



















Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
CNT 4104 TEST WITH COMPLETE SOLUTION.
Typology: Exams
1 / 27
This page cannot be seen from the preview
Don't miss anything!
Data communications deals with the transmission of signals in a reliable and efficient manner - ANSWER true
Changes in corporate data traffic patterns are driving the creation of high-speed WANs - ANSWER true
A modem is required to establish communication between a workstation and a server over a public telephone network - ANSWER true
Compression refers to the ability of a number of devices to share a transmission facility - ANSWER false
The basic building block of any communications facility is the transmission line - ANSWER true
Developing switching systems with the capacity and rapid response to support the demand requirements with the increased use of fiber optic transmission is no longer a challenge - ANSWER false
Frame relay networks are commonly used for terminal-to-computer and computer-to-computer communications - ANSWER false. Packet-switching networks are commonly used
The LAN is owned by the same organization that owns the attached devices - ANSWER true
Enterprises have formed ____ to reach customers, suppliers, and partners while isolating their proprietary information from unwanted access -
ANSWER intranets and extranets
A dominant architecture in the business environment and the more recent Web-focused intranet trend is _________ computing - ANSWER client/server
The key elements of a simple communications model are - ANSWER source, transmission, destination
DWDM enables capacities of ____ per second - ANSWER terabits
An _____ uses Internet and Web technology in an isolated facility internal to an enterprise - ANSWER intranet
A network in which small chunks of data are passed through the network from node to node, and at each node the entire data chunk is received, stored briefly, and then transmitted to the next node, is a _____ network - ANSWER packet switching
In order for data processing devices to communicate certain conventions must be decided on. These requirements can collectively be termed _____ - ANSWER exchange management
In situations in which an information exchange is interrupted due to a fault somewhere in the system, ____ techniques are needed to either resume activity at the point of interruption or to restore systems to their state prior to the beginning of the exchange - ANSWER recovery
In a _____ network, a dedicated communications path is established between two stations through the nodes of the network. The telephone network is the most common example - ANSWER circuit switching
A _____ is a physical facility that provides the infrastructure to move data between connected networks - ANSWER NAP / network access provider
The Internet evolved from the ____ which was developed in 1969 by the Advanced Research Projects Agency of the U.S Department of Defense - ANSWER ARPANET
Communicating across arbitrary, multiple, packet-switched networks is _____ - ANSWER internetworking
Each IP packet includes an unique numeric address of the destination host. This address is referred to as an ________ - ANSWER IP address
__________ is the process of squeezing the data down so that a lower capacity, cheaper transmission facility can be used to meet a given demand - ANSWER compression
The OSI protocol architecture consists of 5 layers: physical, network access, internet, transport, and application - ANSWER true
Procedures needed to allow data to transverse multiple interconnected networks is found in the internet layer of the TCP/IP protocol architecture - ANSWER true
For most applications running as part of the TCP/IP protocol architecture, the transport layer protocol is TCP - ANSWER true
The software used at the network access layer is not dependent on the type of network used because circuit switching, packet switching and local area networks all have the same standards. - ANSWER false
FTP provides a basic electronic mail transport facility. - ANSWER false. Simple Mail Transfer Protocol provides a basic electronic mail transport facility
SSH is an application later protocol in TCP/IP architecture - ANSWER true
SSH protocol enables the user and the remote authenticate each other - ANSWER true
The development of IP (Internet Protocol) is used at the internet layer to provide the routing function across multiple networks. - ANSWER true
It is not necessary for each host on a subnetwork to have an unique global internet (i.e., IP) address. - ANSWER false
TCP numbers the segments that it sends to a particular destination port sequentially. - ANSWER true
TCP is a host-to-host protocol - ANSWER true
TCP is an internet layer protocol - ANSWER false. TCP is in the transport layer
Wi-Fi is an application layer protocol. - ANSWER false. Wifi is in the Network access/Data link layer
HTTP is an internet later protocol - ANSWER false. HTTP is in the application layer
