Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
49 Cards in this Set
- Front
- Back
Permanently assigning an IP address is referred to as:_________
|
static IP
|
|
Which of the following is the default subnet mask for a Class A IP address:____
|
255.0.0.0
|
|
Which protocol is used to map IP address to physical MAC address?
|
ARP
|
|
How many bits is an IPv4 address:______________
|
32
|
|
Which protocol is used to map physical MAC address to IP address?
|
RARP
|
|
The protocol data unit used by the network layer is called a _____
|
Packet
|
|
Which of the following is an example of a Class C IP address :____
|
192.169.20.1
|
|
Which of the following is an example of a Class B IP address :____
|
176.150.20.1
|
|
Layer 3 devices differ from the layer 2 devices in that the layer 3 device can____[choose all that apply]
|
Filter packets based on an IP address
Filter packets based on protocol |
|
The IP protocol operates at which layer of the OSI model?_____
|
Network
|
|
Which of the following is not a function of the network layer?[choose all that apply] ___
|
Establish and maintain a communication session
Maintaining proper voltages on the wire |
|
You ISP assigned you a block of Class A address to use on your network. Which of the following might possibly be one of those addresses? Ignore the fact that most of these addresses are already taken. [choose all that apply]
|
116.25.43.7
26.56.78.109 |
|
Class D addresses are used for what purpose?__________
|
Multicast address
|
|
The IPX/SPX protocol derives its host address from:________
|
The MAC address of the interface
|
|
How many bits is an IPv6 address:______________
|
128
|
|
Which of the following is the default subnet mask for a Class B IP address:____
|
255.255.0.0
|
|
Which of the following is the default subnet mask for a Class C IP address:____
|
255.255.255.0
|
|
The collection of eight bit sets that make up a typical IPv4 address is called a/an:_______
|
octet
|
|
What is the maximum number of hosts in a Class B network that has not been subnetted?
|
65,534
|
|
Which of the following is an example of a Class A IP address :____
|
10.145.20.1
|
|
A JPEG file is an example of_______
|
lossy compression
|
|
The session layer is responsible for______
|
Providing dialogue management and synchronization
|
|
What event leads to an unexpected disconnect?
|
a system crash
|
|
The process of assuring that the communication devices are capable of sending and receiving at the same speed is referred to as:_________
|
flow control
|
|
A session, by definition, consist of a series of__________
|
Activities
|
|
If the transmitting device does not receive an ACK it will automatically resend that frame, based on: _________
|
time to live
|
|
The process two devices go through in order to agree on protocol, connection speed, etc., is referred to as: __________
|
handshake
|
|
Which of the following protocols is connection oriented?
|
TCP
|
|
The actual type of data that is moved or stored is referred to as:_________
|
abstract syntax
|
|
The process of breaking data down into smaller pieces and then adding information from other layers before sending over the wire is _________
|
encapsulation
|
|
A flow control method that only retransmits bad packets is referred to as:_____
|
selectively repeat
|
|
What is the direction of travel in a full duplex data communication device?
|
both directions at the same time
|
|
Which of the networking protocol does not make very much use of Connection ID?_____
|
TCP/IP
|
|
When a user chooses to send a file over the network to another device, it is the responsibility of the_________layer to determine whether or not compression is used?
|
Presentation
|
|
A port number is_____
|
A logical address of a process or application
|
|
A flow control method that allows a fix number of packets to be sent, then waits for ACKs from each of those packets before sending the next group of packets is referred to as:_______
|
static window
|
|
In a half-duplex session, communications are controlled by the exchange of______
|
Tokens
|
|
User information such as user ID and password that permit access to networks resources is referred to as: _________
|
credentials
|
|
The form the data will assume as it moves over the wire is referred to as:
|
transfer syntax
|
|
The complete set of syntaxes used in the transfer of data is referred to as:
|
presentation context
|
|
Which of the following is not a responsibility of the Transport layer ?
|
Physical addressing
|
|
Which of the following Session Layer activities will result in a new Connection ID and acknowledgment numbering sequence?
|
Synchronize major
|
|
A logical address added to each segment of data transmitted that indicates what application or protocol is expecting the data is referred to as:_________
|
port
|
|
The purpose of checkpoints is to _________
|
allow the retransmission of data to resume where it left off
|
|
A sequence of numbers, beginning with a randomly generated number, that identifies each packet in a transmission and the order in which it goes is called: ______
|
acknowledgement number
|
|
Which of the following is the most secure form of encryption mentioned by our author_________
|
data encryption standard
|
|
What is the general name for a flow control method that allows for several frames to be transmitted before an ACK is required___________
|
sliding window
|
|
The form of flow control that can adjust the number of packets transmitted before the ACKs must begin to flow is called ________
|
Sliding window
|
|
FTP uses port_____
|
21
|