Business Data Networks and Security - Chapter 2
Business Data Networks and Security - Chapter 2
8) In an HTTP, which one (browser or Webserver application program) transmits message first?
A) browser
B) Webserver application program
C) They transmit simultaneously.
D) It depends on the situation.
Answer: A
10) Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n)
________ segment.
A) ACK
B) SYN
C) SYN/ACK
D) none of the above
12) If the destination host receives a segment that has an error, it will ________.
A) transmit an ACK segment
B) transmit a NAC segment
C) transmit an RSND segment
D) none of the above
Answer: C
15) After the side wishing to close a TCP connection sends a FIN segment, the other side will ________.
A) not send any more segments
B) only send ACK segments
C) only send FIN segments
D) none of the above
Answer: B
19) Which part of a message is less often in a message compared to the other two parts?
A) header
B) data field
C) trailer
D) All of the above are commonly seen in all messages.
Answer: C
29) To make a forwarding decision, a router looks at the arriving packet's ________.
A) destination IP address
B) destination EUI-48 address
C) both A and B
D) MAC addresses
Answer: A
30) IP is ________.
A) reliable
B) unreliable
C) semi-reliable
D) unreliable or reliable depending on the situation
Answer: B
32) TCP has six single-bit fields in headers and these single-bit fields are called ________ fields.
A) port
B) flag
C) ACK
D) binary
Answer: B
33) If someone says that a 1-bit flag is set, this means that it is given the value ________.
A) 0
B) 1
C) either A or B
D) neither A nor B
Answer: B
38) For every conversation, a client randomly generates an ephemeral port number for ________.
A) applications
B) conversations
C) both A and B
D) neither A nor B
Answer: B
39) The range of port 1024 to port 4999 is the usual range for ________ port numbers.
A) well-known
B) ephemeral
C) both A and B
D) neither A nor B
Answer: B
43) The source socket is 60.171.18.22:2707. The source host is a(n) ________.
A) client
B) server
C) well-known server
D) ephemeral server
Answer: A
44) The destination socket is 60.171.18.22:161. The destination host is a(n) ________.
A) client
B) server
C) well-known server
D) ephemeral server
Answer: B
46) Which of the following layers has more standards than the other three layers?
A) data link
B) Internet
C) transport
D) application
Answer: D
47) At which layer would you find standards for requesting videos from a video-sharing site such as YouTube?
A) application
B) transport
C) Internet
D) none of the above
Answer: A
48) At which layer would you find file transfer protocol (FTP) standards for downloading files from an FTP
server?
A) application
B) transport
C) Internet
D) none of the above
Answer: A
49) In HTTP headers, the end of a header field is usually indicated by a ________.
A) .
B) :
C) ;
D) none of the above
Answer: D
55) How many bytes will it take to transmit "Brain Dead" without the quotation marks?
A) 2
B) 3
C) 9
D) none of the above
Answer: D
62) To represent 65 alternatives, your alternatives field would have to be at least ________ bits long.
A) 5
B) 6
C) 7
D) 8
Answer: C
64) The electrical signal generated by a microphone is called a(n) ________ signal.
A) binary
B) digital
C) analog
D) Either A or B.
Answer: C
67) After the Internet layer process does encapsulation, it passes the IP packet to the ________ layer process.
A) transport
B) data link
C) physical
D) none of the above
Answer: B
68) After the data link layer process does encapsulation, it passes the IP packet to the ________ layer process.
A) physical
B) internet
C) transport
D) none of the above
Answer: A
69) Which layer process does NOT do any encapsulation when an application layer process transmits a
message?
A) physical
B) data link
C) Internet
D) All layers do encapsulation.
Answer: A