networking final study guide

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Given the IP Address 192.168.112.1. Each network requires between 35 and 60 hosts. What is the mask bit?

/26

IP Address assigned is 192.168.87.0. The number of subnets needed is 8. What is the mask bit?

/27

Match the description to the network classification 1. spans multiple cities or countries 2. spans a region near an individual 3. spans a building or campus 4. spans a large metropolitan area or city

1. WAN 2. PAN 3. LAN 4. MAN

Match the description with the network topology. 1. all computers attached to single cable 2. direct connection between each pair of computers 3. all are connected on a closed loop 4. all devices are directly connected to central point

1. bus 2. mesh 3. ring 4. star

Match the mode of communication with the type of communication channel 1. walkie-talkies 2. radios 3. cell phones 4. tv's 5. ham radios 6. skype 7. hi def tv 8. telephone land lines

1. half-duplex 2. simplex 3. full-duplex 4. simplex 5. half-duplex 6. full-duplex 7. simplex 8. full-duplex

Match the Personal Area Network technologies with common communication uses/requirements 1. Used in industry and in the scientific and medical devices 2. Frequently used in television/entertainment remote controls 3. Requires line-of-sight 4. Often used with headset for cell phones 5. Used in environments where electromagnetic interference may be present

1. ism wireless 2. infraRed 3. infraRed 4. bluetooth 5. ism wireless

Match the security problem with its definition. 1. Gaining control of a computer system and uses system to perpetrate a crime 2. Making false or exaggerated claims about services or goods 3. Masquerading as a well-known site in order to obtain personal information 4. Deceiving a user into investing money or abetting a crime 5. Loss of intellectual or other valuable proprietary business information 6. Intentionally blocking or hindering business activities and commerce

1. loss of control 2. misrepresentation 3. phishing 4. scams 5. loss of data 6. denial of service

Match the security technique to the purpose. 1. Encryption 2. Firewalls and Intrusion Detection Systems 3. Digital Signatures 4. Virtual Private Networks 5. Hashing 6. Digital Certificates

1. privacy 2. site integrity 3. message authentication 4. data privacy 5. data integrity 6. sender authentication

How many bits does an IPv6 address occupy?

128-bits

Given the subnet 192.168.42.0/28, how many subnets can be created?

16

Given the IP Address 192.168.112.1. Each network requires between 35 and 60 hosts. What is the subnet address ID of the first network?

192.168.112.0

Given the IP Address 192.168.112.0. Each network requires between 35 and 60 hosts. What is the range of host address on the first subnet?

192.168.112.1 - 192.168.112.62

Given the IP Address 192.168.112.1. Each network requires between 35 and 60 hosts. What is the broadcast address of the first subnet?

192.168.112.63

Which of the following subnet IDs belong to 192.168.212.0/26?

192.168.212.0 192.168.212.64 192.168.212.128 192.168.212.192

IP Address assigned is 192.168.87.0. The number of subnets needed is 8. What is the first subnet address ID?

192.168.87.0

IP Address assigned is 192.168.87.0. The number of subnets needed is 8. What is the range of host addresses on the first subnet?

192.168.87.1 - 192.168.87.30

IP Address assigned is 192.168.87.0. The number of subnets needed is 8. What is the broadcast address of the first subnet?

192.168.87.31

Binary is a base ___ numbering system and uses the digits 0 and 1.

2

Given the IP Address 192.168.112.1. Each network requires between 35 and 60 hosts. What is the subnet mask?

255.255.255.192

What is the subnet mask for IP Address 192.168.212.0/26?

255.255.255.192

IP Address assigned is 192.168.87.0. The number of subnets needed is 8. What is the subnet mask?

255.255.255.224

Given the subnet 192.168.42.0/28, what is the subnet mask?

255.255.255.240

IP Address assigned is 192.168.87.0. The number of subnets needed is 8. What is the maximum number of hosts per subnet?

30

Given the IP Address 192.168.112.1. Each network requires between 35 and 60 hosts. What is the maximun number of subnets that can be created to fulfil the host requirements?

4

A byte is defined as

8 bits

Which is the correct form for creating a hyperlink in HTML?

<a href= "http://www.uc.edu" > University of Cincinnati</a>

How is an email link created in HTML?

<a href= "mailto:[email protected]">

Which is the correct tag to make text bold?

<b>

How is a single blank line inserted in HTML?

<br />

Which is the correct HTML tag for inserting a line break?

<br />

Select the correct tag for the largest header in HTML

<h1>

Which is the correct HTML tag for making text italic?

<i>

Which are correct tags for sizing an image?

