IT 215 Midterm Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

assume you are in checkout@ubuntu how do you do the following to the file 01-configure.yaml - edits the yaml file - how to enter editing mode - how to exit editing mode - how to save a quit

- /home/checkout/Desktop/01-configure.yaml - "i" - esc key - :wq

the cp command in Linux can be used to copy a file from one directory to another, assume you downloaded the file Hi.txt in directory /home/coming/Documents/textDoc -what is the username of the machine you changed the correct directory to be /etc, to copy the hi.txt file, while you're in /etc and move it to your home directory - what is the command to do so

- coming -cp /home/coming/etc/textDoc /home/coming/Desktop/

In a point to point single network, how many physical links will there be when a packet is transmitted a) we cannot say b) 2 c) 1 d) 0

1

if 2 hosts connected by 5 networks, how many packets will there be when it arrives a) 5 b) 2 c) 7 d) 1

1

if someone says that a 1-bit flag is set, its given value is a) both b) either c) 0 d) 1

1

if two hosts are connected by five networks, how many packets will there be when one host sends a packet to the other host a) 2 b) 5 c) 1 d) 7

1

in a point-to-point single network, how many physical links will there be when a packet is transmitted a) 1 b) we cannot say c) 2 d) 0

1

name a private IP address

10.x.x.x

how many alts can you represent with 10 bits

1024

7 bit subnet part, how many subnets possible

128

ASCII has a 7 bit code, how many keyboards can it represent

128

IPv4 for internet transmission

128.171....

firm has 22 bit network part, 6 bit subnet part how many hosts per subnet part

13

a wireless host sends a packet to a server on wired ethernet lan, via AP, how many frames will be involved

2

during a connection opening, how many TCP segments will the side that initiates the connection send a) 2 b) 1 c) 4 d)3

2

20 bit network and 4 bit subnet part, how many hosts

252

8 bit subnet, how many can you have

256

the source socket is 60.171.18.22:2707 what is the source

2707

5 senses can be represented with how many bits

3

5 bit field can represent how many alts

32

IPv4 addresses are ____ bits long a) none of these b) 128 c) 64 d) 32

32

IPv4 addresses are _____ bits long a) none of these b) 128 c) 32 d) 64

32

a mask has ____ bits

32

firm has 22 bit-network part, what subnet part would you select to give at least 10 subnets

4

if two hosts are connected by 5 networks, how many routers will there be helping the tranmsission a) 1 b) 4 c) 5 d) 2

4

if 2 hosts are connected by 5 networks how many frames will there be when one host sends a packet to the other a) 1 b) 5 c) 6 d) 2

5

A host sends a packet to another host containing six single networks along the way, how many data links are used for this transmission a) 1 b) 7 c) 8 d) 6

6

a host sends a packer to another host containing six signal networks along the way, how many data links are used for this transmission a) 1 b) 6 c) 7 d) 8

6

TCP, port number fields are 16 bits long, how many possible ports

64536

how many bits to represent 65 alts

7

the network part of the IPv4 is ___ bits long

8

port numbers for web server, secure web server, ssh

80, 443, 22

which of the following is a host when its on a network (select all that apply) a) client PC b) server c) mobile phone d) none of the above

A,B,C

which of the following is constantly leading to new applications (select all that apply) a) increasing speed b) increasing reliability c) increasing availability wherever you are d) increasing wireless link range

A,B,C

the originating host does not need to contact the DNS server each time it sends a packet to the target host because the originating host may have the target has name (select all that apply) a) stored temporarily b) stored c) cached d) memorized

A,C

the transport process sometimes ______ the application message (select all that apply) a) fragments b) transforms c) defragments d) translates

A,C

after this side wishing to close a TCP connection sends a FIN segment it will _____ a) not send anything b) none c) only send ACK d) only send fin

ACK

which of the following is an internet supervisory protocol a) IP b) DNS c) neither DNS nor IP d) both DNS and IP

DNS

a company has a domain name, what else must it have before they can have a public website

DNS server (to host it), and website itself

what process adds a header in front of an IP packet a) Application b) Data link c) Transport d) Internet

Data link

source and destination EUI-48 addresses are found in ____ headers a) UDP b) Frame c) IP d) TCP

