TE FA21 Flashcards
(37 cards)
What is a characteristic of UDP?
A. UDP datagrams take the same path and arrive in the correct order at the destination
B. Applications that use UDP are always considered unreliable
C. UDP reassembles the received datagrams in the order they were received
D. UDP only passes data to the network when the destination is ready to receive the data
C
Which of the following IP addresses belong to the network 100.10.245.0/24? A. 100.0.245.1 B. 100.0.0.1 C. 100.10.245.0 D. 100.10.245.1
C
Why would a layer 2 switch need an IP address?
A. to enable the switch to send broadcast frames to attached PCs
B. to enable the switch to function as a default gateway
C. to enable the switch to be managed remotely
D. to enable the switch to receive frames from attached PCs
C
Given a generator polynomial g(x) = x^3+x+1. Consider the info sequence 1001. By CRC method, what is the resulted code word for transmission? A. 1010110 B. 1001111 C. 1001000 D. 1001110
C
In a distance vector routing, if a link fails
a. all routers immediately update their link database and recalculate their shortest path
b. neighboring routers exchange routing tables that may use failed links
c. routers set link distance to infinity and floods the network with an updated packet
d. all
D
Which switching type will allow the communication devices in the provider network to be shared and only allocated to an individual subscriber during data transfer?
a. dedicated switched lines
b. circuit-switched
c. packet-switched
d. frame-switched
C
Which protocol glues the network of networks together as the Internet? A. TCP B. UDP C. IP D. none
C
What term describes a computing model where server software runs on dedicated computers?
a. client/server
b. internet
c. intranet
d. extranet
A
The ability of P2P networks to handle many peers is called
a. scalebility
b. multiplexing
c. multi-peer
d. self-controlled
A
The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?
a. fault tolerance
b. scalability
c. security
d. QoS (quality of service)
C
What type of network traffic requires QoS?
a. email
b. online purchasing
c. video conferencing
d. wiki
C
What is the security requirement in the case of DoS?
a. privacy
b. availability
c. integrity
d. none
B
TCP flag bit will start A. A B. P C. S D. F
D
What can be used to identify the process?
a. both the IP address of the host running that process and the port associated with that process
b. port associated with that process
c. process ID assigned by server
d. name of the application running on the host
A
What is the binary equivalent of the following polynomial arithmetic x^7+x^6+x^5+x^2+1?
a. 11011101
b. 11100111
c. 11100101
d. 11101101
C
The checksum of 0000 and 0000 is
a. 0101
b. 1010
c. 1111
d. 0000
C
In CSMA/CD, to continue the transmission process we use a/an
a. signal
b. access point
c. loop
d. station
C
In CSMA/CD, how long will it take a collision to be detected and resolved?
a. round-trip propagation delay
b. one propagation delay
c. none
d. one frame transmission time
A
Which of the following is the pipelining protocol?
A. selective repeat
B. sliding window
C. premature timeout
D. stop and wait automatic repeat request
A
The destination address field in an Ethernet frame is A. 6-byte long B. 4-byte long C. 16-byte long D. 48-byte long
A
The network layer concerns with A. bits B. frames C. packets D. none of the others
C
What is an example of network communication that uses the client-server model?
A. a user uses eMule to download a file that is shared by a friend after the file location is determined
B. a workstation initiates an ARP to find the Mac address of a receiving host
D. a workstation initiates a DNS request when the user types www.cisco.comin the address bar of a web brower
D
What do the client/server and peer-to-peer network models have in common
A. both models have dedicated servers
B. both models support devices in server and client roles
C. both models require the use of TCP/IP-based protocols
D. both models are used only in the wired network enviroment
B
Which of the basic elements of ARQ is associated with negative acknowledgment? A. timeout mechanism b. NAKs C. error detecting code D. ACKs
B