IS435

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/177

flashcard set

Earn XP

Description and Tags

Last updated 5:50 AM on 3/13/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

178 Terms

1
New cards
1) ISPs \________.
A) carry traffic on the Internet
B) connect users to the Internet
C) both A and B
D) neither A nor B
C
2
New cards
1) ISPs \________.
A) carry traffic on the Internet
B) connect users to the Internet
C) both A and B
D) neither A nor B
C
3
New cards
2) We call any device connected to the Internet a(n) \________.
A) IP
B) client
C) router
D) host
D
4
New cards
3) Who owns the Internet?
A) The U.S. Government
B) The United Nations
C) The IETF
D) No one
D
5
New cards
4) The IETF primarily \________.
A) manages the Internet
B) creates Internet standards
C) coordinates the work of ISPs
D) all of the above
B
6
New cards
5) When you use your tablet to access the internet, the tablet is a \________.
A) client host
B) server host
C) both A and B
D) neither A nor B
A
7
New cards
6) What process adds a header in front of an application message or fragment?
A) application
B) transport
C) internet
D) data link
B
8
New cards
7) What process adds a header in front of a TCP segment?
A) Application
B) Transport
C) Internet
D) Data Link
C
9
New cards
8) When a frame arrives, the data link process on the destination host \________.
A) adds a header
B) removes a header
C) both A and B
D) neither A nor B
B
10
New cards
9) The transport layer on the destination host \________.
A) reassembles the application message if it has been fragmented
B) removes the transport header
C) both A and B
D) neither A nor B
C
11
New cards
10) IPv4 addresses are \________ bits long.
A) 32
B) 64
C) 128
D) none of the above
A
12
New cards
11) Routing is based on a(n) \________.
A) IP address
B) single-network address
C) either A or B
D) neither A nor B
A
13
New cards
12) Paths across a single network are called \________.
A) routes
B) data links
C) physical links
D) none of the above
B
14
New cards
13) If there are 10 routers between the source and destination hosts, how many transport
processes will be involved on all devices?
A) 1
B) 2
C) 10
D) 12
B
15
New cards
14) If there are 10 routers between the source and destination hosts, how many internet processes
will be involved on all devices?
A) 1
B) 2
C) 10
D) 12
D
16
New cards
15) Which of the following is an Internet supervisory protocol?
A) DNS
B) IP
C) both A and B
D) neither A nor B
A
17
New cards
16) In a point-to-point single network, how many physical links will there be when a packet is
transmitted?
A) 0
B) 1
C) 2
D) We cannot say with the information provided.
B
18
New cards
17) Which of the following is true?
A) Frames are carried inside packets.
B) Packets are carried inside frames.
C) both A and B
D) neither A nor B
B
19
New cards
18) A host sends a packet to another host containing seven single networks along the way. How
many other hosts will there be along the route when Host A transmits?
A) 1
B) 2
C) 7
D) 9
A
20
New cards
19) A host sends a packet to another host containing six single networks along the way. How
many data links are used for this transmission?
A) 1
B) 6
C) 7
D) 8
B
21
New cards
20) A host sends a packet to another host containing six single networks along the way. How
many routes are included in this transmission?
A) 1
B) 6
C) 7
D) 8
A
22
New cards
21) A host sends a packet to another host with six single networks along the way. How many
frames are involved?
A) 1
B) 6
C) 7
D) 8
B
23
New cards
22) Source and destination EUI-48 (or MAC) addresses are found in \________ headers.
A) IP
B) frame
C) TCP
D) UDP
B
24
New cards
23) \________ have DHCP servers.
A) Home access routers
B) Internet core routers
C) both A and B
D) neither A nor B
A
25
New cards
24) Internet standards are published as \________.
A) RFCs
B) IETFs
C) TCP/IPs
D) Internet Protocols
A
26
New cards
25) Network standards provide \________.
A) strobing
B) synchronization
C) interoperability
D) entanglement
C
27
New cards
26) Which standards agency is especially important for internet processes?
A) ITU-T
B) IETF
C) Both A and B are about equally important.
D) Neither A nor B is important.
B
28
New cards
27) A standards agency for OSI is \________.
A) ITU-T
B) IETF
C) both A and B
D) neither A nor B
A
29
New cards
28) Which layer governs wires?
A) transport
B) physical
C) Internet
D) none of the above
B
30
New cards
29) Which standards layer governs e-mail?
A) data link
B) transport
C) Internet
D) none of the above
D
31
New cards
30) Which standards layer governs multiuser word processing programs?
A) data link
B) transport
C) Internet
D) none of the Above
D
32
New cards
31) Which layer(s) governs transmission through a single network?
A) data link
B) physical
C) both A and B
D) neither A nor B
C
33
New cards
32) At what layer, will you find standards for routers?
A) transport
B) Internet
C) both A and B
D) neither A nor B
B
34
New cards
