NetWorking

Ace your homework & exams now with Quizwiz!

UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00101010 and 11001100. What is the 1s complement of the sum of those two bytes?

00001001

UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00101010 and 11001100. What is the 1s complement of the sum of those two bytes?

00001001-

What is the 32-bit binary equivalent of the IP address 13.253.17.252?

00001101.1111101.00010001.11111100

What is the 32-bit binary equivalent of the IP address 13.253.17.252?

00001101.1111101.00010001.11111100-

What is the 32-bit binary equivalent of the IP address 13.253.17.253?

00001101.1111101.00010001.11111101

What is the 32-bit binary equivalent of the IP address 13.253.17.253?

00001101.1111101.00010001.11111101-

Assume the original message to be sent 101110, the generator is 1001. What is the remainder resulted during the CRC computation?

011

Assume the original message to be sent 101110, the generator is 1001. What is the remainder resulted during the CRC computation?

011-

UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00110111 and 01011100. What is the 1s complement of the sum of those two bytes?

01101100

UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00110111 and 01011100. What is the 1s complement of the sum of those two bytes?

01101100-

UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00111101 and 01010001. What is the 1s complement of the sum of those thow bytes?

01110001

UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00111101 and 01010001. What is the 1s complement of the sum of those thow bytes?

01110001-

UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00110111 and 01001100. What is the 1s complement of the sum of those two bytes?

01111100

UDP and TCP use 1s complement checksum. Suppose you have the followings 2 bytes: 00110111 and 01001100. What is the 1s complement of the sum of those two bytes?

01111100-

Which one is the flag used for framing in PPP?

01111110

flag used for framing in PPP

01111110

Which of the following can be an Ethernet physical address?

07:01:02:01:2C:4B

If an IPv6 address has digits of ________, we can abbreviate the address.

0s

At the CRC generate,...added the data unit before division process.

0s are

G At the CRC generate, ___ added the data unit before division process.

0s are

At the CRC generate, .... added the data unit before division process.

0s are-

G At the CRC generate, ___ added the data unit before division process.

0s are-

The target hardware address on an Ethernet is _______ in an ARP request.

0x000000000000

For control, NVT uses US ASCII characters with the highest order bit set to ______.

1

How many collision domains has the computer network with 88 computers, 10 hubs and 2 repeaters

1

There are 4 serial links between the client and the server, with the transmission rates being 1Mbps, 3Mbps, 2 Mbps, and 1 Mbps. What is the throughput between the client and the server?

1 Mbps

There are 4 serial links between the client and the server, with the transmission rates being 1Mbps, 3Mbps, 2 Mbps, and 1 Mbps. What is the throughput between the client and the server?

1 Mbps-

The default lease time of an IP address offer is ________.

1 hour

How many collision domains has the computer network with 88 computers, 10 hubs and 2 repeaters

1-

Consider sending a 5550-byte datagram into a link that has an MTU of 520 bytes (including IP header of 20 bytes). How many fragments are generated?

12

The VPI of an NNI is _______ bits in length.

12

The general header in SCTP is _______ bytes.

12

Consider sending a 5550-byte datagram into a link that has an MTU of 520 bytes (including IP header of 20 bytes). How many fragments are generated?

12-

What is the first address of a block of classless addresses if one of the addresses is 12.2.2.76/10?

12.0.0.0

What is the first address of a block of classless addresses if one of the addresses is 12.2.2.127/28?

12.2.2.112

What is the last address of a block of classless addresses if one of the addresses is 12.2.2.127/28?

12.2.2.127

What is the first address of a block of classless addresses if one of the addresses is 12.2.2.76/27?

12.2.2.64

What is the last address of a block of classless addresses if one of the addresses is 12.2.2.6/30?

12.2.2.7

If the segment has sequence number of 118 and length of 8 bytes, the receiving computer will send ACK with value of _________

126

If the segment has sequence number of 118 and length of 8 bytes, the receiving computer will send ACK with value of _________

126-

For a 1-byte length field, what is the maximum value for the data length?

127

A host with an IP address of 142.5.0.1 needs to test internal software. What is the destination address in the packet?

127.1.1.1

An IPv6 address is _________ bits long.

128

IPv6 has _______ -bit addresses.

128

How "big" is an IPv6 Internet address?

128 bits-

What is the total delay for transmission of 2000 Mb of text over fiber optic cable with distance of 3000 km with transmission rate of 2Gbps (ignore all other delay)?

12msec

What is the total delay for transmission of 2000 Mb of text over fiber optic cable with distance of 3000 km with transmission rate of 2Gbps (ignore all other delay)?

12msec-

If the segment has sequence number of 128 and length of 8 bytes, the receiving computer will send ACK with value of

136-

Consider an IP subnet with prefix 139.27.229.96/28. Which address belongs to the subnet?

139.27.229.100-

What is the result of ANDing 254 and 15?

14

Assume the RTT 50ms, the size of the Web object 0.4Mb and the transmission rate 10Mbps, how long does it take to download that object from a Web Server to a client if using non-persistent HTTP??

140ms

Assume the RTT 50ms, the size of the Web object 0.4Mb and the transmission rate 10Mbps, how long does it take to download that object from a Web Server to a client if using non-persistent HTTP??

140ms-

What is the result of ANDing 255 and 15?

15

A port address in TCP/IP is ______ bits long.

16

A port address in UDP is _______ long.

16

An IPv6 address consists of ________ bytes (octets);

16

An organization is granted a block of classless addresses with the starting address 199.34.76.64/28. How many addresses are granted?

16

The subnet mask for a class C network is 255.255.255.248. How many subnetworks are available?

16

The number of addresses in a class A block is _______.

16,777,216

SNMP uses the services of UDP on two well-known ports, _______ and _______.

161; 162

Given the subnet with address 201.14.78.0 and the subnet mask 255.255.255.0, which address belongs to that subnet?

201.14.78.64

Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address?

201.14.78.64-

Given the subnet with address 201.14.78.0 and the subnet mask 255.255.255.0, which address belongs to that subnet?

201.14.78.64-

FTP uses port____ for sending identification and password and port____ for sending data

21...20

FTP uses port____ for sending identification and password and port____ for sending data

21...20-

Assume the RTT 100ms, the size of the Web object 1kb and the transmission rate 100kbps, how long does it take to download that object from the Web Server to a client if using non-persistent HTTP?

210ms

Assume the RTT 100ms, the size of the Web object 1kb and the transmission rate 100kbps, how long does it take to download that object from the Web Server to a client if using non-persistent HTTP?

210ms-

In FTP, the well-known port ____ is used for the control connection and the well-known port ________ for the data connection.

21; 20

Which of the following is not a valid acknowledgment number?

232

Which one is not an IP address?

251.222.258.1

Which one is not an IP address?

251.222.258.1-

Which one is not an IP address?

254.322.255.1

Which one is not an IP address?

254.322.255.1-

Which one is not a contiguous mask?

255.148.0.0

In a block, the prefix length is /15; what is the mask?

255.254.0.0

In a block, the prefix length is /22; what is the mask?

255.255.252.0

The IP broadcast address is

255.255.255.255

Find the number of addresses in a block of classless addresses if one of the addresses is 12.2.2.7/24.

256

The number of addresses in a class C block is _______.

256

Which one is not an IP address?

256.222.255.1

Which one is not an IP address?

256.222.255.1-

What is the total delay for transmission of 1.25MB of images over fiber optic cable with distance of 4500 km with transmission rate of 1Gbps (ignore all other delays). Assume that the speed of propagation is 300,000km/sec.

25msec

What is the total delay for transmission of 1.25MB of images over fiber optic cable with distance of 4500 km with transmission rate of 1Gbps (ignore all other delays). Assume that the speed of propagation is 300,000km/sec.

25msec-

In classful addressing, the class of the address can be found by shifting the copy of the address ____ bits to the right.

28

How many duplicate ACKs to trigger the Fast Retransmission mode?

3

In classful addressing we need a routing table with at least ______ columns.

3

How many duplicate ACKs to trigger the Fast Retransmission mode?

3-

Assume that an image is about 1000 x 800 pixels with 1 byte/pixel and it is uncompressed. How long does it take to transmit it over a 2 Mbps channel?

3.2 sec

Assume that an image is about 1000 x 800 pixels with 1 byte/pixel and it is uncompressed. How long does it take to transmit it over a 2 Mbps channel?

3.2 sec-

A common value for MSL is between___ seconds and ___ minute(s).

30; 1

An IPv6 address can have up to __________ hexadecimal digits.

32

An organization is granted a block of classless addresses with the starting address 199.34.32.0/27. How many addresses are granted?

32

The checksum in SCTP is ________ bits.

32

Assume that the IP address has only 8 bits; first 5 bits are used for network and the remaining bits are used for host. How many subnets and hosts in each subnets can be addressed?

32 subnets and 8 hosts

assume that IP address has only 8 bits; first 5bit are used for subnet and the remaining bits are

32 subnets and 8 hosts

Assume that the IP address has only 8 bits; first 5 bits are used for network and the remaining bits are used for host. How many subnets and hosts in each subnets can be addressed?

32 subnets and 8 hosts-

In SCTP, chunks need to terminate on a _______boundary.

32-bit

While IPv4 address is ...bit-long, IPv6 address is ... bit-long

32....128

While IPv4 address is ...bit-long, IPv6 address is ... bit-long

32....128-

Suppose datagrams are limited to 1500bytes including IP header of 20 bytes. UDP header is 8 bytes. How many datagrams would be required to send an MP3 of 50000 bytes

34

Suppose datagrams are limited to 1500bytes including IP header of 20 bytes. UDP header is 8 bytes. How many datagrams would be required to send an MP3 of 50000 bytes

34-

A datagram of 1010 bytes needs _______ bytes of padding.

38

Find the number of addresses in a block of classless addresses if one of the addresses is 12.2.2.7/30.

4

In classless addressing, we need a routing table with at least _______ columns.

4

Multiply the header length field by _______ to find the total number of bytes in the TCP header.

4

The subnet mask for a class C network is 255.255.255.192. How many subnetworks are available?

4

While IPv4 is ...byte-long, IPv6 is ... byte-long

4....16

While IPv4 is ...byte-long, IPv6 is ... byte-long

4....16-

The options field of the TCP header ranges from 0 to _______ bytes.

40

Slotted Aloha efficiency (useful transmission time) is approximately

40%

Slotted Aloha efficiency (useful transmission time) is approximately

40%-

Suppose datagrams are limited to 1500bytes including IP header of 20 bytes. UDP header is 8 bytes. How many datagrams would be required to send an MP3 of 600,000 bytes

408

Suppose datagrams are limited to 1500bytes including IP header of 20 bytes. UDP header is 8 bytes. How many datagrams would be required to send an MP3 of 600,000 bytes

408-

Assume the one-way propagation delay 100ms, the size of the Web object 0.2Mb and the transmission rate 10Mbps, how long does it take to download that object from a Web Server to a client if using non-persistent HTTP?

420ms

Assume the one-way propagation delay 100ms, the size of the Web object 0.2Mb and the transmission rate 10Mbps, how long does it take to download that object from a Web Server to a client if using non-persistent HTTP?

420ms-

The maximum amount of padding that can be added is _______ bytes.

47

While MAC address is ___bit long, IP address is___ bit long

48...32

While MAC address is ___bit long, IP address is___ bit long

48...32-

Assume a website has only 5 different images, using non-persistent HTTP, a client needs ______ to the server

5 TCP connections

Assume a website has only 5 different images, using non-persistent HTTP, a client needs ______ to the server

5 TCP connections-

Suppose datagrams are limited to 1500bytes including IP header of 20 bytes. UDP header is 8 bytes. How many datagrams would be required to send an MP3 of 80000 bytes

55

Suppose datagrams are limited to 1500bytes including IP header of 20 bytes. UDP header is 8 bytes. How many datagrams would be required to send an MP3 of 80000 bytes

55-

1500bytes including IP header of 20byte. UDP header is 8 byte, send an MP3 of 80000 bytes

56

DHCP client can be in one of ___________ states.

6

Ethernet uses a ______ physical address that is imprinted on the network interface card (NIC).

6-byte

The destination address field in an Ethernet frame is

6-byte long

the destination address field in an ethernet fram is

6-byte long

The destination address field in an Ethernet frame is

6-byte long-

Assume that an image is about 1000 x 800 pixels with 1 byte/pixel and it is uncompressed. How long does it take to transmit it over a 1 Mbps channel?

6.4sec

Assume that an image is about 1000 x 800 pixels with 1 byte/pixel and it is uncompressed. How long does it take to transmit it over a 1 Mbps channel?

6.4sec-

A subnet mask in class A has 14 1s. How many subnets does it define?

64

What is the result of ANDing 192 and 65?

64

An organization has been granted a class A address. If the organization has 256 subnets, how many addresses are available in each subnet (including special addresses)?

65,534

The number of addresses in a class B block is _______.

65,534

In BOOTP, the server uses the well-known port _______; the client uses the well-known port _______.

67; 68

An IPv6 address can have up to __________ colons.

7

An organization is granted a block of classless addresses with the starting address 199.34.76.128/29. How many addresses are granted?

8

An organization is granted a block; one address is 2.2.2.64/25. If the subnet prefix length is /28, what is the maximum number of subnets?

8

The VPI of a UNI is _______ bits in length.

8

The subnet mask for a class B network is 255.255.224.0. How many subnetworks are available?

8

UDP packets have a fixed-size header of _______ bytes.

8

a subnet mask in class B has 19 1s. How many subnets does it define?

8

Which is a protocol for wireless LAN

802.11

Which is a protocol for wireless LAN

802.11-

In hexadecimal colon notation, a 128-bit address is divided into _______ sections, each _____ hexadecimal digits in length.

8: 4

A datagram of 402 bytes is divided into _______ cells.

9

Assume the RTT 40ms, the size of the Web object 0.2Mb and the transmission rate 20Mbps, how long does it take to download that object from a Web Server to a client if using non-persistent HTTP??

90ms

Assume the RTT 40ms, the size of the Web object 0.2Mb and the transmission rate 20Mbps, how long does it take to download that object from a Web Server to a client if using non-persistent HTTP??

90ms-

A sequence of 72 bits, after encoding using BASE64, become a sequence of

96 bits-

Suppose there are 3 routers between the source host and the destination host, 10ms is the processing delay at each router or host, 12ms is the propagation delay at each link, and 2ms is the transmission delay out of each router and the source, then the total delay is (ignore all other delays)

96ms

Suppose there are 3 routers between the source host and the destination host, 10ms is the processing delay at each router or host, 12ms is the propagation delay at each link, and 2ms is the transmission delay out of each router and the source, then the total delay is (ignore all other delays)

96ms-

Which organization has authority over interstate and international commerce in the communications field?

FCC

What are the two methods of circuit switching?

FDM and TDM

two famous techniques of channel partition

FDM and TDM

What are the two methods of circuit switching?

FDM and TDM-

The broadcast MAC address in LAN is

FF-FF-FF-FF-FF-FF

The broadcast MAC address in LAN is

FF-FF-FF-FF-FF-FF-

What flag is used to close TCP connection?

FIN

What flag is used to close TCP connection?

FIN-

In the _______ state, the client TCP has closed its connection to the server.

FIN-WAIT-2

If a label is terminated by a null string, it is called a __________.

FQDN

The HTTP request line contains a _______ method to get information about a document without retrieving the document itself.

HEAD

Which chunk probes the condition of an association?

HEARTBEAT chunk

The _______ field of the ATM header provides error control.

HEC

The second generation of cable networks is called a(n) _______ network.

HFC

_____________ is a language for creating Web pages.

HTML

_____________ is a language for creating Web pages.

HTML-

Protocol used to exchange email between email server is

HTTP

Which of the following is present in both an HTTP request line and a status line?

HTTP version number

Protocol used to exchange email between email server is

HTTP-

Which one is incorrect about UDP?

Has congestion control

Which one is incorrect about UDP?

Has congestion control-

This command identifies the sender of the message.

MAIL FROM

In _______, a logical tunnel is established by encapsulating the multicast packet inside a unicast packet.

MBONE

We can compare the task of network management to the task of writing a program. Both tasks need variable declarations. In network management this is handled by _________.

MIB

Which protocol helps to transfer non-plain text files such as image or audio files via SMTP email systems?

