 6 Testing 7 Debugging 8 Deployment 9 Maintenance

Real-Time Protocols Match the real-time protocol with its purpose

1 Real-time Transport Protocol (RTP) Bdeliver media over IP network 2 RTP Control Protocol (RTCP) C provide feedback on QoS in media distribution 3 Real Time Streaming Protocol (RTSP) D control media sessions between endpoints

Network Elements Match each network element with its purpose

1 Switch I connects two or more network slices or devices 2 Wireless Access Point G allows devices to connect through unguided media 3 Modem E transmits and receives data over a communication channel 4 DHCP Server J provides permanent or leased IP addresses to devices on a network 5 Web Server D processes and responds to incoming network requests over HTTP and related protocols 6 IP Router H forward packets within or outside of a network 7 Firewall A monitors and controls incoming and outgoing network traffic 8 DSLAM F uses multiplexing techniques to take phone signals and place on backbone line 9 DNS Server C finds IP address associated with domain name 10 Load Balancer B redistributes network traffic across a number of servers

QoS Scheduling Match the QoS scheduling algorithm with its description

1 Token Bucket C allows a queue to send data at a fixed rate by incrementing a bit counter periodically and using the counter to control transmission 2 Leaky Bucket B allows a queue to send packets at a fixed rate by incrementing a packet counter periodically and using the counter to control transmission 3 Deficit Round Robin D selects packets from a set of queues based on bytes 4 Weighted Round Robin A selects packets from a set of queues assuming uniform packet size

Software Design Considerations, Part II Match the design consideration with its description

1 Usability E user interface accommodates its target audience 2 Performance F completes tasks within acceptable space and time 3 Portability D can be used across various environments 4 Scalability G adapts to increasing data and number of users 5 Security C withstands malicious/criminal acts 6 Reusability B use aspects of this software in other projects 7 Robustness A operates under stress and unpredictable input

Testing Pyramid Rank the following in increasing order of test coverage

1 User Interface (UI) Tests 2 Integration Tests 3 Unit Tests

IPv4 Datagram Format Match the IP datagram header component with its description

1 Version G whether IPv4 or IPv6 2 IHL F number of 32-bit words in the header 3 DSField E specify type of service for prioritization 4 Identification A unique datagram sequence number 5 Flags / Fragment D whether datagram can be broken into chunks 6 TTL I maximum number of router hops remaining 7 Protocol C TCP or UDP 8 Header Checksum H redundant bits used for validating data integrity 9 Options B supplementary information such as timestamp arrivals at routers

Attack Techniques Match the attach technique with its description

1 Wiretapping J Making a copy of packets as they traverse a network 2 Replay B Sending packets captured from a previous session 3 Buffer Overflow G Sending more data than a receiver expects and can handle 4 Address Spoofing H Faking the IP source of a packet to trick a receiver into processing the packet 5 Name Spoofing C Using a misspelling of a well-known name or or poisoning a name server with an incorrect binding 6 DoS and DDoS E sending a site an excessive amount of packets from one or many locations in order to prevent the site from conducting normal business 7 SYN Flood A sending a stream of random TCP connection requests to exhaust its connection pool 8 Password Breaking I automated process of guessing credentials to gain unauthorized access 9 Port Scanning D attempt to connect to each possible protocol service on a host to find a vulnerability 10 Packet Interception F removing or replacing a packet from the Internet

Run-Length Encoding -Decompression Using Run-Length Encoding as described in the slides, what is the total number of bits after decoding / decompressing representation 4 2 0 1 3?

14

Compression Rate Assuming an ASCII character set of 128 characters, and an uncompressed text of 1000 characters which was compressed to 6000 bits, which best approximates he compression rate of the compression algorithm being used?

1.17

Huffman Coding Suppose you have an alphabet ​[A, B, C] with respective frequencies ​[35, 40, 25]. What will be the binary representation of the word CAB in Huffman Coding? (Use the assumptions/conventions discussed in class.)

