2 - Telecommunications and Network Security Flashcards
(118 cards)
1.Whichprotocolprovidesfull-duplex,connectionoriented,andreliablecommunicationsoveravirtualcircuit?a.TCPb.UDPc.IPd.ICMP
A: TCP provides full-duplex, connection oriented, reliable communications over a virtual circuit.
2.WhichofthefollowingisnotoneofthefourlayersoftheTCP/IPmodel?a.Applicationb.Sessionc.Internetd.NetworkAccess
B: Session is not one of the four layers of the TCP/IP model.
3.WhatisusedbybothTCPandUDPtotrackmultiplecommunicationsthatoccuroverthesamenetworkinterfacesimultaneously?a.IPaddressb.MACaddressc.Portaddressd.Applicationorserviceprotocol
C: The port address is used by both TCP and UDP to track multiple communication sessions.
4.HowislogicalcommunicationaccomplishedbetweenpeerlayersoftheOSImodel?a.Encapsulationb.Remoteprocedurecallsc.Memoryaddressingd.Packetswapping
A: Peer layers of the OSI model are able to logically communicate through encapsulation.
5.WhichofthefollowingisthecorrectorderoftheOSImodellayersfromlayerseventolayerone?a.Physical,DataLink,Network,Transport,Session,Presentation,Applicationb.Application,Presentation,Session,Transport,Network,DataLink,Physical.c.Physical,Network,Session,Transport,DataLink,Presentation,Applicationd.Application,Presentation,DataLink,Transport,Session,Network,Physical
B: The correct order of the layers of the OSI model starting with Layer 7 is Application, Presentation, Session, Transport, Network, Data Link, Physical.
6.AtwhatlayeroftheOSImodeldoesUDPoperate?a.Applicationb.Sessionc.Transportd.Network
C: UDP operates at the transport layer.
7.AtwhatlayeroftheOSImodeldoestheIPprotocoloperate?a.Presentationb.Sessionc.Transportd.Network
D: The IP protocol operates at the Network layer.
8.WhichofthefollowingisnotatrueorvalidcharacteristicoftheTCPprotocol?a.Connectionlessb.Fullduplexc.Usesacknowledgementsd.Sequencedsegments
A: TCP is connection-oriented, not connectionless.
9.AtwhatlayeroftheTCP/IPmodelisdatacalledasegment?a.Applicationlayerb.Host-to-HostorTransportlayerc.InternetorNetworklayerd.NetworkAccesslayer
B: At the Host-to-Host or Transport layer data is called a segment.
10.Theoccurrenceofelectronicsignalsspillingoverfromonewiretoanotherisknownas?a.attenuationb.noisec.crosstalkd.superzaping
C: Crosstalk is the occurrence of electronic signals spilling over from one wire to another.
11.WhatTCP/IPsub-protocolcanbeusedtotransferfilesbutrequiresnoauthentication?a.Telnetb.BootPc.LPDd.TFTP
D: TFTP is used to transfer files but does not use authentication.
12.WhichofthefollowingisnotpartoftheTCPhandshakeusedtoinitiateacommunicationsconnection?a.FINb.ACKc.SYNd.SYN/ACK
A: FIN is only used to terminate an existing TCP communications link.
13.AtwhatlayerisdatalabeledasegmentwithintheTCP/IPmodel?a.Applicationb.Host-to-Hostc.Internetd.NetworkAccess
B: The data is labeled a segment in the host-to-host layer of the TCP/IP model.
14.Whatistheabstractprotocolmodelthatiswidelyusedasthestandardframeworkfordesigningapplicationsandnetworkprotocols?a.Clark-Wilsonmodelb.OSImodelc.NetBIOSd.MACaddressing
B: The OSI model is the abstract protocol model that is widely used as the standard framework for designing applications and network protocols.
15.ThethirdlayeroftheOSImodelis?a.Sessionb.Transportc.Networkd.DataLink
C: The Network layer is the third layer of the OSI model.
16.SSL(securesocketslayer)operatesatwhatleveloftheOSImodel?a.Networkb.Transportc.DataLinkd.Session
B: SSL (secure sockets layer) operates at the transport level of the OSI model.
17.EthernetisanexampleofwhattypeofLANtransmissionprotocol?a.Broadbandb.CSMAc.CSMA/CAd.CSMA/CD
D: Ethernet is a CSMA/CD Carrier-Sense multiple Access with Collision Detection LAN transmission protocol.
18.Whattypeoffirewallisabletoself-modifyitstrafficfilters?a.Dynamicpacketfilteringb.Kernelproxyc.Statefulinspectiond.Applicationlevel
A: A dynamic packet filtering firewall is able to self-modify its traffic filters.
19.LogicalcommunicationbetweenpeerlayersoftheOSImodelaremadepossiblethroughtheuseof?a.encapsulationb.remoteprocedurecallsc.directaddressingd.broadcasts
A: Logical communication between peer layers of the OSI model are made possible through the use of encapsulation.
20.Whichofthefollowingcannotbeusedtoexchangefiles?a.FTPb.NFSc.TFTPd.Telnet
D: Telnet cannot be used to exchange files, rather it is limited to running applications or commands remotely.
21.Whichofthefollowingprotocolsisusedfore-mail?a.SMTPb.LPDc.SNMPd.BootP
A: SMTP or Simple Mail Transport Protocol is used to transmit e-mail from server to server and from client to server.
22.WhatisthelastcommunicationbetweentwosystemsoveraTCP/IPconnectionbeforeactualdatacanbeexchanged?a.FINb.ACKc.SYN/ACKd.SYN
B: ACK is the third and final element of the three-way handshake that establishes a communication link between two systems. Once the ACK is received, actual data can be communicated.
23.WhichofthefollowingisnotasecurityserviceusedtoprotectOSIcommunications?a.auditingb.authenticationc.dataintegrityd.packetreceiptacknowledgement
A: Auditing is not a security service used to protect OSI communications.
24.TCPprovidesforallbutwhichofthefollowing?a.full-duplexcommunicationsb.connectionlesscommunicationsc.dataflowmanagementthroughslidingwindowsd.reliablecommunicationvirtualcircuits
B: TCP is connection oriented, UDP is connectionless.