MIME

________ is a supplementary protocol that allows non-ASCII data to be sent through email.

MIME

_________ is a supplementary protocol that allows non-ASCII data to be sent through email.

MIME

Which protocol helps to transfer non-plain text files such as image or audio files via SMTP email systems?

MIME-

____________ is used to compress video.

MPEG

The actual mail transfer is done through ____________.

MTAs

When a datagram is encapsulated in a frame, the total size of the datagram must be less than the _______.

MTU

IMAP and POP are_________

Mail access protocols

IMAP and POP are_________

Mail access protocols-

And encoding technique used in Ethernet that encodes bit 1 a transition from up to down and bit 0 a transition from down to up (of electrical signal) is called

Manchester encoding

And encoding technique used in Ethernet that encodes bit 1 a transition from up to down and bit 0 a transition from down to up (of electrical signal) is called

Manchester encoding-

A three-character data frame: A FLAG B when framing methods using Flag bytes with byte stuffing, the output will be

A ESC FLAG B

A three-character data frame: A FLAG B when framing methods using Flag bytes with byte stuffing, the output will be

A ESC FLAG B-

________ provides service to the user to make the process of sending and receiving a message easier.

A UA

To connect to two similar LANs you use

A bridge

To connect to two similar LANs you use

A bridge-

Dijkstra's algorithm is

A link-state routing algorithm

_______ runs the SNMP client program; _______ runs the SNMP server program.

A manager; an agent

_________ address defines a group of computers.

A multicast

At the CRC checker,______if the data unit is damaged.

A nonzero remainder

Which of the following is an appropriate description concerning mobile network users?

A notebook computer used in a class

Which of the following is an appropriate description concerning mobile network users

A notebook computer used in a class-

Assume a website has only 15 different objects, using persistent HTTP, a client needs ______ to the server

A single TCP connection

Assume a website has only 15 different objects, using persistent HTTP, a client needs ______ to the server

A single TCP connection-

What is the combination of an IP address and a port number called?

A socket

What is the combination of an IP address and a port number called?

A socket-

hat is the combination of an IP address and a port number called

A socket-

Ethernet is

A type of LAN (Local Area Networks)

Ethernet is

A type of LAN (Local Area Networks)-

Which one is correct about P2P network?

A user computer can be both client and server

Which one is correct about P2P network?

A user computer can be both client and server-

In classless addressing,_______is assigned to an organization.

A variable-length block-

To find the physical address of the exiting-point router, ATM uses the services of _________.

ATMARP

In classless addressing, the prefix length defines the _____________.

C) mask

The number of addresses assigned to an organization in classless addressing _______.

C) must be a power of 2

The first address assigned to an organization in classless addressing _______.

B) must be evenly divisible by the number of addresses

A _______ certifies the binding between a public key and its owner.

CA

In TCP congestion control, two important variables the sender has to keep track are

Congestion window and the threshold

In TCP congestion control, two important variables the sender has to keep track are

Congestion window and the threshold-

Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNECT are for implementing

Connection-Oriented services in the Transport Layer

Those five primitives (Operations): LISTEN, CONNECT, RECEIVE, SEND, and DISCONNECT are for implementing

Connection-Oriented services in the Transport Layer-

What type of service that VC network provide?

Connection-oriented

What type of service that Virtual Circuit network provide?

Connection-oriented

What type of service that VC network provide?

Connection-oriented-

What type of service that Virtual Circuit network provide?

Connection-oriented-

Although HTTP is stateless, if the webserver wants to identify the users, ____is used

Cookies

Although HTTP is stateless, if the webserver wants to identify the users, ____is used

Cookies-

In the file distribution of the client-server model, the server has to send ____ of file to many hosts, consuming a large amount of_____

Copies...bandwidth

In the file distribution of the client-server model, the server has to send ____ of file to many hosts, consuming a large amount of_____

Copies...bandwidth-

Reliable data transfer in TCP ensures that data is delivered from sending process to receiving process__________

Correctly and in order

Reliable data transfer in TCP ensures that data is delivered from sending process to receiving process__________

Correctly and in order-

If the router's buffer memory is empty and no other packet is currently being transmitted, then the packet's____ will be zero

Queueing delay

If the router's buffer memory is empty and no other packet is currently being transmitted, then the packet's____ will be zero

Queueing delay-

Which delay mainly depends on the congestion of the network?

Queuing delay

Which delay mainly depends on the congestion of the network?

Queuing delay-

_______ is a dynamic mapping protocol in which a logical address is found for a given physical address.

RARP

This command identifies the receiver of the message in email.

RCPT TO

This command identifies the recipient of the mail.

RCPT TO

This command identifies the receiver of the message in email.

RCPT TO-

The metric used by _______ is the hop count.

RIP

In ________, the multicast packet must reach only those networks that have active members for that particular group.

RPM

Pruning and grafting are strategies used in _______.

RPM

_______ adds pruning and grafting to _______ to create a multicast shortest path tree that supports dynamic membership changes.

RPM; RPB

In TFTP, what type of message is sent to establish a connection to retrieve a file?

RRQ

___________ is a protocol for controlling the flow and quality of dat

RTCP

__________ is the protocol designed to handle real-time traffic on the Internet.

RTP

CSMA/CA belong to______ group, one of three broad classes of MAC protocols.

Random access

CSMA/CA belong to______ group, one of three broad classes of MAC protocols.

Random access-

The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with

Randomly generated number

The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a

Randomly generated number-

Which one is not in UDP segment header?

Receiving Windows

Which one is not in UDP segment header?

Receiving Windows -

In______resolution, the resolver expects the server to supply the final answer.

Recursive

In __________ resolution, the resolver expects the server to supply the final answer.

Recursive-

Which one best describes the advantage(s) of using cache in proxy server?

Reduce the delay time to download content from the remove a remove web server

Which one best describes the advantage(s) of using cache in proxy server?

Reduce the delay time to download content from the remove a remove web server-

In Congestion avoidance of TCP congestion control, if timeout occurs while the current congestion window size is 16, the congestion window will_______________

Reduce to 1

In Congestion avoidance of TCP congestion control, if timeout occurs while the current congestion window size is 16, the congestion window will_______________

Reduce to 1-

In Congestion avoidance of TCP congestion control, when timeout occurs, the congestion window_______________

Reduces to 1

In Congestion avoidance of TCP congestion control, when timeout occurs, the congestion window_______________

Reduces to 1-

in congestion controlCongestion avoidance of TCP congestion control, when timeout occurs, the congestion window_______________

Reduces to 1-

TCP is a (an) _______ transport protocol.

Reliable

TCP is a (n)__________transport protocol.

Reliable

That an application can rely on the connection to deliver all of its data without error and in the proper order is called

Reliable data transfer

______ in the Internet is achieved through the use of acknowledgments and retransmissions.

Reliable data transfer

That an application can rely on the connection to deliver all of its data without error and in the proper order is called

Reliable data transfer-

______ in the Internet is achieved through the use of acknowledgments and retransmissions.

Reliable data transfer-

_____ in link layer guarantees to move each _____ datagrams across the link without error

Reliable delivery.....network

_____ in link layer guarantees to move each _____ datagrams across the link without error

Reliable delivery.....network-

TCP is a (an) _______ transport protocol.

Reliable-

IMAP is designed to allow users to manipulate______, so it is more_______ than POP3

Remote mailboxes.... Complex

IMAP is designed to allow users to manipulate______, so it is more_______ than POP3

Remote mailboxes.... Complex-

In OSI model, as data packet moves from the lower to the upper layer header are¡..

Removed

In the OSI model, as a data packet moves from the lower to the upper layers, headers are____

Removed

In the OSI model, as a data packet moves from the lower to the upper layers, headers are____

Removed-

Which is the function of NAT router?

Replacing source IP address and port # with NAT IP address and new port # for every outgoing datagram and doing vice verse for every incoming datagram

Which is the function of NAT router?

Replacing source IP address and port # with NAT IP address and new port # for every outgoing datagram and doing vice verse for every incoming datagram-

Which the following is the individual characteristic of rdt3.0?

Requires countdown timer.

Which the following is the individual characteristic of rdt3.0?

Requires countdown timer.-

An SNMP agent can send _______ messages.

Response, Trap

Who can send ICMP error-reporting messages?

Routers and destination hosts

Who can send ICMP error-reporting messages?

Routers and destination hosts-

_______ deals with the issues of creating and maintaining routing tables.

Routing

IPSec requires a logical connection between two hosts using a signaling protocol called ____________.

SA

Which chunk is not involved in association establishment?

SACK chunk

_______ is suitable for businesses that require comparable upstream and downstream data rates.

SDSL

AAL5 is sometimes called the _________.

SEAL

___________ is an application protocol that establishes, manages, and terminates a multimedia session

SIP

A set of rules or guidelines that govern interactions between two computer systems in a computer network is called_____

Network protocols

.... are sets of rules or guidelines that govern interactions between two computer systems in a computer network

Network protocols-

Which layer does ICMP reside in?

Network-

The value of the acknowledgment field in a segment defines the number of the ______byte a party expects to receive.

Next

The value of the acknowledgment field in a segment defines the number of the ______byte a party expects to receive.

Next-

Which of the following is true about ICMP messages?

No ICMP error message will be generated for a datagram having a special address such as 127.0.0.0 or 0.0.0.0.

In a Datagram networks,

No call setup and packets may take different paths for the same source-destination pair

In a Datagram networks,

No call setup and packets may take different paths for the same source-destination pair-

SMTP, POP3, and IMAP protocols run on the following layer:

None of them

Skype is a

None of them

With the following Manchester encoding, the bit stream transmitted is _____

None of them

Which layer in the Internet that connects directly to wire?

None of them, physical

SMTP, POP3, and IMAP protocols run on the following layer:

None of them-

Skype is a

None of them-

With the following Manchester encoding, the bit stream transmitted is _____

None of them-

What is the throughput of a link in a network?

Number of bits travelling through the link in a unit time

IP Version 5 was a proposal based on the ______ model. This version never went beyond the proposal stage due to extensive layer changes and the projected expense.

OSI

The _______ model shows how the network functions of a computer ought to be organized.

OSI

We can compare the task of network management to the task of writing a program. Both tasks need rules. In network management this is handled by ___________.

SMI

________ defines the general rules for naming objects, defining object types, and showing how to encode objects and values.

SMI

__________ creates a collection of named objects, their types, and their relationships to each other in an entity to be managed.

SMI

SNMP uses two other protocols:________ and _________.

SMI; MIB

We can compare the task of network management to the task of writing a program. Both tasks have actions performed by statements. In network management this is handled by _______.

SMNP

The formal protocol that defines the MTA client and server in the Internet is called ___________.

SMTP

Which one is correct about SMTP?

SMTP restricts the body of all mail messages to be in simple seven-bit ASCII.

Which one is correct about SMTP?

SMTP restricts the body of all mail messages to be in simple seven-bit ASCII.-

To distinguish between different data chunks belonging to the same stream, SCTP uses ___________.

SSNs

The request and reply message can be used to bind a physical address to an IP address in a(n) _______ situation.

SVC

What network device decreases collision?

SWITCH-

The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.

SYN flooding

The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.

SYN flooding-

The ability of P2P networks to handle many peers is called

Scalability

The ability of P2P networks to handle many peers is called

Scalability-

What is the data unit used in TCP?

Segment

What is the data unit used in TCP?

Segment-

Which of the following is the pipelining protocol:

Selective Repeat

Which of the following is the pipelining protocol:

Selective Repeat-

Switch has a characteristic of

Self-learning

Switch has a characteristic of

Self-learning-

________ defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation.

Semantics

_______ are used to number the packets of a real-time transmission.

Sequence numbers

One of the most importance purposes of computer networks is to (select one BEST answer)

Share the common resource

One of the most importance purposes of computer networks is to (select one BEST answer)

Share the common resource-

SMTP stands for

Simple Mail Transfer Protocol

If ASCII character H is sent and the character I is received, what type of error is this?

Single-bit

Which of the following is hybrid of client-server and P2P?

Skype

Which of the following is hybrid of client-server and P2P?

Skype-

To accomplish flow control, TCP uses a ___________ window protocol.

Sliding-

In the ________ algorithm of the TCP congestion control, the size of the congestion window increases exponentially until timeout

Slow start

The higher the _____ of the router, the lower the ______

Speed....processing delay

The lower the _____ of the router, the higher the ______

Speed....processing delay

The higher the _____ of the router, the lower the ______

Speed....processing delay-

The lower the _____ of the router, the higher the ______

Speed....processing delay-

The most popular Ethernet network topology today is

Star

The most popular Ethernet network topology today is

Star-

Although HTTP is____, if the webserver wants to identify the users, ____is used

Stateless...Cookies

Although HTTP is____, if the webserver wants to identify the users, ____is used

Stateless...Cookies-

A_____document is created by a Web server whenever a browser requests the

Static-

NAT table in router

Store pairs of the host's IP address and the port number

NAT table in router

Store pairs of the host's IP address and the port number-

TCP allows the sending process to deliver data as a_____of bytes and allows the receiving process to obtain data as a_____of bytes.

Stream; stream

___________ audio/video refers to the broadcasting of radio and TV programs through the Internet.

Streaming live

________ audio/video refers to on-demand requests for compressed audio/video files.

Streaming stored

_____audio/video refers to on-demand requests for compressed audio/video files.

Streaming stored

audio/video refers to on-demand requests for compressed audio/video files.

Streaming stored-

What is the difference between the switch and the bridge?

Switch can handle multiple data flow while bridge can handle single one

What is the difference between the switch and the bridge?

Switch can handle multiple data flow while bridge can handle single one-

_________ cryptography is often used for long messages.

Symmetric-key

Which one is best correct about symmetric-key cryptography and asymmetric-key cryptography?

Symmetric-key cryptography has the same key for both sender and receiver while asymmetric-key cryptography not

Which one is best correct about symmetric-key cryptography and asymmetric-key cryptography?

Symmetric-key cryptography has the same key for both sender and receiver while asymmetric-key cryptography not-

Manchester encoding is to

Synchronize between the sender and the receiver

Manchester encoding is to

Synchronize between the sender and the receiver-

SONET is an acronym for _______ Network.

Synchronous Optical

_______ refers to the structure or format of the data, meaning the order in which they are presented..

Syntax

FTP uses the services of ________.

TCP

HTTP uses the services of _________ on well-known port 80.

TCP

HTTP, FTP, SMTP and POP3 run on top of...

TCP

_____ provides reliable, in-order transfer of bytes between client and server

TCP

_________ is not suitable for interactive multimedia traffic because it retransmits packets in case of errors.

TCP

__________ provides full transport layer services to applications.

TCP

Those followings: a) Slow start; b) Congestion avoidance c) Fast retransmit; d) Fast recovery, are mechanisms of____________

TCP -

c) Fast retransmit; d) Fast recovery, are mechanisms of____________

TCP congestion control-

Which one is correct about TCP and UDP?

TCP is reliable transmission and it has congestion control and flow control while UDP is not

BGP messages are encapsulated in _______.

TCP segments

The different between TCP and UDP is

TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections

The different between TCP and UDP is

TCP sets up connections, send data, and the terminate the connection while UDP just sends data without setting connections-

FTP uses ____ connection to the server with port numbers ____.

TCP ¡. 20 and 21

HTTP uses the services of _________ on well-known port 80.

TCP-

HTTP, FTP, SMTP and POP3 run on top of...

TCP-

Electronic mail uses ____ while streaming multimedia typically uses___________________

TCP........UDP

Electronic mail uses ____ while streaming multimedia typically uses___________________

TCP........UDP-

_______ is the protocol suite for the current Internet.

TCP/IP

Which of the following is true of the IP address 231.1.2.3?

The class is D.

In ________, if timeout occurs while the current congestion window size is 64, the congestion window will reduce to 1

The congestion avoidance phase of TCP congestion control

In ________, if timeout occurs while the current congestion window size is 64, the congestion window will reduce to 1

The congestion avoidance phase of TCP congestion control-

In the congestion avoidance phase of TCP congestion control, if ____ occurs while the current congestion window size is 32, the congestion window will____

Timeout......reduce to 1

In the congestion avoidance phase of TCP congestion control, if ____ occurs while the current congestion window size is 32, the congestion window will____

Timeout......reduce to 1-

_______ refers to two characteristics: when data should be sent and how fast it can be sent.

Timing

Which statement is correct about tracert program?

