Você está na página 1de 3

Chapter 3 True/False Indicate whether the statement is true or false. __T__ 1.

The TCP/IP model explains how the protocol suite works to provide communications. __F__ 2. The Trivial File Transfer Protocol (TFTP) sends data using a reliable connection. __T__ 3. Both TCP and UDP use port numbers for communications between hosts. __T__ 4. The size of the TCP window determines the number of acknowledgments sent for a given data transfer. __F__ 5. A small TCP window size produces few acknowledgments. Multiple Choice Identify the choice that best completes the statement or answers the question. __B__ 8. The ____ layer in the TCP/IP model determines the connectionless or connection-oriented services. a. Network Interface b. Transport c. Application d. Internetwork

__C__ 10. The ____ layer of the TCP/IP model maps to both the Data Link and Physical layers of the OSI reference model. a. Transport b. Internetwork c. Network Interface d. Application

__D__ 11. ____ is a connection-oriented protocol that allows you to connect your computer to other computers on the Internet and view Web page content. a. SNMP b. SMTP c. TFTP d. HTTP

__B__ 12. The TCP/IP ____ layer performs several functions, the most notable being end-to-end packet delivery, reliability, and flow control. a. Application b. Transport c. Network Interface d. Internetwork

__A__ 13. ____ is a communication method for network devices that is designed to reduce the flow of packets from their source. a. Congestion avoidance b. Buffering c. Sliding windows d. Collision avoidance

__D__ 14. The ____ layer in the TCP/IP model handles software, or logical, addressing. a. Network Interface b. Application c. Transport d. Internetwork

__A__ 15. The ____ protocol provides a connectionless delivery service. a. IP b. ICMP c. ARP d. RARP

__B__ 17. A(n) ____ supplies the MAC address of the destination host in a unicast packet. a. MAC frame b. ARP reply c. RARP request d. RARP reply

__B__ 22. A(n) ____ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (pings) to a target device in an attempt to crash or greatly reduce the performance of the target device. a. SYN flood b. ICMP flood c. Ping of Death d. smurf attack

__C__ 24. ____ protocols allow the routers to be updated automatically. a. Internetwork b. MAP c. Routing d. TTL

_A___ 25. The Cisco ____ model does not describe how communications take place. Rather, it focuses on how best to design a network, especially a relatively large network or one that is expected to grow. a. Three-Layer Hierarchical b. Link-state Complete each statement.. Matching c. Network state d. Three-way

Match each item with a statement below: a. NFS b .SNMP c. DNS service d. Three-way handshake e. RST __C__ 32. provides TCP/IP host name to IP address resolution __A__ 33. a distributed file system developed by Sun Microsystems that allows data to be shared across a network __E__ 34. indicates that a TCP connection is to be terminated without further interaction __I__ 35. verifies connectivity between two points __B__ 36. a connectionless protocol that permits remote tracking and management of TCP/IP hosts __D__ 37. used by TCP to establish a reliable connection between two points __F__ 38. a portion of memory where the device stores incoming packets until they can be processed __H__ 39. contains enough information in its header to be routed through an internetwork __G__ 40. provides IP address to MAC address resolution in a manner similar to that of ARP f .Buffer g. RARP h. Routed protocol i. Ping utility

Você também pode gostar