0% found this document useful (0 votes)
187 views9 pages

Business Data Networks and Security - Chapter 2

This document contains 65 multiple choice questions about network standards and protocols. It covers topics like Internet standards, TCP, IP, Ethernet, HTTP, encoding, and binary/decimal conversions. The questions test understanding of concepts like semantics, syntax, encapsulation, layers of the OSI model, TCP and UDP port numbers, IP addressing, and Ethernet addressing.

Uploaded by

bhavna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
187 views9 pages

Business Data Networks and Security - Chapter 2

This document contains 65 multiple choice questions about network standards and protocols. It covers topics like Internet standards, TCP, IP, Ethernet, HTTP, encoding, and binary/decimal conversions. The questions test understanding of concepts like semantics, syntax, encapsulation, layers of the OSI model, TCP and UDP port numbers, IP addressing, and Ethernet addressing.

Uploaded by

bhavna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Business Data Networks and Security, 10e (Panko)

Chapter 2  Network Standards

1) Internet standards are published as ________.


A) RFCs
B) IETFs
C) TCP/IPs
D) Internet Protocols
Answer:  A

2) Standards mean the same thing as ________.


A) semantics
B) syntax
C) rules
D) protocols
Answer:  D

3) Standards govern ________.


A) semantics
B) syntax
C) both A and B
D) neither A nor B
Answer:  C

4) The meaning of a message is referred to as the message's ________.


A) protocol
B) order
C) syntax
D) semantics
Answer:  D

5) How a message is organized is its ________.


A) protocol
B) order
C) syntax
D) semantics
Answer:  C

6) A message's semantics is its ________.


A) protocol
B) message order
C) meaning
D) structure
Answer:  C

7) A message's syntax is its ________.


A) protocol
B) message order
C) meaning
D) structure
Answer:  D

8) In an HTTP, which one (browser or Webserver application program) transmits message first?
A) browser
B) Webserver application program
C) They transmit simultaneously.
D) It depends on the situation.
Answer:  A

9) In HTTP, which program may initiate communication?


A) browser
B) Webserver program
C) both A and B
D) neither A nor B
Answer:  A

10) Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n)
________ segment.
A) ACK
B) SYN
C) SYN/ACK
D) none of the above

11) If a destination host does not receive a segment, it will ________.


A) transmit an ACK segment
B) transmit a NAC segment
C) transmit an RSND segment
D) none of the above
Answer:  D

12) If the destination host receives a segment that has an error, it will ________.
A) transmit an ACK segment
B) transmit a NAC segment
C) transmit an RSND segment
D) none of the above
Answer:  C

13) A sending host will retransmit a TCP segment if it ________.


A) receives an ACK segment
B) receives a NAC segment
C) receives an RPT segment
D) none of the above
Answer:  D

14) In a four-step close, which side transmits a FIN segment?


A) the side that initiates the close
B) the other side
C) either side
D) neither side
Answer:  C

15) After the side wishing to close a TCP connection sends a FIN segment, the other side will ________.
A) not send any more segments
B) only send ACK segments
C) only send FIN segments
D) none of the above
Answer:  B

16) Which of the following is inside the header of messages?


A) address field
B) IP address field
C) data field
D) trailer
Answer:  A
17) The ________ contains the content being delivered by a message.
A) address field
B) header
C) data field
D) trailer
Answer:  C

18) A message always has a ________.


A) header
B) data field
C) both A and B
D) neither A nor B
Answer:  A

19) Which part of a message is less often in a message compared to the other two parts?
A) header
B) data field
C) trailer
D) All of the above are commonly seen in all messages.
Answer:  C

20) "Octet" is the same as ________.


A) "bit"
B) "byte"
C) either A or B, depending on the context
D) neither A nor B
Answer:  B

21) EUI-48 addresses are ________.


A) 32 bits long
B) 48 bits long
C) 128 bits long
D) Address length varies.
Answer:  B

22) An EUI-48 address was formerly called a(n) ________ address.


A) IPv4
B) IPv6
C) MAC
D) DNS
Answer:  C

23) ________ read(s) the destination address in an Ethernet frame.


A) The destination host
B) Switches in the network
C) both A and B
D) neither A nor B
Answer:  C

24) If the destination host finds an error in an Ethernet frame, it ________.


A) sends back a NAK
B) sends back a ACK
C) both A and B
D) neither A nor B
Answer:  D

25) Ethernet does ________.


A) error detection
B) error correction
C) both A and B
D) neither A nor B
Answer:  A

26) In IP, the first bit in the second row is ________.


A) 0
B) 31
C) 32
D) 63
Answer:  C

27) How long are IPv4 addresses?


A) 4 bits
B) 32 bits
C) 48 bits
D) 128 bits
Answer:  B

28) How long are IPv4 addresses in octets?


A) 4 octets
B) 32 octets
C) 48 octets
D) 128 octets
Answer:  A

29) To make a forwarding decision, a router looks at the arriving packet's ________.
A) destination IP address
B) destination EUI-48 address
C) both A and B
D) MAC addresses
Answer:  A

30) IP is ________.
A) reliable
B) unreliable
C) semi-reliable
D) unreliable or reliable depending on the situation
Answer:  B

31) TCP messages are called ________.


