It283 Networking With TCP/IP Ecqs 1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rroshto
R
Rroshto
Community Contributor
Quizzes Created: 4 | Total Attempts: 549
Questions: 25 | Attempts: 77

SettingsSettingsSettings
It283 Networking With TCP/IP Ecqs 1 - Quiz


Questions and Answers
  • 1. 

    Which of the following items represent design goals that motivated the developement of TCP/IP? (Choose all that apply.)

    • A.

      Robust network architecture

    • B.

      Reliable delivery mechanisms

    • C.

      Ability of dissimilar systems to exchange data

    • D.

      Support for long-haul connections

    • E.

      High performance

    Correct Answer(s)
    A. Robust network architecture
    B. Reliable delivery mechanisms
    C. Ability of dissimilar systems to exchange data
    D. Support for long-haul connections
    Explanation
    The development of TCP/IP was motivated by the design goals of having a robust network architecture, reliable delivery mechanisms, the ability of dissimilar systems to exchange data, and support for long-haul connections. These goals were important in creating a network protocol that could handle different types of systems, ensure reliable data delivery, and support long-distance connections. High performance was not explicitly mentioned as a design goal for TCP/IP.

    Rate this question:

  • 2. 

    What is the name of the version of IP most widely used today?

    • A.

      IPv1

    • B.

      IPv2

    • C.

      IPv4

    • D.

      IPv6

    Correct Answer
    C. IPv4
    Explanation
    IPv4 is the most widely used version of IP today because it was the first version to be widely implemented and adopted. It provides a large address space, allowing for a large number of unique IP addresses. IPv4 addresses are written in a dotted decimal format, consisting of four sets of numbers separated by periods. However, due to the limited number of available addresses in IPv4, the transition to IPv6 is underway to accommodate the growing number of devices connected to the internet.

    Rate this question:

  • 3. 

    Which of the following milestone events for TCP/IP occured in 1983? (Choose all that apply.)

    • A.

      NSF launches the NSFNET

    • B.

      The Department of Defense mandates TCP/IP as the "official ARPANET protocol."

    • C.

      TCP/IP appears in the 4.2BSD UNIX distribution.

    • D.

      Initial developement of name server technology occurs.

    Correct Answer(s)
    B. The Department of Defense mandates TCP/IP as the "official ARPANET protocol."
    C. TCP/IP appears in the 4.2BSD UNIX distribution.
    D. Initial developement of name server technology occurs.
    Explanation
    In 1983, three milestone events for TCP/IP occurred. The Department of Defense mandated TCP/IP as the "official ARPANET protocol," which solidified its status as the standard protocol for the network. TCP/IP also appeared in the 4.2BSD UNIX distribution, making it more widely available and accessible. Additionally, the initial development of name server technology occurred, which played a crucial role in the growth and expansion of the internet. These events marked significant advancements and milestones in the adoption and development of TCP/IP.

    Rate this question:

  • 4. 

    Which of the following organizations develops and maintains RFCs?

    • A.

      ISOC

    • B.

      IAB

    • C.

      IRTF

    • D.

      IETF

    Correct Answer
    D. IETF
    Explanation
    The IETF (Internet Engineering Task Force) is the correct answer because it is the organization responsible for developing and maintaining RFCs (Request for Comments). RFCs are documents that describe various protocols, standards, and technologies used on the internet. The IETF is a global community of volunteers who work together to develop and improve internet standards. The other organizations listed (ISOC, IAB, and IRTF) are also involved in internet governance and research, but they do not have the primary responsibility for developing and maintaining RFCs.

    Rate this question:

  • 5. 

    Which of the following organizations manages Internet domain names and network addresses?

    • A.

      ICANN

    • B.

      IETF

    • C.

      IRTF

    • D.

      ISOC

    Correct Answer
    A. ICANN
    Explanation
    ICANN (Internet Corporation for Assigned Names and Numbers) is the correct answer because it is the organization responsible for managing and coordinating the domain name system (DNS) and IP addresses on the internet. It oversees the allocation and administration of domain names and IP addresses, ensuring that they are unique and properly distributed. ICANN also plays a crucial role in establishing policies and standards for the internet's global domain name system. IETF (Internet Engineering Task Force), IRTF (Internet Research Task Force), and ISOC (Internet Society) are other organizations involved in internet governance, but they do not specifically manage domain names and network addresses like ICANN does.

    Rate this question:

  • 6. 

    What is the tital of RFC 3300?

    • A.

      Index of Official Protocals

    • B.

      Index of Internet Official Protocols

    • C.

      Internet Official Protocol Standards

    • D.

      The Internet Standards Process

    Correct Answer
    C. Internet Official Protocol Standards
    Explanation
    The correct answer is "Internet Official Protocol Standards." This is the title of RFC 3300, which is a document that provides information about the standards and protocols used on the internet. The other options mentioned are not the correct title of RFC 3300.