Frame

which standards agency is especially important for internet supervisory processes a) NEITHER b) ALL c) ISO & ITU-T d) IETF

IETF

which standards agency is especially important for transport processes a) none of these are important b) IETF c) ISO and ITU-T d) both iso and ITU-T and IETF are equal in importance

IETF

source and destination IP address are found in the ____ header a) Frame b) TCP c) All of these d) IP

IP

source and destination IP addresses are found in the ____ header a) all of these b) IP c) TCP d) Frame

IP

which of the following is a connectionless protocol a) neither b) both c) tcp d) ip

IP

which standards organization is especially important for data link processes a) IETF b) neither ISO & ITU-T c) both ISO & ITU-T d) ISO and ITU-T

ISO & ITU-T

which of the following is a standards agency a) All of these b) TCP/IP c) OSI d) ITU-T

ITU-T

which standards agency is especially important for physical transmission process a) neither b) both c) ITU-T d) IETF

ITU-T

inter-networking communications that does not involve a human is referred to with the term _________ a) anonymous b) World Wide Web c) IoT d) impersonal

IoT

the Mirai bots in the KrebsOnSecurity.com attack were a) All of these b) server hosts c) client hosts d) IoT devices

IoT devices

is the process of presenting external IP addresses that are different from internal IP addresses used in the firm

NAT

who owns the internet a) the UN b) No one c) US Gov d) IETF

No one

which standards agency creates internet standards a) IETF b) TCP/IP c) OSI d) ITU-T

OSI

Internet standards are published as ________. a) IETFs b) TCP/IP c) Internet Protocol d) RFC

RFC

to used AP you need to know

SSID

what is a reliable protocol

TCP

which of the following is not one of the three general message parts a) sata field b) trailer c) address field d) header

address header

In a subnet mask, the 1s correspond to the ________. A) network part B) subnet part C) host part D) all of the above

all

at what layer is ASCII encoding done

application

on a server well known port numbers are used for

applications

if your local DNS server does not know the host name of an IP, it will get the address from a _____

authoritative DNS server

from a security perspective, the internets ability to Gove access to nearly everyone in a _____ a) neither good nor bad b) both good and bad thing c) bad thing d) good thing

bad thing

In the name internet, "inter" means a) international b) international c) between d) interior

between

Host P sends a SYN to Host Q, if Q is willing to open a connection, it will transmit a a) neither b) both c) SYN d) ACK

both

UDP a) neither b) both c) is unreliable d) has a checksum

both

at what layer will you find standards for access points a) neither b) both c) physical d) data link

both

from which standards architectures do organizations typically take their standards a) TCP/IP b) OSI c) neither d) both

both

NAT

both allows a firm to have more internal IP addresses and provides some security

an IP packet may include a a) application message or fragment b) both application message or fragment and TCP segment or UDP diagram c) segment or UDP diagram d ) neither application message or fragment now TCP segment or UDP datagram

both application message or fragment and TCP segment or UDP diagram

which layer governs transmission through a single network a) none of these b) physical c) data d) both data and physical

both data and physical

DHCP server provides a client with

both one or more IP address for it to use and the IP address of one or more DNS servers

the transportation layer on the destinations host _________ a) removes the transport header b) neither reassembles the application message if it has been fragmented nor removes the transport header c) both reassembles the application message if it has been fragmented and removes the transport header d) reassembles the application message if it has been fragmented

both reassembles the application message if it has been fragmented and removes the transport header

in a four step close which side transmits the FIN

both sides

The KrebsOnSecurity.com attack _______ a) both was a DoS attack and used IoT devices b) used IoT devices to attack the site c) was a denial of service attack d) neither was a denial of service attack nor used IoT devices to attack the site

both was a DoS attack and used IoT devices

in an HTTP, which transmits the message first a) web server app b) same time c) depends d)browser

browser

in 1.2.3.4 what is the network part

can't tell

A browser is considered a ______ program a) none of these b) server c) mobile d) client

client

on the internet a ____ host usually gets a dynamic IP address a) neither server nor client b) both server and client c) client d) server

client

on the internet a _____ host usually gets a dynamic IP address a) client b) server c) both client and server d) neither client nor server