<img src= "Imagename.format" alt= "ImageTitle" width= "360" height= "280" />

Which is the correct HTML for inserting an image?

<img src= "imagename.format" alt= "ImageName"/>

What is the correct HTML tag for creating a checkbox?

<input type= "checkbox"/>

How are numbered lists created in HTML?

<ol>

Which tags are tags used with tables in HTML?

<table> <tr><td>

Which is the correct HTML used to right-align the contents of a cell in a table?

<td align= "right" >

How are bulleted lists created in HTML?

<ul>

Which of the following statements are true concerning XML?

Allows a user to specify a data format Describes the structure of the data and allows tag names to be created Has embedded tags similar to HTML

In the TCP 3-way handshake the following are all true except

CLR is used to clear a connection of congestion

How are colors represented in HTML?

Colors are represented as HEX values in two-digit pairs

Why are computers based on a binary numbering system?

Computers only understand "on/off"

Data transfer defines the following actions in the application-layer protocol:

Error handling Interaction termination Message syntax and semantics Interaction between server and client

Which of the following describes characteristics of HTML.

HTML permits a hyperlink to be embedded in an object HTML allows a browser to adapt the web page to the underlying display hardware HTML allows a document to include images, audio, video, and text Markup language used to display complex web pages

What does HTML stand for?

HyperText Markup Language

Which two Internet protocols allow a client to identify a server?

IP address and port number

A packet sent across a TCP/IP Internet is called a(n)

IP datagram

What is the purpose of the <!--> tag?

Insert a comment

What does the <hr /> tag create?

Inserts a horizontal line

Select the four major HTTP request types.

PUT GET POST HEAD

What is the purpose of version information in HTTP?

Permits protocols to change and still preserve backwards compatibility Allows servers to choose highest version of the protocol that is understood by both sender and receiver

How can HTML source code be viewed in an IE browser?

Right-click page and select "View Source"

Which cabling is best suited for manufacturing areas with high levels of background radiation?

STP

List the details an application protocol must specify.

Syntax and semantics of the message that can be exchanged Whether the server or the client initiates the interaction Actions to be taken when an error occurs How the two sides know when to end the communication

Data representation defines the following actions in the application-layer protocol:

Syntax of data items Translation of integers, characters and files between computers

Which organization is responsible for the Web standards?

The World Wide Web Consortium

Random electromagnetic radiation generated by devices such as electric motors can interfere with communication that uses radio transmission or electrical energy sent over wires.

True

The most common form of unguided communication mechanisms consist of wireless networking technologies that use electromagnetic energy in the Radio Frequency range.

True

What are the advantages of Geostationary Earth Orbit satellites?

a minimum of three satellites are need to provide basic world-wide coverage can reach terrain that is unfeasible for other kinds of transmission media 24/7 availability

The stream model refers to

a sequence of bytes flowing from one application program to another

The need for the newer version of IP addressing include all except

ability to send multicast messages

The three building blocks of a wireless LAN are

access point switch or router to connect wired network to access point wireless hosts or nodes

What is the purpose of the Dynamic Host Configuration Protocol (DHCP)?

allows a computer to move to a new network and obtain configuration data without manually making the changes

Domain Name System (DNS)

allows each organization to assign names to computer provides a service that maps human-readable symbolic names to computer addresses

Like User Datagram Protocol (UDP), TCP is a connection orientated because

applications must request that TCP form a connection before they can transfer data and close the connection when transfer is complete

Select the key aspects that make CRC an important part of data networking.

arbitrary message length quick hardware implementation excellent error detection

Which of the following is NOT true concerning a Media Access Control address?

assigned by IEEE

The transmission timing can occur at any time with an arbitrary delay between the transmission of two data items

asynchronous

Bit is derived from

binary digits

A mechanism used to connect two LAN segments and forward frames from one segment to another.

bridge

Narrowband technologies include all except the following

cable modem technologies

In a message model, each message delivered will never be

combined with multiple messages

Which Internet service operates similar to a telephone call?

connection-oriented

The Ethernet frame format contains the following three individual fields

crc header payload

Any phenomenon where a signal transmitted on one circuit or channel of a transmission system that creates an undesired effect in another circuit or channel is called

crosstalk

To avoid creating bottlenecks in network connections, peer-to-peer service is implemented. Peer-to-peer architecture is defined as

data distributed equally among a set a server and each client request is sent to the appropriate server

Broadband technologies include all except the following

dialup telephone connections

What are the three sources of transmission errors?

distortion interference attenuation

Characteristcs of server software are typically all except

does not require a powerful computer hardware

The way software displays an IP addresses for easy understanding by humans.