33) At what layer, will you find standards for access points?
A) physical
B) data link
C) both A and B
D) neither A nor B
C
35
New cards
34) At what layer, will you find standards for switches?
A) application
B) data link
C) transport
D) Internet
B
36
New cards
35) At what layer, will you find standards for frames?
A) application
B) data link
C) transport
D) Internet
B
37
New cards
36) At what layer, will you find standards for IP addresses?
A) application
B) data link
C) transport
D) Internet
D
38
New cards
37) At what layer, will you find standards for routes?
A) application
B) data link
C) transport
D) Internet
D
39
New cards
38) At what layer, will you find standards for EUI-48 addresses?
A) application
B) data link
C) transport
D) Internet
B
40
New cards
39) If two hosts are connected by five networks, how many packets will there be when one host
sends a packet to the other host?
A) 1
B) 2
C) 5
D) 7
A
41
New cards
40) If two hosts are connected by five networks, how many routers will there be when one host
sends a packet to the other host?
A) 1
B) 2
C) 4
D) 5
C
42
New cards
41) If two hosts are connected by five switches, how physical links will there be when one host
sends a packet to the other host?
A) 1
B) 2
C) 5
D) 6
D
43
New cards
42) Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it
will transmit a(n) \________ segment.
A) ACK
B) SYN
C) SYN/ACK
D) none of the above
C
44
New cards
43) If a destination host receives a TCP segment with an error, it will transmit \________
A) an ACK segment
B) an NAC segment
C) an RSND segment
D) nothing
D
45
New cards
44) If a destination host receives a correct segment, it will transmit \________.
A) an ACK segment
B) an NAC segment
C) an RSND segment
D) nothing
A
46
New cards
45) In a four-step close, which side transmits a FIN segment?
A) the side that initiates the close
B) the side that does not initiate the close
C) both A and B
D) neither A nor B
C
47
New cards
46) Which of the following is NOT one of the three general parts of messages?
A) address field
B) header
C) data field
D) trailer
A
48
New cards
47) If the destination internet process detects an error, it \________.
A) discards the packet
B) sends back a segment notifying the sender
C) both A and B
D) neither A nor B
A
49
New cards
48) Which of the following is a connectionless protocol?
A) IP
B) TCP
C) both A and B
D) neither A nor B
A
50
New cards
49) If someone says that a 1-bit flag is set, it is given the value \________.
A) 0
B) 1
C) either 0 or 1
D) neither 0 or 1
B
51
New cards
50) The UDP header has \________ fields.
A) 4
B) 8
C) 16
D) 32
A
52
New cards
51) UDP \________.
A) is unreliable
B) has a checksum field
C) both A and B
D) neither A nor B
C
53
New cards
52) On a server, well-known port numbers indicate \________.
A) applications
B) connections with client computers
C) both A and B
D) neither A nor B
A
54
New cards
53) The range of port 1024 to port 4999 is the usual range for \________ port numbers.
A) well-known
B) ephemeral
C) both A and B
D) neither A nor B
B
55
New cards
54) The source socket is 60.171.18.22:2707. The source is a(n) \________.
A) client
B) server
C) well-known server
D) ephemeral server
A
56
New cards
55) The destination socket is 60.171.18.22:161. The destination host is a(n) \________.
A) client
B) server
C) well-known server
D) ephemeral server
B
57
New cards
56) "Octet" is the same as \________.
A) "bit"
B) "byte"
C) either A or B, depending on the context
D) neither A nor B
B
58
New cards
57) Ethernet has a Frame Check Sequence Field to check for errors. Ethernet is \________.
A) reliable
B) unreliable
C) both A and B
D) neither A nor B
B
59
New cards
58) Converting application messages into bits is called \________.
A) encapsulation
B) encryption
C) encoding
D) exchange
C
60
New cards
59) Transmitting "Oh, My!" without the quotes in ASCII requires \________ octets.
A) 2
B) 4
C) 6
D) 7
D
61
New cards
60) Convert decimal 8 to binary.
A) 100
B) 1000
C) 10000
D) 111
B
62
New cards
61) A 5-bit field can represent \________ alternatives or different combinations.
A) 8
B) 16
C) 32
D) 64
C
63
New cards
62) To represent 65 alternatives, your alternatives field would have to be at least \________ bits
long.
A) 5
B) 6
C) 7
D) 8
C
64
New cards
63) The five senses can be represented with a \________-bit field.
A) 2
B) 3
C) 4
D) 5
B
65
New cards
64) In QoS, the S stands for \________.
A) software
B) security
C) service
D) satisfaction
C
66
New cards
65) QoS is quantified through \________.
A) criteria
B) consensus
C) metrics
D) none of the above
C
67
New cards
66) Transmission speed is normally measured in \________.
A) bits per second
B) bytes per second
C) octets per second
D) none of the above
A
68
New cards
67) Throughput is \________.
A) the speed a network actually provides to users
B) a network's rated speed
C) both A and B
D) neither A nor B
A
69
New cards
68) In a coffee shop hot spot, the rated speed is 10 Mbps. Throughput is about half of the rated
