Quiz review: "The Internet"
How are protocols like HTTP, SMTP, and IP created
A worldwide group of volunteers draft, revise, and publish protocols
Which of the following statements are true of the standards of the internet? A. Internet standards ensure that hardware and software created by different companies will be able to communicate with each other online B. Internet standards are specific procedures and rules that are created in order to benefit the Internet community C. Internet standards cannot be altered or removed once they are created D. Internet standards are written by one company with little to no outside feedback
A. Internet standards ensure that hardware and software created by different companies will be able to communicate with each other online B. Internet standards are specific procedures and rules that are created in order to
Which of the following states ments are true of the internet? A. Most network routing on the Internet is hierarchical B. Domain names and IP addresses are assigned randomly C. the structure of the internet makes it difficult to grow significantly D. most data can follow more than one path to the destination device
A. Most network routing on the Internet is hierarchical D. Most data can follow more than one path to the destination device
which of the following statements about IP Addresses is not true? A. There are no rules or guidelines for creating a new IP address B. Which IP address has a network prefix and may have various subnet and interface IDs C. Each of the octets in an address can be any number between 0 and 255 D. IP address might have prefixes to identify what routers or subnets to which the address belongs
A. There are no rules or guidelines for creating a new IP address
which of the following statements about redundancy on the internet are true? A. redundancy has good qualities; if several routers fail, data can still be transferred B. Redundancy has good qualities; many devices can be added to the network without affecting traffic C. Redundancy has bad qualities; it creates unnecessary routers in the network D. Redundancy has bad qualities; as more and more devices are added to the network
A. redundancy has good qualities; if several routers fail, data can still be transferred B. Redundancy has good qualities; many devices can be added to the network without affecting traffic
What is the primary reason that routing on the Internet is redundant?
Networks are still available in case of a path or router failure
Desktop computers, laptops, tablets, smartphones and other devices are made by different companies, yet they are all able to access the Internet. This has led to widespread use of the Internet. This has led to widespread use of the Internet from many different kinds of devices. Which of the following makes this possible?
Open standards and protocols
The new version of the internet protocol, IPv6, allows for IP addresses that are 128 bits long. How many possible IP addresses are available with IPv6?
2^128
Which of the following statement is TRUE regarding Internet protocols? A. The internet is the same thing as the World Wide Web B. HTTP is a protocol primarily used for electronic mail C. When a request is made by a client computer, HTTP ensures that the client is connected to the requested web page for the entire duration it's being viewed D. All of the above are false
All of the above are false
The Internet Engineering Task Force makes decisions by rough consensus, not by the majority of votes. What does this ensure about the internet?
Although the standards that govern the internet (like IP and DNS) might change, they will not be affected by a small group or party
Which of the following identifies a device using the internet
An IP Address
Which of the following statements is true regarding the networks that make up the internet? A. If one network crashes, all other networks are affected B. The World WIde Web is one of the networks that is connected to the internet C. Different types of networks can be connected in order to transfer data and communicate D. All devices that are connected on a network use the same protocol
C. Different types of networks can be connected in order to transfer data and communicate D. All devices that are connected on a network use the same protocol
Which of the following standards created by the IETF is always required? A. HTTP B. SMTP C. IP D. TCP
IP
A hacker intercepts a message from a DNS server and answers the request with his or her own IP address. Which of the following is the name for this kind of DNS attack?
DNS spoofing
Why is the Domain Name System useful?
Domain names are easier for humans to remember than the IP addresses of frequently visited websites
New websites are being created every day, yet internet users are still able to navigate the web and access information at the same speed. What makes this possible?
Hierarchical DNS
How does the hierarchical architecture of the DNS help the system scale
Host names can be found in a database that can be distributed over many servers
A new device is given an IP address and added to a network so that it can access the Internet. Large amounts of files are uploaded and downloaded on this new device, but other users who were already online do not experience any difference in performance. Which of the following enables this phenomenon?
Redundant routers
Which of the following statements about TCP/IP is false?
TCP/IP is exactly two sets of protocols (TCP and IP)
Which of the following statements are true of the Internet Engineering Task Force (IETF)?
The most important work of the IETF is to create and maintain protocols like HTTP and SMTP The IETF is completely made up of volunteers all over the world who do not need to attend meetings in person to participate
Tom sends Troy an email. Which of the following statements about the way the email is sent is NOT true? A. The email is split into packets of a fixed size B. Each packet knows the IP address of Troy's computer C. The packets all take different paths to get to Troy's computer D. The packers arrive at Troy's computer in the correct order so that they can be reassembled correctly
The packers arrive at Troy's computer in the correct order so that they can be reassembled correctly
Which of the following statements is an accurate interpretation of bandwidth speed?
The rate at which data is downloaded in a set amount of time
HTTP is an example of an open standard of the internet. What are the benefits of open standards like HTTP? A. They allow individuals to make changes to the standards for their own personal use B. They allow devices and applications across many networks to work together and communicate C. They are always being created and revised by Internet users around the world D. The are open for interpretation, meaning that everyone can use them in a different way
They allow devices and applications across many networks to work together and communicate They are always being created and revised by Internet users around the world
Why was IPv6 as the new version of the internet protocol
With only 32 bit IP addresses, the older version could not support the large number of devices connecting to the internet
Andrew uses an application to track how long it takes a packet to travel from his computer to a Wikipedia server. which of the following is he measuring with this application?
latency
A domain name consists of several domain labels separated by dots. Which of the following statements about domain name labels is NOT correct? A. every domain name ends with a top level domain label B. the hierarchy of domain name labels descends from left to right C. The left most label of the domain name identifies the server D. there is virtually no limit on the number of subdomains in a domain name
the hierarchy of domain name labels descends from left to right
Which of the following statements about packets is false? A. Each packet of information is sent independently B. It is possible that each packet might take a completely different path to the end host C. the packet does not contain information about the sender's IP address D. packet switching results in a decentralized network
the packet does not contain information about the sender's IP address