IS 435 Final

0.0(0)
studied byStudied by 3 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/390

flashcard set

Earn XP

Description and Tags

Last updated 6:17 PM on 12/12/22
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

391 Terms

1
New cards
1) ISPs ________. A) carry traffic on the Internet B) connect users to the Internet C) both A and B D) neither A nor B
Both A and B
2
New cards
2) We call any device connected to the Internet a(n) ________. A) IP B) client C) router D) host
Host
3
New cards
3) Who owns the Internet? A) The U.S. Government B) The United Nations C) The IETF D) No one
No one
4
New cards
4) The IETF primarily ________.A) manages the Internet B) creates Internet standards C) coordinates the work of ISPs D) all of the above
Creates Internet Standards
5
New cards
5) When you use your tablet to access the internet, the tablet is a ________. A) client host B) server host C) both A and B D) neither A nor B
Client Host
6
New cards
6) What process adds a header in front of an application message or fragment? A) application B) transport C) internet D) data link
transport
7
New cards
7) What process adds a header in front of a TCP segment? A) Application B) Transport C) Internet D) Data Link
Internet
8
New cards
8) When a frame arrives, the data link process on the destination host ________. A) adds a header B) removes a header C) both A and B D) neither A nor B
Removes a header
9
New cards
9) The transport layer on the destination host ________. A) reassembles the application message if it has been fragmented B) removes the transport header C) both A and B D) neither A nor B
Both A and B
10
New cards
10) IPv4 addresses are ________ bits long. A) 32 B) 64 C) 128 D) none of the above
32
11
New cards
11) Routing is based on a(n) ________. A) IP address B) single-network address C) either A or B D) neither A nor B
IP address
12
New cards
12) Paths across a single network are called ________. A) routes B) data links C) physical links D) none of the above
Data links
13
New cards
13) If there are 10 routers between the source and destination hosts, how many transport processes will be involved on all devices? A) 1 B) 2 C) 10 D) 12
2
14
New cards
14) If there are 10 routers between the source and destination hosts, how many internet processes will be involved on all devices? A) 1 B) 2 C) 10 D) 12
12
15
New cards
15) Which of the following is an Internet supervisory protocol? A) DNS B) IP C) both A and B D) neither A nor B
DNS
16
New cards
16) In a point-to-point single network, how many physical links will there be when a packet is transmitted? A) 0 B) 1 C) 2 D) We cannot say with the information provided.
1
17
New cards
17) Which of the following is true? A) Frames are carried inside packets. B) Packets are carried inside frames. C) both A and B D) neither A nor B
Packets are carried inside frames
18
New cards
18) A host sends a packet to another host containing seven single networks along the way. How many other hosts will there be along the route when Host A transmits? A) 1 B) 2 C) 7 D) 9
1
19
New cards
19) A host sends a packet to another host containing six single networks along the way. How many data links are used for this transmission? A) 1 B) 6 C) 7 D) 8
6
20
New cards
20) A host sends a packet to another host containing six single networks along the way. How many routes are included in this transmission? A) 1 B) 6 C) 7 D) 8
1
21
New cards
21) A host sends a packet to another host with six single networks along the way. How many frames are involved? A) 1 B) 6 C) 7 D) 8
6
22
New cards
22) Source and destination EUI-48 (or MAC) addresses are found in ________ headers. A) IP B) frame C) TCP D) UDP
frame
23
New cards
23) ________ have DHCP servers. A) Home access routers B) Internet core routers C) both A and B D) neither A nor B
Home access routers
24
New cards
24) Internet standards are published as ________. A) RFCs B) IETFs C) TCPD) Internet Protocols
RFCs
25
New cards
25) Network standards provide ________. A) strobing B) synchronization C) interoperability D) entanglement
interoperability
26
New cards
26) Which standards agency is especially important for internet processes? A) ITU-T B) IETF C) Both A and B are about equally important. D) Neither A nor B is important.
IETF
27
New cards
27) A standards agency for OSI is ________. A) ITU-T B) IETF C) both A and B D) neither A nor B
ITU-T
28
New cards
28) Which layer governs wires? A) transport B) physical C) Internet D) none of the above
physical
29
New cards
29) Which standards layer governs e-mail? A) data link B) transport C) Internet D) none of the above
none of the above
30
New cards
30) Which standards layer governs multiuser word processing programs? A) data link B) transport C) Internet D) none of the Above
none of the above
31
New cards
31) Which layer(s) governs transmission through a single network? A) data link B) physical C) both A and B D) neither A nor B
both A and B
32
New cards
32) At what layer, will you find standards for routers? A) transport B) Internet C) both A and B D) neither A nor B
Internet
33
New cards
33) At what layer, will you find standards for access points? A) physical B) data link C) both A and B D) neither A nor B