    Rate this question:

  • 7. 

    Which of the following steps must a Standard RFC go through to become an official standard? (Choose all that apply.)

    • A.

      Draft Standard

    • B.

      Historic Standard

    • C.

      Proposed Standard

    • D.

      Retired Standard

    • E.

      Standard (sometimes called "Internet Standard")

    Correct Answer(s)
    A. Draft Standard
    C. Proposed Standard
    E. Standard (sometimes called "Internet Standard")
    Explanation
    A Standard RFC must go through three steps to become an official standard: Draft Standard, Proposed Standard, and Standard (sometimes called "Internet Standard"). The Draft Standard stage is the initial version of the RFC that is being developed and reviewed by the Internet Engineering Task Force (IETF). The Proposed Standard stage is the next step where the RFC is further refined and reviewed by the IETF community. Finally, if the RFC meets all the criteria and requirements, it can be elevated to the Standard stage, which is the official standard recognized by the IETF. The other options, Historic Standard and Retired Standard, do not represent the progression of an RFC towards becoming an official standard.

    Rate this question:

  • 8. 

    A Best Current Practice (BCP) RFC is a special form of Standard RFC.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    A Best Current Practice (BCP) RFC is not a special form of Standard RFC. BCP RFCs are documents that provide guidelines, recommendations, or best practices for network operations, protocols, or procedures. They are not considered standards like Standard RFCs, which define specific protocols or specifications. Therefore, the correct answer is false.

    Rate this question:

  • 9. 

    List the seven layers of the ISO/OSI network reference model in ascending order starting with Layer 1 seperated by a comma.Example:Session, Physical, Data Link, ETC....NOT f, g, b, c..etccheck your spelling...this is fill in the blank and there is only one way to do it!!!!

    Correct Answer
    Physical, Data Link, Network, Transport, Session, Presentation, Application
    Explanation
    The answer provided lists the seven layers of the ISO/OSI network reference model in ascending order starting with Layer 1. The layers are organized as follows: Physical, Data Link, Network, Transport, Session, Presentation, Application.

    Rate this question:

  • 10. 

    Whic of the following statements represent benefits of a layered approace to networking? (Choose all that apply.)

    • A.

      Takes a big problem and breaks it into a series of smaller interrelated problems

    • B.

      Allows individual layers to be insulated from one another

    • C.

      Permits expertise to be applied from differnt disciplines for different layers

    • D.

      Permits hardware issues to be kept separate from software issues

    Correct Answer(s)
    A. Takes a big problem and breaks it into a series of smaller interrelated problems
    B. Allows individual layers to be insulated from one another
    C. Permits expertise to be applied from differnt disciplines for different layers
    D. Permits hardware issues to be kept separate from software issues
    Explanation
    A layered approach to networking provides several benefits. Firstly, it takes a big problem and breaks it into a series of smaller interrelated problems, making it easier to manage and troubleshoot. Secondly, it allows individual layers to be insulated from one another, which increases flexibility and modularity. Thirdly, it permits expertise to be applied from different disciplines for different layers, ensuring that each layer is optimized by the relevant experts. Lastly, it permits hardware issues to be kept separate from software issues, simplifying the maintenance and troubleshooting process.

    Rate this question:

  • 11. 

    Which terms represent parts of the PDU that are always present in an y PDU? (Choose all that apply.)

    • A.

      Header

    • B.

      Payload

    • C.

      Checksum

    • D.

      Trailer

    Correct Answer(s)
    A. Header
    B. Payload
    Explanation
    The header and payload are always present in any PDU. The header contains control information and metadata about the PDU, while the payload contains the actual data being transmitted. The checksum is not always present in a PDU, as it is used for error detection and may be optional depending on the protocol being used. The trailer is also not always present, as it is used for additional information or error detection and may be optional.

    Rate this question:

  • 12. 

    Which of the following components operate at the Physical layer? (Choose all that apply.)

    • A.

      Network interface cards (NICs)

    • B.

      Segmentation and reassembly

    • C.

      Connectors

    • D.

      Cables

    Correct Answer(s)
    A. Network interface cards (NICs)
    C. Connectors
    D. Cables
    Explanation
    The components that operate at the Physical layer are network interface cards (NICs), connectors, and cables. Network interface cards (NICs) are responsible for connecting a device to a network, while connectors and cables are used to physically connect devices together. These components are all involved in the transmission of raw data bits over a physical medium, which is the main function of the Physical layer in the OSI model.

    Rate this question:

  • 13. 

    What is the common name for PDUs at the Data Link Layer?

    • A.

      Frames

    • B.

      Packets

    • C.

      Segments

    • D.