To determine a router on the path, the program sends three packets with the same TTL

Which statement is correct about tracert program?

To determine a router on the path, the program sends three packets with the same TTL-

What is the purpose of the IEEE 802 commitlee?

To develop LAN standards

What is the purpose of the IEEE 802 commitlee

To develop LAN standards-

What is tracert (in Windows machine) or traceroute (in Linux machine) program for?

To find the route path between the sender and receiver and to measure transit times of packets along the path

What is tracert or traceroute program for?

To find the route path between the sender and receiver and to measure transit times of packets along the path

What is tracert (in Windows machine) or traceroute (in Linux machine) program for?

To find the route path between the sender and receiver and to measure transit times of packets along the path-

What is tracert or traceroute program for?

To find the route path between the sender and receiver and to measure transit times of packets along the path-

One important role of the Transport Layer is to

To multiplex and de-multiplex messages

One important role of the Transport Layer is to

To multiplex and de-multiplex messages-

In DNS, TLD is short for

Top-Level Domain

In DNS, TLD is short for

Top-Level Domain-

____ are responsible for domains such as com, org, gov, and all of the country domains such as uk, fr, ca, and jp

Top-level domain servers

____ are responsible for domains such as com, org, gov, and all of the country domains such as uk, fr, ca, and jp

Top-level domain servers-

In TCP, what can happen if timeout is much larger than the round-trip time?

When a segment is lost, TCP would not quickly retransmit the segment, resulting in long data transfer delays into the application-

In TCP, what can happen if timeout is much larger than the round-trip time?

When a segment is lost, TCP would not quickly retransmit the segment, resulting in long data transfer delays into the application.

Regarding TCP, what can happen if timeout is much larger than the round-trip time?

When a segment is lost, TCP would not quickly retransmit the segment, resulting in long data transfer delays into the application.

Regarding TCP, what can happen if timeout is much larger than the round-trip time?

When a segment is lost, TCP would not quickly retransmit the segment, resulting in long data transfer delays into the application.-

In _______ delivery, packets of a message are logically connected to one another.

a connection-oriented

In _______ delivery, a packet is not connected to any other packet.

a connectionless

To prevent unnecessary traffic, IGMP uses ______________ strategy.

a delayed response

In _______ delivery, both the deliverer of the IP packet and the destination are on the same network.

a direct

IGMP is _______ protocol.

a group management

At the CRC checker, __________ if the data unit is damaged.

a nonzero remainder

At the CRC checker, __________ if the data unit is damaged.

a nonzero remainder-

In TFTP, A DATA block is sent in response to a _______ message.

a or b

On a network that uses NAT, the router can use _______ global address(es).

a pool of

When a mobile host wants to register with its foreign agent, it sends _______ message.

a registration request

An HTTP request message always contains _______.

a request line and a header

An HTTP request message always contains _______.

a request line and a header-

A response message always contains _______.

a status line and a header

When the IP layer of a receiving host receives a datagram, _______.

a transport layer protocol takes over

Ethernet is

a type of lan-

In IPv6, _______ address defines a single computer.

a unicast

The association identifier in SCTP is __________________ .

a unique verification tag

In classless addressing, __________ is assigned to a organization.

a variable-length block

In classless addressing, __________ is assigned to an organization.

a variable-length block

In classless addressing, __________ is assigned to an organization.

a variable-length block-

In BOOTP, the client uses ________ port and the server uses _________port.

a well-known; a well-known

TELNET uses only one TCP connection. The server uses ________ port and the client uses ________ port.

a well-known; an ephemeral

For many applications, we need a program or a script to be run at the client site. These are called _______________ documents.

active

The main problem that must be solved in providing mobile communication using the IP protocol is ____________.

addressing

If a router acts as an agent, it advertises its presence in a network by appending an agent _______ message to an ICMP router advertisement.

advertisement

In the _______ phase, a mobile host must learn the address of its foreign agent.

agent discovery

In the _______ phase, a mobile host must learn the address of its home agent.

agent discovery

The first phase in mobile communication is called _________.

agent discovery

Which of the following services is not provided by a UA?

all are

What does the URL need to access a document

all are correct-

Distance vector routing algorithm requires

all nodes to know link costs to their neighbours

In the OSI model, which of the following is an application layer service?

all of the above

SCTP strategies for congestion control include _______.

all of the above

An ICMP message has _____ header and a variable-size data section.

an 8-byte

A TCP segment is encapsulated in __________.

an IP datagram

UDP packets are encapsulated in ___________ .

an IP datagram

To distinguish between different streams, SCTP uses ___________.

an SI

TCP uses _________________ to check the safe and sound arrival of dat

an acknowledgment mechanism

TCP uses _________________ to check the safe and sound arrival of dat

an acknowledgment mechanism-

An applet is _______ document application program.

an active

In IPv6, ____ address defines a group of computers with addresses that have the same prefix.

an anycast

The RSA algorithm uses _______ cryptography method.

an asymmetric-key

To determine whether or not a node is reachable, _______ message can be sent.

an echo-request

The root of the DNS tree is _______.

an empty string

In _______ delivery, the deliverer of the IP packet and the destination are on different networks.

an indirect

On a network that uses NAT, _______ initiates the communication.

an internal host

In the DNS, the names are defined in ___________ structure

an inverted-tree

In the DNS, the names are defined in ___________ structure.

an inverted-tree

In the DNS, the names are defined in ___________ structure

an inverted-tree-

A proxy firewall filters at the __________ layer.

application

In the sending computer, UDP receives a data unit from the _______ layer.

application

The job of gathering data at the source host from different.....,enveloping the data with header information to create ....is called multiplexing

application processes.... segments

The job of gathering data at the source host from different.....,enveloping the data with header information to create ....is called multiplexing

application processes.... segments-

Options in SCTP ____________________________.

are handled by defining new chunk types

During an FTP session the data connection is opened _______.

as many times as necessary

A connection in SCTP is called an ____________.

association

In SCTP, TSN is a cumulative number identifying the _______; SI defines the _______; SSN defines the ________.

association; stream; chunks in a stream

In __________ cryptography, everyone has access to everyoneís public key.

asymmetric-key

What type of DNS Server has the IP addresses of all names in the Autonomous?

authoritative

What type of DNS Server has the IP addresses of all names in the Autonomous?

authoritative-

For purposes of routing, the Internet is divided into ___________.

autonomous systems

In SCTP, duplicate messages are _______.

b and c

What is needed to determine the number of the last byte of a fragment?

b and c

In IPv6, options are inserted between the _________ and the ___________ dat

base header; upper-layer data

In the _______ encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits.

base64

In the _______ encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits.

base64-

In fixed-length subnetting, the number of subnets must _______.

be a power of 2

In an SCTP packet, control chunks come ___________ data chunks.

before

In computer networking, hosts are sometimes divided into two categories:

clients and servers

In computer networking, hosts are sometimes divided into two categories

clients and servers-

When the mobile host acts as a foreign agent, the care-of address is called a _______ care-of address.

co-located

what are the communication links

coaxial cable, copper wire, fiber optic, an radio spectrum-

There are two types of user agents: _________ and ___________.

command-driven and GUI-based

In the __________ algorithm the size of the congestion window increases additively until congestion is detected.

congestion avoidance

In the congestion detection algorithm, if detection is by three ACKs, a new _______ phase starts.

congestion avoidance

In the congestion avoidance phase of TCP congestion control, if the timeout occurs while the current______ size is 64, the ____size will reduce to 1

congestion window.... congestion window

In the congestion avoidance phase of TCP congestion control, if the timeout occurs while the current______ size is 64, the ____size will reduce to 1

congestion window.... congestion window-

What is the first step in establishing a virtual connection on an ATM network?

connecting to an ATMARP server

The value of the window scale factor can be determined during __________.

connection establishment

those five primitivesv(operation): listen, connect, receive, send and disconnect are for implementing

connection-oriented services-

The Internet provides two types of services to its applications:

connectionless service and connection-oriented service.

The Internet provides two types of services to its applications:

connectionless service and connection-oriented service.-

UDP is called a ________________transport protocol.

connectionless, unreliable

The MIME _______ header uses text to describe the type of data in the body of the message.

content-description

Urgent data requires the urgent pointer field as well as the URG bit in the _______ field.

control

In SCTP, the acknowledgment number and window size are part of each ________.

control chunk

The control information in SCTP is included in the ________.

control chunks

in the file distribution of the client-server model, the server has to send

copies..large-

The value of the ________ subfield in an option controls the presence of the option in fragmentation.

copy

Both private and hybrid networks have a major drawback: _________.

cost

The ____________ domain section uses two-character country abbreviations.

country

The acknowledgment number in TCP segment is ________.

cumulative

The acknowledgment number is ________.

cumulative

According to the PPP transition state datagram, exchange of user control and data packets occurs in the...state

d. Establishing-

K x 512 bit times befor sesing

dai nhat

is the individual chracteristic of switch

dai nhat

CSMA/CD stands for

dai nhi

An SCTP sequence number (TSN) is located in the _______.

data chunk header

The third phase of JPEG is ___________.

data compression

In FTP, which category of commands sets the attributes (file type, data structure, and transmission modes) of a file to be transferred?

data formatting commands

The ______ layer is responsible for moving frames from one hop (node) to the next.

data link

In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______.

data structures

The third phase in mobile communication is called _________.

data transfer

MOSPF is a _______ protocol.

data-driven

NVT uses two sets of characters, one for _____and one for __________.

data; control

In OSPF, the ________ message does not contain complete database information; it only gives an outline, the title of each line in the database.

database description

what is the data unit used in Internet Protocol

datagram

There are two broad classes of packet-switched networks are:

datagram network and virtual-circuit network

Packets in the IP layer are called _________ .

datagrams

Lost acknowledgments may create a _______ if they are not handled properly.

deadlock

In _______ forwarding, the mask and destination addresses are both 0.0.0.0 in the routing table.

default

In the _______ mode, the echoing is done by the client.

default

Jitter is introduced in real-time data by the _______________.

delay between packets

Jitter is introduced in real-time data by the _______________.

delay between packets-

UDP uses _______ to handle incoming user datagrams that go to different processes on the same host.

demultiplexing

The SYN flooding attack belongs to a group of security attacks known as a _____ attack.

denial of service

PIM-DM is used in a _______ multicast environment, such as a LAN.

dense

In SCTP, control information and data information are carried in _______ chunks.

different chunks

In classful addressing, when an indirect delivery is made, the deliverer and receiver have _______.

different netids

The IP header field formerly known as the service type field is now called the _______ field.

differentiated services

In ________, each node maintains a vector (table) of minimum distances to every node.

distance vector

The Routing Information Protocol (RIP) is an intradomain routing based on _________ routing.

distance vector

in _______ routing, the least cost route between any two nodes is the route with the minimum distance.

distance vector

As leamed in class, computer networks a classified base on

distance, switching-

The WWW today is a _______ client-server service, in which a client using a browser can access a service using a server.

distributed

In IGMP, the general query message ___________________ group.

does not define a particular

A _________ is a subtree of the domain name space.

domain

To have a hierarchical name space, a ______________ was designed.

domain name space

A full domain name is a sequence of labels separated by ________.

dots

A traditional TV network transmits signals _______.

downstream

A proposed standard is elevated to ________ standard status after at least two successful tries.

draft

A _______ document is created by a Web server whenever a browser requests the document.

dynamic

A _______ routing table is updated periodically using one of the adaptive routing protocols.

dynamic

A _______ routing table is updated periodically using one of the dynamic routing protocols.

dynamic

The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports.

dynamic

routing table is updated periodically using one of the adaptive routing protocol

dynamic

A _______ document is created by a Web server whenever a browser requests the document.

dynamic-

In the domain name chal.atc.fhdedu, _______ is the least specific label.

edu

DNS can use the services of ________ using the well-known port 53.

either a or b

Tunneling is a technique in which the IP datagram is first _______ and then _______.

encrypted; encapsulated in another datagram

In the asymmetric-key method of cryptography, which key is publicly known?

encryption key only

Flow control _____.

ensures the sender does not too much data that may overwhelm the receiver+ has two techniques: Stop and Wait and Sliding window-

In ___________, the entity identity is verified once for the entire duration of system access.

entity authentication

The ________ usually contains the sender address, the receiver address, and other information

envelope

The ________ usually contains the sender address, the receiver address, and other information.

envelope

The ________ usually contains the sender address, the receiver address, and other information

envelope-

The _______ field in the SNMP PDU is an offset that points to the variable in error.

error index

The _______ field in the SNMP PDU reports an error in a response message.

error status

To make addresses more readable, IPv6 specifies ____________notation.

hexadecimal colon

In a _________name space, each name is made of several parts.

hierarchical

In the digital signature technique when the whole message is signed using an asymmetric key, the sender of the message uses _______ to sign the message.

his or her own private key

The registration reply is sent by the _______ agent to the foreign agent.

home

The _________ acts on behalf of the mobile host when a remote host sends a packet to the mobile host.

home agent

The ___________ is usually a router attached to the home network of the mobile host.

home agent

A mobile host normally uses two addresses. The host has its original address, called the _______ address and a temporary address, called the _________address.

home; care-of

The _______ field in the base header restricts the lifetime of a datagram.

hop limit

In a URL, the ______ is the computer on which the information is located.

host

A _______ can learn about network _______ by sending out a router-solicitation packet.

host, routers

In _______ forwarding, the full IP address of a destination is given in the routing table.

host-specific

IP is responsible for _______ communication while TCP is responsible for _______ communication.

host-to-host; process-to-process

Using the limited broadcast address, a _______ sends a packet to _______ on the network.

host; all other hosts

A _______ network allows an organization to have its own private internet and, at the same time, access the global Internet.

hybrid

A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication.

hybrid

The total length field defines the total length of the datagram _________.

including the header

When the DHCP client first starts, it is in the _______ state.

initializing

The _______ module receives an IGMP report or query.

input

The ARP component that sends an ARP reply to the data link layer is the _______.

input module

Routing between autonomous systems is referred to as ____________.

interdomain routing

based on distance, two most important types of computer networks are

internet and local area networks-

Routing inside an autonomous system is referred to as _______________.

intradomain routing

An _______ is a private network with no external access that uses the TCP/IP protocol suite.

intranet

A pointer query involves the _______ domain.

inverse

The _________ domain is used to map an address to a name.

inverse

the ability to inject packets into the internet with a false source ip address

ip spoofing-

The IP header size _______.

is 20 to 60 bytes long

In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query.

iterative

In __________ resolution, the resolver expects the server to supply the final answer.

iterative-

In distance vector routing, each node periodically shares its routing table with _________ and whenever there is a change.

its immediate neighbors

To prevent _________, we can timestamp the packets and separate the arrival time from the playback time.

jitter

The _______ timer prevents a long idle connection between two TCPs.

keepalive

The routers running the BGP protocols exchange _______ messages regularly to tell each other that they are alive.

keepalive

Each node in the tree has a _______, which is a string with a maximum of ___ characters.

label; 63

When we use IP over ATM, only the ________ cell carries the 8-byte trailer added to the IP datagram.

last

When we use IP over ATM, padding can be added only to the _____ or the _______.

last cell; last two cells

The acknowledgment in SCTP defines the cumulative TSN, the TSN of the ____________ .

last data chunk received in order

The number of states in the state transition diagram of SCTP is __________ the number of states in the state transition diagram of TCP.

less than

The _________ ordering enables a manager to access a set of variables one after another by defining the first variable.

lexicographic

In the ____ mode, line editing (echoing, character erasing, line erasing, and so on) is done by the client.

line

A _______ address is used if a LAN uses the Internet protocols but is not connected to the Internet for security reasons.

link local

The Multicast Open Shortest Path First (MOSPF) protocol is an extension of the OSPF protocol that uses multicast routing to create source-based trees. The protocol is based on _______ routing.

link state

The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on _______ routing.

link state

The _________ routing uses the Dijkstra algorithm to build a routing table.

link state

In OSPF, a _________ message is sent by a router that needs information about a specific route or routes.

link state request

When a user logs into a local time-sharing system, it is called ________ login.

local

In the Internet, the email address consists of two parts: a _______ and a _______.

local part; domain name

IGMP operates __________.

locally

A _______ address is an internetwork address with universal jurisdiction.

logical

When a host on network A sends a message to a host on network B, which address does the router look at?

