IT Quiz 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

"Enter Deep" in a CDN (Content Distribution Network) is to build large clusters at a smaller number for the content deliveries.

False

A DoS (Denial of Service) attack collects private information.

False

A POP3 Server maintains user state information across POP3 sessions.

False

A browser requests a Web page that consists of some text and three images. For this page, the browser will send one request message and receive four response messages.

False

A router runs all 5 layers of the protocol stack.

False

A server can use cookies to determine a user's postal address without the user's consent.

False

A transport layer packet is called a "datagram".

False

A transport layer packet is called a "message"

False

A transport layer packet is called a "message".

False

A transport layer segment encapsulates the transport layer header and a network-layer datagram.

False

An Ethernet switch is responsible for routing and forwarding packets.

False

Assume a 2-link network with the transmission rates R1 = 2 Mbps, and R2 = 1 Mbps, the throughput of the end-to-end transmission is 2 Mbps.

False

At the network core, there are inter-connected end systems.

False

BitTorrent is an application layer protocol that is based on Client-Server architecture.

False

Checksum at the Sender side is the 1's complement of the sum of all the 16-bit words in the segment including the checksum.

False

Checksum is used to handle packet loss.

False

Clients can directly communicate to each other in a Client-Server architecture.

False

DNS (Domain Name System) uses a centralized database to keep the mappings of domain names and IP addresses.

False

DNS (Domain Name System) uses the TCP services with port number 53

False

DNS is implemented with a pure Client-Server architecture.

False

DNS runs over TCP.

False

GET /index.html HTTP/1.1 Host: people.uwplatt.edu Connection: close User-Agent: mOZILLA/5.0 Accept-Language: en-us,en;q=0.5 The above HTTP Request message indicates a HTTP persistent connection.

False

HTTP defines how a web page is interpreted by a client.

False

HTTP encapsulates all objects in a single response message.

False

HTTP response messages never have an empty message body.

False

If the traffic intensity approaches 1, the queuing delay decreases.

False

If the traffic intensity at the router is close to zero, packet loss could happen.

False

In RDT, a timeout event must be added to the Receiver to handle packet loss.

False

In the Internet Protocol Stack, the Application Layer uses the services provided by the Link Layer directly.

False

It takes 10 milliseconds to propagate 1 Bit over a link with the distance of 1,000 meters and a propagation speed of 1,000 Kilometers/second.

False

It takes the router 10 milliseconds to push a 1,000-bit packet onto a link with 1,000 Kbps transmission rate.

False

One of the advantages of a Client-Server architecture is self-scalability.

False

One of the reasons to use UDP over TCP is data integrity.

False

SMTP is used by a user agent, such as Outlook app, to access the mail box in a mail server.

False

SSL (Secure Sockets Layer) is implemented at the Transport layer.

False

SSL (Secure Sockets Layer) provides host-to-host security services.

False

Skype is implemented with a pure P2P architecture.

False

Suppose 10 connections traverse the same link of rate 1 Gbps. Suppose that the client access links all have rate 5 Mbps. Then the maximum throughput for each connection is 100 Mbps.

False

Suppose host A sends host B one segment with sequence number 38 and 4 bytes of data. Then in this same segment the acknowledgement number is necessarily 42.

False

Suppose that host A wants to send data over TCP to host B, and host B wants to send data to host A over TCP. Two separate TCP connections - one for each direction - are needed.

False

TCP is an application layer protocol.

False

The Internet is a circuit-switched network where the resources needed along a path for communication are reserved for the duration of the communication session.

False

The Internet provides its applications two types of services, a TDM service and a FDM service.

False

The Link Layer is at the bottom of the Internet protocol stack.

False

The PUT method of the HTTP is used when the browser requests an object.

False

The client process passes the stream of data through the socket, and the data is directed to the network layer without buffering.

False

The default mode of HTTP uses non-persistent connections.

False

The header length of an UDP segment is 20 bytes.

False

The packet at the Link Layer is called a "segment".

False

The propagation delay depends on the length of the packet.

False

The size of the TCP RcvWindow never changes throughout the duration of the connection.

False

UDP is a connection-oriented Transport Layer service.

False

UDP is a reliable data transfer protocol.

False

When a client contacts a TCP server at port number 5520, the client uses the same port number for the communication.

False

When a host makes DNS query, the query is first sent to a root DNS server.

False

With a TCP connection, you could have more than one Receiver simultaneously.

False

With a packet-switched network, we can guarantee a certain amount of end-to-end bandwidth.

False

A IMAP Server maintains user state information across IMAP sessions.

True

A TCP socket is identified by a four-tuple: (source IP address, source port number, destination IP address, destination port number).

True

A false source address is known as IP spoofing.

True

A host on the Internet is the end system running the network applications.

True

An IMAP Server maintains a consistent folder hierarchy that can be accessed from any compute.

True

An IMAP Server maintains a consistent folder hierarchy that can be accessed from any computer.

True

An authoritative DNS server is an organization's own DNS server.

True

Arriving TCP segments with different source IPs or source port numbers will be directed to two different sockets.

True

Bandwidth flooding is a type of DoS (Denial of Service) attacks.

True

Conditional GET method of HTTP allows a web cache to verify if an object is up to date.

True

Consider a queue preceding a transmission link of rate R. Suppose a packet arrives to the queue periodically every 1/a seconds. Also suppose all packets are of length L. Then the queuing delay is small and bounded as long as aL < R.

True

Consider an incoming link with a transmission rate 100 Mbps to router A, and an outgoing link with a transmission rate 1.5 Mbps leaving router A. Packet loss could happen after a period of time.

True

Ethernet LANs can have transmission rates up to 10Gbps.

True

FM radio and broadcast TV are examples of "push" systems.

True

HTTP uses TCP as the underlying protocol.

True

MSS is the maximum amount of application-layer data in the segment.

True

Normally, video conferencing is Loss-tolerant.

True

One of the reasons to use UDP over TCP is finer application-level control over what data is sent and when.

True

One of the reasons to use UDP over TCP is small packet header overhead.

True

Packet Loss could happen when the arrival rate to the router is greater than the router transmission rate.

True

Pipelined Reliable Data Transfer protocols allow the Sender to send multiple packets without waiting for acknowledgments.

True

Queuing Delay occurs when the arrival rate of packets to the router exceeds the output link capacity.

True

Routers do not maintain TCP connection states.

True

TCP provides a connection-oriented service.

True

TCP provides guaranteed in-order delivery of data to the receiver.

True

Telnet is implemented with a pure Client-Server architecture.

True

The "default domain name server" is the local DNS server.

True

The GET method of the HTTP is used when the browser requests an object.

True

Web servers are end systems.

True

With SMTP, it is possible to send multiple mail messages over the same TCP connection.

True

You should use UDP if you are developing an application, which needs to transmit the data from a remote client to a server as fast as possible.

True

eBay is a Client-Server architecture.

True

GET /index.html HTTP/1.1 Host: people.uwplatt.edu Connection: close User-Agent: mOZILLA/5.0 Accept-Language: en-us,en;q=0.5 The above HTTP Request message indicates a HTTP persistent connection.

false

Checksum is used to detect bit errors in a transmitted packet.

true


संबंधित स्टडी सेट्स

Iggy Ch 25 - Care of Patients with Skin Problems

View Set

DR QUIZ 4 - Authorized Relationships, Duties, adn Disclosure

View Set

DMD Lesson 6 Inheritance of Genes

View Set

Chapter 11: LECTURE REASONING AND DECISION MAKING

View Set

PassPoint MS Professional Behaviors/Professionalism ML6

View Set

Ch. 39 Pt. 2 Anatomy and Physiology

View Set

Chapter 7, Ch. 7, Ch. 9, Ch. 8, Ch. 6

View Set