dotted decimal notation

The type of routing used by most routers on the Internet is

dynamic

Terms used to measure the Electromagnetic Spectrum include all the following except

electric charge in amperes

Select the three types of data errors in data communication systems.

erasure single bit error burst error

A license is required to operate transmissions equipment in all wireless networks.

false

A router is used to connect two Wide Area Networks (WAN) provided that both networks use the same technology and protocols.

false

Access technologies that handle the last mile problem are defined as connections to from the service provider to the subscriber at the greatest physical distance from the service provider.

false

Address Resolution Protocol forms a conceptual boundary in the protocol stack- layers below ARP use IP addresses, and layers above ARP use MAC addresses.

false

All encryption keys require that the encryption key and the decryption key remain secret.

false

Any IPv6 address that ends with 96 zero bits contains an IPv4 address.

false

Broadband interference is easier to block than narrowband frequency interference.

false

Classless Inter-Domain Routing (CIDR) is used for routing data through the Internet.

false

Communication between two parties on a circuit switched network is affected by communication between other parties sharing a common medium.

false

DSL technology is the most widely used high-speed data communication used in the business community.

false

Data transmissions can NOT be converted from parallel to serial.

false

Hardware failure accounts for the bulk of all delay and loss transmissions.

false

IPv4 is being replaced by IPv6 due to a variety of flaws associated with the original IPv4 address schema.

false

ISDN is the most popular data networking service offered by an Internet service provider.

false

In both circuit switched and packet switched models a sender must perform initialization before communication begins and notification when communication terminates.

false

In parallel transmission, the number of wires are always in multiples of eight.

false

Interior Gateway Protocols and Exterior Gateway Protocols use routing metrics to ensure traffic is directed through the Internet by the shortest hop-count metric.

false

Length specification is a minor concern in the development and implementation of LAN technology.

false

Like IPv4, IPv6 is a connection orientation protocol.

false

Low Earth Orbit Satellites are defined as below 2000 Kilometers, having a short propagation delay, and easy to track.

false

Noise occurs only in wireless communication devices.

false

Parallel transmission sends one bit at a time over a transmission medium.

false

Replay errors occur when a duplicate packet arrives causing packets to arrive out of sequence.

false

Routers, unlike other devices on a network, use all five layers of the TCP/IP reference model.

false

Signal strength must be increase in order to send signals across greater distances on a LAN.

false

Synchronous Optical Network (SONET) defines a narrow set of standards used for digital transmission.

false

The frame header contains information to process the frame and holds up to 64 Kbytes of data.

false

The purpose of subnet masks (address masks) is to "hide" a computer on the network.

false

The technique known as sliding window is a flow control that permits a steady stream of data to be continuously transmitted on the Internet.

false

Twisted pair Ethernet uses RJ45 connectors and are interchangeable with the jacks used to connect telephones.

false

When using TCP/IP, the size of a datagram sent across the Internet is determined by the TCP/IP protocol.

false

The three basic purposes of the Network Interface Card (NIC) is

for frame recognition to handle address recognition for CRC computation

Signal transmissions fall into two broad classes

guided and unguided

What is the term used to describe a computer that connects to the Internet and runs applications?

host computer

What are benefits in using optical fiber over copper wiring?

immune to electrical noise higher bandwidth less signal attenuation

Which layer of the TCP/IP reference model specifies the format of packets sent across the Internet?

internet

The IP address scheme guarantees that each computer on the Internet

is assigned a unique address

Characteristics of client software are typically all except

is invoked automatically when a system boots

The transmission timing occurs at regular intervals with a fixed gap between the transmission of two data items

isochronous

Serial transmission can be divided into the following classifications:

isochronous synchronous asynchronous

Why does light travel around a bend in an optical fiber?

light reflects when the angle of incidence is greater than the critical angle

The IP address 127.0.0.1 is commonly used to test network applications and is called a

loopback address

Address resolution is

mapping between a protocol address and a hardware address

A host that connects to multiple networks is called

multi-homed

Random electromagnetic radiation is called

noise

Which of the following is not a type of wireless technology?

optical

What is the purpose of the TIME TO LIVE field in the IP header?

prevents a datagram from circulating forever in a circular path

Which of the following is NOT a media that uses light energy to carry information?

radio waves

Colon Hexadecimal Notation is used to

reduced the number of characters used to write an address

An analog device used to propagate LAN signals over long distances.

repeater

The basic hardware component used to connect heterogeneous (diverse) networks is a

router

Why do organizations seldom use a single router to connect all its networks?

