Lesson2-exam Flashcards

1
Q

In the OSI model, all of the following are protocols of the application layer except:

HTTP
ICANN
POP3
IMAP

A

ICANN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In the OSI model, what does the application layer do?

It transforms a raw transmission facility into a line that appears free of undetected transmission errors to the network layer.

It controls the operation of the subnet which are identifiable parts of the network.

Deals with transmitting raw bits over a communication channel.

This layer actively interacts with the operating system or application when the user decides to transfer files, read messages, or perform network-related activities.

A

This layer actively interacts with the operating system or application when the user decides to transfer files, read messages, or perform network-related activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the OSI model, the hyperlink uses a(n) _____ to name the pages on the web.

Domain Name System

Session Initiation Protocol

Uniform Resource Locator

Open Systems Interconnection

A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which protocol provides error recovery and flow control services for the transport layer?

TCP
UDP
Telnet
FTP

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The transport layer performs data packet creation and what other types of services?

Error checking

Descending layer

Media connection

Information display

A

Error checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

At the ‘sending’ computer, the transport layer provides input to which OSI layer?

The session layer
The network layer
The physical layer
The data link layer

A

The network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which layer is the network layer in the OSI 7 layer model?

1

2

3

5

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of these is not a design issue for the network layer?

Handling session information

Implementing a connection-based service

Providing services to the transport layer

Handling store-and-forward packet switching

A

Handling session information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of these statements is FALSE?

The network layer is responsible for determining the shortest path for a packet of data.

The network layer controls the conversations between different computers.

The network layer does accounting.

The network layer helps transmit data between hosts.

A

The network layer controls the conversations between different computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The unique identifier applicable to a specific network computer or node is the Network _____.

address

protocol

tag

processor

A

address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This IPv4 field denotes how long the packet will be active before it is deleted

Protocol

Options

Version

Time to live

A

Time to live

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When the receiving system lets the sender know the data was received at its destination it is called ____.

Arrival
Feedback
Messaging
Acknowledgement

A

Acknowledgement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Feedback-based flow control ____.

limits the rate at which senders may transmit data without using feedback from the receiver

makes sure a message is sent back to the sender when it is ready to accept more data

allow programmers to develop games and other programs to make our lives simpler and entertaining

ensures that problems do not occur the majority of the time

A

makes sure a message is sent back to the sender when it is ready to accept more data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In which part of the OSI Model is the physical layer?

Bottom Layer

Middle Layer

Top layer

It does not belong to the OSI Model as a layer.

A

Bottom Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An NIC is used for which of the following?

Connecting a telephone to the network.

Connecting a computer to a network.

Securing a computer in a network.

Using as a telephone wire.

A

Connecting a computer to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is true about half-duplex mode?

Data is transmitted in both directions but not at the same time.

Data is not transmitted.

Data is transmitted in both directions at the same time.

Data is transmitted in one direction only.

A

Data is transmitted in both directions but not at the same time.

17
Q

Which of the following identifies the protocol or protocols available to the session layer for standardizing communications on a network?

OSI

TCP/IP

NetBIOS

IP/NetBIOS

A

TCP/IP

18
Q

The API that allows applications on separate computers to communicate over a LAN is:

IP
TCP
TCP/IP
NetBIOS

A

NetBIOS

19
Q

What does layer five of the OSI model do?

Provides access to available network resources.

Establishes, manages and terminates communicative sessions.

Organizes bits into frames providing node-to-node delivery.

Moves packets from source to destination providing internetworking capabilities.

A

Establishes, manages and terminates communicative sessions.

20
Q

The presentation layer of the OSI model translates data into an acceptable format usable by which layer?

The session layer
The network layer
The data link layer
The application layer

A

The application layer

21
Q

Among others, what are the two primary networking features managed by the presentation layer of the OSI model?

Protocols and interpretation

Translation and encryption

Compression and conversion

Protocols and architecture

A

Protocols and architecture

22
Q

In some situations, the presentation layer of the OSI model may have two sub-layers associated with its operation. Which option below lists both of these sublayers?

XDR and TDI

MIDI and TLS

CASE and SASE

SVCS and SSL

A

Case and Sase

23
Q

Which of the following problems would the OSI Model solve?

It would allow a Mac and a PC to be used on the same network.

It would allow two computers from the same manufacturer to be used on the same network.

It would allow multiple software programs on the same computer to communicate with each other.

It would instruct developers what software still needs to be created.

It would provide direction for how to build a server.

A

It would allow a Mac and a PC to be used on the same network.

24
Q

Which organization created the suggested standard for communications that describes how data is sent and received over a network?

Institute of Electrical and Electronics Engineers (IEEE)

International Organization for Standardization (ISO)

Federal Communications Commission (FCC)

World Wide Web Consortium (W3C)

American Communication Consortium (ACC)

A

International Organization for Standardization (ISO)

25
Q

At the ‘receiving’ computer, the transport layer provides input to which OSI layer?

The physical layer
The network layer
The session layer
The data link layer

A

The session layer

26
Q

The session layer provides communicative support to which two OSI layers?

Network and application
Application and physical
Data link and transport
Presentation and transport

A

Presentation and transport

27
Q

Which option contains the name of the layer responsible for translating, encrypting and compressing data within the OSI model?

Physical
Session
None of the answers is correct
Network
Presentation

A

Presentation

28
Q

Which layer provides the physical connection between the computer and network?

Session layer

Transport layer

Physical layer

Application layer

Network layer

A

Physical layer

29
Q

Which option below best completes this sentence: Among other communicative tasks, the session layer also terminates:

communicative functions between offline devices

a request for service generated out of queue

sessions between software processes

hardware input/output service requests

A

sessions between software processes

30
Q

IPsec (Internet Protocol Security) works by:

Requesting that questionable data be resent

Storing and then forwarding packets after CRC checking

Encrypting and authenticating each packet

Changing the protocol to keep the hacker guessing

A

Encrypting and authenticating each packet

31
Q

areas of weakness:

A

Internet Packet: Definition & Explanation
Network Layer of the OSI Model: Functions, Design & Security
Data Link Layer of the OSI Model: Protocol, Functions & Design

32
Q

Which protocol below is used to format most data packets for transmission over the Internet?

IP
TCP
TCP/IP
FTP

A

TCP/IP

33
Q

All of the following are functions of the Data Link Layer except

Stop all bad files from passing to the physical layer

deal with transmission errors

regulate the flow of data

provide a well defined interface to the network layer

A

Stop all bad files from passing to the physical layer

34
Q

The network layer converts:

logical addresses into physical addresses

Physical addresses into logical addresses

MAC addresses into layers

layers into MAC addresses

A

logical addresses into physical addresses