A) segments
B) fragments
C) packets
D) datagrams
Answer:  A

32) TCP has six single-bit fields in headers and these single-bit fields are called ________ fields.
A) port
B) flag
C) ACK
D) binary
Answer:  B

33) If someone says that a 1-bit flag is set, this means that it is given the value ________.
A) 0
B) 1
C) either A or B
D) neither A nor B
Answer:  B

34) The UDP has ________ fields.


A) 4
B) 8
C) 16
D) 32
Answer:  A

35) The UDP ________.


A) is unreliable
B) has a checksum field
C) both A and B
D) neither A nor B
Answer:  C

36) UDP is ________.


A) reliable
B) unreliable
C) It depends on the situation.
D) none of the above
Answer:  B

37) On a server, well-known port numbers indicate ________.


A) applications
B) connections with client computers
C) both A and B
D) neither A nor B
Answer:  A

38) For every conversation, a client randomly generates an ephemeral port number for ________.
A) applications
B) conversations
C) both A and B
D) neither A nor B
Answer:  B

39) The range of port 1024 to port 4999 is the usual range for ________ port numbers.
A) well-known
B) ephemeral
C) both A and B
D) neither A nor B
Answer:  B

40) 2500 is in the range for ________ port numbers.


A) well-known
B) ephemeral
C) both A and B
D) neither A nor B
Answer:  B

41) The source socket is 60.171.18.22:2707. The source is a(n) ________.


A) client
B) server
C) well-known server
D) ephemeral server
Answer:  A

42) Which of the following is a socket?


A) 80
B) 21
C) both A and B
D) neither A nor B
Answer:  D

43) The source socket is 60.171.18.22:2707. The source host is a(n) ________.
A) client
B) server
C) well-known server
D) ephemeral server
Answer:  A

44) The destination socket is 60.171.18.22:161. The destination host is a(n) ________.
A) client
B) server
C) well-known server
D) ephemeral server
Answer:  B

45) The application standard is almost always ________.


A) HTTP
B) TCP
C) reliable
D) None of the above is true.
Answer:  D

46) Which of the following layers has more standards than the other three layers?
A) data link
B) Internet
C) transport
D) application
Answer:  D

47) At which layer would you find standards for requesting videos from a video-sharing site such as YouTube?
A) application
B) transport
C) Internet
D) none of the above
Answer:  A

48) At which layer would you find file transfer protocol (FTP) standards for downloading files from an FTP
server?
A) application
B) transport
C) Internet
D) none of the above
Answer:  A

49) In HTTP headers, the end of a header field is usually indicated by a ________.
A) .
B) :
C) ;
D) none of the above
Answer:  D

50) In HTTP, the end of a header field is usually indicated by a ________.


A) bit position
B) CRLF
C) colon
D) blank line
Answer:  B

51) An HTTP request message usually has a ________.


A) header
B) data field
C) both A and B
D) neither A nor B
Answer:  A

52) An HTTP response message usually has a ________.


A) trailer
B) data field
C) both A and B
D) neither A nor B
Answer:  B

53) Converting application messages into bits is called ________.


A) encapsulation
B) encryption
C) encoding
D) exchange
Answer:  C

54) At what layer is encoding done?


A) application
B) transport
C) Internet
D) none of the above
Answer:  A

55) How many bytes will it take to transmit "Brain Dead" without the quotation marks?
A) 2
B) 3
C) 9
D) none of the above
Answer:  D

56) Which of the following is an integer?


A) 4,307
B) 45.7
C) both A and B
D) neither A nor B
Answer:  A

57) Convert the binary number 100 to decimal.


A) It is in decimal.
B) 2
C) 4
D) 8
Answer:  C

58) Convert a decimal number 15 to the binary number.


A) It is a binary number.
B) 1100
C) 1101
D) 1111
Answer:  D

59) Convert decimal 8 to binary.


A) 100
B) 1000
C) 10000
D) 111
Answer:  B

60) A 5-bit field can represent ________ alternatives or different combinations.


A) 8
B) 16
C) 32
D) 64
Answer:  C

61) A 7-bit field can represent ________ alternatives or different combinations.


A) 14
B) 49
C) 128
D) 256
Answer:  C

62) To represent 65 alternatives, your alternatives field would have to be at least ________ bits long.
A) 5
B) 6
C) 7
D) 8
Answer:  C

63) The five senses can be represented with a ________-bit field.


A) 2
B) 3
C) 4
D) 5
Answer:  B

64) The electrical signal generated by a microphone is called a(n) ________ signal.
A) binary
B) digital
C) analog
D) Either A or B.
Answer:  C

65) A codec ________.


A) encodes voice sounds into digital signals for transmission
B) encodes voice sounds into analog signals for transmission
C) encrypts the signal
D) converts binary voice signals into digital signals for transmission
Answer:  D

66) ________ is placing a message in the data field of another message.


A) Encoding
B) Vertical communication
C) Layering
D) Encapsulation
Answer:  D

67) After the Internet layer process does encapsulation, it passes the IP packet to the ________ layer process.
A) transport
B) data link
C) physical
D) none of the above
Answer:  B

68) After the data link layer process does encapsulation, it passes the IP packet to the ________ layer process.
A) physical
B) internet
C) transport
D) none of the above
Answer:  A

69) Which layer process does NOT do any encapsulation when an application layer process transmits a
message?
A) physical
B) data link
C) Internet
D) All layers do encapsulation.
Answer:  A

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy