IT 215 Midterm Review
assume you are in checkout@ubuntu how do you do the following to the file 01-configure.yaml - edits the yaml file - how to enter editing mode - how to exit editing mode - how to save a quit
- /home/checkout/Desktop/01-configure.yaml - "i" - esc key - :wq
the cp command in Linux can be used to copy a file from one directory to another, assume you downloaded the file Hi.txt in directory /home/coming/Documents/textDoc -what is the username of the machine you changed the correct directory to be /etc, to copy the hi.txt file, while you're in /etc and move it to your home directory - what is the command to do so
- coming -cp /home/coming/etc/textDoc /home/coming/Desktop/
In a point to point single network, how many physical links will there be when a packet is transmitted a) we cannot say b) 2 c) 1 d) 0
1
if 2 hosts connected by 5 networks, how many packets will there be when it arrives a) 5 b) 2 c) 7 d) 1
1
if someone says that a 1-bit flag is set, its given value is a) both b) either c) 0 d) 1
1
if two hosts are connected by five networks, how many packets will there be when one host sends a packet to the other host a) 2 b) 5 c) 1 d) 7
1
in a point-to-point single network, how many physical links will there be when a packet is transmitted a) 1 b) we cannot say c) 2 d) 0
1
name a private IP address
10.x.x.x
how many alts can you represent with 10 bits
1024
7 bit subnet part, how many subnets possible
128
ASCII has a 7 bit code, how many keyboards can it represent
128
IPv4 for internet transmission
128.171....
firm has 22 bit network part, 6 bit subnet part how many hosts per subnet part
13
a wireless host sends a packet to a server on wired ethernet lan, via AP, how many frames will be involved
2
during a connection opening, how many TCP segments will the side that initiates the connection send a) 2 b) 1 c) 4 d)3
2
20 bit network and 4 bit subnet part, how many hosts
252
8 bit subnet, how many can you have
256
the source socket is 60.171.18.22:2707 what is the source
2707
5 senses can be represented with how many bits
3
5 bit field can represent how many alts
32
IPv4 addresses are ____ bits long a) none of these b) 128 c) 64 d) 32
32
IPv4 addresses are _____ bits long a) none of these b) 128 c) 32 d) 64
32
a mask has ____ bits
32
firm has 22 bit-network part, what subnet part would you select to give at least 10 subnets
4
if two hosts are connected by 5 networks, how many routers will there be helping the tranmsission a) 1 b) 4 c) 5 d) 2
4
if 2 hosts are connected by 5 networks how many frames will there be when one host sends a packet to the other a) 1 b) 5 c) 6 d) 2
5
A host sends a packet to another host containing six single networks along the way, how many data links are used for this transmission a) 1 b) 7 c) 8 d) 6
6
a host sends a packer to another host containing six signal networks along the way, how many data links are used for this transmission a) 1 b) 6 c) 7 d) 8
6
TCP, port number fields are 16 bits long, how many possible ports
64536
how many bits to represent 65 alts
7
the network part of the IPv4 is ___ bits long
8
port numbers for web server, secure web server, ssh
80, 443, 22
which of the following is a host when its on a network (select all that apply) a) client PC b) server c) mobile phone d) none of the above
A,B,C
which of the following is constantly leading to new applications (select all that apply) a) increasing speed b) increasing reliability c) increasing availability wherever you are d) increasing wireless link range
A,B,C
the originating host does not need to contact the DNS server each time it sends a packet to the target host because the originating host may have the target has name (select all that apply) a) stored temporarily b) stored c) cached d) memorized
A,C
the transport process sometimes ______ the application message (select all that apply) a) fragments b) transforms c) defragments d) translates
A,C
after this side wishing to close a TCP connection sends a FIN segment it will _____ a) not send anything b) none c) only send ACK d) only send fin
ACK
which of the following is an internet supervisory protocol a) IP b) DNS c) neither DNS nor IP d) both DNS and IP
DNS
a company has a domain name, what else must it have before they can have a public website
DNS server (to host it), and website itself
what process adds a header in front of an IP packet a) Application b) Data link c) Transport d) Internet
Data link
source and destination EUI-48 addresses are found in ____ headers a) UDP b) Frame c) IP d) TCP
Frame
which standards agency is especially important for internet supervisory processes a) NEITHER b) ALL c) ISO & ITU-T d) IETF
IETF
which standards agency is especially important for transport processes a) none of these are important b) IETF c) ISO and ITU-T d) both iso and ITU-T and IETF are equal in importance