10110

Subnet Hosts Given a subnet mask of 255.255.252.0, how many hosts are available in the subnet?

1022

Cyclic Redundancy Check (CRC) In a CRC with generator polynomial x^3 + x^2 + 1, what is the associated 4-bit key? Assume the most-significant-bit-first-code (MSB) implicitly used in class.

1101

Cyclic Redundancy Check (CRC) In a CRC with generator polynomial x^3 + x^2 + 1, what is the associated key? Assume the most-significant-bit-first-code (MSB) approach used in class.

1101

3-Way Handshake How many combined SYN and ACK are sent if there are two connections, each with its own 3-way handshake startup and graceful shutdown?

16

LZW Compression Consider a simple alphabet ​[A, B, C]. In LZW compression, assuming the dictionary gets prepopulated with the entire alphabet, how would you compress (represent) the string CABABA?

2 0 1 4 0

IP Addresses - Shared Mask If two IP addresses on the same subnet are 250.252.251.100 and 250.252.252.101, what is the largest mask they can share (measured in bits)?

21

Network Mask Which are valid network masks for IPv4 addresses?

255.240.0.0 255.255.255.0 255.255.0.0

Transmission Time What is the approximate time to transmit a color image of a screenshot of the entire screen with resolution 1280 x 1024, assuming a transmission speed of 1Mbps?

30 seconds

Transmission Rate Without data compression, and focusing only on the data itself without any overhead, what transmission rate is required to send 30 frames per second of gray-scale images with resolution 1280 x 1024?

315 Mbps

HTTP GET How many HTTP GET requests are required to get an HTML file with references to 1 external JavaScript file, 2 JPEG image files, and 3 hyperlinks?

4

IPv4 and IPv6 addresses What are the respective number of bytes in IPv4 and IPv6 internet addresses?

4 and 2^4

IPv6 Address Suppose that an IPv6 address has a subnet id with 16 bits. How many bits are in its global prefix id?

48

Playing back packets Suppose that a server sends four packets of audio data, in 15 seconds each. The first is sent by the server exactly at noon (12:00:00), while each of the three successive packets is sent immediately after the completion of its predecessor. The client, on the other hand, receives the four packets beginning at 12:00:02, 12:00:20, 12:00:42, 12:01:02 respectively. What is the smallest delayed wait time in seconds that the client can use to ensure seamless playback?

7

IPv6 Zero Compression How many hexadecimal zeros are implied by the Zero Compression double-colon (::) in the right end of the IPv6 address 2001:0DBB:B13E:AC10:FA24:FE01::?

8

CSS Grid VIew Assuming CSS as in the image, what width (as a percentage 0-100) will be used on a desktop by the two div tags in <div class="col-3>text</div> <div class="col-7>more text</div>

83.33

Cyberattack Impact Which of the following are concerns with cyber attacks on business?

A Damage to reputation B Loss of customer confidence C Stolen intellectual property D Prevention of customer access

Network Mask Which are valid network masks for IPv4 addresses?

A 255.0.0.0 B 255.255.0.0 C 255.255.255.0 E 255.192.0.0

JavaScript equality Which of the following return true?

A 77 == '77' C false == 0

Socket Programming Approaches Which approaches to UDP and TCP socket programs are discussed in the slides?

A Concurrent Approach for UDP B Iterative Approach for UDP D Concurrent Approach for TCP E Iterative Approach for TCP

Management Information Base Which of the following are true of Management Information Base (MIB)

A Versions defined both by IETF and private enterprises B Most associated with Simple Network Management Protocol (SNMP) C Objects represented using Abstract Syntax Notation One (ASN.1) D Supports both scalar (single) and tabular (multiple) objects E Store information about UDP TCP IP ARP routers modems and printers

Server-Side Socket Program for UDP Which of the following are typically included in the server-side socket program for UDP?

