Sdp9 From The Photos

209 Questions | Total Attempts: 154

SettingsSettingsSettings
Sdp9 From The Photos - Quiz

.


Questions and Answers
  • 1. 
    1. Two packets A and B are sent in that order through a connectionless communication network. They will arrive at the destination:
    • A. 

      In any order, after possibly having traversed different routes.

    • B. 

      In the order A-B, after having traversed the same route.

    • C. 

      In any order, after having traversed the same route.

    • D. 

      In the order A-B, after possibly having traversed different routes

  • 2. 
    1. The Internet received its name in the 1980s because:
    • A. 

      It consisted of many interconnected networks.

    • B. 

      It was an interim (temporary) design of what it later became, but the name stuck.

    • C. 

      It was meant to be a network internal to the United States Department of Defense.

    • D. 

      It achieved international scope with the addition of the City University of London.

  • 3. 
    1. All store-and-forward networks are:
    • A. 

      Packet or message switched networks.

    • B. 

      Broadcast networks

    • C. 

      Connection-based networks

    • D. 

      Connectionless networks

  • 4. 
    The Date: header in the HTTP response message indicates when the object in the response was last modified.
    • A. 

      True

    • B. 

      False

  • 5. 
    The process that sends messages into, and receives messages from, the network through a software interface is called a socket
    • A. 

      True

    • B. 

      False

  • 6. 
    1. The transfer of an html file from one host to another is:
    • A. 

      Loss-tolerant and time sensitive

    • B. 

      Loss-intolerant and time sensitive

    • C. 

      Loss-intolerant and time insensitive

    • D. 

      None of the above

  • 7. 
    1. SMTP is used to
    • A. 

      To transfer messages from one mail server to another

    • B. 

      To transfer messages from mail server to a user agent

    • C. 

      To define the format of message headers

    • D. 

      All of the above

  • 8. 
    DNS resource record has Type\=MX
    • A. 

      Value is the hostname of the DNS server that is authoritative for Name.

    • B. 

      Value is the IP address of the mail server that has the alias hostname Name.

    • C. 

      Value is the hostname of the mail server that has the alias hostname Name.

    • D. 

      None of the above

  • 9. 
    1. When a UDP segment arrives to a host, in order to direct the segment to the appropriate socket, the OS uses
    • A. 

      The destination port number

    • B. 

      The source port number

    • C. 

      The source IP address

    • D. 

      All of the above

  • 10. 
    1. The stop-and-wait protocol is highly inefficient when there is a
    • A. 

      Large distance between source and destination and the transmission rate is high

    • B. 

      Large distance between source and destination and the transmission rate is low

    • C. 

      Short distance between source and destination and the transmission rate is high

    • D. 

      Short distance between source and destination and the transmission rate is low

  • 11. 
    Pipelining requires which of the following
    • A. 

      All of the above

    • B. 

      Transmitting many packets  before receiving acknowledgements

    • C. 

      Unique sequence numbers for each in-transit packet

    • D. 

      Sender-side buffering of unacknowledged packets

  • 12. 
    1. Suppose a client sends an HTTP request message with the If-modified-since: header. Suppose the object in a server has not 1changed since the last time a client retrieved the object. Then the server will send a response message with the status code
    • A. 

      404 Not Found

    • B. 

      200 OK

    • C. 

      304 Not Modified

    • D. 

      None of the above

  • 13. 
    1. Streams are not needed in which of the following programs:
    • A. 

      UDPserver

    • B. 

      TCPserver

    • C. 

      UDPclient

    • D. 

      TCPclient

  • 14. 
    For BitTorrent, which of the following is true:
    • A. 

      Among the chunks that a peer does not have, the peer will request chunks that appear to be relatively rare in the torrent.

    • B. 

      At a given instant of time, a peer A may upload to a peer B, even if peer B is not sending anything to A.

    • C. 

      Although a peer may have 50 concurrent TCP connections with other peers, at any given instant of time it sends data to less than 10 other peers.

    • D. 

      All of the above.

  • 15. 
    TCP applies fast retransmit to a segment when
    • A. 

      It estimates unusually large RTTs

    • B. 

      It receives three ACKs for an earlier segment

    • C. 

      The segment's timer expires

    • D. 

      none of the above

  • 16. 
    Nmap is often used to:
    • A. 

      Measure throughput between hosts

    • B. 

      Measure round-trip times between hosts.

    • C. 

      Decipher encrypted traffic

    • D. 

      Do port scans over a range of ports at a target host.

  • 17. 
    For Ethernet, if an adapter determines that a frame it has just received is addressed to a different adapter
    • A. 

      It discards the frame without sending an error message to the network layer

    • B. 

      It sends a NACK (not acknowledged frame) to the sending host

    • C. 

      It delivers the frame to the network layer, and lets the network layer decide what to do

    • D. 

      It discards the frame and sends an error message to the network layer

  • 18. 
    A beacon frame sent by an AP includes:
    • A. 

      Both the AP's MAC address and SSID.

    • B. 

      The AP's SSID.

    • C. 

      The AP's MAC address.

    • D. 

      None of the above

  • 19. 
    The 802.11 protocol does not implement collision detection because
    • A. 

      The adapter would still not be able to detect all collisions due to hidden terminals.

    • B. 

      It is costly to build wireless hardware that detects collisions.

    • C. 

      Collision detection was found to be useless in wired Ethernet.

    • D. 

      All of the above

  • 20. 
    Packets sent by two stations in 802.11 can collide because
    • A. 

      At a given time, the random backoff values of the two stations are the same

    • B. 

      The packets are sent to different Aps but on the same channel

    • C. 

      The two stations could be hidden from each other

    • D. 

      All of the above

  • 21. 
    An 802 11 frame includes
    • A. 

      Four address fields.

    • B. 

      A sequence number field.

    • C. 

      An acknowledgement field.

    • D. 

      All of the above

  • 22. 
    Which of the following statements best describes the purpose of the SNMP protocol
    • A. 

      The SNMP protocol is a tool for gathering data about network conditions and executing remote actions at remote managed devices

    • B. 

      The SNMP protocol specified the action …

    • C. 

      The SNMP protocol is used by the network …

  • 23. 
    What is the purpose of the SNMP SetRequest message?
    • A. 

      To allow a managing entity to query the value of a set of MIB object values in a managed device

    • B. 

      To allow a managing entity to set the values of one or more MIB objects in a managed device

    • C. 

      To allow a managed device to request and receive a set of initial values for MIB objects in the managed device.

  • 24. 
    What is the purpose of a presentation service?
    • A. 

      To display data in a format specified by a user.

    • B. 

      None of the above

    • C. 

      To allow a client to inform a server that it (the client) is present and ready to receive dat

    • D. 

      To encode, transmit, and translate data from one machine-specific format to another

  • 25. 
    How we call the link-layer packets ?
    • A. 

      Frames

    • B. 

      Datagrams

    • C. 

      Packets

    • D. 

      Segment

    • E. 

      Message

Back to Top Back to top