MIS 307 Exam 1- Lecture quizzes

Ace your homework & exams now with Quizwiz!

The most widely used LAN protocol is: TCP-IP Ethernet DNS DHCP

Ethernet

A destination port number at the transport layer identifies which application on a computer should receive the data transmission. True or False

True

The DNS root servers have only one job: to delegate name resolution to other DNS servers. True or False

True

The data link layer accepts messages from the network layer and controls the hardware that transmits them. True or False

True

When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet. physical layer packet multicast message X.25 message broadcast message application layer packet

broadcast message

The hexidecimal number 4A01 when converted to binary is: 010010100000000 0100101000010001 0100101000000001 0100101010000001

0100101000000001

Internet Message Access Protocol (IMAP) or Post Office Protocol (POP) are protocols used by a client to send messages from a mail server. True or False

False- RECEIVE

In step 5 of the DHCP process, the server sends a REQUEST (or DHCPREQUEST) packet, letting the client know that it intends to use the address. True or False

False- The client sends a REQUEST (or DHCPREQUEST) packet, letting the server know that it intends to use the address.

The top-level DNS servers delegate to hundreds of thousands of other top-level DNS servers. True or False

False- The top-level DNS servers delegate to hundreds of thousands of second-level DNS servers

TCP includes a sequence number to keep track of the total number of packets sent. True or False

False- adds sequence numbers to packets and reorders any packets that arrive in the wrong order

Digital transmission produces more errors than analog transmission. True or False

False- analog has more errors

With contention, a computer does not have to wait before it can transmit. A computer can transmit at anytime. True or False

False- have to wait otherwise have collision

DNS is normally responsible for translating IP address to host names. True or False?

False- host to IP addresses

The Internet's Transmission Control Protocol (TCP) uses the MTU to determine the minimum size of each packet in any transmission. True or False

False- minimum

An ARP entry is usually learned and is kept on a device for a certain amount of time, as long as it is being continually used. True or False

True

Because there is a limit on the length of a frame that the data link layer can transmit from node to node, the transport layer breaks up the message from the application layer into several smaller segments. True or False

True

DHCP dynamically assigns an IP address to a computer. True or False

True

For the requests from the Web browser to be understood by the Web server, they must use the same standard protocol or language. True or False

True

HTTP response status codes indicate whether a specific HTTP request has been successfully completed. True or False

True

In the OSI model, the application layer provides a set of utilities for applications and is the end user's access to the network. True or false?

True

Radio data transmission requires that each device has a radio receiver/transmitter and uses a specific frequency. True or False

True

A protocol data unit (PDU) is a term used in telecommunications that refers to: the language of data transmission information added or removed by a layer of the Internet model transport layer protocols the application layer

information added or removed by a layer of the Internet model

The application layer is the seventh layer of the Internet model and specifies the type of connection and the electrical signals that pass through it. True or false?

false- only 5 layers

Network layer functions include: providing services for an application program identifying all hosts in the network dealing with transmission errors regulating the flow of data

identifying all hosts in the network

Select a valid IPV6 address: 198.51.10.1 2001:db8:1f70:999:de8:7648:3a49:6e8 198.51.100.215 2001:db8:1f70:999:7648:3a49:6e8

2001:db8:1f70:999:de8:7648:3a49:6e8

HTTPS uses port number 80 21 143 443

443

The most common Error Detection Method is...... Parity Cyclical Redundancy Check Checksums Parity Check

Cyclical Redundancy Check

Star-Ring topology is most commonly used to implement wireless networks? True or False

False- Mesh topology

The newer form of IP, version 6 (IPv6): Is running out of address space to support the growth of the Internet Has a 20 byte header Has an increased address size from 32 bits to 128 bits Does not include version number in its header Does not include hop limit in its header

Has an increased address size from 32 bits to 128 bits

In DHCP, how does your computer finally choose an IP address? Question options: a)Sends the request to the DHCP server b)Send the request to another host on the network c)Broadcast the request on the network d)Contact the router to choose one

a)Sends the request to the DHCP server

A(n) _________ is a specially formatted request used to perform IP address to data link address resolution. Autonomous System Request Link state request HTTP request Address Resolution Protocol request Domain Service Request

Address Resolution Protocol request (ARP)

What do the twists in twisted pair cabling do to improve network communications? Reduces a specific type of interference, called EMI Resistant to interference and corrosion Data can travel longer distances Data will travel faster

Reduces a specific type of interference, called EMI

_________ is the process of determining the path that a message will travel from sending computer to receiving computer. Packetizing Addressing Routing Interfacing Broadcasting

Routing

With Client-Based Architecture, application software on the client computers contains presentation, application, and data access logic. True or false?

True

Network Address Translation (NAT): operates on a hub, usually connecting two networks together. allows you to use public IP addresses on the internal network. enables private IP networks that use unregistered IP addresses to connect to the Internet. is the feature implemented at Router to protect a network against Denial of Service attack.

enables private IP networks that use unregistered IP addresses to connect to the Internet.

The fourth layer of the OSI model is called the __________ layer. a. network b. transport c. session d. data link e. presentation

transport

Using HTTP version 1.0 a keep-alive: tells the server "please keep this connection open, I'll request more" True or False

False- 1.1

With Post Office Protocol (v3, therefore POP 3) emails remain on the mail server True or False

False- Does not remain on server

IPv6 uses 32-bit addresses as opposed to the 128-bit addresses used by IPv4 allowing for a substantially larger number of possible addresses. True or False

False- IPv6 used 128-bit addresses and IPv4 uses 32-bit addresses

In TCP/IP, the parts of the IP address that are used as the network and host addresses are fixed, so the network and host addresses can be determined without more information. True or False

False- Not FIXED

IP packets provide guaranteed delivery over the network. True or false?

False- not guaranteed

Each network interface on your computer is identified by a series of letters known as a MAC address True or False

False- numbers and letters

Polling is the process of permitting all clients to transmit or receive at any time True or False

False- periodically polls client to see if it has data to send

A physical circuit refers to the transmission characteristics of the connection, such as the speed at which data is being sent through the connection. True or False

False- physical is Cables, Wires

A URL is nothing more than the address of a given unique resource on the Web. True or False

True

What is the most common type of cabling used in networks? Multimode fiber Fiber Optic Twisted pairs Coaxial

Twisted pairs

In NDP Neighbor Solicitation does the following task; advertise their presence together with various link and Internet parameters either periodically, or in response to a Router Solicitation message. are used by nodes to respond to a Neighbor Solicitation message. are used by nodes to determine the link layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link layer address. inquire with Router Solicitation messages to locate routers on an attached link.Routers which forward packets not addressed to them generate Router Advertisements immediately upon receipt of this message rather than at their next scheduled time.

are used by nodes to determine the link layer address of a neighbor, or to verify that a neighbor is still reachable via a cached link layer address.

An endpoint is a locally unused port number for communication a port number combination of an IP address and a port number 16-bit number used to identify specific applications

combination of an IP address and a port number


Related study sets

Articles of Confederation, Constitutional Convention, and Ratification (oh my!)

View Set

Chapter 11 Exceptions and Advanced File I/O

View Set

Parte 5: Questiones de los examenes Software

View Set

PRACTICE QUESTIONS • RENAL SYSTEM •

View Set

CNA 234 / Chapter 1 - Introducing Active Directory (incomplete)

View Set

TQM Chapter 6: Quality in Customer-Supplier Relationships

View Set