logical

The principle of ________ states that the routing table is sorted from the longest mask to the shortest mask.

longest mask matching

applications typically uses

loss-tolerant..udp-

In a _______ attack, an intruder comes between two communicating parties, intercepting and replying to their messages.

man-in-the-middle

The inclusion of the checksum in the TCP segment is ________.

mandatory

A _________ address comprises 80 bits of zero, followed by 16 bits of one, followed by the 32-bit IPv4 address.

mapped

The inverse request and inverse reply can also be used to build the server _______ table.

mapping

In classless addressing, the prefix length defines the _____________.

mask

In classless addressing, the prefix length defines the _____________.

mask-

Which option defines the maximum number of bytes in a TCP segment?

maximum segment size

In FTP, _______ is the service type used by the IP protocol because this is an interactive connection between a user (human) and a server.

minimize delay

In TCP, the size of the window is the ________ of rwnd and cwnd.

minimum

A _______ adds signals from different sources to create a single signal.

mixer

IPv6 allows _________ security provisions than IPv4.

more

A real-time video performance lasts 10 min. If there is jitter in the system, the viewer spends _______ minutes watching the performance.

more than 10

A one-to-many communication between one source and a specific group of hosts is classified as a _______ communication.

multicast

IGMP helps a ________ router create and update a list of loyal members related to each router interface.

multicast

In a real-time video conference, data from the server is _______ to the client sites.

multicast

The least significant 23 bits in a 48-bit Ethernet address identify a ________.

multicast group

In _______, the router may forward the received packet through several of its interfaces.

multicasting

Real-time traffic needs the support of ____________.

multicasting

Emulation of ________ through ___________ is not efficient and may create long delays.

multicasting; multiple unicasting

The association identifier in SCTP cannot be a combination of logical and port addresses because of ________________.

multihoming service

SCTP association allows _____________ for each end.

multiple IP addresses

UDP uses ________ to handle outgoing user datagrams from multiple processes on one host.

multiplexing

the job of gathering data at the source host from different

multiplexing-

SCTP allows __________ service in each association.

multistream

The number of addresses assigned to an organization in classless addressing _______.

must be a power of 2

The number of addresses assigned to an organization in classless addressing _______.

must be a power of 2-

The first address assigned to an organization in classless addressing _______.

must be evenly divisible by the number of addresses

The first address assigned to an organization in classless addressing _______.

must be evenly divisible by the number of addresses-

SMI emphasizes three attributes to handle an object: _____, ________, and _________.

name; data type; encoding method

The ARP function in version 4 is part of _______ in version 6.

neighbor solicitation and advertisement

To request the physical address of a host whose IP address is known, a _______ message is sent.

neighbor-solicitation

In classful addressing, when a direct delivery is made, both the deliverer and receiver have the same _______.

netid

ICMP is a _________ layer protocol.

network

IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the _________ level.

network

Routers operate in the _______ layers.

network

The ______ layer adds a header to the packet coming from the upper layer that includes the logical addresses of the sender and receiver.

network

The routing processor of a router performs the ________ layer functions of the router.

network

In OSPF, a ________ defines the links of a network.

network link

In _______ forwarding, the destination address is a network address in the routing table.

network-specific

A packet-filter firewall filters at the ________ or ___________ layer.

network; transport

Control chunks in SCTP ___________________.

never use a TSN, IS, or SSN number

The value of the acknowledgment field in a segment defines the number of the ______byte a party expects to receive.

next

in _______ forwarding, the routing table holds the address of just the next hop instead of complete route information.

next-hop

An ACK segment, if carrying no data, consumes ______ sequence number(s).

no

In TCP, ________ retransmission timer is set for an ACK segment.

no

TCP delivers _______ out-of-order segments to the process.

no

In SCTP, ___________ can be carried in a packet that carries an INIT chunk.

no other chunk

ACK segments consume _______ sequence number(s) and _______ acknowledged.

no; are not

A _______ is a large number used only once that helps distinguish a fresh authentication request from a repeated one.

nonce

Which of the following is true about ICMP messages?

none is true

A SYN + ACK segment cannot carry data; it consumes _____ sequence numbers.

none of the above

A ___________ address is an address of 96 bits of zero followed by 32 bits of IPv4 address.

none of the above

A best-effort delivery service such as IP includes _______.

none of the above

An MTU field is found on the _______ error message to inform the sender about packet size.

none of the above

An RFC, during its lifetime, falls into one of _______ maturity levels.

none of the above

An organization has been granted a class C address. If the organization has 4 subnets, how many addresses are available in each subnet (including special addresses)?

none of the above

Connection establishment in TCP is called __________ handshaking.

none of the above

IGMP is a companion to the ______ protocol.

none of the above

IPSec defines two protocols: _________ and __________.

none of the above

In BGP, a _______ message is sent by a router whenever an error condition is detected or a router wants to close the connection.

none of the above

In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.

none of the above

In OSPF, when the link between two routers is broken, the administration may create a _________ link between them using a longer path that probably goes through several routers.

none of the above

In a URL, an optional ________ can be inserted between the host and the path, and it is separated from the host by a colon.

none of the above

In a block, the mask is 255.255.255.224; what is the prefix length?

none of the above

OSPF uses the _______ message to create neighborhood relationships and to test the reachability of neighbors.

none of the above

RPF eliminates the ________ in the flooding process.

none of the above

RPF guarantees that each network receives only ____ of the multicast packet.

none of the above

The FIN segment consumes ____ sequence numbers if it does not carry dat

none of the above

The Internetworking Protocol (IP) is a ________ protocol.

none of the above

The first level in the generic domains section allows ______ possible labels.

none of the above

The loopback address is used to send a packet from the _______ to _______.

none of the above

The process of transferring a mail message occurs in ________ phases.

none of the above

Which address could be the beginning address of a block of 16 classless addresses?

none of the above

Which of the following does UDP guarantee?

none of the above

Which version 4 protocols are still viable and known by their same names in version 6?

none of the above

_______ is the standard mechanism provided by TCP/IP for copying a file from one host to another.

none of the above

_______ was invented by Phil Zimmermann to provide all four aspects of security in the sending of email.

none of the above

__________means that the sender and the receiver expect confidentiality.

none of the above

Which address could be the beginning address of a block of 16 classless addresses

none of the above-

about manchester code

none of them

In a ___________ connection, one TCP connection is made for each request/response.

nonpersistent

A DATA chunk arrives with its B/E bits equal to 11. It is ___________.

not fragmented.

In SCTP, the number of padding bytes are _________ in the value of the length field.

not included

The value of the ________ subfield defines the types of an option.

number

A SYN segment cannot carry data; it consumes _____ sequence number(s).

one

In TCP, the receiver can temporarily shut down the window; the sender, however, can always send a segment of _____ byte(s) after the window is shut down.

one

Only ______ end of option option can be used in a datagram.

one

The FIN + ACK segment consumes _____ sequence number(s) if it does not carry dat

one

RPB guarantees that each destination receives _________ of the packet.

one copy

the difference between flow control and congestion control

one is to avoid overflowing..one is to avoid congestion-

A multicast message is sent from _______ to _______.

one source; multiple destinations

AAL5 accepts an IP packet of no more than 65,536 bytes and adds _________ in addition to padding.

one trailer

In SCTP, acknowledgment numbers are used to acknowledge _____________.

only data chunks

In TCP, there can be ______ RTT measurement(s) in progress at any time.

only one

In the group-shared tree approach, _________ involved in multicasting.

only the core router is

ICMP packets are the input to _______.

only the input module

To create a neighborhood relationship, a router running BGP sends an ________ message.

open

An HFC network uses _______ as the medium from the cable TV office to the fiber node.

optical fiber

To make control characters effective in special situations, TELNET uses ______ signaling.

out-of-band

because ftp uses a separate control connection different

out-of-band-

The _______ module sends out an IGMP report.

output

The ARP component that sends an IP packet to a queue is the _______.

output module

which error-reporting message is found in version 6 but not in version 4?

packet too big

Today's Internet is a _______________network.

packet-switched

Today's Internet is a _______________network.

packet-switched-

Errors in the header or option fields of an IP datagram require a _______ error message.

parameter-problem

In error reporting, a destination can send a _______ message if an option is not recognized.

parameter-problem

An area is _______.

part of an AS

In a URL, the _______ is the full name of the file where the information is located.

path

In ________ routing, we assume that there is one node (or more) in each autonomous system that acts on behalf of the entire autonomous system.

path vector

one important role of the network layer is to

perform the network routing-

In RIP, the ________ timer controls the advertising of regular update messages.

periodic

The home address is ______.

permanent

When a _______ exists between two routers on an ATM network, an ATMARP server is not needed.

permanent virtual circuit

A special segment called a probe is sent by a sending TCP when the _______ timer goes off.

persistence

The _______ timer is needed to handle the zero window-size advertisement.

persistence

HTTP version 1.1 specifies a _________connection by default.

persistent

In a ___________connection, the server leaves the connection open for more requests after sending a response.

persistent

In a ___________connection, the server leaves the connection open for more requests after sending a response.

persistent-

A ________ is a local address. Its jurisdiction is over a local network.

physical

A bridge has access to the _______ address of a station on the same network.

physical

Repeaters function in the _______ layer.

physical

The ________ address, also known as the link address, is the address of a node as defined by its LAN or WAN.

physical

Bridges function in the _______ layers.

physical and data link

PPP is a _______ layer protocol.

physical and data link

The input and output ports of a router perform the ________ layer functions of the router.

physical and data link

Frame Relay operates in the _______.

physical and data link layers

Examples of _______include copper wire, coaxial cable, optical fiber, and satellite radio.

physical transmission media

Examples of _______include copper wire, coaxial cable, optical fiber, and satellite radio.

physical transmission media-

There are two categories of__________: Guided medium and unguided medium

physical transmission medium

There are two categories of__________: Guided medium and unguided medium

physical transmission medium-

Routers function in the _______ layers.

physical, data link, and network

If a segment carries data along with an acknowledgment, this is called _______.

piggybacking

Before a message is encrypted, it is called _______.

plaintext

A ________buffer is required for real-time traffic.

playback

In OSPF, a ________ link connects two routers without any other host or router in between.

point-to-point

To deliver a message to the correct application program running on a host, the _______ address must be consulted.

port

UDP needs the _______ address to deliver the user datagram to the correct application process.

port

The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ .

port addresses

In FTP, which category of commands defines the port number for the data connection on the client site?

port defining commands

In ________ encoding, the differences between the samples are encoded instead of encoding all the sampled values.

predictive

In classless addressing, the ______ is another name for the common part of the address range.

prefix

In classless addressing, the ______ is another name for the common part of the address range.

prefix-

In the OSI model, encryption and decryption are functions of the ________ layer.

presentation

In the OSI model, encryption and decryption are functions of the ________ layer.

presentation-

A ________ server loads all information from the disk file.

primary

When a datagram needs to be discarded in a congested network, the decision is based on the _______ field in the base header.

priority

Digital signature does not provide _________.

privacy

Private networks, hybrid networks, and virtual private networks can provide _________ for organizations

privacy

A _______ network is totally isolated from the global Internet.

private

In the asymmetric-key method of cryptography, the receiver has possession of the _______.

private key

VPN is a network that is _______ but ________.

private; virtual

One of the responsibilities of the transport layer protocol is to create a ______ communication.

process-to-process

UDP does not add anything to the services of IP except for providing _______ communication.

process-to-process

Which of the following functions does UDP perform?

process-to-process communication

In the OSI model, what is the main function of the transport layer?

process-to-process message delivery

In the OSI model, what is the main function of the transport layer?

process-to-process message delivery-

The _______ module discards datagrams with a TTL value of zero.

processing

In a URL, the _______ is the client-server program used to retrieve the document.

protocol

A set of rules or guidelines that govern interactions among people, between people and machines, and among machines is called_____

protocols-

In IPv6, the___________ address is generally used by a normal host as a unicast address.

provider-based unicast

In HTTP, a _______ server is a computer that keeps copies of responses to recent requests.

proxy

A _______ is an ARP that acts on behalf of a set of hosts.

proxy ARP

A technique called ______ is used to create a subnetting effect.

proxy ARP

In HTTP, a _______ server is a computer that keeps copies of responses to recent requests.

proxy-

A _______ message tells an upstream router to stop sending multicast messages for a specific group through a specific router.

prune

The _______ is software residing on the remote system that allows the remote system to receive characters from a TELNET server.

pseudoterminal driver

A VPN is physically ________ but virtually ________.

public; private

In cryptography, the encryption/decryption algorithms are ________; the keys are ________.

public; secret

The third stage in an email transfer needs a ________ protocol.

pull

SMTP is a __________protocol.

push

The second phase of JPEG is ___________.

quantization

A router sends a _______ message to the host to monitor group membership.

query

ICMP messages are divided into two broad categories:

query and error reporting messages

To prevent unnecessary traffic, IGMP designates one router as the __________ for each network.

query router

In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.

quoted-printable

In Kerberos, the ___________ provides services for the entity.

real server

Kerberos allows the global distribution of ASs and TGSs, with each system called a ________

realm

The _______ module takes fragments of a message and puts them back in order.

reassembly

The output of the _______ module is an IP packet destined for an upper-layer protocol.

reassembly

After the renewing state, a DHCP client can go to the __________ state.

rebinding

Clark's solution can solve the silly window syndrome created by the _________.

receiver

Delayed acknowledgment can solve the silly window syndrome created by the _________.

receiver

In __________ resolution, the resolver expects the server to supply the final answer.

recursive

In __________ resolution, the resolver expects the server to supply the final answer.

recursive-

A router can send a _______ message to a host to inform it of a more efficient path.

redirection

The use of hierarchy in routing tables can ________ the size of the routing tables.

reduce

The ports ranging from 1,024 to 49,151 are not assigned or controlled by ICANN. They are called ___________ ports.

registered

The second phase in mobile communication is called _________.

registration

If BOOTP client and server are on different networks, there is a need for an intermediary called a _______.

relay agent

TCP is a(n) _______ transport protocol.

reliable

Stream Control Transmission Protocol (SCTP) is a new _____________protocol.

reliable, message-oriented

When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.

remote

In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______.

removed

After the bound state, a DHCP client can go to the __________ state.

renewing

In a _______ attack, a message captured by an intruder is illegally sent a second time.

replay

After the selecting state, a DHCP client can go to the ________state.

requesting

An RFC is labeled ________ if it must be implemented by all Internet systems.

required

The flow-control mechanism in TFTP _______.

requires an ACK for every DATA message

the dns servers that together implement the dns distributed database

resource record..ip address-

Karn's algorithm is used in calculations by the _______ timer.

retransmission

a _______ is a server whose zone consists of the whole tree.

root server

On a network that uses NAT, the _______ has a translation table.

router

The _______ packet contains information about a router.

router advertisement

In OSPF, a ________ defines the links of a true router.

router link

If a host needs information about routers on the network, it sends a _______ message.

router-solicitation

Using the direct broadcast address, a _______ sends a packet to _______ on the network.

router; all other hosts

An IGMP query is sent from a _______ to a _______.

router; host or router

A ________ server loads all information from the primary server

secondary

A ________ server loads all information from the primary server.

secondary

A ________ server loads all information from the primary server

secondary-

TCP groups a number of bytes together into a packet called a ___________.

segment

TCP has ____________; SCTP has ____________.

segments; packets

After sending the DHCPDISCOVER message, the client goes to the _______ state.

selecting

If a member of a group wishes to terminate membership, it can _______ in response to a group membership query.

send a group membership termination

Nagle's algorithm can solve the silly window syndrome created by the _________.

sender

In Sliding Window Flow Control with window size of W, the source______________

sends up to W frames without ACK

In Sliding Window Flow Control with window size of W, the source______________

sends up to W frames without ACK-

SMI defines two structured data types: ________ and _________.

sequence; a sequence of

An agent is a host or computer that runs the SNMP _______ process.

server

Dynamic documents are sometimes referred to as _________ dynamic documents.

server-site

The Response PDU is sent from the ______ to the ______ in response to GetRequest or GetNextRequest.

server; client

The Trap PDU is sent from the ______ to the _______ to report an event.

server; client

A cookie is made by the ________ and eaten by the _________.

server; server

In the OSI model, when data is transmitted from device A to device B, the header from Aís layer 5 is read by Bís _______ layer.