A getRequest() - receive the request C process() - prepare what is going to be sent E sendResponse() - send the response

Javascript placement In which higher-level tag of the HTML file can JavaScript go

A head C body

InetSocketAddress Which parameter(s) CAN be provided to instantiate InetSocketAddress in java?

A host's domain name as string B host's IP address as string C host's IP address as InetAddress E host's port as integer

Socket Program Connection for TCP Which of the following uniquely determine the socket connection for TCP?

A local IP address B local port D remote IP address E remote port

Fiber-Optic Cable Which are true of fiber optic cables?

A low noise immunity B high bandwidth D requires special handling

More JavaScript equality Which of the following return true?

A null == null B null == undefined

Firewalls Which are goals of firewalls?

A prevent outsiders to probe the network and discover its topology B prevent outsiders from sending excessive packets into the network C prevent outsiders from sending viruses into the network D prevent insiders from sending valuable data out of the network

Man-in-the-Middle Which are examples of "Man in the Middle" attack?

A record sent passwords B alter packets C misdirect transaction D impersonate a service E scan ports

Base64 Encoding How would you represent a single cyan-colored pixel in Base64 encoding? (Hint: first think about how to represent cyan as a three-byte binary number, and then do the Base64 encoding from the lecture.)

AP//

SP20 - OSI Model From TOP to BOTTOM, what is the order of these seven layers of the OSI Model?

Application Presentation Session Transport Network Data Link Physical

Socket Class - UDP Which Java class is typically used for socket programming in conjunction with UDP?

DatagramSocket

ARP Which best describes the purpose of Address Resolution Protocol

Determine a MAC address from an IP address

Secure Hash Algorithm (SHA) Which are true of Secure Hash Algorithm (SHA)?

E Was developed by the NSA and NIST F The size of the output is independent of the size of the input

Test Client-Server Connection What is the common name for a server program used to test if the connection between a client and a server is successful, by simply responding with what was sent?

Echo

UDP Datagram Address Which addresses MUST appear in the actual header of a UDP datagram?

G Source Port address I Destination Port address

HTTP Request Methods 1/1 point Match the HTTP request method with its description

GET -> request a specified resource HEAD -> request a specified resource without the body POST -> request that the server accept an entity PUT -> request that the server accept an entity and place under specified URI DELETE -> remove the specified resource TRACE -> echo a received request so client can see what changes have occurred among intermediate servers OPTIONS -> return the HTTP methods that the server supports for the specified URL CONNECT ->convert the request connection to a TCP/IP tunnel PATCH -> apply partial modifications to a resource

IGP vs. EGP Which is true of Interior Gateway Protocol (IGP) compared to an Exterior Gateway Protocol (EGP)?

IGPs report more detailed routing information than EGPs

Caesar Cipher Assuming a Caesar Cipher with a shift of 23, how do you decode the cipher FKQBOKBQ

INTERNET

Firewall Packet Filter Suppose that IP address 192.5.48.4 refers to a host running SSH? Which filter parameters should most likely be used on incoming traffic to that address?

IP Type = TCP and Dest Port = 22

NAT In Network Address Translation (NAT), which IP addresses need to get replaced?

IP source on outgoing datagram and IP destination on incoming datagram

SP20 - Addresses Match the addressing scheme with its size in bits

IPv6 -> 128 IPv4 -> 32 MAC -> 48 Port -> 16

Internet Organizations Match the organization with its function

ISO-> developed OSI model of internet W3C -> regulate standards such as HTML CSS and XML ICANN -> maintain namespaces and numerical spaces of internet IEEE -> maintain standards for low-level such as wired and wireless connections IETF -> promote standards such as the TCP/IP protocol suite

IP Address in Java Which class traditionally represents an IPv4 Address (alone) in Java

InetAddress

Layers - MAC Address What is the highest (uppermost) layer of the TCP/IP model to use physical (MAC) addresses?