both A and B
34
New cards
34) At what layer, will you find standards for switches? A) application B) data link C) transport D) Internet
data link
35
New cards
35) At what layer, will you find standards for frames? A) application B) data link C) transport D) Internet
data link
36
New cards
36) At what layer, will you find standards for IP addresses? A) application B) data link C) transport D) Internet
Internet
37
New cards
37) At what layer, will you find standards for routes? A) application B) data link C) transport D) Internet
Internet
38
New cards
38) At what layer, will you find standards for EUI-48 addresses? A) application B) data link C) transport D) Internet
Data link
39
New cards
39) If two hosts are connected by five networks, how many packets will there be when one host sends a packet to the other host? A) 1 B) 2 C) 5 D) 7
1
40
New cards
40) If two hosts are connected by five networks, how many routers will there be when one host sends a packet to the other host? A) 1 B) 2 C) 4 D) 5
4
41
New cards
41) If two hosts are connected by five switches, how physical links will there be when one host sends a packet to the other host? A) 1 B) 2 C) 5 D) 6
6
42
New cards
42) Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment. A) ACK B) SYN C) SYN\ACK D) none of the above
SYN\ACK
43
New cards
43) If a destination host receives a TCP segment with an error, it will transmit ________. A) an ACK segment B) an NAC segment C) an RSND segment D) nothing
Nothing
44
New cards
44) If a destination host receives a correct segment, it will transmit ________. A) an ACK segment B) an NAC segment C) an RSND segment D) nothing
an ACK segment
45
New cards
45) In a four-step close, which side transmits a FIN segment? A) the side that initiates the close B) the side that does not initiate the close C) both A and B D) neither A nor B
both A and B
46
New cards
46) Which of the following is NOT one of the three general parts of messages? A) address field B) header C) data field D) trailer
address field
47
New cards
47) If the destination internet process detects an error, it ________. A) discards the packet B) sends back a segment notifying the sender C) both A and B D) neither A nor B
discards the packet
48
New cards
48) Which of the following is a connectionless protocol? A) IP B) TCP C) both A and B D) neither A nor B
IP
49
New cards
49) If someone says that a 1-bit flag is set, it is given the value ________. A) 0 B) 1 C) either 0 or 1 D) neither 0 or 1
1
50
New cards
50) The UDP header has ________ fields. A) 4 B) 8 C) 16 D) 32
4
51
New cards
51) UDP ________. A) is unreliable B) has a checksum field C) both A and B D) neither A nor B
both A and B
52
New cards
52) On a server, well-known port numbers indicate ________. A) applications B) connections with client computers C) both A and B D) neither A nor B
applications
53
New cards
53) The range of port 1024 to port 4999 is the usual range for ________ port numbers. A) well-known B) ephemeral C) both A and B D) neither A nor B
ephemeral
54
New cards
54) The source socket is 60.171.18.22:2707. The source is a(n) ________. A) client B) server C) well-known server D) ephemeral server
client
55
New cards
55) The destination socket is 60.171.18.22:161. The destination host is a(n) ________. A) client B) server C) well-known server D) ephemeral server
server
56
New cards
56) "Octet" is the same as ________. A) "bit" B) "byte" C) either A or B, depending on the context D) neither A nor B
byte
57
New cards
57) Ethernet has a Frame Check Sequence Field to check for errors. Ethernet is ________. A) reliable B) unreliable C) both A and B D) neither A nor B
unreliable
58
New cards
58) Converting application messages into bits is called ________. A) encapsulation B) encryption C) encoding D) exchange
encoding
59
New cards
59) Transmitting "Oh, My!" without the quotes in ASCII requires ________ octets. A) 2 B) 4 C) 6 D) 7
7
60
New cards
60) Convert decimal 8 to binary. A) 100 B) 1000 C) 10000 D) 111
1000
61
New cards
61) A 5-bit field can represent ________ alternatives or different combinations. A) 8 B) 16 C) 32 D) 64
32
62
New cards
62) To represent 65 alternatives, your alternatives field would have to be at least ________ bits long. A) 5 B) 6 C) 7 D) 8
7
63
New cards
63) The five senses can be represented with a ________-bit field. A) 2 B) 3 C) 4 D) 5
3
64
New cards
64) In QoS, the S stands for ________. A) software B) security C) service D) satisfaction
service
65
New cards
65) QoS is quantified through ________. A) criteria B) consensus C) metrics D) none of the above
metrics
66
New cards
66) Transmission speed is normally measured in ________. A) bits per second B) bytes per second C) octets per second D) none of the above
bits per second
67
New cards
67) Throughput is ________. A) the speed a network actually provides to users B) a network's rated speed C) both A and B D) neither A nor B
the speed a network actually provides to users
68
New cards
68) In a coffee shop hot spot, the rated speed is 10 Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. If you and three others are transmitting or receiving at the same time, what speed should you expect to get? A) 0.5 Mbps B) 1 Mbps C) 1.25 Mbps D) none of the above