      Data Link PDUs

    Correct Answer
    A. Frames
    Explanation
    The common name for PDUs at the Data Link Layer is "Frames". Frames are the units of data that are transmitted over a network at the Data Link Layer. They contain the necessary information for error detection and correction, as well as the source and destination addresses. Frames are used to encapsulate packets and are responsible for the reliable transmission of data between adjacent network nodes.

    Rate this question:

  • 14. 

    What functions does the Session layer provide? (Choose all that apply.)

    • A.

      Segmentation and reassembly

    • B.

      Session setup, maintenance, and tear-down

    • C.

      Checkpoint controls

    • D.

      Data format conversions

    Correct Answer(s)
    B. Session setup, maintenance, and tear-down
    C. Checkpoint controls
    Explanation
    The Session layer provides session setup, maintenance, and tear-down functions. This means that it is responsible for establishing and managing communication sessions between two devices. It handles the initiation, maintenance, and termination of these sessions. Additionally, the Session layer also provides checkpoint controls, which allow for the synchronization and recovery of data during a session.

    Rate this question:

  • 15. 

    Which of the following TCP/IP network model layers maps most nearly to single layers in the ISO/OSI network reference model? (Choose all that apply.)

    • A.

      TCP/IP Network Access layer

    • B.

      TCP/IP Internet layer

    • C.

      TCP/IP Transport layer

    • D.

      TCP/IP Application layer

    Correct Answer(s)
    B. TCP/IP Internet layer
    C. TCP/IP Transport layer
    Explanation
    The TCP/IP Internet layer maps most nearly to the Network layer in the ISO/OSI network reference model. This layer is responsible for addressing, routing, and forwarding data packets across different networks. Similarly, the TCP/IP Transport layer maps most nearly to the Transport layer in the ISO/OSI model. This layer ensures reliable delivery of data between end systems and provides services such as segmentation, flow control, and error recovery.

    Rate this question:

  • 16. 

    Whic of the follwing two TCP/IP protocols operate at the TCP/IP Transport layer? (Choose all that apply.)

    • A.

      ARP

    • B.

      PPP

    • C.

      TCP

    • D.

      UDP

    • E.

      XNET

    Correct Answer(s)
    C. TCP
    D. UDP
    Explanation
    TCP and UDP are both protocols that operate at the TCP/IP Transport layer. TCP (Transmission Control Protocol) is a reliable and connection-oriented protocol that ensures the delivery of data packets in the correct order and provides error checking and flow control. UDP (User Datagram Protocol) is a connectionless and unreliable protocol that does not guarantee the delivery of data packets or their order, making it suitable for real-time applications such as video streaming or online gaming. ARP (Address Resolution Protocol) operates at the TCP/IP Network layer, while PPP (Point-to-Point Protocol) is a data link layer protocol. XNET is not a recognized TCP/IP protocol.

    Rate this question:

  • 17. 

    In UNIX terminology, a listener process that operates on a server to handle incomming requests for services is called a _______________.

    • A.

      Listener

    • B.

      Monitor

    • C.

      Daemon (day-mon)

    • D.

      Service

    Correct Answer
    C. Daemon (day-mon)
    Explanation
    A listener process in UNIX terminology is referred to as a daemon. A daemon is a background process that operates on a server and handles incoming requests for services. It runs continuously and independently of user interaction, ensuring that services are always available and responsive. The term "daemon" is derived from the Greek mythological figure, a supernatural being that performs tasks without human intervention.

    Rate this question:

  • 18. 

    The process of combining multiple outgoing protocol streams at the Transport and Network layers in TCP/IP is called ___________.

    • A.

      Folding

    • B.

      Multiplexing

    • C.

      Unfolding

    • D.

      Demultiplexing

    Correct Answer
    B. Multiplexing
    Explanation
    Multiplexing is the process of combining multiple outgoing protocol streams at the Transport and Network layers in TCP/IP. It allows multiple streams of data to be transmitted over a single communication channel, increasing efficiency and reducing the need for multiple connections. By multiplexing, different protocols or data streams can share the same network connection, saving bandwidth and improving overall network performance.

    Rate this question:

  • 19. 

    On any system, only those protocol numbers for protocols that are actually in use must be defined on that system. True or False?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    This statement is true because defining protocol numbers for protocols that are not in use would be unnecessary and would consume system resources. It is more efficient to only define protocol numbers for the protocols that are actually being used on the system.

    Rate this question:

  • 20. 

    The purpose of a TCP/IP port number is to identify which aspect of a system's operation for incoming and outgoing protocol data?

    • A.

      Network layer protocol in use

    • B.

      Transport layer protocol in use

    • C.

      Sending or receiving application process

    • D.

