CNIT123-Quiz#02
What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack? a) Application b) Transport c) Internet d) Network
a) Application
What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate? a) Application b) Transport c) Internet d) Network
a) Application
What connection-oriented protocol is utilized by the Transport layer? a) TCP b) HTTPS c) UDP d) SSL
a) TCP
What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server? a) 80 b) 434 c) 443 d) 408
c) 443, SHTP
What TCP/IP protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity? a) ARP b) TCP c) ICMP d) UDP
c) ICMP, Internet Control Message Protocol
What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network? a) 224 address b) 255 address c) 128 address d) 127 address
d) 127 address
What port does the Hypertext Transfer Protocol, or HTTP service use? a) 80 b) 25 c) 53 d) 69
a) 80, HTTP
What does the acronym TCP represent? a) Tranmission Control Protocol b) The Control Protocol c) Transfer Congestion Protocol d) Transfer Control Protocol
a) Tranmission Control Protocol
What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments? a) Application b) Transport c) Internet d) Network
b) Transport
What is the decimal equivalent of the binary number 11000001? a) 193 b) 201 c) 128 d) 164
a) 193
How many host computers can be assigned a valid IPv4 address when using a CIDR /24 prefix? a) 16 million b) 512 c) 65,000 d) 254
d) 254
In the TCP/IP stack, what layer is concerned with physically moving bits across the network's medium? a) Application b) Transport c) Internet d) Network
d) Network
What port does the Simple Mail Transfer Protocol, or SMTP service use? a) 53 b) 25 c) 69 d) 80
b) 25, SMTP
In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header? a) Application b) Transport c) Internet d) Network
b) Transport
What TCP/IP protocol is fast, unreliable, and operates at the Transport layer? a) TCP b) UDP c) FTP d) POP3
b) UDP, User Datagram Protocol (connectionless protocol)
What IPv4 address class has the IP address 221.1.2.3? a) Class A b) Class D c) Class B d) Class C
d) in this its a Class C address - there are three classes of IPv4 addresses - class A (0-127), class B (128-191), and class C (192-223)
What port does the Trivial File Transfer Protocol, or TFTP service use? a) 25 b) 69 c) 80 d) 53
b) 69, TFTP
What TCP flag is responsible for delivering data directly and immediately to an application? a) ACK flag b) PSH flag c) SYN flag d) RST flag
b) PSH flag
What TCP flag is responsible for synchronizing the beginning of a session? a) ACK flag b) URG flag c) SYN flag d) PSH flag
c) SYN flag
What port does the Domain Name System, or DNS service use? a) 25 b) 69 c) 80 d) 53
d) 53, DNS
What protocol is the most widely used and allows all computers on a network to communicate and functioncorrectly? a) ATM b) TCP/IP c) NetBIOS d) IPX/SPX
b) TCP/IP
What 32-bit number tracks packets received by a node and allows the reassembling of large packets that have been broken up into smaller packets? a) UDP b) IP c) ISN d) TCP
c) ISN, Initial Sequence Number
What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address? a) Application b) Transport c) Internet d) Network
c) Internet
What type of network attack relies on guessing a TCP header's initial sequence number, or ISN? a) DoS b) ARP spoofing c) Session hijacking d) Man-In-the-Middle
c) Session hijacking
What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity? a) SYN b) ISN c) port d) IP
c) port