session

The OSI model consists of _______ layers.

seven

an SCTP packet can carry __________.

several data chunks

one of the most importance purposes of computer networks is to

share common resource-

In RPF, a router forwards only the copy that has traveled the _______ path from the source to the router.

shortest

In multicast routing, each involved router needs to construct a ________ path tree for each group.

shortest

In unicast routing, each router in the domain has a table that defines a ______ path tree to possible destinations.

shortest

In TCP, the window should not be _________.

shrunk

A serious problem can arise in the sliding window operation when either the sending application program creates data slowly or the receiving application program consumes data slowly, or both. This problem is called the ______.

silly window syndrome

The _______ data types are atomic data types.

simple

SMI has two broad categories of data type: _______ and _______.

simple; structured

If ASCII character H is sent and the character I is received, what type of error is this (H: 01001000 and I: 01001001)?

single -bit

If ASCII character H is sent and the character I is received, what type of error is this (H: 01001000 and I: 01001001)?

single -bit-

The ______ address is used if a site with several networks uses the Internet protocols but is not connected to the Internet for security reasons.

site local

To accomplish flow control, TCP uses a ___________ window protocol.

sliding

To accomplish flow control, TCP uses a ___________ window protocol.

sliding-

In the ________ algorithm of the TCP congestion control, the size of the CONGWIN (congestion window) increases exponentially.

slow start

In the ________ algorithm the size of the congestion window increases exponentially until it reaches a threshold.

slow start

In the ________ stage of the TCP congestion control, the size of the congestion window increases exponentially until timeout occurs.

slow start

In the congestion detection algorithm, if detection is by a time-out, a new _______ phase starts.

slow start

In the ________ algorithm of the TCP congestion control, the size of the CONGWIN (congestion window) increases exponentially.

slow start-

In the ________ algorithm the size of the congestion window increases exponentially until it reaches a threshold.

slow start-

In the ________ stage of the TCP congestion control, the size of the congestion window increases exponentially until timeout occurs.

slow start-

The combination of an IP address and a port number is called a _________.

socket

The combination of an IP address and a port number is called a ____________.

socket address

The combination of an IP address and a port number is called a _________.

socket-

A mobile host can send an agent _______ message if it has not received any agent advertisements.

solicitation

Which error-reporting message from version 4 has been eliminated in version 6?

source quench

In the _______ extension header, the destination address changes from router to router.

source routing

DVMRP is a ________routing protocol, based on RIP.

source-based

In the _______ tree approach, each router needs to have one shortest path tree for each group.

source-based

Multicast link state routing uses the _______ tree approach.

source-based

One method to alert a source host of congestion is the _______ message.

source-quench

PIM-SM is used in a _______multicast environment such as a WAN.

sparse

The _______ is used by a router in response to a received leave report.

special query message

Why was the OSI model developed?

standards were needed to allow any two systems to communicate

Why was the OSI model developed?

standards were needed to allow any two systems to communicate-

A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.

static

A _______ routing table contains information entered manually.

static

BOOTP is a ________ configuration protocol.

static

In _______, a table associating a logical address with a physical address is updated manually.

static mapping

The IP addresses are designed to work with ________ hosts because part of the address defines the network to which the host is attached.

stationary

The original IP addressing was based on the assumption that a host is ________.

stationary

When a receiver must acknowledge every block of data before the next block is sent, the _____ type of flow control is being used

stop-and-wait

When a receiver must acknowledge every block of data before the next block is sent, the _____ type of flow control is being used

stop-and-wait-

In FTP, when we _______, it is copied from the client to the server.

store a file

TCP is a __________protocol.

stream-oriented,Connection-oriented

TCP allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes.

stream; stream

TCP allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes..

stream; stream

TCP allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes.

stream; stream-

Which IP option is used if exactly four specific routers are to be visited by the datagram?

strict source route

In OSPF, a ________ link is a network is connected to only one router.

stub

In classless addressing, the _______ is the varying part (similar to the hostid).

suffix

In classless addressing, the _______ is the varying part (similar to the hostid).

suffix-

In OSPF, an area border router advertises a ____________ LS

summary link to network

The task of moving the packet from the input queue to the output queue in a router is done by _________.

switching fabrics

In _________ cryptography, the same key is used in both directions.

symmetric-key

In __________cryptography, the same key is used by the sender (for encryption) and the receiver (for decryption).

symmetric-key

When there is more than one source, the _______ identifier defines the mixer.

synchronization source

To talk with a mail server (with name serverName), we can use command

telnet serverName 25

To talk with a mail server (with name serverName), we can use command

telnet serverName 25-

The care-of address is _______.

temporary

TELNET is an abbreviation for ____________.

terminal network

An IP datagram (datagram A) cannot reach its destination. An ICMP error message is sent to the source. The data field of the IP datagram (datagram B) that encapsulates the ICMP packet contains _______.

the ICMP header plus 8 bytes of datagram A

When the sender and the receiver of an email are on the same system, we need only ___________.

two UAs

When the sender and the receiver of an email are on different systems, we need only _____________.

two UAs and one pair of MTAs

When the sender is connected to the mail server via a LAN or a WAN, we need only ______________.

two UAs and two pairs of MTAs

When both sender and receiver are connected to a mail server via a LAN or a WAN, we need ___________________.

two UAs, two pairs of MTAs, and a pair of MAAs

If four hosts on a network belong to the same group, a total of _______ sent in response to a general query message.

two membership reports are

In IPv6, the ________ prefix defines the purpose of the address.

type

The _______ field of the IGMP message is 17 for a query message.

type

What field uniquely identifies the kind of ICMP message (for example, echo reply versus echo request)?

type

A one-to-one communication between one source and one destination is classified as a _______ communication.

unicast

An ARP reply is normally _______.

unicast

The RARP reply packets are normally_________ .

unicast

In ______, the router forwards the received packet through only one of its interfaces.

unicasting

In BGP, the _______ message is used by a router to withdraw destinations that have been advertised previously, or to announce a route to a new destination, or both.

update

If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of _______.

user B

UDP packets are called __________ .

user datagrams

Because the sending and the receiving processes may not write or read data at the same speed, TCP ________.

uses buffers

An object id defines a _______. Add a zero suffix to define the _______.

variable; variable contents

In Stop and Wait Flow Control, source______________

waits for the acknowledgment (ACK) before sending next frame

In Stop and Wait Flow Control, source______________

waits for the acknowledgment (ACK) before sending next frame-

the ports ranging from 0 to 1,023 are assigned and controlled by ICANN. These are the ___________ ports.

well-known

A dynamic table is one _______.

which is updated automatically

following standards: IEEE 802.11b .. belong to

wireless lan-

using crc, the received message is error

with (non-zero) remainder

A static table is one _______.

with manual entries

What a server is responsible for or has authority over is called a _________.

zone

When the secondary downloads information from the primary, it is called ______ transfer.

zone

In the exponential backoff phase of CSMA/CD, after 3rd collision of a frame, the adapter then waits K x 512 bit times before sensing the channel again, where K is chosen at a random from

{0,1,2,3,4,5,6,7}

In the exponential backoff phase of CSMA/CD, after 3rd collision of a frame, the adapter then waits K x 512 bit times before sensing the channel again, where K is chosen at a random from

{0,1,2,3,4,5,6,7}-

What does the IP header's protocol field identify

| The transport layer protocol that generated the information in the data field-

The _______ protocol allows the administrator to assign a cost, called the metric, to each route.

OSPF

A Web page (also called a document) consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc.

Objects

A Web page consists of _______ such as a HTML file, a JPEG image, a GIF image, a Java applet, an audio clip, etc.

Objects-

In Datagram networks and in Virtual networks:

One has each packet to route independently; one has all packet to route in one path, respectively

In Datagram networks and in Virtual networks:

One has each packet to route independently; one has all packet to route in one path, respectively-

The difference between TCP and UDP is primarily

One is connection-oriented, one is connectionless

The difference between TCP and UDP is primarily

One is connection-oriented, one is connectionless-

The difference between flow control and congestion control is primarily

One is to avoid overflowing the receiver's buffer; one is to avoid congestion of the channel

Which of the following is an appropriate description concerning B2C?

Ordering books online

Which of the following is an appropriate description concerning B2C

Ordering books online-

Because FTP uses a separate control connection different from data connection, FTP is said to sent its control information_____

Out-of-band

Because FTP uses a separate control connection different from data connection, FTP is said to sent its control information_____

Out-of-band-

Skype is a

P2P application

Skype is a

P2P application-

Three popular mail access protocols are

POP3,IMAP and HTTP

Three popular mail access protocols are

POP3,IMAP and HTTP-

Currently two message access protocols are available: _______ and _________.

POP3; IMAP4

Currently two message access protocols are available:_____ and_____..

POP3; IMAP4

Currently two message access protocols are available:_____ and_____.

POP3; IMAP4-

A user needs to send the server some information. The request line method is _______.

POST

If a label is not terminated by a null string, it is called a __________.

PQDN

The inverse request and inverse reply messages can bind the physical address to an IP address in a(n) _______ situation.

PVC

When does packet loss happen?

Packet arriving to the full queue at the routers

When does packet loss happen?

Packet arriving to the full queue at the routers-

A program running in a network attached device that passively receives all packet passing by the device's network interface is

Packet sniffer-

A Virtual Circuit maintains

Path from source to destination and forwarding tables in routers along path-

__________ encoding is based on the science of psychoacoustics, which is the study of how people perceive sound.

Perceptual

rdt 1.1 assumes that the channel is

Perfectly reliable

rdt 1.1 assumes that the channel is

Perfectly reliable-

One important role of the Network Layer is to

Perform network routing, i.e., to find the most efficient transmission route between two computers

One important role of the Network Layer is to

Perform network routing, i.e., to find the most efficient transmission route between two computers-

In a ___________connection, the server leaves the connection open for more requests after sending a response.

Persistent-

Repeaters function in the...layer

Physical

Which layer repeaters function at?

Physical

Repeaters function in the...layer

Physical-

Which layer repeaters function at?

Physical-

ARP is

Plug-and-play

ARP is

Plug-and-play-

In datalink layer, there are two types of networks links:

Point-to-point link and broadcast link

In datalink layer, there are two types of networks links:

Point-to-point link and broadcast link-

POP3 is short for

Post Office Protocol-Version 3

POP3 is short for

Post Office Protocol-Version 3-

In the OSI model, encryption and decryption are functions of the_____layer.

Presentation

In the OSI model, encryption and decryption are functions of the ________ layer.

Presentation-

In the OSI model, encryption and decryption are functions of the_____layer.

Presentation-

One of the responsibilities of the transport layer protocol is to create a logical communication between:

Processes

One of the responsibilities of the transport layer protocol is to create a logical communication between:

Processes-

The transport layer protocol provides logical communication between ______, while the network layer protocol provides logical communication between _____.

Processes.....Hosts

The transport layer protocol provides logical communication between ______, while the network layer protocol provides logical communication between _____.

Processes.....Hosts-

The time delay for checking bit-level error in the packet that occurs at the router can be classified as the _____

Processing Delay

The time delay for checking bit-level error in the packet that occurs at the router can be classified as the _____

Processing Delay-

Total nodal delay is accumulated from the following delays:

Processing delay, queuing delay, transmission delay and propagation delay

Total nodal delay is accumulated from the following delays:

Processing delay, queuing delay, transmission delay and propagation delay-

The ____on the physical medium of the link is a little less than or equal to the speed of light

Propagation delay

The time required for a data bit to travel through the link from router A to router B is

Propagation delay

The ____on the physical medium of the link is a little less than or equal to the speed of light

Propagation delay-

Which one is INCORRECT about proxy?

Proxy helps to remove the bottleneck of access link

Which one is INCORRECT about proxy?

Proxy helps to remove the bottleneck of access link-

Two types of ALOHA are:

Pure ALOHA and slotted ALOHA

Two types of ALOHA are:

Pure ALOHA and slotted ALOHA-

1001 0101 and 1010 1010.

1011 1111-

For even parity scheme (single), if the information is 101110, then information after adding parity bit is

1011100

For even parity scheme (single), if the information is 101110, then information after adding parity bit is

1011100-

Assume the original message to be sent 101110, the generator is 1001. What is the transmitted message?

101110011

Assume the original message to be sent 101110, the generator is 1001. What is the transmitted message?

101110011-

An organization has been granted a class B address. If the organization has 64 subnets, how many addresses are available in each subnet (including special addresses)?

1024

_______ specifies a physical star topology featuring a central hub and twisted-pair cable as the medium.

10BASE-T

Which one is the most-commonly-used cabling standard for Ethernet?

10Base-T

Which one is the most-commonly-used cabling standard for Ethernet?

10Base-T-

Assume the original message to be sent 11001, the generator is 1001. What is the transmitted message?

11001010

Assume the original message to be sent 11001, the generator is 1001. What is the transmitted message?

11001010-

What is the 32-bit binary equivalent of the IP address 254.1.8.252?

11111110.00000001.00001000.11111100

What is the 32-bit binary equivalent of the IP address 254.1.8.252?

11111110.00000001.00001000.11111100-

Which one is not in UDP segment header?

ACK number

Which one is not in UDP segment header?

ACK number-

Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 55 bytes, sequence number 100, the source port 1028, the destination port 80. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A

ACK number: 155, source port: 80, destination port: 1028

Multiple access link in 802.11 wireless LAN is a

Broadcast link-

What does NAT stand for?

Network Address Translation

What does NAT stand for?

Network Address Translation-

Which layer does ICMP functions?

Network Layer

Which layer does ICMP functions?

Network Layer-

If the sender wants to disable an option, it sends a _______ command.

WONT

In TFTP, if a message is _______, it is resent.

a and b

In TFTP, one symptom of the sorcererís apprentice bug is that _______.

a and b

Which TFTP message contains a block number field?

a and b

Which is a manager duty?

a and b

Which of the following is a necessary part of the IPv6 datagram?

a and b

In FTP, when we _______, it is copied from the server to the client.

a and c

Which part of the mail created by the UA contains the sender and receiver names?

header

What is information used to route packet in network

. Destination Address fields in IP header-

Which agency developed standards for physical connection interfaces and electronic signaling speccifications

. EIA-

In classless addressing,_______is assigned to an organization

.A variable-length block-------------------------------------

What is the default mask for class B in CIDR notation?

/16

In a block, the mask is 255.255.192.0; what is the prefix length?

/18

An organization is granted a block; one address is 2.2.2.64/20. The organization needs 10 subnets. What is the subnet prefix length?

/24

What is the default mask for class C in CIDR notation?

/24

What is the default mask for class A in CIDR notation?

/8

For data, NVT uses US ASCII characters with the highest order bit set to ______.

0

For the timestamp option, a flag value of _______ means that each visited router adds only the timestamp in the provided field.

0

How many default gateway addresses does a computer need to function on a LAN (assume that not connect to other network)?

0

What is the result of ANDing 0 and 15?

0

In TFTP, connection termination is signaled by a DATA message with _______ bytes.

0 to 511

In sliding window flow control, if the size is 63, what the range sequence numbers?

0 to 63

In sliding window flow control, if the window size is 63. What the range sequence numbers?

0 to 63

In sliding window flow control, if the window size is 63. What the range sequence numbers?

0 to 63-

How many default gateway addresses does a computer need to function on a LAN (assume that not connect to other network)?

0-

A host can get its IP address from its server by using _______ as the source address and _______ as the destination address.

0.0.0.0; 255.255.255.255

There are 4 serial links between the client and the server, with the transmission rates being 1Mbps, 3Mbps, 2 Mbps, and 0.5 Mbps. What is the throughput between the client and the server?

0.5 Mbps

There are 4 serial links between the client and the server, with the transmission rates being 1Mbps, 3Mbps, 2 Mbps, and 0.5 Mbps. What is the throughput between the client and the server?

0.5 Mbps-

There are 4 serial links between the client and the server, with the transmission rates being 1Mbps, 1Mbps, 2 Mbps, and 0.7 Mbps. What is the throughput between the client and the server?

0.7 Mbps

There are 4 serial links between the client and the server, with the transmission rates being 1Mbps, 1Mbps, 2 Mbps, and 0.7 Mbps. What is the throughput between the client and the server?

0.7 Mbps-

Which one can be a MAC address?

