The entire hostname has a maximum of ___________
Small piece of data sent from a website and stored on the users...
_______ is a repository of information linked together from points all...
Which of the following statements best describes the purpose of the...
Andalyn says complete 48-bit MAC addresses are allocated to NIC...
A single channel is shared by multiple signals by
The size of the TCP RcvWindow never changes throughout the duration of...
How to understand the connection-oriented protocol?
Network clients use well-known _______ numbers to contact well-defined...
An 802 11 frame includes
Small piece of data sent from a website and stored in the user's web...
In IPv4 protocol, each datagram is handled
Communication between a computer and a keyboard involves...
FTP uses ____ parallel TCP connections to transfer a file
Which of the following is most likely to be a MAC address assigned to...
Local DNS name servers
An 802.11 frame includes
How much data can a typical frame contain?
FTP uses _ parallel TCP connection to transfer
The internet protocol defines the __ layer of the Internet protocol...
Suppose a client sends an HTTP request message with the...
How much data can a typical frame contain?
Ethernet provides which of the following services to the network layer
Link layer data is
For BitTorrent, which of the following is true:
Packets sent by two stations in 802.11 can collide because
Andalyn says complete 48-bit MAC addresses are allocated to NIC...
A beacon frame sent by an AP includes:
Suppose a client sends an HTTP request message with the...
The packet of information at the application layer is called...
In a URL, the _______ is the full name of the file where the...
Three or more devices share a link in ___ connection
For BitTorrent , which of the following is true
Time it takes for a small packet to travel from client to server and...
Which of the following statements is (are) true of network...
Which of the following IP header fields provide simple error...
TCP applies fast retransmit to a segment when
On a network, the term authentication typically refers to the process...
Determine the correct class of the following IP address :...
How many ports can be per IP address
E-mails use ______________ protocol for sending messages
How many ports can be per IP address
A packet with no data is sent from host A to host B on an otherwise...
What is the type of an "8+1" parity code that outputs 100101011?
The password is sent to the server using _______ command.
Consider the latency model for dynamic congestion windows. Which of...
Ethernet provides which of the following services to the network layer
Twisted-pair copper wire is no longer present in computer networks.
Wireless transmission can be done via
Which one of the following is an architecture paradigms?
When a UDP segment arrives to a host, in order to direct the segment...
Which of the following nmap fields provide simple error detection ?
A channel partitioning has which of the following characteristics
FTP is built on _____ architecture
Internet has chosen datagram approach to switching in the
__________algorithm computes the least-cost path between source and...
Which one of the following allows a user at one site to establish a...
The TCP segment has a field in its header for RcvWindow
The Internet received its name in the 1980s because:
The process that sends messages into, and receives messages from, the...
Pipelining requires which of the following
Nmap is often used to:
The _______ layer lies between the network layer and the application...
Header of datagram in IPv4 has
Determine the correct class of the following ip address: 93.44.123.184
An IPv4 datagram can encapsulate data from several higher-level...
If 5 files are transferred from server A to client B in the same...
The physical layer is responsible for
The transmission of high-quality, interactive voice and video over the...
SMTP is used to
When a UDP segment arrives to a host, in order to direct the segment...
UDP has which of the following characteristics
The housing a large number of hosts. is often used to create a...
There are transport service requirements, for which of the following...
HTTP persistent connection - multiple objects can be sent over single...
The packet of information at the application layer is called _____
Twisted-pair copper wire is no longer present in computer networks.
The stop-and-wait protocol is highly inefficient when there is a
Streams are not needed in which of the following programs:
With SYN cookies, when a server receives a SYN segment, it returns a...
FTP client contacts FTP server at port ______, using TCP
Convert the following IP address: 158.0.147.85 to the binary
Which of the following protocols are essential to the existence of the...
Host A is sending host B a large file over a TCP connection. Assume...
A sender's data link layer uses "bit stuffing " to
A browser will generate header lines as a function of:
Determine the correct class of the following IP address:...
The transfer of an html file from one host to another is:
Which of the following allows a host to be assigned an IP address...
A channel partitioning protocol has which of the following...
In version field of IPv4 header, when machine is using some other...
When the data link layer applies "framing" to the data to be...
E-mail is _________
Consider an HTTP Web server using persistent connections. Suppose the...
How we call the delay, when packet waits to be transmitted onto the...
A router is installed to interconnect 4 subnetworks with MTUs of 1024,...
Dividing the network into smaller portions called
Application layer data is
Below provided a typical HTTP response message. Let's take a careful...
In order to maintain network stability while Transmission Control...