Layer 2 - Data Link

IGMP - Layer With which layer is IGMP most associated?

Layer 3

Encoding What is the ten-letter word for the encoding of data bits as either low-to-high or high-to-low, also known as Phase Encoding?

Manchester

Auto-Configuration Which best describes "Auto-Configuration" discussed in our course?

Map a MAC address into an IPv6 address

Model-View Controller In the Model View Controller architecture, which part is traditionally most closely connected to the database?

Model

JSON Properties Which is/are true of JSON?

More concise than XML Supports arrays

Network Masking Given a destination address (D), a network prefix (N), and an address mask (M), which comparison should be used to determine whether the destination lies on the network? (Let | denote OR, and let & denote AND

N == (D & M)

Network Masking Given a destination address (D), a network prefix (N), and an address mask (M), which comparison should be used to determine whether the destination lies on the network? (Let | denote OR, and let & denote AND)

N == (D & M)

Protocol Stack Match the OSI Layer with a representative protocol

Network -> ICMP Session -> FTP Transport -> TCP Physical -> CAT-5 Presentation -> MPEG Application -> HTTP Data Link -> RARP

SP20 - TCP/IP PDU Match the TCP/IP layer with the corresponding Protocol Data Unit

Network -> Packet Data Link -> Frame Application -> Message Transport -> Segment Physical -> Bit

Determine your MAC address How can you find your MAC address on a Windows machine?

Open a CMD prompt and type "ipconfig /all"

Architecture for Compiler Which architecture is most typified in the consecutive processes of a compiler that perform lexical analysis, parsing, semantic analysis, and ultimately code generation?

Pipes and Filters

SP20 - Process Address Which address is most specifically used to identify the Process?

Port

Service Address Which address is used to specify the Service?

Port

RSA What does the cryptographic technique RSA stand for?

Rivest, Shamir, Adelman

SW / CC What are the respective goals of the Sliding Window (SW) and Congestion Control (CC) algorithms?

SW aims to speeds up the flow of data, while CC aims to slow down the flow of data

Socket Class - TCP Which Java class is typically used for socket programming in conjunction with TCP?

ServerSocket

Feature Drive Development Which is NOT formally one of the five main procedures in Feature Driven Development

Test by Feature

Internets Who is credited with inventing internets?

The Defense Dept. in the late 1960s

Intrusion Detection System Which is least likely to be what an Intrusion Detection System aims to detect?

Time-to-Live Expiration

UTP What is UTP, discussed in class

a medium of unprotected wires divided into groups

Socket Programming: Server Side Ignoring error handling, which method should go in the XXXXX to allow this server code to function? int portNumber =7654;ServerSocket serverSocket = new ServerSocket(portNumber);Socket clientSocket = serverSocket.XXXXX();PrintWriter out = new PrintWriter(clientSocket.getOutputStream(), true);BufferedReader in = new BufferedReader(new InputStreamReader(clientSocket.getInputStream()));

accept

RARP What does the Reverse Address Resolution Protocol aim to determine?

an IP address associated with a given MAC address

Colors Matching Match the color with the hexadecimal code

black -> 000000 white -> FFFFFF red -> FF0000 green -> 00FF00 blue -> 0000FF

SOA Which goal is relatively deemphasized according to the "SOA Manifesto"

client-specific optimizations

InetSocketAddress - Required Which parameter(s) MUST be provided to instantiate InetSocketAddress in java?

host's port as integer

HTML Tags What is the expected order of these HTML (start) tags

html head title body div

External JavaScript tag Where tag do we use to within an HTML file to reference external JavaScript

script

Color Formats Which are valid ways in CSS of specifying the color yellow (equal amounts of red and green)? (substitute comma for the semi-colons - TopHat doesn't allow commas in the answers)

yellow rgb(255;255;0) FFFF00 (two trailing zeros) FF0 (one trailing zero)