00-D0-56-F2-B5-12

In CRC, if the generator is x^4+x+1, then which one is added in to the frame before the dividing process to find the remainder

0000

What is the 32-bit binary equivalent of the IP address 1.255.8.252?

00000001.1111111.00001000.11111100

What is the 32-bit binary equivalent of the IP address 1.255.8.252?

00000001.1111111.00001000.11111100-

What is the one's compliment 8-bit checksum of the following 8-bit binary numbers:

1011 1111

In the congestion avoidance phase of TCP congestion control, if the timeout occurs at the current congestion window size 32, the congestion size will reduce to ___ and the threshold window size is set to _____

1.... 16

In the congestion avoidance phase of TCP congestion control, if the timeout occurs at the current congestion window size 32, the congestion size will reduce to ___ and the threshold window size is set to _____

1.... 16-

In the congestion avoidance phase of TCP congestion control, if the timeout occurs at the current congestion window size 80, the congestion size will reduce to ___ and the is set to _____

1.... 40

In the congestion avoidance phase of TCP congestion control, if the timeout occurs at the current congestion window size 80, the congestion size will reduce to ___ and the is set to _____

1.... 40-

All objects managed by SNMP are given an object identifier. The object identifier always starts with _______.

1.3.6.1.2.1

Which of the following could be a legitimate MIB object identifier?

1.3.6.1.2.1.1

Assume a webpage has only 10 different images, using non-persistent HTTP, a client needs ______ to the server to load.

10 different TCP connections

Assume a webpage has only 10 different images, using non-persistent HTTP, a client needs ______ to the server to load.

10 different TCP connections-

message to be sent 100001, the generator 1001. what is the tra

1000001001

Assume the original message to be sent 100001, the generator is 1001. What is the transmitted message?

100001101

Assume the original message to be sent 100001, the generator is 1001. What is the transmitted message?

100001101-

Assume that the time it takes for a small packet to travel from the client to the server and then back to the client is 100 ms, then the round-trip time is

100ms

Assume that the time it takes for a small packet to travel from the client to the server and then back to the client is 100 ms, then the round-trip time is

100ms-

Suppose a subnet has a block of IP addresses 101.101.101.0/24, which address belongs to that block?

101.101.101.122

Suppose a subnet has a block of IP addresses 101.101.101.0/24, which address belongs to that block?

101.101.101.122-

Suppose an ISP owns the block of addresses of the form 101.101.101.128/30, which address can be assigned to its customer?

101.101.101.129

Suppose an ISP owns the block of addresses of the form 101.101.101.128/30, which address can be assigned to its customer?

101.101.101.129-

suppoes an IPS owns the block of addresses of the form 101.101.101.128/29, which address

101.101.101.131

Suppose a subnet has a block of IP addresses 101.101.101.0/24, which address does not belong to that block?

101.101.102.0

Suppose a subnet has a block of IP addresses 101.101.101.0/24, which address does not belong to that block?

101.101.102.0-

Suppose a subnet has a block of IP addresses 101.101.101.0/24, which address does not belong to that block?

101.101.111.0

Suppose a subnet has a block of IP addresses 101.101.101.0/24, which address does not belong to that block?

101.101.111.0-

Assume the original message to be sent 101001, the generator is 1001. What is the transmitted message?

101001001

Assume the original message to be sent 101001, the generator is 1001. What is the transmitted message?

101001001-

For even parity scheme (single), if the information is 101010, then information after adding parity bit is

1010101

For even parity scheme (single), if the information is 101010, then information after adding parity bit is

1010101-

Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. In the acknowledgement of the first arriving segment, what is the acknowledgment number?

165

Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 20 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. In the acknowledgement of the first arriving segment, what is the acknowledgment number?

165-

Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 30 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. In the acknowledgement of the first arriving segment, what is the acknowledgment number?

175

Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 30 and 40 bytes of data, respectively. In the first segment, the sequence number is 145. In the acknowledgement of the first arriving segment, what is the acknowledgment number?

175-

Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the subnet address?

18.240.0.0

Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is the subnet address?

180.25.0.0

Assume that an image is about 1000 x 800 pixels with 3 bytes/pixel and it is uncompressed. How long does it take to transmit it over a 1 Mbps channel?

19.2 sec

Assume that an image is about 1000 x 800 pixels with 3 bytes/pixel and it is uncompressed. How long does it take to transmit it over a 1 Mbps channel?

19.2 sec-

If 20 people need to communicate using symmetric-key cryptography, _______ symmetric keys are needed.

190

Suppose there are 5 routers between the source host and the destination host, 10ms is the processing delay at each router, 10ms is the propagation delay at each link, and 12ms is the transmission delay out of each router and the source, then the total delay is (ignore all other delays)

192ms

Suppose there are 5 routers between the source host and the destination host, 10ms is the processing delay at each router, 10ms is the propagation delay at each link, and 12ms is the transmission delay out of each router and the source, then the total delay is (ignore all other delays)

192ms-

Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 30 and 40 bytes of data, respectively. In the first segment, the sequence number is 165. In the acknowledgement of the first arriving segment, what is the acknowledgment number?

195

Suppose that Host A then sends two segments to Host B over a TCP connection. The first and second segments contain 30 and 40 bytes of data, respectively. In the first segment, the sequence number is 165. In the acknowledgement of the first arriving segment, what is the acknowledgment number?

195-

If the ACK value is 200, then byte _______ has been received successfully.

199

If the ACK value is 200, then byte _______ has been received successfully.

199-

In SCTP, the data field of the DATA chunk must carry at least _________ byte of data, which means the value of length field cannot be less than ___________.

1; 17

A subnet mask in class C has 25 1s. How many subnets does it define?

2

In IP fragmentation with MTU (Maximum Data Unit) size of 1500 bytes , a 2000-byte datagram is fragmented into _______ datagram(s)

2

In IP fragmentation with MTU (Maximum Transmission Unit) size of 1500 bytes , a 2000 byte datagram is fragmented into _______ datagram(s)

2

In IP fragmentation, a 2000 byte datagram is fragmented into _______ datagrams

2

The IP packet that carries an IGMP packet has a value of _______ in its protocol field.

2

There are 4 serial links between the client and the server, with the transmission rates being 3Mbps, 12Mbps, 2 Mbps, and 2 Mbps. What is the throughput between the client and the server?

2 Mbps

There are 4 serial links between the client and the server, with the transmission rates being 3Mbps, 12Mbps, 2 Mbps, and 2 Mbps. What is the throughput between the client and the server?

2 Mbps-

In IP fragmentation with MTU (Maximum Transmission Unit) size of 1500 bytes , a 2000 byte datagram is fragmented into _______ datagram(s)

2-

In IP fragmentation, a 2000 byte datagram is fragmented into _______ datagrams

2-

Which address could be the beginning address of a block of 256 classless addresses?

2.4.6.0

Which address could be the beginning address of a block of 256 classless addresses

2.4.6.0-

Which address could be the beginning address of a block of 32 classless addresses?

2.4.6.64

Which address could be the beginning address of a block of 32 classless addresses

2.4.6.64-

By default, FTP uses which ports

20 and 21

Which one is the returned code of the response from a web server when a client successful connects to the web server?

200

Which one is the returned code of the response from a web server when a client successful connects to the web server?

200-

Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address?

201.14.78.64

Which one is not a MAC address:

A1-000-6C-2D-15-0A

Which one is not a MAC address:

A1-000-6C-2D-15-0A-

A router connected to an ATM network uses the _______ layers.

AAL, ATM, and physical

The IP protocol uses the _______ sublayer.

AAL5

The only AAL used by the Internet is __________.

AAL5

Which ATM layer adds an 8-byte trailer to an IP packet?

AAL5

In TFTP, which type of message is always a set number of bytes?

ACK

Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 55 bytes, sequence number 100, the source port 1028, the destination port 80. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A

ACK number: 155, source port: 80, destination port: 1028-

Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 2105 bytes, sequence number 100, the source port 1028, the destination port 1029. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A

ACK number: 2205, source port: 1029, destination port: 1028

Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 2105 bytes, sequence number 100, the source port 1028, the destination port 1029. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A

ACK number: 2205, source port: 1029, destination port: 1028-

Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 45 bytes, sequence number 200, the source port 1038, the destination port 80. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A

ACK number: 245, source port: 80, destination port: 1038

Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 45 bytes, sequence number 200, the source port 1038, the destination port 80. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A

ACK number: 245, source port: 80, destination port: 1038-

Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 40 bytes, sequence number 410, the source port 1028, the destination port 80. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A

ACK number: 450, source port: 80, destination port: 1028

Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 40 bytes, sequence number 410, the source port 1028, the destination port 80. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A

ACK number: 450, source port: 80, destination port: 1028-

Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 5105 bytes, sequence number 600, the source port 1028, the destination port 1029. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A

ACK number: 5705, source port: 1029, destination port: 1028

Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 5105 bytes, sequence number 600, the source port 1028, the destination port 1029. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A

ACK number: 5705, source port: 1029, destination port: 1028-

Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 105 bytes, sequence number 600, the source port 1028, the destination port 1029. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A

ACK number: 705, source port: 1029, destination port: 1028

Host A and B are communicating over a TCP connection, host A send to host B the first segment with size 105 bytes, sequence number 600, the source port 1028, the destination port 1029. What is the ACK number, the source port number, the destination port number in the ACK segment sent by host B to host A

ACK number: 705, source port: 1029, destination port: 1028-

Which method of networks access has the biggest difference between download and upstream speed?

ADSL

_______ has a higher transmission rate in the downstream direction than in the upstream direction.

ADSL

Which method of networks access has the biggest difference between download and upstream speed?

ADSL-

The _______ protocol provides message authentication and integrity, but not privacy.

AH

The ________ protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet.

AH

In an ESS the _______ stations are part of a wired LAN.

AP

A table has following information: < IP address; MAC address; TTL>, where TTL is Time-To-Live. This table can be a (an)

APR table-

Which one is not belong to application layer?

ARP

_______ is a dynamic mapping protocol in which a physical address is found for a given logical address.

ARP

A sender usually has more than one IP datagram to send to the same destination. It is inefficient to use the ARP protocol for each datagram destined for the same host or router. The solution is the _________.

ARP table

Which one is not belong to application layer?

ARP-

This was the first network.

ARPANET

In Kerberos, the _______ is the KDC.

AS

INTEGER, OCTET STRING, and ObjectIdentifier are _______ definitions used by SMI.

ASN.1

To define the data type, SMI uses fundamental _______ definitions and adds some new definitions.

ASN.1

The ________ layer provides routing, traffic management, switching, and multiplexing services.

ATM

Which ATM layer has a 53-byte cell as an end product?

ATM

A switch inside an ATM network uses the _______ layers.

ATM and physical

In OSI model, as data packet moves from the upper to the lower layer header are

Added

In OSI model, as data packet moves from the upper to the lower layer header are

Added-

ARP stands for __________

Address Resolution Protocol

What device can ....

All

A Virtual Circuit consists of

All are correct

In a Datagram networks,

All are correct

What are general functions of router?

All are correct

What does the URL need to acess a document

All are correct

What is present in the HDLC control fiels for I-frame

All are correct

What is the IP address used to test a PC's network card that don't need connect PC to another PC?

All are correct,connection-oriented-

A Virtual Circuit consists of

All are correct-

In a Datagram networks,

All are correct-

What are general functions of router?

All are correct-

What is present in the HDLC control fiels for I-frame

All are correct-

What is (are) correct about DHCP?

All of the others

Which one(s) is (are) correct about Decentralized DNS?

All of the others

Which statement is correct about cookie technology?

All of the others ,Most major commercial Web sites today use cookies

What is (are) correct about DHCP?

All of the others-

Which one is best correct for IMAP (Internet Mail Access Protocol)

All of them

Which statement is best correct about UDP and TCP?

All of them

Why NAT (Network Address Translation) is used?

All of them

______ is (are) (an) example(s) of random access MAC

All of them

Which one is best correct for IMAP (Internet Mail Access Protocol)

All of them-

Which statement is best correct about UDP and TCP?

All of them-

What device can ....

All-

The client-server model significantly relies on ____ infrastructure servers, the Peer-to-Peer model, instead, pairs of interminably connected peers, communicates ____ with each other

Always-on....directly

The client-server model significantly relies on ____ infrastructure servers, the Peer-to-Peer model, instead, pairs of interminably connected peers, communicates ____ with each other

Always-on....directly-

Which of the following is true about ICMP messages?

An ICMP error message may be generated only for the first fragment.

TCP uses______________to check the safe and sound arrival of dat

An acknowledgment mechanism

____________ is a group of networks and routers under the authority of a single administration.

An autonomous system

IP is _________ datagram protocol.

An unreliable and connectionless

IP is _________ datagram protocol.

An unreliable and connectionless-

What is the order of the 5 layers in the Internet model?

Application, transport, network, link, physical

What is the order of the 5 layers in the Internet model?

Application, transport, network, link, physical-

DHCP is used to

Assign IP addresses automatically-

DHCP is used by the server to:

Assign IP addresses to clients automatically

__________ algorithms are more efficient for short messages

Asymmetric-key

___________ algorithms are more efficient for short messages.

Asymmetric-key

__________ algorithms are more efficient for short messages

Asymmetric-key-

algorithms are more efficient for short messages

Asymmetric-key-

Which one is correct about Denial of Service (DoS) attack?

Attackers make network resources unavailable by overwhelming resource with bogus traffic

Which one is correct about Denial of Service (DoS) attack?

Attackers make network resources unavailable by overwhelming resource with bogus traffic-

According to the PPP transition state datagram, verification of user identification occurs in the...state

Authenticating

According to the PPP transition state datagram, verification of user identification occurs in the...state

Authenticating-

An ISP has a DNS server that holds both names of Web servers and their IP addresses. That DNS servers is called

Authorative

An ISP has a DNS server that holds both names of Web servers and their IP addresses. That DNS servers is called

Authorative-

Multiple access link in 802.11 wireless LAN is a

Broadcast link

SMI uses another standard, ___________, to encode data to be transmitted over the network.

BER

___________ is an interdomain routing protocol using path vector routing.

BGP

In an ESS the _______ station is mobile.

BSS

The Physical layer is connected with the movement of____over the physical medium

Bits

The Physical layer is connected with the movement of____over the physical medium

Bits-

IP is________datagram protocol

Both a and b

IP address written as 200.23.16.0/23 means:

Both are correct

NAT router must

Both are correct

The "Time-To-Live" field in IP datagram

Both are correct

The difference between flow control and congestion control is primarily

Both are correct

IP address written as 200.23.16.0/23 means

Both are correct-

IP address written as 200.23.16.0/23 means:

Both are correct-

NAT router must

Both are correct-

The "Time-To-Live" field in IP datagram

Both are correct-

The difference between flow control and congestion control is primarily

Both are correct-

Why CSMA/CD (Carrier Sense Multiple Access / Collision Detection) (that is used in Ethernet) can NOT be used in Wireless LAN?

Both of them

Why CSMA/CD (Carrier Sense Multiple Access / Collision Detection) (that is used in Ethernet) can NOT be used in Wireless LAN?

Both of them-

If ASCII character G is sent and the character D is received, what type of error is this?

Burst

If ASCII character G is sent and the character D is received, what type of error is this (G: 01000111 and D: 01000100)?

Burst-

What is the framing method used in PPP?

Byte stuffing.

What is the framing method used in PPP?

Byte stuffing.-

___________ is a technology that creates and handles dynamic documents.

CGI

Which one is not a service provided by the link layer?

Congestion control

MAC protocal using 802.11

CSMA/CA

What is the MAC protocol used in 802.11 network?

CSMA/CA

What is the MAC protocol used in 802.11 network?

CSMA/CA-

______is used in Ethernet

CSMA/CD

is used in ethernet

CSMA/CD

______is used in Ethernet

CSMA/CD-

_______ was formed to connect universities with no defense ties.

CSNET

The DES cipher uses the same concept as the _________ cipher, but the encryption/ decryption algorithm is much more complex.

Caesar

CSMA/CD stands for

Carrier Sense Medium Access/Collision Detection

CSMA/CD stands for

Carrier Sense Medium Access/Collision Detection-

Which one is not a service provided by the link layer?

Congestion control-

Two types of network switching are:

Circuit and packet switching

Two types of network switching are

Circuit and packet switching-

In _____, the network establishes a dedicated end-to-end connection between two hosts

Circuit switching

What are two fundamental switching approaches for building a network core?