IETF
source and destination IP address are found in the ____ header a) Frame b) TCP c) All of these d) IP
IP
source and destination IP addresses are found in the ____ header a) all of these b) IP c) TCP d) Frame
IP
which of the following is a connectionless protocol a) neither b) both c) tcp d) ip
IP
which standards organization is especially important for data link processes a) IETF b) neither ISO & ITU-T c) both ISO & ITU-T d) ISO and ITU-T
ISO & ITU-T
which of the following is a standards agency a) All of these b) TCP/IP c) OSI d) ITU-T
ITU-T
which standards agency is especially important for physical transmission process a) neither b) both c) ITU-T d) IETF
ITU-T
inter-networking communications that does not involve a human is referred to with the term _________ a) anonymous b) World Wide Web c) IoT d) impersonal
IoT
the Mirai bots in the KrebsOnSecurity.com attack were a) All of these b) server hosts c) client hosts d) IoT devices
IoT devices
is the process of presenting external IP addresses that are different from internal IP addresses used in the firm
NAT
who owns the internet a) the UN b) No one c) US Gov d) IETF
No one
which standards agency creates internet standards a) IETF b) TCP/IP c) OSI d) ITU-T
OSI
Internet standards are published as ________. a) IETFs b) TCP/IP c) Internet Protocol d) RFC
RFC
to used AP you need to know
SSID
what is a reliable protocol
TCP
which of the following is not one of the three general message parts a) sata field b) trailer c) address field d) header
address header
In a subnet mask, the 1s correspond to the ________. A) network part B) subnet part C) host part D) all of the above
all
at what layer is ASCII encoding done
application
on a server well known port numbers are used for
applications
if your local DNS server does not know the host name of an IP, it will get the address from a _____
authoritative DNS server
from a security perspective, the internets ability to Gove access to nearly everyone in a _____ a) neither good nor bad b) both good and bad thing c) bad thing d) good thing
bad thing
In the name internet, "inter" means a) international b) international c) between d) interior
between
Host P sends a SYN to Host Q, if Q is willing to open a connection, it will transmit a a) neither b) both c) SYN d) ACK
both
UDP a) neither b) both c) is unreliable d) has a checksum
both
at what layer will you find standards for access points a) neither b) both c) physical d) data link
both
from which standards architectures do organizations typically take their standards a) TCP/IP b) OSI c) neither d) both
both
NAT
both allows a firm to have more internal IP addresses and provides some security
an IP packet may include a a) application message or fragment b) both application message or fragment and TCP segment or UDP diagram c) segment or UDP diagram d ) neither application message or fragment now TCP segment or UDP datagram
both application message or fragment and TCP segment or UDP diagram
which layer governs transmission through a single network a) none of these b) physical c) data d) both data and physical
both data and physical
DHCP server provides a client with
both one or more IP address for it to use and the IP address of one or more DNS servers
the transportation layer on the destinations host _________ a) removes the transport header b) neither reassembles the application message if it has been fragmented nor removes the transport header c) both reassembles the application message if it has been fragmented and removes the transport header d) reassembles the application message if it has been fragmented
both reassembles the application message if it has been fragmented and removes the transport header
in a four step close which side transmits the FIN
both sides
The KrebsOnSecurity.com attack _______ a) both was a DoS attack and used IoT devices b) used IoT devices to attack the site c) was a denial of service attack d) neither was a denial of service attack nor used IoT devices to attack the site
both was a DoS attack and used IoT devices
in an HTTP, which transmits the message first a) web server app b) same time c) depends d)browser
browser
in 1.2.3.4 what is the network part
can't tell
A browser is considered a ______ program a) none of these b) server c) mobile d) client
client
on the internet a ____ host usually gets a dynamic IP address a) neither server nor client b) both server and client c) client d) server
client
on the internet a _____ host usually gets a dynamic IP address a) client b) server c) both client and server d) neither client nor server
client
a tablet is considered a ______ when it is used to access the internet a) neither client nor server hosts b) server host c) client host d) both client and a server host
client host
a web application minimally consists of a _____ program and a _____ program
