Network and Security Midterm Review

Ace your homework & exams now with Quizwiz!

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source? A. Source port B. Acknowledgment number C. Data D. Checksum

D. Checksum

Which of the following is an example of Bluetooth? a) wide area network b) virtual private network c) local area network d) personal area network

d) personal area network

Which of the following devices forwards packets between networks by processing the routing information included in the packet? a) firewall b) bridge c) hub d) router

d) router

Retransmission of packets must not be done when _______ a) Packet is lost b) Packet is corrupted c) Packet is needed d) Packet is error-free

d) Packet is error-free

The transport layer handles multiplexing and demultiplexing through what type of device? a) Hubs b) Switches c) Routers d) Ports

d) Ports

Which of the following allows you to connect and login to a remote computer? a) SMTP b) HTTP c) FTP d) Telnet

d) Telnet

What are nodes in a computer network? a) the computer that routes the data b) the computer that terminates the data c) the computer that originates the data d) all of the mentioned

d) all of the mentioned

Which layer provides the services to user? a) physical layer b) presentation layer c) session layer d) application layer

d) application layer

Which of the following is used in an attempt to render a computer resource unavailable to its intended users? a) botnet process b) worms attack c) virus attack d) denial-of-service attack

d) denial-of-service attack

Which OSI layer is responsible for directing data from one LAN to another? A. Transport layer B. Network layer C. Data Link layer D. Physical layer

B. Network layer

At which OSI layer does IP operate? A. Application layer B. Transport layer C. Network layer D. Data Link layer

C. Network layer

What number does a host use to identify the application involved in a transmission? A. IP address B. MAC address C. Port number D. Sequence number

C. Port number

How many layers are there in the ISO OSI reference model? a) 7 b) 5 c) 4 d) 6

a) 7

Which of the following is false with respect to UDP? a) Connection-oriented b) Unreliable c) Transport layer protocol d) Low overhead

a) Connection-oriented

Two broad categories of congestion control are a) Open-loop and Closed-loop b) Open-control and Closed-control c) Active control and Passive control d) Active loop and Passive loop

a) Open-loop and Closed-loop

Which of this is not a network edge device? a) Switch b) PC c) Smartphones d) Servers

a) Switch

Which of the following is the network layer protocol for the internet? a) hypertext transfer protocol b) file transfer protocol c) ethernet d) internet protocol

d) internet protocol

What is the main advantage of UDP? a) More overload b) Reliable c) Low overhead d) Fast

c) Low overhead

Which of the following are Gigabit Ethernets? a) 1000 BASE-LX b) 1000 BASE-CX c) 1000 BASE-SX d) All of the mentioned

d) All of the mentioned

Which layer does the data link layer take packets from and encapsulate them into frames for transmission? a) transport layer b) application layer c) network layer d) physical layer

c) network layer

What is the term for an endpoint of an inter-process communication flow across a computer network? a) port b) machine c) socket d) pipe

c) socket

Which layer is responsible for process to process delivery in a general network model? a) session layer b) data link layer c) transport layer d) network layer

c) transport layer

Which is the correct expression for the length of UDP datagram? a) UDP length = IP length - IP header's length b) UDP length = UDP length - UDP header's length c) UDP length = IP length + IP header's length d) UDP length = UDP length + UDP header's length

a) UDP length = IP length - IP header's length

Application layer data lives in the _____ section of the transport layer protocol. a) data payload b) header c) footer d) flags

a) data payload

How is a single channel shared by multiple signals in a computer network? a) multiplexing b) phase modulation c) analog modulation d) digital modulation

a) multiplexing

Which of the following computer networks is built on the top of another network? a) overlay network b) prime network c) prior network d) chief network

a) overlay network

The instantiation of an endpoint in a potential TCP connection is known as a ______. a) socket b) port c) sequence number d) TCP segment

a) socket

Which of the following networks extends a private network across public networks? a) virtual private network b) local area network c) storage area network d) enterprise private network

a) virtual private network

What port does the File Transfer Protocol (FTP) typically listen on? a) 443 b) 21 c) 25 d) 80

b) 21

If a link transmits 4000 frames per second, and each slot has 8 bits, what is the transmission rate of the circuit using Time Division Multiplexing (TDM)? a) 500kbps b) 32kbps c) 32bps d) 500bps

b) 32kbps Explanation: Transmission rate = frame rate ** number of bits in a slot. Given: Frame rate = 4000/sec and number of bits in slot = 8. Thus, Transmission rate = (4000 * 8) bps = 32000bps = 32kbps

What is a computer network? a) A device used to display information on a computer screen b) A collection of interconnected computers and devices that can communicate and share resources c) A type of software used to create documents and presentations d) The physical casing that protects a computer's internal components

b) A collection of interconnected computers and devices that can communicate and share resources

Which topology requires a multipoint connection? a) Ring b) Bus c) Star d) Mesh

b) Bus

What is the term for the data communication system within a building or campus? a) MAN b) LAN c) PAN d) WAN

b) LAN

The checksum doesn't compute for a packet sent at the Internet Protocol (IP) level. What will happen to the data? a) The data will be sent back to the sending node with an error. b) The data will be discarded. c) The data will be resent. d) It will be sent, but may be out of order.

b) The data will be discarded.

How do two devices become part of a network? a) PIDs of the processes running of different devices are same b) a process in one device is able to exchange information with a process in another device c) a process is active and another is inactive d) a process is running on both devices

b) a process in one device is able to exchange information with a process in another device

The ______ field is used to detect errors over the entire user datagram. a) udp header b) checksum c) source port d) destination port

b) checksum

Which one of the following is not a function of network layer? a) congestion control b) error control c) routing d) inter-networking

b) error control

Which connection is necessary for a computer to join the internet? a) internet society b) internet service provider c) different computer d) internet architecture board

b) internet service provider

What is internet? a) A network of interconnected local area networks b) A collection of unrelated computers c) Interconnection of wide area networks d) A single network

c) Interconnection of wide area networks

What type of transmission is involved in communication between a computer and a keyboard? a) Half-duplex b) Full-duplex c) Simplex d) Automatic

c) Simplex

Which network topology requires a central controller or hub? a) Ring b) Bus c) Star d) Mesh

c) Star

In which scenario should you use the User Datagram Protocol (UDP)? a) When you are using instant messaging with a co-worker b) When you are sending an email c) When you are streaming a video d) When you make a phone call

c) When you are streaming a video

HTTP is an example of a(n) ______ layer protocol. a) transport b) data-link c) application d) network

c) application

Which of the following maintains the Domain Name System? a) a single server b) a single computer c) distributed database system d) none of the mentioned

c) distributed database system

When discussing IDS/IPS, what is a signature? a) It refers to "normal," baseline network behavior b) It is used to authorize the users on a network c) An electronic signature used to authenticate the identity of a user on the network d) Attack-definition file

d) Attack-definition file

Beyond IP, UDP provides additional services such as _______ a) Routing and switching b) Sending and receiving of packets c) Multiplexing and demultiplexing d) Demultiplexing and error checking

d) Demultiplexing and error checking

When a collection of various computers appears as a single coherent system to its clients, what is this called? a) mail system b) networking system c) computer network d) distributed system

d) distributed system


Related study sets

chapter 26: Assessing Male Genitalia and Rectum

View Set

SYSTEMS ANALYSIS AND DESIGN FINAL

View Set

FRL3000: Smartbook: CH14-Cost of Capital

View Set

Programming Final - Practice Exam Questions

View Set

IC Intro: Unit 1 - What's your name?

View Set

AP US History Exploration (Test questions)

View Set