Protocol Stack Match the OSI Layer with a representative protocol

1 Network F IP 2 Session A FTP 3 Transport G UDP 4 Physical D 10 Base-T 5 Presentation C JPEG 6 Application E SMTP 7Data Link B ARP

Routing Table Match the column in the Routing (Forwarding) Table with its description

1 Network Destination E intended network but not specific host 2 Network Mask A applied to destination address to extract network component 3 Gateway B similar to NextHop - address of next station 4 Interface C locally available interface is responsible for reaching the gateway 5 Metric D cost associated with the indicated route

Header Checksum Computation What is the order of steps in the computation of the header checksum (in an IPv4 datagram header)

1 Put a 0 in the checksum field 2 Add each 16-bit value together 3 Add in any carry 4 Invert the bits 5 Put result in the checksum field

Colors Matching Match the color with the hexadecimal code

1 black A 000000 2 white E FFFFFF 3 red C FF0000 4 green D 00FF00 5 blue B 0000FF

HTML Entity Code Match the HTML entity code text with the corresponding symbol

1 copy D © 2 nbsp A (space) 3 laquo E « 4 sect C § 5 euro B €

SSH Components Which three are components of SSH?

A Authentication Protocol C Connection Protocol F Transport-Layer Protocol

Server Address Which address(es) is/are used to specify the server?

A Domain name B IP Address

TCP Which are true of the Transmission Control Protocol (TCP)?

A it supports full duplex communication B it has graceful connection shutdown D its data is sent as a continuous stream E it is an end-to-end protocol

Logical Connections Which layers use logical rather than physical connections

A Application C Internet E Transport

Color Formats Which are valid ways in CSS of specifying the color cyan? (substitute comma for the semi-colons - TopHat doesn't allow commas in the answers)

A cyan B rgb(0;255;255) C 00FFFF (two leading zeros) D 0FF (one leading zero)

Multiple IP Addresses Which best describes the possibility of a device having multiple IP addresses?

A host (arbitrary device) can have multiple IP addresses, if it is multi-homed

JavaScript Data Types Which are valid (primitive) datatypes in JavaScript?

A number B string D boolean E null F undefined Gsymbol

ICMP Which type of issue would Internet Control Message Protocol (ICMP) not report on?

checksum problem

JavaScript: Change HTML Which syntax should be used to change the HTML of an element with id "snake" to "<p>new html</p>"?

document.getElementById("snake").innerHTML= "<p>new html</p>"

MTU If an application sends UDP data that exceeds the Maximum Transmission Unit (MTU), what will the IP protocol do?

fragment it

DOM Hyperlinks Which attribute is used directly with "document." to obtain its list of hyperlinks?

links

E-Mail Protocols Which is an applicable protocol for each activity related to e-mail:m1 = download an email from mailbox server to a mail clientm2 = send an email from a mail client to mail server;m3 = checking email in a web browser

m1:POP, m2:SMTP, m3:HTTPS

Stream Which is not characteristic of the "stream paradigm"?

one-to-many communication

Stream Paradigm Which is not characteristic of the "stream paradigm"?

one-to-many communication

Internal JavaScript tag Where tag do we use to include JavaScript within an HTML file

script

CSS Selector / Declaration What is the proper format for a CSS selector and declaration

selector {property:value}

NAPT In Network Address and Port Translation (NAPT), which best describes the information used in an attempt to identify the local destination address?

source IP and destination port

MAC Address Division Which best describes the division of bits in a MAC address of a network interface controller?

the prefix represents the manufacturer and the suffix represents the device

jQuery What is the standard form for calling a jQuery function to perform an action on selected elements?