client, server
Internet Service Providers _________ a) both carry traffic between routers and connect users to the internet b) neither carry traffic between routers nor connect users to the internet c) carry traffic between routers d) connect users to the internet
connect users to the internet
TCP is a a) none b) semi-connected c) connected d) connectionless
connection-oriented protocol
for every conversation, a client randomly generates an ephemeral port number for a)conversatio b) none c) application d) the server
conversations
the IETF primarily ______ a) all of these b) coordinates the work of ISPs c) manages the internet d) creates internet standards
creates internet standards
in ethernet II frame, the IP packet is carried in the ____ field a) destination address b) source address c) data d) ethertype
data
the ____ contains the content being delivered by a message a) trailer b) address field c) data field d) header
data field
at what layer will you find standards for EUI-48 addresses a) transport b) application c) internet d) data link
data link
at what layer will you find standards for frames a) internet b) app c) transport d) data link
data link
which standards layer governs peer-to-peer file sharing a) transport b) data link c) internet d) none of these
data link
which is not in an IP packet a) data link header b) all are part of the packet c) internet header d) transport header
data link header
which is not in an IP packet a) transport header b) internet header c) all of these are part of an IP packet d) data link header
data link header
At what layer will you find standards for switches a) data links b) internet c) application d) transport
data links
network standards _____ a) prevent the growth of new features b) decrease equipment prices c) both decrease prices and prevent new growth d) neither decrease prices nor prevent new growth
decrease equipment prices
if the destination internet process detects an error, it _____ a) sends back a notification b) discards the packet c) both d) neither
discards the packet
which of the following is an internet supervisory protocol a) both DNS and IP b) neither DNS nor IP c) DNS d) IP
dns
in DNS, a group of resources under the control of an org is called
domain
pinging is to send ICMP ____ messages to the target host
echo request
converting app messages into bits is a) encapsulation b) exchange c) encoding d) encryption
encoding
IETF standards typically begin as simple protocols which ______ a) neither b) both c) prevents long term development speed d) enhances development speed
enhances dev speed
the range of ports 1024-4999 is the range for
ephemeral
TCP has single bit fields in its headers; these singe-bit fields are called _____ fields a) flag b) ack c) port d) binary
flag
source and destination EUI-48 addresses are round in _____ headers a) TCP b) IP c) Frame d) UDP
frame
a message always has a ___ a) header b) data field c) both d) neiterh
header
SYN segments have a) all b) headers c) headers and data fields d) data fields only
headers
TCP control segments normally have a) all b) data fields c) headers d)none
headers
_____ have DHCP servers a) both home and internet core routers b) neither home nor internet core routers c) internet core routers d) home access routers
home access routers
______ have DHCP servers a) internet core routers b) home access routers c) neither home access routers nor internet core routers d) both home access routers and internet core routers
home access routers
A device that is connected to the internet is known as a ________ a) client b) router c) IP d) host
host
when host A wishes to communicate with host B, a DNS server provides the IP address of _____ a) the DNS server b) host B c) host A d) none of these
host B
when host a wishes to communicate with host b, a DNS server provides the IP address of the _______ a) the DNS server b) neither c) Host b d) Host a
host b
router physical sockets fore wire and fiber optic are called
interfaces
at what layer will you find standards for IP addresses a) app b) transport c) data link d) internet
internet
at what layer will you find standards for packets a) data link b) internet c) transport d) application
internet
at what layer will you find standards for routers a) internet b) both c) neither d) transport
internet
what process adds a header in from of a TCP segment a) transport b) data link c) application d) internet
internet
Network standards provide ______ a) synchronisation b) interoperability c) entanglement d) strobing
interoperability
In the case where a host client or host server cannot reach a Domain Name System server it ___________ a) will need to use a DHCP server b) cannot have a host name c) is unlikely to be able to communicate with most server hosts d) will have to rely on host names
is unlikely to be able to communicate with most server hosts