1.25 Mbps
69
New cards
69) In a coffee shop, there are ten people sharing an access point with a rated speed of 2Gbps. The throughput is half the rated speed. If each person downloading is getting an average of 200Mbps, how many people are using the Internet at that moment? A) 10 B) 5 C) 2 D) none of the above
5
70
New cards
70) Trunk lines in the Internet core are ________. A) dedicated B) multiplexed C) both A and B D) neither A nor B
multiplexed
71
New cards
71) The business benefit of multiplexing is ________. A) lower cost B) higher speed C) avoiding the need to send many transmission links through narrow conduits D) security
lower cost
72
New cards
72) ________ is the percentage of time that a network is available for use. A) Availability B) Downtime C) QoS D) none of the above
availability
73
New cards
73) When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________. A) latency B) output C) jitter D) throughput
latency
74
New cards
74) Variability in delay is called ________. A) jitter B) variance C) a QoS failure D) latency
jitter
75
New cards
75) Guarantees for quality of service are called ________. A) QoS-G B) QoS metrics C) SLAs D) QoS guarantees
SLAs
76
New cards
76) An SLA specifies the ________. A) best case B) worst case C) both A and B D) neither A nor B
worst case
77
New cards
77) An SLA specifies ________. A) maximum speed B) minimum speed C) both A and B D) neither A nor B
minimum speed
78
New cards
78) An SLA specifies ________. A) maximum latency B) minimum latency C) both A and B D) neither A nor B
maximum latency
79
New cards
79) ISPs usually offer QoS guarantees to ________. A) residential customers B) business customers C) both A and B D) neither A nor B
business customers
80
New cards
80) ________ can be addressed by using priority. A) Chronic lacks of capacity B) Momentary traffic peaks C) both A and B D) neither A nor B
momentary traffic peaks
81
New cards
81) Momentary traffic peaks can lead to ________. A) latency B) packet loss C) both A and B D) neither A nor B
both A and B
82
New cards
82) To handle momentary traffic peaks, which would you give higher priority to? A) e-mail B) VoIP C) both A and B D) It is impossible to say with the information provided.
VoIP
83
New cards
83) Traffic shaping may ________ traffic that is undesirable. A) prohibit B) limit C) both A and B D) neither A nor B
both A and B
84
New cards
84) SNMP agents communicate with the ________. A) network visibility program B) network management program C) MIB D) all of the above
network management program
85
New cards
85) To determine if a host is reachable, you send a(n) ________. A) SNMP SET command B) MIB C) trap D) ping
ping
86
New cards
86) Ping tells you ________. A) that a host is reachable B) latency in the connection to the host C) both A and B D) neither A nor B
both A and B
87
New cards
87) SNMP Set commands can ________. A) ask agents for information about the managed device B) change router operation C) both A and B D) neither A nor B
change router operation
88
New cards
88) SNMP Get commands can ________. A) ask agents for information about the managed device B) change router operation C) both A and B D) neither A nor B
ask agents for information about the managed device
89
New cards
89) The SNMP manager stores the information it receives from Get commands ________. A) in the MIB B) on the agent C) on the managed device D) in the cloud
in the MIB
90
New cards
90) Using the SNMP Set command ________. A) saves management labor B) requires excellent security C) both A and B D) neither A nor B
both A and B
91
New cards
91) Using standard configurations ________. A) saves money B) gives management agility C) both A and B D) neither A nor B
saves money
92
New cards
92) SDN can ________. A) permit routing rules to be changed rapidly B) reduce router costs C) both A and B D) neither A nor B
both A and B
93
New cards
93) Creating switching and routing tables is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control
control
94
New cards
94) Routing packets is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control
forwarding
95
New cards
95) The general term for evil software is ________. A) virus B) worm C) malware D) all of the above
malware
96
New cards
96) ________ is the general name for a security flaw in a program. A) A virus B) Malware C) A security fault D) A vulnerability
a vulnerability
97
New cards
97) Users typically can eliminate a vulnerability in one of their programs by ________. A) installing a patch B) using an antivirus program C) both A and B D) neither A nor B
installing a patch
98
New cards
98) Vulnerability-based attacks that occur before a patch is available are called ________ attacks. A) indefensible B) stealth C) malware D) zero-day
zero-day
99
New cards
99) What kind of attack is most likely to succeed against a system with no technological vulnerabilities? A) malware B) social engineering C) both A and B D) neither A nor B
social engineering
100
New cards
100) ________ are full programs. A) Viruses B) Worms C) both A and B D) neither A nor B
worms

Explore top flashcards