$(selector).action()

HTML Entity Code What is the format for an HTML entity code called "code"

&code;

HTML Tags What is the expected order of these HTML (start) tags

1 <html> 2 <head> 3 <title> 4 <body> 5 <div>

CSS Selectors Match the selector format with its interpretation

1 *name B wildcard 2 .name D class 3 #name C id 4 name A element

HTTP Status Codes Match the HTTP Status code with its general category (XX is a placeholder for two more decimal digits)

1 1XX B Informational 2 2XX E Success 3 3XX D Redirection 4 4XX A Client Error 5 5XX C Server Error

XML Components Match the component of XML with its description

1 <bookstore> E root 2 lang D attribute 3 <title lang="en">Harry Potter</title> A element 4 <?xml version="1.0" encoding="UTF-8"?> C prologue 5 en B value

TCP/IP Units of Data Match the TCP/IP layer with the corresponding Protocol Data Unit

1 Application A Message 2 Data Link B Frame 3 Internet D Packet/IP Datagram 4 Physical E Bit 5 Transport C Segment/User Datagram

OSI Model From TOP to BOTTOM, what is the order of these seven layers of the OSI Model?

1 Application 2 Presentation 3 Session 4 Transport 5 Network 6 Data Link 7 Physical

Classful Address Classes Match the IPv4 Address Class with its usage

1 Class A A Large networks 2 Class B C Medium networks 3 Class C D Small networks 4Class D B Multicast 5 Class E E Reserved

HTTP Request Header Match the HTTP Request Header attribute with a possible value

1 Connection F keep-alive 2 Accept D text/html 3 Accept-Encoding B gzip 4 User-Agent C Mozilla/5.0 5 Host E www.example.com 6 Accept-Language A en-US

PDU Match the TCP/IP Layer with the Protocol Data Unit

1 Data Link C Frame 2 Application D Message 3 Physical E Bits 4 Internet A Packet 5 Transport B Segment

TCP/IP Protocol Data Units Match the TCP/IP Layer with the Protocol Data Unit

1 Data Link D Frame 2 Application C Message 3 Physical E Bits 4 Internet B Packet 5 Transport A Segment

HTTP Request Methods Match the HTTP request method with its description

1 GET A request a specified resource 2 HEAD F request a specified resource without the body 3 POST C request that the server accept an entity 4 PUT E request that the server accept an entity and place under specified URI 5 DELETE B remove the specified resource 6 TRACE D echo a received request so client can see what changes have occurred among intermediate servers 7 OPTIONS H return the HTTP methods that the server supports for the specified URL 8 CONNECT I convert the request connection to a TCP/IP tunnel 9 PATCH G apply partial modifications to a resource

Default Ports Match the service with the default port

1 HTTP B 80 2 HTTPS C 443 3 TELNET G 23 4 FTP A 20 and 21 5 IMAP J 143 6 SSH F 22 7 DNS E 53 8 POP3 D 110 9 SMTP I 25 10 My SQL H 3306

Addresses Match the addressing scheme with its size in bits

1 IPv4 D 32 2 IPv6 A 128 3 Port B 16 4 MAC C 48

Internet Organizations Match the organization with its function

1 ISO C developed OSI model of internet 2 W3C A regulate standards such as HTML CSS and XML 3 ICANN E maintain namespaces and numerical spaces of internet 4 IEEE B maintain standards for low-level such as wired and wireless connections 5 IETF D promote standards such as the TCP/IP protocol suite

Styling Hierarchy Organize the styling options from highest priority (top) to lowest priority (bottom)

1 Inline 2 Internal style-sheet 3 External style-sheet 4 Browser

URL Components Match each component in URL "http://www.example.com:80/path/to/myfile.html?key1=value1&key2=value2#SomewhereInTheDocument" with its description

1 http D protocol 2 .com G top-level domain 3 example B secondary domain 4 80 A port 5 /path/to/myfile.html F path 6 key1=value1&key2=value2 E parameters 7 #SomewhereInTheDocument C anchor

CSS Selector Combinators Match the CSS selector combinator with its interpretation

1 name1 + name2 D adjacent siblings 2 name1 ~ name2 B siblings 3 name1 > name2 A child 4 name1 name2 C descendant

CSS Grid VIew Assuming CSS as in the image, how many columns of the 12-column gridview will be used -- on a standard cellphone -- by the first div tag in<div class="col-3>text</div><div class="col-6>more text</div>

12.0

MAC Address How many hexadecimal digits are in a full MAC address?