client

a tablet is considered a ______ when it is used to access the internet a) neither client nor server hosts b) server host c) client host d) both client and a server host

client host

a web application minimally consists of a _____ program and a _____ program

client, server

Internet Service Providers _________ a) both carry traffic between routers and connect users to the internet b) neither carry traffic between routers nor connect users to the internet c) carry traffic between routers d) connect users to the internet

connect users to the internet

TCP is a a) none b) semi-connected c) connected d) connectionless

connection-oriented protocol

for every conversation, a client randomly generates an ephemeral port number for a)conversatio b) none c) application d) the server

conversations

the IETF primarily ______ a) all of these b) coordinates the work of ISPs c) manages the internet d) creates internet standards

creates internet standards

in ethernet II frame, the IP packet is carried in the ____ field a) destination address b) source address c) data d) ethertype

data

the ____ contains the content being delivered by a message a) trailer b) address field c) data field d) header

data field

at what layer will you find standards for EUI-48 addresses a) transport b) application c) internet d) data link

data link

at what layer will you find standards for frames a) internet b) app c) transport d) data link

data link

which standards layer governs peer-to-peer file sharing a) transport b) data link c) internet d) none of these

data link

which is not in an IP packet a) data link header b) all are part of the packet c) internet header d) transport header

data link header

which is not in an IP packet a) transport header b) internet header c) all of these are part of an IP packet d) data link header

data link header

At what layer will you find standards for switches a) data links b) internet c) application d) transport

data links

network standards _____ a) prevent the growth of new features b) decrease equipment prices c) both decrease prices and prevent new growth d) neither decrease prices nor prevent new growth

decrease equipment prices

if the destination internet process detects an error, it _____ a) sends back a notification b) discards the packet c) both d) neither

discards the packet

which of the following is an internet supervisory protocol a) both DNS and IP b) neither DNS nor IP c) DNS d) IP

dns

in DNS, a group of resources under the control of an org is called

domain

pinging is to send ICMP ____ messages to the target host

echo request

converting app messages into bits is a) encapsulation b) exchange c) encoding d) encryption

encoding

IETF standards typically begin as simple protocols which ______ a) neither b) both c) prevents long term development speed d) enhances development speed

enhances dev speed

the range of ports 1024-4999 is the range for

ephemeral

TCP has single bit fields in its headers; these singe-bit fields are called _____ fields a) flag b) ack c) port d) binary

flag

source and destination EUI-48 addresses are round in _____ headers a) TCP b) IP c) Frame d) UDP

frame

a message always has a ___ a) header b) data field c) both d) neiterh

header

SYN segments have a) all b) headers c) headers and data fields d) data fields only

headers

TCP control segments normally have a) all b) data fields c) headers d)none

headers

_____ have DHCP servers a) both home and internet core routers b) neither home nor internet core routers c) internet core routers d) home access routers

home access routers

______ have DHCP servers a) internet core routers b) home access routers c) neither home access routers nor internet core routers d) both home access routers and internet core routers

home access routers

A device that is connected to the internet is known as a ________ a) client b) router c) IP d) host

host

when host A wishes to communicate with host B, a DNS server provides the IP address of _____ a) the DNS server b) host B c) host A d) none of these

host B

when host a wishes to communicate with host b, a DNS server provides the IP address of the _______ a) the DNS server b) neither c) Host b d) Host a

host b

router physical sockets fore wire and fiber optic are called

interfaces

at what layer will you find standards for IP addresses a) app b) transport c) data link d) internet

internet

at what layer will you find standards for packets a) data link b) internet c) transport d) application

internet

at what layer will you find standards for routers a) internet b) both c) neither d) transport

internet

what process adds a header in from of a TCP segment a) transport b) data link c) application d) internet

internet

Network standards provide ______ a) synchronisation b) interoperability c) entanglement d) strobing

interoperability

In the case where a host client or host server cannot reach a Domain Name System server it ___________ a) will need to use a DHCP server b) cannot have a host name c) is unlikely to be able to communicate with most server hosts d) will have to rely on host names

is unlikely to be able to communicate with most server hosts

if you change a standards at one_____ you are not required to change standards at ____ layers

layer, other

internet is organized in a

mesh

when a source host sends a packet to a destination host, there will probably be ____ along the way a) about the same number of data links and routes b) more data links c) all of these d) more routes

