Networking II Exam 1 Ch01

Ace your homework & exams now with Quizwiz!

List the seven layers of the ISO/OSI network reference model in ascending order, starting with Layer 1.

7: Application 6: Presentation 5: Session 4: Transport 3: Network 2: Data Link 1: Physical (Please Do Not Throw Sausage Pizza Away)

Which of the following features are typical for most protocol analyzers? (Choose all that apply.) Decodes may be applied to packets in the trace buffer. Alarms may be set to flag unusual network events or conditions. Packet filters display various statistical reports and graphs based on traffic analysis. Packet filters may be applied to incoming data before capture, or to store data after capture. Packet filters include built-in trend analysis and capacity-planning tools.

Decodes may be applied to packets in the trace buffer. Alarms may be set to flag unusual network events or conditions. Packet filters display various statistical reports and graphs based on traffic analysis. Packet filters may be applied to incoming data before capture, or to store data after capture.

True or false? A Best Current Practice (BCP) RFC is a special form of Standard RFC.

False

True or false? RFC 5000 describes how an RFC is created and what processes it must go through to become an official standard, adopted by the IETF.

False

Which organization manages Internet domain names and network addresses?

ICANN

What version of IP supports 128-bit addresses?

IPv6

The ____ is where notions of network location are addressed and where the intricacies involved in directing a PDU from sender to receiver are handled.

Network layer

The ____ includes the physical transmission medium (cables or wireless media) that any network must use to send and receive the signals that constitute the physical expression of networked communications.

Physical Layer

Which of the following steps must a Standard RFC go through to become an official standard? (Choose all that apply.) Standard (sometimes called "Internet Standard") Proposed Standard Retired Standard Historic Standard Draft Standard

Standard (sometimes called Internet Standard) Proposed Standard Draft Standard

Which of the following milestone events for TCP/IP occurred in 1983? (Choose all that apply.) The Department of Defense mandates TCP/IP as the "official ARPANET protocol." TCP/IP appears in the 4.2BSD UNIX distribution. NSF launches the NSFNET. Initial development of name server technology occurs.

The Department of Defense mandates TCP/IP as the "official ARPANET protocol." TCP/IP appears in the 4.2BSD UNIX distribution. Initial development of name server technology occurs.

On any system, only those protocol numbers for protocols that are actually in use must be defined on that system. True or false?

True

True or false? A card that runs in promiscuous mode can capture broadcast packets.

True

True or false? A divide and conquer approach permits concerns related to networking hardware to be completely separated from those related to networking software.

True

True or false? When two or more RFCs cover the same topic, they usually also share the same title.

True

Which of the following TCP/IP protocols operate at the TCP/IP Transport layer? (Choose all that apply.) ARP PPP UDP TCP ICMP

UDP TCP

Many analyzers have configurable ____ that indicate unusual network events or errors.

alarms

Which of the following components operate at the Physical layer? (Choose all that apply.) cables segmentation and reassembly network interface cards (NICs) connectors

cables network interface cards (NICs) connectors

A packet filter that's applied to incoming data in a protocol analyzer may be called a _____. (Choose all that apply.) data filter egress filter post-filter capture filter pre-filter

capture filter pre-filter

What function(s) does the Session layer provide? (Choose all that apply.) checkpoint controls data format conversions segmentation and reassembly session setup, maintenance, and tear-down

checkpoint controls session setup, maintenance, and tear-down

The Session layer includes mechanisms to maintain reliable ongoing conversations, called ____________________.

checkpoints

Which of the following activities may occur during the protocol analysis process? (Choose all that apply.) decoding packets into readable form capturing packets "off the wire" gathering statistics retransmitting captured packets for testing tapping into network communications

decoding packets into readable form capturing packets "off the wire" gathering statistics tapping into network communications

Breaking up an incoming data stream so separate portions may be delivered to the correct applications is called ____________________.

demultiplexing

True or false? The Session layer is equipped to request retransmission of all erroneous or missing PDUs when reassembly is underway, so that it can guarantee reliable delivery of data from sender to receiver.

false

Data Link layer PDUs are called ____________________.

frames

Which terms represent parts of a PDU that are always present in any PDU? (Choose all that apply.) trailer header payload checksum

header payload

Devices that operate on the Internet are generically identified as ____________________.

hosts

The ____ is the parent organization for all the various Internet boards and task forces.

internet society

The ____________________ is the parent organization for all the various Internet boards and task forces.

internet society

The term ____________________ refers to a single logical network composed of multiple physical networks, which may all be at a single physical location, or spread among multiple physical locations.

internetwork

The primary function of the OSI Model's ____________________ layer is to provide a globally unique address to every host on the Internet and paths to and from hosts.

network

The OSI Model's ____________________ layer includes the physical transmission medium (cables or wireless media) that any network must use to send and receive the signals that constitute the physical expression of networked communications.

physical

Each TCP/IP service has an associated ____________________ that uses a 16-bit number to identify a specific process or service.

port address

The TCP/IP Application layer also is known as the ____ layer because this is where the protocol stack interfaces with applications or processes on a host machine.

process

____________________ is the process of tapping into the network communications system, capturing packets that cross the network, gathering network statistics, and decoding the packets into readable form.

protocol analysis

Which of the following items represent design goals that motivated the development of TCP/IP? (Choose all that apply.) robust network architecture support for long-haul connections high performance ability of dissimilar systems to exchange data reliable delivery mechanisms

robust network architecture support for long-haul connections ability of dissimilar systems to exchange data reliable delivery mechanisms

Which of the following terms is a synonym for a dynamically assigned port address, used to service a temporary TCP/IP connection for data exchange?

socket address

Which of the following statements represent benefits of a layered approach to networking? (Choose all that apply.) takes a big problem and breaks it into a series of smaller interrelated problems permits expertise to be applied from different disciplines for different layers allows individual layers to be insulated from one another permits hardware issues to be kept separate from software issues

takes a big problem and breaks it into a series of smaller interrelated problems permits expertise to be applied from different disciplines for different layers allows individual layers to be insulated from one another permits hardware issues to be kept separate from software issues (all)

A(n) ____ is holding area for packets copied off the network.

trace buffer

Many PDUs include a characteristic closing component called ____ that provides data integrity checks for the data portion of the PDU, known as the payload.

trailer


Related study sets

CISSP-Topic 1, Security Management Practices

View Set

N3035- Fluid and Electrolytes (REVISED for final exam)

View Set

FIT1043 - Introduction to data Science Week 1

View Set

Day 27 Dangerous Goods and Hazardous Materials (DGHM) SSG

View Set

Chapter 25, Chapter 25 Nuclear Energy, Chapter 25-Nuclear Chemistry, Chapter 25 - Nuclear Chemistry, Chapter 25; Nuclear Chemistry

View Set