      None of the above

    Correct Answer
    C. Sending or receiving application process
    Explanation
    The purpose of a TCP/IP port number is to identify the sending or receiving application process for incoming and outgoing protocol data. Port numbers allow multiple applications to communicate over a network by assigning unique identifiers to each process. This ensures that the data is correctly delivered to the intended application on the receiving end. The network layer protocol and transport layer protocol are responsible for handling the transmission of data, but the port number specifically identifies the application process involved.

    Rate this question:

  • 21. 

    Which of the following terms is a synonym for a dynamically assigned port address, used to service a temporary TCP/IP connection for data exchange?

    • A.

      Protocol number

    • B.

      Well-known port address

    • C.

      Registered port address

    • D.

      Socket address

    Correct Answer
    D. Socket address
    Explanation
    A socket address is a term used to refer to a dynamically assigned port address that is used to service a temporary TCP/IP connection for data exchange. It is a synonym for the given description as it represents the combination of an IP address and a port number, which allows communication between different applications over a network. The socket address is dynamically assigned and can change for each new connection, making it suitable for temporary connections.

    Rate this question:

  • 22. 

    Which of the following activities may occur during the protocol analysis process? (Choose all that apply.)

    • A.

      Tapping into network communications

    • B.

      Capturing packets "off the wire"

    • C.

      Gathering statistics

    • D.

      Decoding packets into readable form

    • E.

      Retransmitting captured packets for testing

    Correct Answer(s)
    A. Tapping into network communications
    B. Capturing packets "off the wire"
    C. Gathering statistics
    D. Decoding packets into readable form
    Explanation
    The protocol analysis process involves several activities. Tapping into network communications refers to accessing and monitoring the data being transmitted over a network. Capturing packets "off the wire" means capturing the network packets as they are transmitted. Gathering statistics involves collecting and analyzing data about the network traffic. Decoding packets into readable form involves converting the captured packets into a format that can be easily understood and analyzed. Retransmitting captured packets for testing is not mentioned as an activity that occurs during the protocol analysis process.

    Rate this question:

  • 23. 

    Why is promiscuous mode operation important for protocol analysis?

    • A.

      It isn't.

    • B.

      It allows the protocol analyzer to capture and inspect all traffic on the network medium, including erros and malformed packets.

    • C.

      It bypasses normal packet-level security on a network.

    • D.

      It enables the protocol analyzer to gather statistics.

    Correct Answer
    B. It allows the protocol analyzer to capture and inspect all traffic on the network medium, including erros and malformed packets.
    Explanation
    Promiscuous mode operation is important for protocol analysis because it enables the protocol analyzer to capture and inspect all traffic on the network medium, including errors and malformed packets. This is crucial for accurately analyzing and troubleshooting network protocols, as it allows for the detection and identification of any issues or abnormalities in the network traffic. By capturing all traffic, the protocol analyzer can provide a comprehensive view of the network, helping to identify and resolve any potential problems.

    Rate this question:

  • 24. 

    A packet filter that's applied to incoming data in a a protocol analyzer may be called a ______________. (Choose all that apply.)

    • A.

      Capture filter

    • B.

      Data filter

    • C.

      Pre-filter

    • D.

      Post-filter

    Correct Answer(s)
    A. Capture filter
    C. Pre-filter
    Explanation
    A packet filter that's applied to incoming data in a protocol analyzer may be called a capture filter or a pre-filter. A capture filter is used to select which packets should be captured and analyzed based on specific criteria, such as source or destination IP address, port number, or protocol type. A pre-filter, on the other hand, is used to filter out unwanted packets before they are captured and analyzed, reducing the amount of data that needs to be processed. Therefore, both capture filter and pre-filter are applicable terms for describing a packet filter in this context.

    Rate this question:

  • 25. 

    Which of the following features are typical for most protocol analyzers? (Choose all that apply.)

    • A.

      Packet filters may be applued to incoming data before capture, or to store data after capture.

    • B.

      Decodes may be applied to packets in the trace buffer.

    • C.

      Alarms may be set to flag unusual network events or conditions

    • D.

      Packet filters display various statistical reports and graphs based on traffic analysis.

    • E.

      Packet filters inlcude built-in trend analysis and capacity-planning tools.

    Correct Answer(s)
    A. Packet filters may be applued to incoming data before capture, or to store data after capture.
    B. Decodes may be applied to packets in the trace buffer.
    C. Alarms may be set to flag unusual network events or conditions
    D. Packet filters display various statistical reports and graphs based on traffic analysis.
    Explanation
    Protocol analyzers typically have the following features: packet filters that can be applied to incoming data before capture or to store data after capture, decodes that can be applied to packets in the trace buffer, alarms that can be set to flag unusual network events or conditions, and packet filters that display various statistical reports and graphs based on traffic analysis. Additionally, packet filters may include built-in trend analysis and capacity-planning tools.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 12, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 25, 2011
    Quiz Created by
    Rroshto
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.