router processor speed may be insufficient and redundancy improves Internet reliability

Transport protocols use _____________ to handle out-of-order packets deliveries and duplicate packets

sequencing

Describe the client-server model of interaction

server starts first and awaits contact by the client

Which are two common ways to protect against EMI?

shielding and moving device away from source of interference

The type of routing used most by Internet hosts is

static

Name the two basic Internet communication paradigms

stream and message

The transmission timing occurs continuously with no gap between the transmission of two data items.

synchronous

What procedure is followed when a checksum error is detected?

the datagram is discarded immediately

Circuit switching provides

the illusion of an isolated physical path between a sender and a receiver

An IP address that contains all zeros is used to indicate

this computer

A URL contains information

to specify a web page that uses separator characters to display the protocol, computer name, document name, and parameters

The purpose of Name Resolution is

translate a domain name into an address

Which layer of the TCP/IP reference model specifies the message and procedures that are used to ensure reliable transfer

transport

A communication system that allows arbitrary pairs of computers to communicate is called universal service.

true

A typical residential subscriber receives much more information than the subscriber sends. Internet access technologies are designed to transfer more data in one direction than the other.

true

A virtual packet is hardware independent and each host or router on the Internet contains protocol software that recognizes these Internet packets.

true

All Internet routing protocols fall into either Interior Gateway Protocols or Exterior Gateway Protocols.

true

An IP address does not identify a specific computer.

true

An Internet address (IPv4) is a unique 32-bit number assigned to a host and used for all communications with the host.

true

Because IP is central to all Internet communication, changing IP requires a change to the entire Internet.

true

Each packet of data that crosses the Internet travels independently and contains information that identifies the intended recipient.

true

Electromagnetic Radiation has two fluctuating fields- one is electric and one magnetic.

true

IEEE 802.11 standard applies only to wireless equipment.

true

In order for an organization to ensure security, a firewall must be placed at EACH Internet connection.

true

In order to make universal service possible across diverse networks, protocol software is required on both the computers and the routers used on the Internet.

true

In the US, a digital circuit leased from a telephone company follows the same digital transmission standards that the phone company uses to transport digital phone calls and are referred to as the T-series standards.

true

Interferences and disturbances in communication systems are both naturally occuring and man-made.

true

Internally, computers and communication hardware uses parallel transmission.

true

Light used to "see" an object must have a wavelength about the same size or smaller than the object being viewed.

true

Noise is virtually unavoidable and can never be eliminated completely from wireless communication channels.

true

Only the first portion of a destination address is used when forwarding a packet across a WAN. When the packet reaches the switch to which the destination computer attaches, the second part of the address is used to forward the packet to the correct local computer.

true

Packet switching forms the basis of the Internet.

true

Serial transmission sends one bit at a time over a transmission medium.

true

Synchronous Transport Signal (STS) are a series of standards for digital trunk high-capacity circuits.

true

TCP/IP is the most widely used protocol suite on the Internet.

true

The Internet Corporation for Assigned Names and Numbers (ICANN) handles IP address assignment and dispute resolution.

true

The appropriate response to congestion consists of reducing the rate at which packets are being transmitted.

true

The designation 100BaseT uses Cat 5E cabling and runs at 100Mbps

true

The electromagnetic spectrum covers a wide range of wavelengths and photon energies.

true

The expense of packet switched technologies depend on the distances they span.

true

The fundamental delivery method used on the Internet is connectionless service.

true

The goal of a Wide Area Network (WAN) is to allow as many computers as possible to send packets simultaneously.

true

The purpose of spread spectrum techniques is to increase overall performance and make transmissions more immune to noise in a wireless environment.

true

Transport protocols do more than detect errors; transport protocols employ techniques that can repair or circumvent problems.

true

Zero compression eliminates long runs of zeroes in IPv6 addressing.

true

The IEEE addressing scheme support the following three address types

unicast, broadcast, multicast

IPv6 has the following address types

unicast, multicast, and anycast

Connections provided by TCP are achieved in software and are called

virtual connections

The terms client and server arose from

which side initiates contact

To control the flow of data, TCP uses a ____________ to measures in bytes the amount of buffer space available.

window

An optimization that replaces sequences of zeroes in an IPv6 addresses is called

zero compression


संबंधित स्टडी सेट्स

The Maya, Aztec, and Inca empires

View Set

Bab 3 Pengelolaan Sumber Daya Alam Indonesia

View Set

Genetics Mastering and LC: Test 2

View Set

Marketing Test #1 - Chapter 1 Review

View Set

Chapter 15-The Foreign Exchange Market and Determination of Exchange Rates

View Set