speed. There are ten people using the hot spot. If you and three others are transmitting or
receiving at the same time, what speed should you expect to get?
A) 0.5 Mbps
B) 1 Mbps
C) 1.25 Mbps
D) none of the above
C
70
New cards
69) In a coffee shop, there are ten people sharing an access point with a rated speed of 2Gbps.
The throughput is half the rated speed. If each person downloading is getting an average of
200Mbps, how many people are using the Internet at that moment?
A) 10
B) 5
C) 2
D) none of the above
B
71
New cards
70) Trunk lines in the Internet core are \________.
A) dedicated
B) multiplexed
C) both A and B
D) neither A nor B
B
72
New cards
71) The business benefit of multiplexing is \________.
A) lower cost
B) higher speed
C) avoiding the need to send many transmission links through narrow conduits
D) security
A
73
New cards
72) \________ is the percentage of time that a network is available for use.
A) Availability
B) Downtime
C) QoS
D) none of the above
A
74
New cards
73) When a packet travels through a network, the time it takes to get from the sender to the
receiver is called \________.
A) latency
B) output
C) jitter
D) throughput
A
75
New cards
74) Variability in delay is called \________.
A) jitter
B) variance
C) a QoS failure
D) latency
A
76
New cards
75) Guarantees for quality of service are called \________.
A) QoS-G
B) QoS metrics
C) SLAs
D) QoS guarantees
C
77
New cards
76) An SLA specifies the \________.
A) best case
B) worst case
C) both A and B
D) neither A nor B
B
78
New cards
77) An SLA specifies \________.
A) maximum speed
B) minimum speed
C) both A and B
D) neither A nor B
B
79
New cards
78) An SLA specifies \________.
A) maximum latency
B) minimum latency
C) both A and B
D) neither A nor B
A
80
New cards
79) ISPs usually offer QoS guarantees to \________.
A) residential customers
B) business customers
C) both A and B
D) neither A nor B
B
81
New cards
80) \________ can be addressed by using priority.
A) Chronic lacks of capacity
B) Momentary traffic peaks
C) both A and B
D) neither A nor B
B
82
New cards
81) Momentary traffic peaks can lead to \________.
A) latency
B) packet loss
C) both A and B
D) neither A nor B
C
83
New cards
82) To handle momentary traffic peaks, which would you give higher priority to?
A) e-mail
B) VoIP
C) both A and B
D) It is impossible to say with the information provided.
B
84
New cards
83) Traffic shaping may \________ traffic that is undesirable.
A) prohibit
B) limit
C) both A and B
D) neither A nor B
C
85
New cards
84) SNMP agents communicate with the \________.
A) network visibility program
B) network management program
C) MIB
D) all of the above
B
86
New cards
85) To determine if a host is reachable, you send a(n) \________.
A) SNMP SET command
B) MIB
C) trap
D) ping
D
87
New cards
86) Ping tells you \________.
A) that a host is reachable
B) latency in the connection to the host
C) both A and B
D) neither A nor B
C
88
New cards
87) SNMP Set commands can \________.
A) ask agents for information about the managed device
B) change router operation
C) both A and B
D) neither A nor B
B
89
New cards
88) SNMP Get commands can \________.
A) ask agents for information about the managed device
B) change router operation
C) both A and B
D) neither A nor B
A
90
New cards
89) The SNMP manager stores the information it receives from Get commands \________.
A) in the MIB
B) on the agent
C) on the managed device
D) in the cloud
A
91
New cards
90) Using the SNMP Set command \________.
A) saves management labor
B) requires excellent security
C) both A and B
D) neither A nor B
C
92
New cards
91) Using standard configurations \________.
A) saves money
B) gives management agility
C) both A and B
D) neither A nor B
A
93
New cards
92) SDN can \________.
A) permit routing rules to be changed rapidly
B) reduce router costs
C) both A and B
D) neither A nor B
C
94
New cards
93) Creating switching and routing tables is an example of \________.
A) forwarding
B) routing complexity
C) hardwiring
D) control
D
95
New cards
94) Routing packets is an example of \________.
A) forwarding
B) routing complexity
C) hardwiring
D) control
A
96
New cards
95) The general term for evil software is \________.
A) virus
B) worm
C) malware
D) all of the above
C
97
New cards
96) \________ is the general name for a security flaw in a program.
A) A virus
B) Malware
C) A security fault
D) A vulnerability
D
98
New cards
97) Users typically can eliminate a vulnerability in one of their programs by \________.
A) installing a patch
B) using an antivirus program
C) both A and B
D) neither A nor B
A
99
New cards
98) Vulnerability-based attacks that occur before a patch is available are called \________
attacks.
A) indefensible
B) stealth
C) malware
D) zero-day
D
100
New cards
99) What kind of attack is most likely to succeed against a system with no technological
vulnerabilities?
A) malware
B) social engineering
C) both A and B
D) neither A nor B
B