Because UDP is not a reliable protocol, its header contains no source and destination port numbers - ANSWER false. both TCP and UDP must contain source and destination port numbers of their host
UDP is more reliable than TCP protocol - ANSWER false
TCP header contains a sequence number of the contained segment but UDP does not. - ANSWER true
The key features of a protocol are: syntax, semantics and ________ - ANSWER timing
The ________ layer is concerned with the exchange of data between an end
In the TCP/IP protocol architecture, the ________ layer is concerned with specifying the characteristics of the transmission medium, the nature of the signals and the data rate. - ANSWER physical
________ (SSH) protocol provides a secure remote logon capability which enables a user at a terminal or personal computer to logon to a remote computer function as if directly connected to that computer. - ANSWER secure shell
Each application on a computer has an address that is unique within that computer known as ________ Points (SAPs) or ports that allow the transport layer to support multiple applications at each computer. - ANSWER service access
________ is when the sending TCP includes a code that is a function of the contents of the remainder of the segment. The receiving TCP performs the same calculation and compares the result with the incoming code. A discrepancy results if there has been some error in transmission. - ANSWER checksum
IPv4 includes 32 bits source address field but IPv6 includes - ANSWER 128
Based on our textbook, Ethernet is a commonly used protocol at ________ (or
data link) layer of the TCP/IP protocol suite. - ANSWER network access
Sockets programming is a new technology developed for mobile communications applications - ANSWER false
A ___ socket is one computer uses an address to call a _____ socket on another computer - ANSWER client/server
Computers with server sockets normally keep their TCP or UDP port closed until incoming calls are detected. - ANSWER false. computers with server sockets keep a TCP or UDP port open. ready for incoming calls.
In socket programming, the concatenation of a TCP or UDP ______ value and an ______ address forms a socket, which is unqiue throughout the Internet - ANSWER port/IP
It is possible for an application to have multiple socket addresses - ANSWER true
In practice, when socket programming is used as an API, a socket is identified by the triple_____, local _____, local process - ANSWER protocol/address
Once an IP address is assigned to a device, the IP address never changes when the device is placed in different location - ANSWER false
Every router has a MAC address and, when a router is moved from one room to the other or from one building to another building, its MAC address never changes. - ANSWER true
Every IP address is 32-bit long because it is a standard. - ANSWER false. IPv is 32 bits but IPv6 is 128 bits
ARP (Address Resolution) is a protocol defined in the application layer - ANSWER false
ARP can translate or map an IP address to a corresponding MAC address - ANSWER true
Every ICMP header consists of 64 bits of data no matter what type of message it contains. - ANSWER true
Because ICMP is a kind of or a part of IP protocol in TCP/IP, every ICMP message contains the source host IP address and destination host IP address.
Because VPN (Virtual Private Network) involves the use of public Internet technology, it generally requires higher cost and more complex maintenance than implementing and operating a full private network. - ANSWER false
Because IPsec is located in the IP layer, when it is implemented in a router, there is no need to change applications software on a user or server system. - ANSWER true
We can use and implement IPsec in a system to include authentication-only function. Encryption is not compulsory. - ANSWER true
The IP address 216.85.40.100 is a Class C address. - ANSWER true
network using a standard Class A network number (or ID) can host more computers than Class C. - ANSWER true
Two networks with the same subnet mask means they have the same network ID or number. - ANSWER false. every network must have a unique ID or number
SMTP standardizes the message character set as 7-bit ASCII. - ANSWER true
Typically, for fast transmission, single queries to find IP address of a domain name are carried over TCP and queries for a group of names are carried over UDP. - ANSWER false. single queries are carried over UDP and queries for a grup pf names are carried over TCP
The _________ is responsible for transferring the message from the MHS to the MS. - ANSWER MDA
The ________ relays mail for one application-level hop. - ANSWER MTA
The _______ is a directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address. - ANSWER DNS
The protocol that is used for transfer of mail from a user agent to a MTA and from one MTA to another is the _________. - ANSWER SMTP