if you change a standards at one_____ you are not required to change standards at ____ layers
layer, other
internet is organized in a
mesh
when a source host sends a packet to a destination host, there will probably be ____ along the way a) about the same number of data links and routes b) more data links c) all of these d) more routes
more data links
when a source host sends a packet to a destination host, there will probably be ____ along the way a) more routes b) all of these c) more data links d) about the same number of routes and data links
more data links
what of the following is an architecture a) both b) neither c) IETF d) ISO
neither
which of the following is a socket a) 21 b) 80 c) both d) neither 80 nor 21
neither
HTTP is
neither connection oriented nor reliable
in a network mask, the 1s correspond to the
network part
a border router connects different IP
networks
Who manages the internet a) no one b) the UN c) IETF d) US Gov
no one
a sending host will retransmit a TCP segment if it a) receives an ACK b) none c) receives a NAC d) receives RPT
none
destination host receives incorrect segment a) none b) RSND c) ACK d) NAC
none
how many bytes will take "brain dead"
none
Express the mask /18 in dotted decimal notation. A) 255.0.0.0 B) 255.255.0.0 C) 255.255.255.0 D) none of the above
none of the above
A packet sent from one host to another over the Internet will always pass through ________ a) none of these b) more than 2 ISPs c) a single ISP d) exactly 2 ISPs
none of these
a TCP message is called a _________ a) none of these b) packet c) datagram d) frame
none of these
which standards layer governs e-mail a) transport b) internet c) none of these d) data link
none of these
which standards layer governs multi-user word processing programs a) internet b) transport c) data link d) none of these
none of these
which standards layer governs the World Wide Web a) data link b) internet c) Transport d) none of these
none of these
if a destination host receives a TCP segment with an error it will a) NAC b) RSND c) nothing d) ack seg
nothing
UDP is a standard for
packet delivery
AP take ____ from wireless devices and send them to devices on the wired LAN
packets
which layer governs wires a) physical b) internet c) transport d) none
physical
NAT enhances security by
preventing sniffiners learning internal IP addresses
standards mean the same thing as a) semantics b) rules c) protocols d) syntax
protocols
most servers are _____ a) mainframes b) Windows PCs c) routers d) rack servers
rack servers
not making protocols reliable
reduces cost
when a frame arrives the data link process on the destination host ______ a) neither adds a header nor removes a header b) adds a header c) both adds a header and removes a header d) removes a header
removes a header
corporations wish to have ____ domain names
second level
TCP messages are called a) segments b)frames c) packets d) fragments
segments
on the internet a ____ host usually gets a static IP address a) neither client nor server b) both client and server c) server d) client
server
on the internet, a _____ host usually get a static IP address a) neither client nor server b) both client and server c) server d) client
server
which if the following is one of the three parts of IPv4 address
subnet part
internal router connect different IP
subnets
DNS is a _____ protocol
supervisory
for cost reasons you should ____ where you can and ____ where you must
switch, route
an advantage of DHCP to configure clients is
the config info will be up to date
seeing an IPv4, you know
the length
standards processes/layers provide services directly to ____ a) the next lower layer b) the next higher layer c) only themselves d) all layers
the next higher layer
its typically advantageous to change a standard if the layer _____ gets an upgraded standard a) the one above it b) the one below it c) none of these d) at least two layers away
the one below it
.com is a
top-level domian
In TCP/IP, the application layer is served directly by the ________ layer a) physical b) data link c) transport d) network
transport
which layer processes app message fragmentation a) all b) app c) internet d) trasnport
transport
TCP/IP standards are set at the
transport layer
if you add one bit to an alt fields, you can have
twice as many alts
IP is a) none b) unreliable c) somewhat relaible d) reliable
unrelaible
depicting the internet as a cloud symbolizes a) users do not have to know how the internet operates b) the internet today is too complex to be understandable by humans c) the internet is too complex for anyone to depict d) the internet is amorphous
users do not have to know how the internet operates
Bombarding a server with traffic so that is cannot serve its legitimate users is a ________ attack a) DoS b) malware c) hacking d) virus
virus