Network and Security Midterm Review
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source? A. Source port B. Acknowledgment number C. Data D. Checksum
D. Checksum
Which of the following is an example of Bluetooth? a) wide area network b) virtual private network c) local area network d) personal area network
d) personal area network
Which of the following devices forwards packets between networks by processing the routing information included in the packet? a) firewall b) bridge c) hub d) router
d) router
Retransmission of packets must not be done when _______ a) Packet is lost b) Packet is corrupted c) Packet is needed d) Packet is error-free
d) Packet is error-free
The transport layer handles multiplexing and demultiplexing through what type of device? a) Hubs b) Switches c) Routers d) Ports
d) Ports
Which of the following allows you to connect and login to a remote computer? a) SMTP b) HTTP c) FTP d) Telnet
d) Telnet
What are nodes in a computer network? a) the computer that routes the data b) the computer that terminates the data c) the computer that originates the data d) all of the mentioned
d) all of the mentioned
Which layer provides the services to user? a) physical layer b) presentation layer c) session layer d) application layer
d) application layer
Which of the following is used in an attempt to render a computer resource unavailable to its intended users? a) botnet process b) worms attack c) virus attack d) denial-of-service attack
d) denial-of-service attack
Which OSI layer is responsible for directing data from one LAN to another? A. Transport layer B. Network layer C. Data Link layer D. Physical layer
B. Network layer
At which OSI layer does IP operate? A. Application layer B. Transport layer C. Network layer D. Data Link layer
C. Network layer
What number does a host use to identify the application involved in a transmission? A. IP address B. MAC address C. Port number D. Sequence number
C. Port number
How many layers are there in the ISO OSI reference model? a) 7 b) 5 c) 4 d) 6
a) 7
Which of the following is false with respect to UDP? a) Connection-oriented b) Unreliable c) Transport layer protocol d) Low overhead
a) Connection-oriented
Two broad categories of congestion control are a) Open-loop and Closed-loop b) Open-control and Closed-control c) Active control and Passive control d) Active loop and Passive loop
a) Open-loop and Closed-loop
Which of this is not a network edge device? a) Switch b) PC c) Smartphones d) Servers
a) Switch
Which of the following is the network layer protocol for the internet? a) hypertext transfer protocol b) file transfer protocol c) ethernet d) internet protocol
d) internet protocol
What is the main advantage of UDP? a) More overload b) Reliable c) Low overhead d) Fast
c) Low overhead
Which of the following are Gigabit Ethernets? a) 1000 BASE-LX b) 1000 BASE-CX c) 1000 BASE-SX d) All of the mentioned
d) All of the mentioned
Which layer does the data link layer take packets from and encapsulate them into frames for transmission? a) transport layer b) application layer c) network layer d) physical layer
c) network layer
What is the term for an endpoint of an inter-process communication flow across a computer network? a) port b) machine c) socket d) pipe
c) socket
Which layer is responsible for process to process delivery in a general network model? a) session layer b) data link layer c) transport layer d) network layer
c) transport layer
Which is the correct expression for the length of UDP datagram? a) UDP length = IP length - IP header's length b) UDP length = UDP length - UDP header's length c) UDP length = IP length + IP header's length d) UDP length = UDP length + UDP header's length
a) UDP length = IP length - IP header's length
Application layer data lives in the _____ section of the transport layer protocol. a) data payload b) header c) footer d) flags
a) data payload
How is a single channel shared by multiple signals in a computer network? a) multiplexing b) phase modulation c) analog modulation d) digital modulation
a) multiplexing
Which of the following computer networks is built on the top of another network? a) overlay network b) prime network c) prior network d) chief network
a) overlay network
The instantiation of an endpoint in a potential TCP connection is known as a ______. a) socket b) port c) sequence number d) TCP segment
a) socket
Which of the following networks extends a private network across public networks? a) virtual private network b) local area network c) storage area network d) enterprise private network
a) virtual private network
What port does the File Transfer Protocol (FTP) typically listen on? a) 443 b) 21 c) 25 d) 80
b) 21
If a link transmits 4000 frames per second, and each slot has 8 bits, what is the transmission rate of the circuit using Time Division Multiplexing (TDM)? a) 500kbps b) 32kbps c) 32bps d) 500bps
b) 32kbps Explanation: Transmission rate = frame rate ** number of bits in a slot. Given: Frame rate = 4000/sec and number of bits in slot = 8. Thus, Transmission rate = (4000 * 8) bps = 32000bps = 32kbps
What is a computer network? a) A device used to display information on a computer screen b) A collection of interconnected computers and devices that can communicate and share resources c) A type of software used to create documents and presentations d) The physical casing that protects a computer's internal components
b) A collection of interconnected computers and devices that can communicate and share resources
Which topology requires a multipoint connection? a) Ring b) Bus c) Star d) Mesh
b) Bus
What is the term for the data communication system within a building or campus? a) MAN b) LAN c) PAN d) WAN
b) LAN
The checksum doesn't compute for a packet sent at the Internet Protocol (IP) level. What will happen to the data? a) The data will be sent back to the sending node with an error. b) The data will be discarded. c) The data will be resent. d) It will be sent, but may be out of order.
b) The data will be discarded.
How do two devices become part of a network? a) PIDs of the processes running of different devices are same b) a process in one device is able to exchange information with a process in another device c) a process is active and another is inactive d) a process is running on both devices
b) a process in one device is able to exchange information with a process in another device
The ______ field is used to detect errors over the entire user datagram. a) udp header b) checksum c) source port d) destination port
b) checksum
Which one of the following is not a function of network layer? a) congestion control b) error control c) routing d) inter-networking
b) error control
Which connection is necessary for a computer to join the internet? a) internet society b) internet service provider c) different computer d) internet architecture board
b) internet service provider
What is internet? a) A network of interconnected local area networks b) A collection of unrelated computers c) Interconnection of wide area networks d) A single network
c) Interconnection of wide area networks
What type of transmission is involved in communication between a computer and a keyboard? a) Half-duplex b) Full-duplex c) Simplex d) Automatic
c) Simplex
Which network topology requires a central controller or hub? a) Ring b) Bus c) Star d) Mesh
c) Star
In which scenario should you use the User Datagram Protocol (UDP)? a) When you are using instant messaging with a co-worker b) When you are sending an email c) When you are streaming a video d) When you make a phone call
c) When you are streaming a video
HTTP is an example of a(n) ______ layer protocol. a) transport b) data-link c) application d) network
c) application
Which of the following maintains the Domain Name System? a) a single server b) a single computer c) distributed database system d) none of the mentioned
c) distributed database system
When discussing IDS/IPS, what is a signature? a) It refers to "normal," baseline network behavior b) It is used to authorize the users on a network c) An electronic signature used to authenticate the identity of a user on the network d) Attack-definition file
d) Attack-definition file
Beyond IP, UDP provides additional services such as _______ a) Routing and switching b) Sending and receiving of packets c) Multiplexing and demultiplexing d) Demultiplexing and error checking
d) Demultiplexing and error checking
When a collection of various computers appears as a single coherent system to its clients, what is this called? a) mail system b) networking system c) computer network d) distributed system
d) distributed system