Circuit switching and packet switching

What are two fundamental switching approaches for building a network core?

Circuit switching and packet switching-

In _____, the network establishes a dedicated end-to-end connection between two hosts

Circuit switching-

The telephone networks are examples of __________.

Circuit-switched networks

The telephone networks are examples of __________.

Circuit-switched networks-

Which one is incorrect about proxy?

Client caches the whole website to improve the downloading speed

Which one is incorrect about proxy?

Client caches the whole website to improve the downloading speed-

While the____ significantly relies on always-on infrastructure servers, the____does not (or minimally relies on)

Client-server model...Peer-to-Peer model

While the____ significantly relies on always-on infrastructure servers, the____does not (or minimally relies on)

Client-server model...Peer-to-Peer model-

In TFTP, a connection is terminated with a _______ block.

DATA

The first phase of JPEG is ___________.

DCT transformation

A group table entry in the _______ state sends a request when its timer expires.

DELAYING

What is the protocol that network devices (for example: modern ADSL) use to assign IP address to PCs in LAN automatically?

DHCP

use to assign IP address to PCs in LAN automatically?

DHCP

What is the protocol that network devices (for example: modem ADSL) use to assign IP address to PCs in LAN automatically?

DHCP-

_______ is backward compatible with __________.

DHCP; BOOTP

The DNS servers that together implement the _____, store____ for the hostname to IP address mappings.

DNS database ....Resource Records

The DNS servers that together implement the _____, store____ for the hostname to IP address mappings.

DNS database ....Resource Records-

The______ that together implement the DNS distributed database, store____ for the hostname to IP address mappings.

DNS servers....Resource Records

The______ that together implement the DNS distributed database, store____ for the hostname to IP address mappings.

DNS servers....Resource Records-

As soon as the browser receives the IP address from____, it can initiate a TCP connection to the HTTP server located at port_____ at that IP address

DNS... 80

As soon as the browser receives the IP address from____, it can initiate a TCP connection to the HTTP server located at port_____ at that IP address

DNS... 80-

If the sender wants an option enabled by the receiver, it sends a _______ command.

DO

If the sender wants an option disabled by the receiver, it sends a _______ command.

DONT

_________ is an implementation of multicast distance vector routing. It is a source-based routing protocol, based on RIP.

DVMRP

Which layers bridges function at?

Data link and Physical

Which layers bridges function at?

Data link and Physical-

What is the data unit used in Internet Protocol (IP)?

Datagram

Any network that routes packets according to host destination addresses is a ________

Datagram network

What is the data unit used in Internet Protocol (IP)?

Datagram-

The job of delivering the data in a transport-layer segment to the correct application process is called_________.

De-multiplexing

The job of delivering the data in a transport-layer segment to the correct socket is called_________.

De-multiplexing

The job of delivering the data in a transport-layer segment to the correct application process is called_________.

De-multiplexing-

The job of delivering the data in a transport-layer segment to the correct socket is called_________.

De-multiplexing-

What is information used to route packet in network?

Destination Address fields in IP header

Single parity check can

Detect a single bit error

Single parity check can

Detect a single bit error-

Regarding to the DNS, IP addresses such as 209.191.122.70 or 10.22.8.8 are ____ to remember by human, but _____ to process by routers

Difficult... Easy

Regarding to the DNS, IP addresses such as 209.191.122.70 or 10.22.8.8 are ____ to remember by human, but _____ to process by routers

Difficult... Easy-

In the _______ protocol, the symmetric key is K = Gxy mod N, where G and N are public numbers.

Diffie-Hellman

______________ can provide authentication, integrity, and nonrepudiation for a message.

Digital signature

What type of routing protocol that BGP is?

Distance Vector Routing

What type of routing protocol that BGP is

Distance Vector Routing-

RIP (Routing Information Protocol) in the Internet uses

Distance vector routing algorithm

As learned in class, computer networks are classified based on:

Distance, switching

As learned in class, computer networks are classified based on:

Distance, switching-

What is DDoS stand for?

Distributed Denial-of-Service

What is DDoS stand for?

Distributed Denial-of-Service-

DNS is short for

Domain Name System

DNS is short for

Domain Name System-

_________ occurs when a remote host communicates with a mobile host that has moved to the same network (or site) as the remote host.

Double crossing

If the buffer of the router in the Internet is full, the router will____

Drop incoming packets, resulting packet loss

If the buffer of the router in the Internet is full, the router will____

Drop incoming packets, resulting packet loss-

BGP can have two types of sessions: _______ and ________ sessions.

E-BGP; I-BGP

Which agency developed standards for physical connection interfaces and electronic signaling speccifications?

EIA

Which agency developed standards for physical connection interfaces and electronic signaling specifications?

EIA

An unauthorized user tries to send a file to a server using TFTP. What should be the response of the server?

ERROR

In TFTP, what type of message is sent in response to an RRQ that fails to establish a connection?

ERROR

The _______ chunk is sent when an end point finds an error in a received packet.

ERROR

The _______ protocol provides message authentication, integrity, and privacy.

ESP

Regarding to the DNS, hostnames such as www.fpt.edu.vn, www.stanford.edu are ____ to remember by human, but _____ to process by routers

Easy....Difficult

Regarding to the DNS, hostnames such as www.fpt.edu.vn, www.stanford.edu are ____ to remember by human, but _____ to process by routers

Easy....Difficult-

In the exponential backoff phase of CSMA/CD for a 50Mbps Ethernet, after the first collision of a frame, the adapter then waits .... before sensing the channel again.

Either 0 or 10.24 microseconds

In the exponential backoff phase of CSMA/CD for a 50Mbps Ethernet, after the first collision of a frame, the adapter then waits .... before sensing the channel again.

Either 0 or 10.24 microseconds-

Assume an Ethernet network has speed of 15Mbps. In the exponential backoff phase of CSMA/CD, after the first collision of a frame, the adapter then waits .... before sensing the channel again.

Either 0 or 34 microseconds

Assume an Ethernet network has speed of 15Mbps. In the exponential backoff phase of CSMA/CD, after the first collision of a frame, the adapter then waits .... before sensing the channel again.

Either 0 or 34 microseconds-

In the exponential backoff phase of CSMA/CD for a 1Mbps Ethernet, after the first collision of a frame, the adapter then waits .... before sensing the channel again.

Either 0 or 512 microseconds

In the exponential backoff phase of CSMA/CD for a 1Mbps Ethernet, after the first collision of a frame, the adapter then waits .... before sensing the channel again.

Either 0 or 512 microseconds-

what is the ip address used to test a PC's network card that don't need

Either of 127.0.0.1

Which statement is correct about Error Control in TCP/IP model

Error Control is implemented in both Data Link Layer and Transport Layer

Which statement is correct about Error Control in TCP/IP model

Error Control is implemented in both Data Link Layer and Transport Layer-

Which of the following is the service of link layer?

Error detection.

According to the PPP transition state datagram, exchange of user control and data packets occurs in the...state

Establishing

CSMA/CD (Carrier Sense Multiple Access/Collision Detection) belongs to ____________ while CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) belongs to ____________

Ethernet............ Wireless LAN

CSMA/CD (Carrier Sense Multiple Access/Collision Detection) belongs to ____________ while CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) belongs to ____________

Ethernet............ Wireless LAN-

Which one is a MAC address:

F0-F0-16-F2-15-00

Which one is a MAC address:

F0-F0-16-F2-15-00-

Which cable type used for segment lenth more than 2000m.

Fiber optics

Which cable type used for segment lenth more than 2000m.

Fiber optics-

___ is a guided transmission medium, while___ is an unguided transmission medium

Fiber-optic cable...... Wireless LAN channel

___ is a guided transmission medium, while___ is an unguided transmission medium

Fiber-optic cable...... Wireless LAN channel-

TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.

First-

_________ broadcasts packets, but creates loops in the systems.

Flooding

_________ control regulates the amount of data a source can send before receiving an acknowledgment from the destination..

Flow

_______ are special-interest groups that quickly test, evaluate, and standardize new technologies.

Forums

Which field or bit value unambiguously identifies the datagram as a fragment?

Fragment offset = 1000

What is the name of packet in Link layer of Internet protocol stack?

Frame

What is the name of packet in Link layer of Internet protocol stack?

Frame-

A method for encapsulating data in a PPP frame, identifying the beginning and end of the frame is called

Framing

A method for encapsulating data in a PPP frame, identifying the beginning and end of the frame is called

Framing-

That the frequency spectrum of a link is shared among the connections established across the link is called.....

Frequency division multiplexing

That the frequency spectrum of a link is shared among the connections established across the link is called.....

Frequency division multiplexing-

Which of the following statement is correct?

Full-Duplex: Communications in which both sender and receiver can send at the same time

Which of the following statement is correct?

Full-Duplex: Communications in which both sender and receiver can send at the same time-

TCP connection provides ___________.

Full-duplex service

TCP connection provides ___________.

Full-duplex service-

The HTTP request line contains a _______ method to request a document from the server.

GET

What is the service that the UDP protocol provides?

Guaranteed delivery

What is the service that the UDP protocol provides

Guaranteed delivery-

There are two categories of physical transmission medium:

Guided medium and unguided medium

There are two categories of physical transmission medium:

Guided medium and unguided medium-

_______ is a standard to allow telephones on the public telephone network to talk to computers connected to the Internet.

H.323

_______ was designed as an alternative to the T-1 line.

HDSL

The _______ oversees the IETF and the IRTF.

IAB

To distinguish data from control characters, each sequence of control characters is preceded by a special control character called ________.

IAC

_______ is the precursor to ICANN.

IANA

Mobile IP uses the router advertisement packet of _______ and appends an agent advertisement message.

ICMP

Traceroute command uses

ICMP

What is protocol used to inform errors concerning IP

ICMP-

A group table entry is in the _______ state if there is no corresponding timer running.

IDLE

What is the name of the standard for Ethernet LAN

IEEE 802.3

What is the name of the standard for Ethernet LAN

IEEE 802.3-

In version 6, an independent protocol called _______ is eliminated.

IGMP

_______ is more powerful and complex than _______.

IMAP4; POP3

______is more powerful and complex than______.

IMAP4; POP3

is more powerful and complex than______.

IMAP4; POP3-

In the original ARPANET, _______ were directly connected together.

IMPs

An IGMP packet is carried in an __________ packet.

IP

In the sending computer, UDP sends a data unit to the _______ layer.

IP

The ________ protocol is the transmission mechanism used by the TCP/IP suite.

IP

The logical addresses in the TCP/IP protocol suite are called _______ addresses.

IP

funtion of ARP

IP address to MAC address

When a host has the _______ address of a host but needs the _______ address, it uses a neighbor solicitation packet.

IP; physical

VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________.

IPSec; tunneling

The _______ maintains and supports IAB.

ISOC

FTP uses port 21 for sending.... and port 20 for sending.....

Identification and password.... Data file

FTP uses port 21 for sending.... and port 20 for sending.....

Identification and password.... Data file-

_________ audio/video refers to the use of the Internet for interactive audio/video applications.

Interactive

Vulnerability Attack, Bandwidth Flooding, and Connection Flooding belongs to

Internet DoS Attack

Vulnerability Attack, Bandwidth Flooding, and Connection Flooding belongs to

Internet DoS Attack-

Based on distance, two MOST IMPORTANT types of computer networks are:

Internet and Local Area Networks

Based on distance, two MOST IMPORTANT types of computer networks are:

Internet and Local Area Networks-

In TCP, what can happen if the timeout is smaller than the connection's round-trip time?

It can result in unnecessary retransmissions.

In TCP, what can happen if the timeout is smaller than the connection's round-trip time?

It can result in unnecessary retransmissions.-

Which of the following describe the DHCP Discover message?

It does not use a layer 2 destination address

Which of the following describe the DHCP Discover message?

It does not use a layer 2 destination address.

Which of the following describe the DHCP Discover message?

It does not use a layer 2 destination address.-

Where is the LLC(Logical Link Control)?

It is a sublayer of the datalink layer and above the MAC sublayer of the datalink layer

Where is the LLC(Logical Link Control)?

It is a sublayer of the datalink layer and above the MAC sublayer of the datalink layer-

In CSMA/CD, if the adapter detects signal energy from other adapters while transmitting,

It stops transmitting its frame and transmits a jam signal-

In CSMA/CD, if the adapter detects signal energy from other adapters while transmitting,

It stops transmitting its frame and transmits a jam signal.

Channel partitioning, random access, and taking turns are______

MAC protocols-

The message contains the ________ and the __________.

header; body

____________ is used to compress images.

JPEG

______is used to compress video.

JPEG

is used to compress video.

JPEG-

One way to create an active document is to use __________.

Java applets.

The symmetric (shared) key in the Diffie-Hellman protocol is ____________.

K = Gxy mod N

In Exponential Backoff of CSMA/CD, the delay time after 4 collisions is

K*512 bittimes, where K is randomly selected in {0, 1, 2,..., 14, 15}

In Exponential Backoff of CSMA/CD, the delay time after 4 collisions is

K*512 bittimes, where K is randomly selected in {0, 1, 2,..., 14, 15}-

A _______ is a trusted third party that solves the problem of symmetric-key distribution.

KDC

_______ is an authentication protocol that needs an authentication server and a ticket-granting server.

Kerberos

A packet of L bits is transmitted via the link with the transmission rate of R bits/sec; the transmission delay is

L/R-

__________ allows an ATM network to be divided into several logical subnets.

LIS

Which statement is correct for "layering" in OSI model

Layering allows easy and maintain and updating the system; changing the protocol of one layer does not affect the others

Which one is correct about ALOHA?

Less bandwidth utilization than CSMA/CA

Which one is correct about ALOHA?

Less bandwidth utilization than CSMA/CA-

What type of routing algorithm that OSPF use?

Link State Routing Algorithm

What type of routing algorithm that OSPF use?

Link State Routing Algorithm-

In the transmission delay calculation t = L/R, what is R?

Link bandwidth of the link

In the transmission delay calculation t = L/R, what is R?

Link bandwidth of the link-

TCP provides __________between application processes running on different hosts

Logical communications

The transport layer protocol provides _____ communication between ______ running on different applications

Logical.....Processes

The transport layer protocol provides _____ communication between ______ running on different applications

Logical.....Processes-

_____ applications typically uses ____

Loss-tolerant........UDP

The third stage in an email transfer uses a(n) ________ protocol.

MAA

Channel partitioning, random access, and taking turns are______

MAC protocols

The packets in the application layer is called

Message

______________ means that the receiver needs to be sure of the sender identity and that an imposter has not sent the message.

Message authentication

___________ means that the data must arrive at the receiver exactly as they were sent.

Message integrity

The packets in the application layer is called

Message-

MAN stands for?

Metropolitan Area Network

MAN stands for

Metropolitan Area Network-

_________ means combining several streams of traffic into one stream.

Mixing

In the transport layer, the job of gathering data at the source host from different application processes, enveloping the data with header information to create segments, and passing the segments to the network layer is called _______.

Multiplexing

The job of gathering data at the source host from different application processes, enveloping the data and passing the segments to the network layer is called

Multiplexing

The job of gathering data at the source host from different sockets, enveloping the data and passing the segments to the network layer is called

Multiplexing

The job of gathering data at the source host from different application processes, enveloping the data and passing the segments to the network layer is called

Multiplexing-

The job of gathering data at the source host from different sockets, enveloping the data and passing the segments to the network layer is called

Multiplexing-

MIME is short for

Multipurpose Internet Mail Extensions

MIME is short for

Multipurpose Internet Mail Extensions-

Maximun of data flow through in N-port switch ...(an... with L2)

N

Maximum number of data flow through in N-port switch (LAN switch L2):

N/2

Maximum number of data flow through in N-port switch (LAN switch L2):

N/2-

Using _______, all of the outgoing packets go through the corresponding router, which replaces the source address in the packet with the appropriate global address.

NAT

_______ is a technology using a set of global Internet addresses and a set of private addresses.

NAT

__________ technology allows a site to use a set of private addresses for internal communication and a set of global Internet addresses for communication with another site.

NAT

Where is link layer implemented?

NIC

Where is link layer implemented?

NIC-

For control connection, FTP uses the __________ character set

NVT ASCII

The _______ translates local characters into NVT form.

TELNET client

The _______ translates NVT characters into a form acceptable by the remote operating system.