more data links

when a source host sends a packet to a destination host, there will probably be ____ along the way a) more routes b) all of these c) more data links d) about the same number of routes and data links

more data links

what of the following is an architecture a) both b) neither c) IETF d) ISO

neither

which of the following is a socket a) 21 b) 80 c) both d) neither 80 nor 21

neither

HTTP is

neither connection oriented nor reliable

in a network mask, the 1s correspond to the

network part

a border router connects different IP

networks

Who manages the internet a) no one b) the UN c) IETF d) US Gov

no one

a sending host will retransmit a TCP segment if it a) receives an ACK b) none c) receives a NAC d) receives RPT

none

destination host receives incorrect segment a) none b) RSND c) ACK d) NAC

none

how many bytes will take "brain dead"

none

Express the mask /18 in dotted decimal notation. A) 255.0.0.0 B) 255.255.0.0 C) 255.255.255.0 D) none of the above

none of the above

A packet sent from one host to another over the Internet will always pass through ________ a) none of these b) more than 2 ISPs c) a single ISP d) exactly 2 ISPs

none of these

a TCP message is called a _________ a) none of these b) packet c) datagram d) frame

none of these

which standards layer governs e-mail a) transport b) internet c) none of these d) data link

none of these

which standards layer governs multi-user word processing programs a) internet b) transport c) data link d) none of these

none of these

which standards layer governs the World Wide Web a) data link b) internet c) Transport d) none of these

none of these

if a destination host receives a TCP segment with an error it will a) NAC b) RSND c) nothing d) ack seg

nothing

UDP is a standard for

packet delivery

AP take ____ from wireless devices and send them to devices on the wired LAN

packets

which layer governs wires a) physical b) internet c) transport d) none

physical

NAT enhances security by

preventing sniffiners learning internal IP addresses

standards mean the same thing as a) semantics b) rules c) protocols d) syntax

protocols

most servers are _____ a) mainframes b) Windows PCs c) routers d) rack servers

rack servers

not making protocols reliable

reduces cost

when a frame arrives the data link process on the destination host ______ a) neither adds a header nor removes a header b) adds a header c) both adds a header and removes a header d) removes a header

removes a header

corporations wish to have ____ domain names

second level

TCP messages are called a) segments b)frames c) packets d) fragments

segments

on the internet a ____ host usually gets a static IP address a) neither client nor server b) both client and server c) server d) client

server

on the internet, a _____ host usually get a static IP address a) neither client nor server b) both client and server c) server d) client

server

which if the following is one of the three parts of IPv4 address

subnet part

internal router connect different IP

subnets

DNS is a _____ protocol

supervisory

for cost reasons you should ____ where you can and ____ where you must

switch, route

an advantage of DHCP to configure clients is

the config info will be up to date

seeing an IPv4, you know

the length

standards processes/layers provide services directly to ____ a) the next lower layer b) the next higher layer c) only themselves d) all layers

the next higher layer

its typically advantageous to change a standard if the layer _____ gets an upgraded standard a) the one above it b) the one below it c) none of these d) at least two layers away

the one below it

.com is a

top-level domian

In TCP/IP, the application layer is served directly by the ________ layer a) physical b) data link c) transport d) network

transport

which layer processes app message fragmentation a) all b) app c) internet d) trasnport

transport

TCP/IP standards are set at the

transport layer

if you add one bit to an alt fields, you can have

twice as many alts

IP is a) none b) unreliable c) somewhat relaible d) reliable

unrelaible

depicting the internet as a cloud symbolizes a) users do not have to know how the internet operates b) the internet today is too complex to be understandable by humans c) the internet is too complex for anyone to depict d) the internet is amorphous

users do not have to know how the internet operates

Bombarding a server with traffic so that is cannot serve its legitimate users is a ________ attack a) DoS b) malware c) hacking d) virus

virus


Set pelajaran terkait

BLAW Ch. 13 - Defenses to Contract Enforceability

View Set

Ch. 38: Angiosperm Reproduction and Biotechnology

View Set

ch.3 The stakeholder approach to business, society, and ethics

View Set

HRM CH 1: Managing Human Resources

View Set