Ch 1,2,5
"Octet" is the same as ________.
"byte"
In a point-to-point single network, how many physical links will there be when a packet is transmitted?
1
If there are 10 routers between the source and destination hosts, how many internet processes will be involved on all devices?
12
ASCII has a 7-bit code. How many keyboard characters can it represent?
128
What is binary 1111 in decimal?
15
If there are 10 routers between the source and destination hosts, how many transport processes will be involved on all devices?
2
The IPv4 addresses are ____ bits long.
32
If two hosts are connected by five networks, how many frames will there be when one host sends a packet to the other host?
5
To prevent an unauthorized user from sending supervisory commands to switches, companies use ________.
802.1AE
To prevent anyone from simply walking up to a corporate switch and plugging their computer into its Ethernet port, companies can use
802.1X
What 802 Working Group creates Ethernet standards?
802.3
Which light wavelength dominates in LANs?
850 nm
Which of the following is used most often in LANs for fiber transmission links?
850 nm multimode fiber
Flooding a host with traffic from multiple computers and internet connections so that it cannot serve its legitimate users is a ________ attack.
Distributed Denial of Service (DDoS)
Ethernet uses ______ addresses.
EUI-48
________ have DHCP servers.
Home access routers
When Host A wishes to communicate with Host B, a DNS server provides the IP address of ______.
Host B
Which standards agency is especially important for Internet supervisory processes?
IETF
Routing is based on a(n) ________.
IP address
Which of the following is a standards agency?
ITU-T
Internet communication that does not involve a human is referred to with the term ________.
Internet of Things (IoT)
4-pair UTP terminates in a(n) ________ connector.
RJ-45
_____ have access points and DHCP servers.
Residential Access Routers
To manage their Ethernet networks, companies rely on ________.
SNMP
Which of the following protocols is reliable?
TCP
ARP cache poisoning is ________.
a man-in-the middle attack
Which of the following is NOT one of the three general parts of messages?
address field
The strength of a wave is its ________.
amplitude
If a destination host receives a correct segment, it will transmit ______; however, if a destination host receives an incorrect segment, it will transmit ______.
an ACK segment, nothing
On a server, well-known port numbers indicate ______.
applications
RSTP ________.
both answers
The KrebsOnSecurity.com attack ________.
both answers was a denial of service attack and used IoT devices to attack the site
In HTTP, which program may initiate communication?
browser (client)
The source socket is 60.171.18.22:2707. The source is a(n) ________.
client
On the Internet, a __________host usually gets a dynamic IP address and a __________ host gets a static IP address.
client, server
Trunk links connect switches to ________ switches.
core
What type of switch connects switches to other switches?
core switches
The IETF primarily ________.
creates Internet standards
At what layer will you find standards for EUI-48 addresses?
data link
The transmission paths of an IP packet between two routers are called _________.
data links
Network standards ________.
decrease equipment prices
Converting application messages into bits is called _______.
encoding
Ethernet messages are ________.
frames
The ability to transmit in two directions simultaneously is ________.
full-duplex communication
A message always has a ________.
header
In Ethernet, switches are organized in a ________.
hierarchy
We call any device connected to the Internet a(n) ________.
host
At what layer will you find standards for routers?
internet
Network standards provide ________.
interoperability
Which layer governs wires?
physical
UTP categories rate the ________ of UTP cabling.
quality
Most servers are ________.
rack servers
The ________ is the packet's entire path between the source host and the destination host.
route
Fiber that has a core diameter of 8.3 microns is ________.
single-mode fiber
Ethernet forwarding devices are ________.
switches
Standards layers provide services directly to ________.
the next-higher layer
IETF standards are dominant in the OSI-TCP/IP layered standards architecture at the ________ layer.
transport
What process adds a header in front of a short application message or fragment?
transport
In binary signaling, there is (are) ________ state(s).
two
Depicting the Internet as a cloud symbolizes ________.
users do not have to know how the Internet operates