1.
Which of the following items represent design goals that motivated the developement of TCP/IP? (Choose all that apply.)
A. 
Robust network architecture
B. 
Reliable delivery mechanisms
C. 
Ability of dissimilar systems to exchange data
D. 
Support for long-haul connections
E. 
2.
What is the name of the version of IP most widely used today?
A. 
B. 
C. 
D. 
3.
Which of the following milestone events for TCP/IP occured in 1983? (Choose all that apply.)
A. 
B. 
The Department of Defense mandates TCP/IP as the "official ARPANET protocol."
C. 
TCP/IP appears in the 4.2BSD UNIX distribution.
D. 
Initial developement of name server technology occurs.
4.
Which of the following organizations develops and maintains RFCs?
A. 
B. 
C. 
D. 
5.
Which of the following organizations manages Internet domain names and network addresses?
A. 
B. 
C. 
D. 
6.
What is the tital of RFC 3300?
A. 
Index of Official Protocals
B. 
Index of Internet Official Protocols
C. 
Internet Official Protocol Standards
D. 
The Internet Standards Process
7.
Which of the following steps must a Standard RFC go through to become an official standard? (Choose all that apply.)
A. 
B. 
C. 
D. 
E. 
Standard (sometimes called "Internet Standard")
8.
A Best Current Practice (BCP) RFC is a special form of Standard RFC.
9.
List the seven layers of the ISO/OSI network reference model in ascending order starting with Layer 1 seperated by a comma.Example:Session, Physical, Data Link, ETC....NOT f, g, b, c..etccheck your spelling...this is fill in the blank and there is only one way to do it!!!!
10.
Whic of the following statements represent benefits of a layered approace to networking? (Choose all that apply.)
A. 
Takes a big problem and breaks it into a series of smaller interrelated problems
B. 
Allows individual layers to be insulated from one another
C. 
Permits expertise to be applied from differnt disciplines for different layers
D. 
Permits hardware issues to be kept separate from software issues
11.
Which terms represent parts of the PDU that are always present in an y PDU? (Choose all that apply.)
A. 
B. 
C. 
D. 
12.
Which of the following components operate at the Physical layer? (Choose all that apply.)
A. 
Network interface cards (NICs)
B. 
Segmentation and reassembly
C. 
D. 
13.
What is the common name for PDUs at the Data Link Layer?
A. 
B. 
C. 
D. 
14.
What functions does the Session layer provide? (Choose all that apply.)
A. 
Segmentation and reassembly
B. 
Session setup, maintenance, and tear-down
C. 
D. 
15.
Which of the following TCP/IP network model layers maps most nearly to single layers in the ISO/OSI network reference model? (Choose all that apply.)
A. 
TCP/IP Network Access layer
B. 
C. 
D. 
16.
Whic of the follwing two TCP/IP protocols operate at the TCP/IP Transport layer? (Choose all that apply.)
A. 
B. 
C. 
D. 
E. 
17.
In UNIX terminology, a listener process that operates on a server to handle incomming requests for services is called a _______________.
A. 
B. 
C. 
D. 
18.
The process of combining multiple outgoing protocol streams at the Transport and Network layers in TCP/IP is called ___________.
A. 
B. 
C. 
D. 
19.
On any system, only those protocol numbers for protocols that are actually in use must be defined on that system. True or False?
20.
The purpose of a TCP/IP port number is to identify which aspect of a system's operation for incoming and outgoing protocol data?
A. 
Network layer protocol in use
B. 
Transport layer protocol in use
C. 
Sending or receiving application process
D. 
21.
Which of the following terms is a synonym for a dynamically assigned port address, used to service a temporary TCP/IP connection for data exchange?
A. 
B. 
C. 
D. 
22.
Which of the following activities may occur during the protocol analysis process? (Choose all that apply.)
A. 
Tapping into network communications
B. 
Capturing packets "off the wire"
C. 
D. 
Decoding packets into readable form
E. 
Retransmitting captured packets for testing
23.
Why is promiscuous mode operation important for protocol analysis?
A. 
B. 
It allows the protocol analyzer to capture and inspect all traffic on the network medium, including erros and malformed packets.
C. 
It bypasses normal packet-level security on a network.
D. 
It enables the protocol analyzer to gather statistics.
24.
A packet filter that's applied to incoming data in a a protocol analyzer may be called a ______________. (Choose all that apply.)
A. 
B. 
C. 
D. 
25.
Which of the following features are typical for most protocol analyzers? (Choose all that apply.)
A. 
Packet filters may be applued to incoming data before capture, or to store data after capture.
B. 
Decodes may be applied to packets in the trace buffer.
C. 
Alarms may be set to flag unusual network events or conditions
D. 
Packet filters display various statistical reports and graphs based on traffic analysis.
E. 
Packet filters inlcude built-in trend analysis and capacity-planning tools.