________ supplements SMTP and allows the encapsulation of multimedia (nontext) messages inside of a standard SMTP message. - ANSWER MIME
________ is an Internet standard defined in RFC 1939 that supports the basic functions of download and delete for e-mail retrieval. - ANSWER POP
________ are programs that extract information from name servers in response to client requests. - ANSWER Resolvers
_______ are server programs that hold information about a portion of the domain name tree structure and the associated RRs. - ANSWER Name servers
The _______ domain is dedicated exclusively for private businesses. - ANSWER biz
HTTP is ___________. - ANSWER a transaction-oriented client/server protocol, a stateless protocol, and flexible in the formats it can handle
A ________ is a server that appears to the client as if it were an origin server. - ANSWER gateway
A _______ is a forwarding agent, receiving a request for a URL object - ANSWER proxy
The ________ is the foundation protocol of the World Wide Web and can be used in any client/server application involving hypertext - ANSWER HTTP
VoIP works by encoding ________ information into a digital format, which can be carried across IP networks in discrete packets - ANSWER voice
Whereas traditional telephone networks allocate dedicated circuits for voice communications using _____ switching, VoIP uses _____ switching, allowing the sharing of transmission capacity - ANSWER circuit/packet
The __________, defined in RFC 3261, is an application level control protocol for setting up, modifying, and terminating real-time sessions between participants over an IP data network - ANSWER session initiation protocol
SIP supports five facets of establishing and terminating multimedia communications: user capabilities, user availability, ____________, session management, and user location. - ANSWER session setup
The term softphone refers to software operating on a PC that implements _______. - ANSWER VoIP
The __________ data transfer protocol is used only for the transmission of user data, typically in multicast fashion among all participants in a session - ANSWER RTP
The ___________ Protocol (SDP) describes the content of sessions, including telephony, Internet radio, and multimedia applications. - ANSWER session description
The Payload Type field of a RTP header is 1 bit long - ANSWER false. The Payload Type field of RTP header is 7 bits
The values in the RTCP Sender Report enable only the receivers and network managers to monitor the condition on the network as they relate to a particular session. - ANSWER false. Not only the receivers and network managers, but also the senders
Every RTP header always contains a fixed number of fields, which is 96 bits long. - ANSWER false
The packet loss values in a RTCP Sender Report give an indication of transient congestion. - ANSWER false. pack loss values are an indication of persistent congestion
RTCP receivers can only provide reception quality feedback by using a Receiver Report. Sender Reports are not allowed for this purpose. - ANSWER false. RTCP receivers provide reception quality feedback using a Sender Report or a Receiver Report.
currently not supported. - ANSWER false. Multimedia is supported
A user agent server (UAS) issues SIP requests. - ANSWER false. User agent client (UAC) issues SIP request
The jitter measure may provide a warning of increasing congestion before it leads to packet loss. - ANSWER true
The RTP Timestamp is the absolute wall clock time when this RTP header was sent. - ANSWER false. The NTP Timestamp is the absolute wall clock time when the report was sent
The Payload Type field of a RTP header identifies the media type of the payload and the format of the data, including the use of compression or encryption. - ANSWER true
If an application-level firewall prevents the forwarding of RTP packets, mixer relays should be used to solve the problem. - ANSWER false. If an application level firewall prevents the forwarding of RTP packets, translator relays should be used to solve this problem.
A transport protocol can be either connection oriented, such as UDP, or connectionless, such as TCP. - ANSWER false. UDP is connectionless and TCP
is connection oriented
The receiver needs to adopt some policy concerning the amount of data it permits the sender to transmit. - ANSWER true
There is no need for connection establishment and termination procedures to support connection-oriented service with a reliable network service. - ANSWER false. There is a need because connection oriented allows each end to assure that the other exists, allows exchange or negotiation of optional parameters, triggers allocation of transport entity resources
When a TCP entity detects the presence of congestion in the Internet, it reduces the flow of data onto the Internet until it detects an easing in congestion. - ANSWER true
The SYN segment functions both as a connection request and as a connection acknowledgment. - ANSWER true
In a protocol architecture, the transport protocol sits above application and other upper-layer protocols, and just below the network or internetwork layer. - ANSWER false. Transport protocol sits above network layer and just below application and other upper=layer protocols