Ch 1,2,5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

"Octet" is the same as ________.

"byte"

In a point-to-point single network, how many physical links will there be when a packet is transmitted?

1

If there are 10 routers between the source and destination hosts, how many internet processes will be involved on all devices?

12

ASCII has a 7-bit code. How many keyboard characters can it represent?

128

What is binary 1111 in decimal?

15

If there are 10 routers between the source and destination hosts, how many transport processes will be involved on all devices?

2

The IPv4 addresses are ____ bits long.

32

If two hosts are connected by five networks, how many frames will there be when one host sends a packet to the other host?

5

To prevent an unauthorized user from sending supervisory commands to switches, companies use ________.

802.1AE

To prevent anyone from simply walking up to a corporate switch and plugging their computer into its Ethernet port, companies can use

802.1X

What 802 Working Group creates Ethernet standards?

802.3

Which light wavelength dominates in LANs?

850 nm

Which of the following is used most often in LANs for fiber transmission links?

850 nm multimode fiber

Flooding a host with traffic from multiple computers and internet connections so that it cannot serve its legitimate users is a ________ attack.

Distributed Denial of Service (DDoS)

Ethernet uses ______ addresses.

EUI-48

________ have DHCP servers.

Home access routers

When Host A wishes to communicate with Host B, a DNS server provides the IP address of ______.

Host B

Which standards agency is especially important for Internet supervisory processes?

IETF

Routing is based on a(n) ________.

IP address

Which of the following is a standards agency?

ITU-T

Internet communication that does not involve a human is referred to with the term ________.

Internet of Things (IoT)

4-pair UTP terminates in a(n) ________ connector.

RJ-45

_____ have access points and DHCP servers.

Residential Access Routers

To manage their Ethernet networks, companies rely on ________.

SNMP

Which of the following protocols is reliable?

TCP

ARP cache poisoning is ________.

a man-in-the middle attack

Which of the following is NOT one of the three general parts of messages?

address field

The strength of a wave is its ________.

amplitude

If a destination host receives a correct segment, it will transmit ______; however, if a destination host receives an incorrect segment, it will transmit ______.

an ACK segment, nothing

On a server, well-known port numbers indicate ______.

applications

RSTP ________.

both answers

The KrebsOnSecurity.com attack ________.

both answers was a denial of service attack and used IoT devices to attack the site

In HTTP, which program may initiate communication?

browser (client)

The source socket is 60.171.18.22:2707. The source is a(n) ________.

client

On the Internet, a __________host usually gets a dynamic IP address and a __________ host gets a static IP address.

client, server

Trunk links connect switches to ________ switches.

core

What type of switch connects switches to other switches?

core switches

The IETF primarily ________.

creates Internet standards

At what layer will you find standards for EUI-48 addresses?

data link

The transmission paths of an IP packet between two routers are called _________.

data links

Network standards ________.

decrease equipment prices

Converting application messages into bits is called _______.

encoding

Ethernet messages are ________.

frames

The ability to transmit in two directions simultaneously is ________.

full-duplex communication

A message always has a ________.

header

In Ethernet, switches are organized in a ________.

hierarchy

We call any device connected to the Internet a(n) ________.

host

At what layer will you find standards for routers?

internet

Network standards provide ________.

interoperability

Which layer governs wires?

physical

UTP categories rate the ________ of UTP cabling.

quality

Most servers are ________.

rack servers

The ________ is the packet's entire path between the source host and the destination host.

route

Fiber that has a core diameter of 8.3 microns is ________.

single-mode fiber

Ethernet forwarding devices are ________.

switches

Standards layers provide services directly to ________.

the next-higher layer

IETF standards are dominant in the OSI-TCP/IP layered standards architecture at the ________ layer.

transport

What process adds a header in front of a short application message or fragment?

transport

In binary signaling, there is (are) ________ state(s).

two

Depicting the Internet as a cloud symbolizes ________.

users do not have to know how the Internet operates


Set pelajaran terkait

Jarvis Health Assessment Adaptive Quizzing CH 1-11

View Set

Discrete Structures Chapter 4: Functions

View Set

General Chemistry Chapter 4-6 Timberlake

View Set

Chapter 3 PREPU Health, Wellness and Health Disparities

View Set

260 New Content (DM, Neuro + Sensory)

View Set

Genetic, developmental, nutritional, and environmental disease (Pediatric Diseases)

View Set

تربية اسلامية توجيهي

View Set