TELNET server

In BOOTP, the client often needs to use ________ to obtain the complete information it needs.

TFTP

In Kerberos, the _______ issues the ticket for the real server.

TGS

The _______ was designed to provide security at the transport layer.

TLS

What field in the IP header changes when a datagram is forwarded by a simple router?

TTL

What field in the IP header changes when a datagram is forwarded by a simple router?

TTL-

the different between tcp and udp is

Tcp sets up connections ..-

In CRC, both receiver and sender knows

The Generator

In CRC, both receiver and sender knows

The Generator-

_________ is a repository of information linked together from points all over the world.

The WWW

What does that mean by "Carrier Sense" in CSMA/CD?

The host listens for the carrier signal from other adapters before any transmission

What does that mean by "Carrier Sense" in CSMA/CD?

The host listens for the carrier signal from other adapters before any transmission-

A datagram is fragmented into three smaller datagrams. Which of the following is true?

The identification field is the same for all three datagrams.-

With WWW as an example of client-server computer software, the server is:

The machine that makes WWW document available

With WWW as an example of client-server computer software, the server is:

The machine that makes WWW documents available

With WWW as an example of client-server computer software, the server is

The machine that makes WWW documents available-

With WWW as an example of client-server computer software, the server i

The machine that makes WWW documents available.

With WWW as an example of client-server computer software, the server is:

The machine that makes WWW documents available.

With WWW as an example of client-server computer software, the client is:

The machine that you use to display WWW documents

Which of the following is true of the IP address 192.0.0.10?

The network address is 192.0.0.0.

In cyclic redundancy checking, what is CRC

The remainder

How long does it take to download an object from a Web Server to a client if using non-persistent HTTP?

The summation of Two Round Trip Times and the Transmission Time

How long does it take to download an object from a Web Server to a client if using non-persistent HTTP?

The summation of Two Round Trip Times and the Transmission Time-

What does that mean by store-and-forward operation of switches?

The switch will transmit only after it receives the whole frame

What does that mean by store-and-forward operation of switches?

The switch will transmit only after it receives the whole frame-

In TCP congestion control, when timeout occurs

The threshold congestion window will be set to half of the current window size

In TCP congestion control, when timeout occurs

The threshold congestion window will be set to half of the current window size-

What does the IP header's protocol field identify?

The transport layer protocol that generated the information in the data field

What does the IP header's protocol field identify?

The transport layer protocol that generated the information in the data field-

What is store-and-forward operation in switches?

They receive the whole frame before forwarding to next station

What does that mean by cut-through operation of switches?

They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived

What is cut-through operation in switches?

They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived

What does that mean by cut-through operation of switches?

They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived-

What is cut-through operation in switches?

They start forwarding frames as soon as the destination header field has come in, but before the rest of frame has arrived-

___________servers are involved in the Kerberos protocol.

Three

In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ________ duplicate ACK segments have arrived

Three-

We can divide audio and video services into _______ broad categories.

Three-

Which field in the IP header is used to prevent an IP packet from continuously looping through a network?

Time-to-Live (TTL)

Which field in the IP header is used to prevent an IP packet from continuously looping through a network?

Time-to-Live (TTL)-

Which field in the IP header is used to prevent an IP packet from continuously looping through a network?

Time-to-Live (TTL-

The purpose of MTA (Mail Transfer Agent) is...

Transferal of message across the Internet

The purpose of MTA is...

Transferal of message across the Internet

The purpose of MTA (Mail Transfer Agent) is...

Transferal of message across the Internet-

The purpose of MTA is...

Transferal of message across the Internet-

__________ means changing the encoding of a payload to a lower quality to match the bandwidth of the receiving network.

Translation

In the OSI model, which layer functions as a liaison between user support layers and network support layers?

Transport layer

In the OSI model, which layer functions as a liaison between user support layers and network support layers

Transport layer-

_______ occurs when the remote host communicates with a mobile host that is not attached to the same network (or site) as the mobile host.

Triangle routing

____________ means that each IP datagram destined for private use in the organization must be encapsulated in another datagram.

Tunneling

_____specifies a physical star topology central hub....

Twisted-pair

_____specifies a physical star topology central hub....

Twisted-pair-

According to the Nyquist theorem, we need to sample an analog signal______times the highest frequency.

Two-

A registration request or reply is sent by ________ using the well-known port 434.

UDP

BOOTP uses the services of _______.

UDP

RIP uses the services of _______.

UDP

RTCP uses an odd-numbered _______ port number that follows the port number selected for RTP.

UDP

RTP uses a temporary even-numbered _______ port.

UDP

TFTP uses the services of ________.

UDP

Which protocol is better for real-time video application over the Internet in term of minimizing the average transmission delay?

UDP

_______ is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer.

UDP

Which protocol is better for real-time video application over the Internet in term of minimizing the average transmission delay?

UDP-

A version of the _______ operating system included TCP/IP.

UNIX

The _________ is a standard for specifying any kind of information on the Internet.

URL

Ethernet technologies provides ____ to the network layer

Unreliable service

Ethernet technologies provides ____ to the network layer

Unreliable service-

What is WRONG about UDP?

Use ACK to notify the sender that the packet has arrived the receiver

What is WRONG about UDP?

Use ACK to notify the sender that the packet has arrived the receiver-

UDP is an acronym for _______.

User Datagram Protocol

Because the sending and the receiving processes may not write or read data at the same speed, TCP______

Uses buffers-

The _______ field in the SNMP PDU consists of a sequence of variables and their corresponding values.

VarBindList

If the sender wants to enable an option, it sends a _______ command.

WILL

Following standards: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to:

Wireless LAN

________ uses CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) as the MAC sub-layer protocol

Wireless LAN

Following standards: IEEE 802.11b: 11Mps; IEEE 802.11a: 54 Mpbs; IEEE 802.11g: 54 Mpbs belong to:

Wireless LAN-

Which statement is correct about packet switching and circuit switching?

With the same delay performance, packet-switching allows more number of users than circuit switching

Which statement is correct about packet switching and circuit switching?

With the same delay performance, packet-switching allows more number of users than circuit switching-

Because the sending and the receiving processes may not write or read data at the same speed, TCP

______Uses buffers

In SCTP, a data chunk is numbered using ________.

a TSN

an RTP packet is encapsulated in _______.

a UDP user datagram

A time-exceeded message is generated if _______.

a and b

How can two routers be connected on an ATM network?

a and b

ICMPv6 includes _______.

a and b

The term ________ means that IP provides no error checking or tracking. IP assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination, but with no guarantees.

best-effort delivery

HDLC is a __________ protocol

bit-oriented

The physical layer is concerned with the movement of _______ over the physical medium.

bits

A VPN can use _______ to guarantee privacy.

both a and b

A __________on each packet is required for real-time traffic.

both a and b

DHCP can be configured ___________.

both a and b

DHCP is a _______ configuration protocol.

both a and b

IP is _________ datagram protocol

both a and b

P is _________ datagram protocol.

both a and b

The BOOTP client and server can be on _______.

both a and b

There is no need for a header length field in SCTP because ________________.

both a and b

IP is _________ datagram protocol

both a and b-

After the rebinding state, a DHCP client can go to the __________ state.

both and b

In the ICMP package, ICMP packets are the output of _______.

both the input and the output module

A one-to-all communication between one source and all hosts on a network is classified as a _______ communication.

broadcast

An ARP request is normally _______.

broadcast

RPB creates a shortest path _______ tree from the source to each destination.

broadcast

The RARP request packets are normally _________.

broadcast

If ASCII character G is sent and the character D is received, what type of error is this (G: 01000111 and D: 01000100)?

burst

If ASCII character G is sent and the character D is received, what type of error is this (G: 01000111 and D: 01000100)?

burst-

TCP sliding windows are __________ oriented.

byte

In SCTP, a message ________ split into several chunks.

can be

Parity checking _____.

can detect a single bit error in a transmission

Parity checking _____.

can detect a single bit error in a transmission-

When an organization uses a private network, it _______________.

can use a block of addresses without permission from the Internet authorities

In SCTP, a DATA chunk ______carry data belonging to more than one message.

cannot

In the domain name chal.atc.fhdedu, _______ is the most specific label.

chal

In the _______ mode, each character typed is sent by the client to the server.

character

The purpose of echo request and echo reply is to

check node-to-node communication

The purpose of echo request and echo reply is to

check node-to-node communication-

After a message is encrypted, it is called _______.

ciphertext

The value of the ________ subfield defines the general purpose of an option.

class

Identify the class of the following IP address: 4.5.6.7.

class A

Identify the class of the following IP address: 191.1.2.3.

class B

Identify the class of the following IP address: 229.1.2.3.

class D

In ________ addressing, a typical forwarding module can be designed using three tables, one for each unicast class (A, B, C).

classful

In ________ addressing, when an address is given, we can find the beginning address and the range of addresses.

classful

The idea of address aggregation was designed to alleviate the increase in routing table entries when using ________.

classless addressing

A manager is a host that runs the SNMP _______ process.

client

Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm.

client-server

Active documents are sometimes referred to as _________ dynamic documents.

client-site

The GetRequest PDU is sent from the _______ to the __________ to retrieve the value of a variable or a set of variables.

client; server

During an FTP session the control connection is opened _______.

exactly once

In RIP, the ________ timer controls the validity of the route.

expiration

An _______ is a private network with limited external access that uses the TCP/IP protocol suite.

extranet

SONET is a standard for _______ networks.

fiber-optic cable

A host with the domain name pit.arc.nasgov. is on the _______ level of the DNS hierarchical tree. (The root is level one.)

fifth

In FTP, which category of commands lets a user switch directories and create or delete directories?

file management commands

In FTP, which category of commands is used to store and retrieve files?

file transfer commands

In FTP, ASCII, EBCDIC, and image define an attribute called _______.

file type

A(n) _________ machine is a machine that goes through a limited number of states.

finite state

TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.

first

TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.

first-

In a _______ name space, a name is assigned to an address. A name in this space is a sequence of characters without structure.

flat

The _______ field in the base header and the sender IP address combine to indicate a unique path identifier for a specific flow of dat

flow label

The _______ uses a registry table to find the care-of address of the mobile host.

foreign agent

SNMP defines the ___________________ to be sent from a manager to an agent and vice vers

format of the packets

The _______ module sends out an IP packet, the next-hop address, and interface information.

forwarding

The Bootstrap Protocol (BOOTP) is a client/server protocol designed to provide ________ of information for a diskless computer or a computer that is booted for the first time.

four pieces

The _______ module consults the MTU table to determine the packet size necessary for transmission.

fragmentation

Communication in TCP is ___________.

full-duplex

In RIP, the ________ timer is used to purge invalid routes from the table.

garbage collection

TELNET is a ________ client-server application program.

general-purpose

The _______ domains define registered hosts according to their generic behavior.

generic

When you use ftp client (a utility in Windows), what is command used to get files from ftp server?

get

When you use ftp client (a utility in Windows), what is command used to get files from ftp server?

get-

A _______ message tells an upstream router to start sending multicast messages for a specific group through a specific router.

graft

The _______ field of the IGMP message is all zeros in a query message.

group address

The IGMP functions in version 4 are part of _______ in version 6.

group membership

The _______ module can create a new entry in the group table and start a timer.

group-joining

The _______ module can decrement the reference count in the group table.

group-leaving

To join a group, a host sends a _______.

group-membership report

CBT is a ________ protocol that uses a core as the root of the tree.

group-shared

In TCP, one end can stop sending data while still receiving dat This is called a ______ .

half-close

If the sender is a host and wants to send a packet to another host on another network, the logical address that must be mapped to a physical address is ______.

the IP address of the router found in the routing table

The sender is a router that has received a datagram destined for a host on another network. The logical address that must be mapped to a physical address is ______.

the IP address of the router found in the routing table

If the sender is a host and wants to send a packet to another host on the same network, the logical address that must be mapped to a physical address is ______.

the destination IP address in the datagram header

The sender is a router that has received a datagram destined for a host in the same network. The logical address that must be mapped to a physical address is ______.

the destination IP address in the datagram header

In calculating the time difference between two clocks, a negative value indicates _______.

the destination clock lags behind the source clock

If the fragment offset has a value of 100, it means that _______.

the first byte of the datagram is byte 800

A DATA chunk arrives with its B/E bits equal to 10. It is ___________.

the first fragment

A DATA chunk arrives with its B/E bits equal to 01. It is ___________.

the last fragment

A DATA chunk arrives with its B/E bits equal to 00. It is ___________.

the middle fragment

In error reporting the encapsulated ICMP packet goes to

the original order,the original sender,the source

The source port address on the UDP user datagram header defines _______.

the process running on the sending computer

The value of receiving window size is determined by _________.

the receiver

The value of window size is determined by _________.

the receiver

In TFTP, if a duplicate DATA message is received, _______.

the receiver discards the duplicate

The value of receiving window size is determined by _________

the receiver-

The value of receiving window size is determined by _________.

the receiver-

The value of window size is determined by _________.

the receiver-

In cyclic redundancy checking, what is CRC

the remainder

In cyclic redundancy checking, what is CRC

the remainder-

In the digital signature technique when the whole message is signed using an asymmetric key, the receiver of the message uses _______ to verify the signature.

the senderís public key

An HLEN value of decimal 10 means _______.

there are 40 bytes in the header

In TFTP, the block number on a DATA message is 22. This always means _______.

there were 21 previous blocks

10BASE2 uses _______ cable while 10BASE5 uses _______.

thin coaxial, thick coaxial

If the fragment offset has a value of 100 and MF = 0, it means that _______.

this is the last fragment.

If the fragment offset has a value of 100 and MF = 0, it means that _______.

this is the last fragment.-

In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ________ duplicate ACK segments have arrived

three

In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ________ duplicate ACK segments have arrived.

three

In the Internet, the domain name space (tree) is divided into _______ different sections:

three

The documents in the WWW can be grouped into ______ broad categories.

three

To communicate with a remote host, a mobile host goes through ________ phases.

three

We can divide audio and video services into _______ broad categories.

three

In ATM, end devices such as routers use all _____ layers, while switches inside the ATM network use only the bottom ______layers.

three; two

When all fragments of a message have not been received within the designated amount of time, a _______ error message is sent.

time-exceeded

When the hop count field reaches zero and the destination has not been reached, a _______ error message is sent.

time-exceeded

When the hop-count field reaches zero and the destination has not been reached, a _______ error message is sent.

time-exceeded

A _______ shows the time a packet was produced relative to the first or previous packet.

timestamp

If a host needs to synchronize its clock with another host, it sends a _______ message.

timestamp-request

one important role of the transport layer is to

to multiplex and de-multiplex messages-

In OSPF, a _______ link is a network with several routers attached to it.

transient

A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidth signal.

translator

In FTP, there are three types of _______: stream, block, and compressed.

transmission modes

Pipelined reliable data transfer protocols allow the sender to _______

transmit multiple packets without waiting for an ACK

Pipelined reliable data transfer protocols allow the sender to _______

transmit multiple packets without waiting for an ACK-

In the _________ mode, the IPSec header is added between the IP header and the rest of the packet.

transport

The_________ layer is responsible for the delivery of a message from one process to another.

transport

UDP and TCP are both _______ layer protocols.

transport

In the OSI model, which layer functions as a liaison between user support layers and network support layers?

transport layer

This job of delivering the data in a.... to the correct.... is called de-multiplexing

transport-layer segment..... application process

This job of delivering the data in a.... to the correct.... is called de-multiplexing

transport-layer segment..... application process-

IPSec operates at two different modes: _________ mode and _________mode.

transport; tunnel

To name objects globally, SMI uses an object identifier, which is a hierarchical identifier based on a _______ structure

tree

In the ________ mode, the IPSec header is placed in front of the original IP header.

tunnel

A process called _______ sends a multicast packet through WANs that do not support physical multicast addressing.

tunneling

In networks that do not support physical multicast addressing, multicasting can be accomplished through _______.

tunneling

In IGMP, a membership report is sent _______.

twice

To use the services of UDP, we need ________ socket addresses.

two


Related study sets

Section 5: Legal Descriptions in Texas

View Set

Econ Test 3 Chapters 10,11,13,16,19

View Set

Chp 4: Tissue: The Living Fabric

View Set

Numbers 31 to 100 and Aggregative Number Hindi

View Set