IST 220 Final Exam

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/57

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards

End systems are connected by a network of:

Transmission rates and packet switches

2
New cards

All activity in the Internet that involves two or more communicating remote entities is governed by a protocol. True or False?

True

3
New cards

Every router has a _______________ that maps destination addresses (or portions of the destination addresses) to that router's outbound links.

Forwarding table

4
New cards
<p><span>For the figure below, what is the source of packet delay most associated with number 1?</span></p>

For the figure below, what is the source of packet delay most associated with number 1?

Transmission delay

5
New cards
<p>For the figure below, what is the source of packet delay most associated with number 2?</p>

For the figure below, what is the source of packet delay most associated with number 2?

Propagation delay

6
New cards
<p>For the figure below, what is the source of packet delay most associated with number 3?</p>

For the figure below, what is the source of packet delay most associated with number 3?

Queuing delay

7
New cards
<p>For the figure below, what is the source of packet delay most associated with number 4?</p>

For the figure below, what is the source of packet delay most associated with number 4?

Nodal processing

8
New cards

Packet switching pre-allocates use of the transmission link regardless of demand, with allocated but unneeded link time going unused. True or False?

False

9
New cards

The Internet protocol stack consists of six layers. True or False?

False

10
New cards

Describe the meaning of the phrase encapsulation as used in the context of protocol layers and their service models.

Encapsulation is the process of creating a packet which includes two fields: header fields and a payload field. The payload field is typically a packet from the layer above.

11
New cards

In topic 1.6, "Networks Under Attack," you learned about four categories of attacks that "the bad guys" can launch across the Internet, and saw several examples of each. In a few sentences, describe one of those examples.

  • The bad guys can put malware in your host via the internet

    • Malware: self-replicating or not

      • Viruses

      • Worms

  • The bad guys can attack servers and network infrastructure

    • Denial-of-service (DoS) attacks

    • Distributed DoS (DDoS)

  • The bad guys can sniff packets

    • Packet sniffer - passive receiver that records a copy of every packet that flies by

  • The bad guys can masquerade as someone you trust

    • IP spoofing

12
New cards

Which of the following is not an example of an object, as we have used that term in this course?

HTTP socket

13
New cards

Web servers implement the server side of HTTP. True or False?

True

14
New cards

Suppose the URL that a user requests is http://220.m84.us/http_object_demo/index.html. Which path will be included in the request?

/http_object_demo/index.html

15
New cards

The first line of an HTTP request message is called the request line. True or False?

True

16
New cards

An HTTP server is stateless. True or False?

True

17
New cards

In a few sentences, describe what a proxy server is.

A proxy server, also known as a Web cache, is a network entity that satisfies HTTP requests on the behalf of an origin Web server. A user's browser can be configured so that all of the user's HTTP requests are first directed to the Web cache. This can substantially reduce the response time for a client request, and can substantially reduce traffic on an institution's access link to the Internet. 

18
New cards

The HTTP mechanism which allows a cache to verify that its objects are up to date is called the:

conditional GET

19
New cards

HTTP/1.1 uses UDP connections. True or False?

False

20
New cards

The three major components of e-mail are user agents, mail servers, and the Simple Mail Transfer Protocol (SMTP). True or False?

True

21
New cards

SMTP uses UDP for ultra-reliable delivery from the sender's mail server to the recipient's mail server. True or False?

False

22
New cards

Much like HTTP, SMTP uses a command-response interaction. True or False?

True

23
New cards

SMTP is primarily a pull protocol—it is used to load information at the client's convenience. True or False?

False

24
New cards

Because POP3 is an extremely simple mail access protocol, it doesn't require authorization (i.e., a username and password). True or False?

False

25
New cards

What does the term "logical communication" mean, in the context of a transport-layer protocol?

Logical communication means that, from an application's perspective, it is as if the hosts running the processes were directly connected.

26
New cards

How many timers does the TCP Sender use in order to decide when to retransmit a packet?

One: for the oldest unacknowledged packet

27
New cards

The sequence number for a segment is the byte-stream number of the first byte in the segment. True or False?

True

28
New cards

Which action should the TCP receiver take in response to the following event: "Arrival of out-of-order segment with higher-than-expected sequence number. Gap detected."?

Immediately send duplicate ACK, indicating sequence number of next expected byte.

29
New cards

Assume a TCP connection exists between Host A and Host B. True or false: The acknowledgement number that Host A puts in its segment is the sequence number of the last byte Host A received from Host B. True or False?

False

30
New cards

Congestion can manifest both long delays (queueing in router buffers) and packet loss (buffer overflow at routers). True or False?

True

31
New cards

Describe the difference between forwarding and routing.

Forwarding refers to the router-local action of transferring a packet from an input link interface to the appropriate output link interface. Routing refers to the network-wide process that determines the end-to-end paths that packets take from source to destination. 

32
New cards

What is defined as the area or component which connects a router's input ports to its output ports?

Switching fabric

33
New cards
<p><span>In the figure below, what would be the most appropriate words to put in place of the yellow box? In other words, what does the routing algorithm generate?</span></p>

In the figure below, what would be the most appropriate words to put in place of the yellow box? In other words, what does the routing algorithm generate?

forwarding table

34
New cards

The boundary between the host and the physical link—which boundary must be associated with an IP address—is called:

an interface

35
New cards

What does the sending host do to help the destination host be absolutely sure it has received the last fragment of the original datagram?

Sets the flag bit of the last fragment to 0

36
New cards

Network Address Translation (NAT) lets us use just one IP address as far as the outside world is concerned, while still being able to provide private IP addresses for many device interfaces within the local network. True or False?

True

37
New cards

Link-layer protocols run at which numbered network layer?

Layer 3

38
New cards

Which term may be used synonymously with "network adapter"?

Network interface card

39
New cards

Assume we are using a one-bit even parity scheme. True or false: When an even number of bit errors occurs, the result is an undetected error.

True

40
New cards

The link layer is a combination of hardware, software, and firmware. True or False?

False

41
New cards

SMTP is a protocol that you can use to access your e-mail. True or False?

False

42
New cards

If a file consists of F bits and the transfer takes T seconds for the receiver to receive all of the bits, what is the average throughput?

F/T

43
New cards

What is the standard port number for SMTP?

25

44
New cards

In order to transmit data over a network, an application process creates a:

socket

45
New cards

In the application layer protocol stack, which statement is true about user applications?

They run only on end systems

46
New cards

What is the purpose of the conditional GET in HTTP?

To reduce response time and link utilization

47
New cards

What information is needed to identify a process for receiving messages over a network?

Both IP address and port number

48
New cards

Which of the following network applications typically runs over UDP?

DNS

49
New cards

What do we call the tool that can intercept and log traffic passing over a digital network or part of a network?

Packet sniffer

50
New cards

The Internet's network core contains packet switches. True or False?

True

51
New cards

What is the purpose of cookies in web applications?

To maintain state

52
New cards

Circuit switching pre-allocates use of the transmission link regardless of demand, with allocated but unneeded link resources going unused. True or False?

True

53
New cards

What is the main difference between POP3 and IMAP?

IMAP keeps messages on the server while POP3 typically downloads and deletes them

54
New cards

Which term is synonymous with “host”?

End System

55
New cards

Which transport layer protocol provides reliable data transfer and flow control?

TCP

56
New cards

The most popular mail access protocols are POP3, IMAP, and HTTP. True or False?

True

57
New cards

In the following URL, what is the hostname?

http://220.m84.us/http_object_demo/index.html

58
New cards

What is the purpose of TTL in DNS records?

To specify how long a cached entry remains valid