12.0

MAC Address Size How many hexadecimal digits are in a full MAC Address?

12.0

3-Way Handshake How many ACK (acknowledgements) are sent if there are four connections, each with its own 3-way handshake startup and graceful shutdown?

16

IPv6 Zero Compression How many hexadecimal zeros are implied by the Zero Compression double-colon (::) in the right end of the IPv6 address 2001:0DBB:AC10:FE01::?

16.0

Website Design Elements Match the graphical website design element with common use

1magnifying glass B search within website 2 hamburger C fly-out menu 3 logo A company information 4 breadcrumbs D records and retraces navigation 5 shopping cart E items to be purchased Show Submitted Answer

IP Addresses - Shared Mask If two IP addresses on the same subnet are 250.252.253.100 and 250.252.254.101, what is the largest mask they can share (measured in bits)?

22.0

IPv6 Usage Based on internet traffic tracked by Google, what is the estimated usage of IPv6 addressing as of 2020?

30%

Socket Addres What is the total number of bits in a socket address?

48.0

HTTP GET How many HTTP GET requests are required to get an HTML file with references to 1 JavaScript file (via script), 2 hyperlinks (via a=anchor), and 3 JPEG images (via img)?

5

Adaptive Retransmission Review Suppose we have the following record of packet transmission times between a sender (S) and recipient (R) for a given day:9:00 a.m. S to R 10 seconds, R to S 10 seconds9:01 a.m. S to R 11 seconds, R to S 9 seconds9:02 a.m. S to R 8 seconds, R to S 14 seconds9:03 a.m. S to R 12 seconds, R to S 6 seconds10:00 a.m. S to R 20 seconds, R to S 20 seconds10:01 a.m. S to R 22 seconds, R to S 18 seconds10:02 a.m. S to R 16 seconds, R to S 28 seconds10:03 a.m. S to R 24 seconds, R to S 12 secondsAt 10:04:00 we send a packet. Assuming adaptive retransmission, what is the most appropriate amount of time to wait without receiving an acknowledgement from the would-be recipient, before resending the packet?

50

Subnet Hosts Given a subnet mask of 255.255.254.0, how many hosts are available in the subnet?

510

HTML Header Tag How many HTML header tags of the form <hN> are there (where H represents a number)?

6.0

IPv6 Address Suppose that an IPv6 address has a subnet id with 16 bits. How many bits are in its interface id?

64

UDP Which term(s) does not describe the User Datagram Protocol (UDP)?

B uses stream paradigm C connection-oriented

JSON Properties Which is true of JSON?

B More concise than XML C Supports arrays

JSON Functions Which two JSON functions did we discuss that convert between string and JSON objects (and vice versa)?

B parse D stringify

JSON Data Types In JavaScript Object Notation (JSON), a value may not be which of the following data types?

B undefined E date F function

IP Datagram Address Which addresses must appear in the header of the IPv4 datagram (packet)?

D Source IP address F Destination IP address

HTML List tags Which are valid list tags in HTML?

D ul E dl F ol

TypeScript Which best describes the relationship of JavaScript and TypeScript

TypeScript is a syntactic superset of JavaScript

Encapsulation Let "A ⊂ B" denote "A is encapsulated inside B". Which best represents the relationship between a Frame (F), IP Datagram (I), and User Datagram (U)?

U ⊂ I ⊂ F


संबंधित स्टडी सेट्स

Chapter 16 - Cardiovascular Emergencies

View Set

2-2 Properties of Quadratic Functions in Standard Form

View Set

Absorption and Variable Income Statements

View Set

Appointment Scheduling Chapter 9

View Set

Classroom and Grading Expectations

View Set