On a network, the term authentication typically refers to the process...
TCP applies fast retransmit to a segment when
For Ethernet, if an adapter determines that a frame it has just...
Host A is sending host B a large file over a TCP connection. Assume...
A cookie is made by the ________ and eaten by the _______
Suppose host A sends host B one segment with sequence number 38 and 4...
What is the purpose of a presentation service?
Which of the following allows a host to be assigned an IP address...
Define to which level of the network protocols are belong to:
Link communication generally refers to data that is
Typically the TCP port used by SMTP is
Ethernet (IEEE 802.3) is an example of
To record Internet routers of IPv4, that handles datagram is...
Transport layer data is
Below provided a typical HTTP response message. Let's take a careful...
The FDDI protocol is based on
Multicast communication generally refers to data that is
The Date: header in the HTTP response message indicates when the...
How are routing paths calculated?
In asynchronous serial communication the physical layer provide
Set of rules that the sending of rules that the sending program must...
To deliver a message to the correct application program running on a...
When a student in Hong Kong uses her computer to have a voice...
Which of the following IP header fields is designed to prevent a...
In contrast to standards developed by traditional standards...
In HTTP, the first line in a request message is called a _____ line;...
The primary role of a router is to forward datagrams from input links...
How does an operating system identify the application to which data...
Two packets A and B are sent in that order through a connectionless...
Which of the following features of Ethernet has not remained constant...
Which of the following is the network-layer protocol of the Internet?
In a broadcast-based network, longer propagation delays
The protocols of the various layers are called ___________
What is the purpose of the SNMP SetRequest message?
Which of the following internet applications typically transmit(s)...
Time needed to transmit L-bit packet into link = L (bits) / R...
HTTP non-persistent connection - multiple objects can be sent over...
Which of the following is a protocol used for communication between aa...
With ADSL, each subscriber gets more downstream bandwidth than...
The IP address space is organized in a hierarchy (I) to make the...
Which of the following is a disadvantage of connection based...
How we call the link-layer packets ?
What is the segment?
The throughput of a network link for an HTTP session is measured in...
Layers four and five of the Internet protocol stack are implemented in...
DNS resource record has Type\=MX
A university has 20 computers in a laboratory that is currently served...
There are transport service requirements, for which of the following...
Which of the following OSI layers converts the ones and zeroes to...
IEEE standard ethernet CSMA/CD provides which of the following...
Consider an application running on host cs.cmu.edu that wants to send...
Most packets use these as the inputs to the links. This means that the...
A forwarding table is
Below provided a typical HTTP response message. Let's take a careful...
This is the amount of time required to push all of the packet's...
Network layer data is
Which of the following network exploration tools can be used to...
The MSS is the maximum size of a TCP segment including headers
Match the following
____ is a process-to-process protocol that adds only port addresses,...
Link layer encapsulates datagrad in a
Registered users may look up all meetings in their agenda in a given...
Before sending a packet into a datagram network, the source must...
____________is a physical-layer device that acts on individual bits...
Convert the following IP address: 192.224.224.15 to the binary
The term packetization refers to the process of
Which of the following is an application layer service?
__________provides full transport layer services to applications
Time for a small packet to travel from client to server and back
A corporate information systems manager is interested in collecting...
Network layer at source is responsible for creating a packet from data...
An ARP query packet is encapsulated in
The process that waits to be contacted to begin the session is the...
A difference between routers and switches is that
At which of the following layers of the OSI protocol stack can the...
Compared to the wired transmission, wireless transmission typically...
Which of the following best describes an IP address?
Find the FTP reply whose message is wrongly matched
Convert the following IP address: 93.44.123.184 to the binary
Which of the following maps IP addresses onto datalink addresses?
The time required to examine the packet's header and determine where...
CCT stands for
What is not a application layer protocol?
Which of the following can be used by a router to report a dropped...
Computer networks that provide only a connection service at the...
Application layer offers _______ service
Which layer of the TCP/IP model involves routing?
331 Username OK , password required - status code refers to (protocol...
A specific CSMA-CD network such as 10-BASET "Ethernet
A network entity that satisfies HTTP requests on the behalf of an...
Two packets A and B are sent in that order through a...
DNS provides a few other important services in addition to translating...
All store-and-forward networks are:
Identify the incorrect statement
Which of the following was designed to solve the problem of IP address...
Which of the following statements are true about the TCP service...
Each time an end system wants to send a packet, it stamps the packet...
Filtering in a firewall can be based on:
The 802.11 protocol does not implement collision detection because
The network interface card of a Web server that you manage has...