CS 2204 Quizzes
CS 2204 Quizzes
CS 2204 Quizzes
bits. The solution used on North American T1 lines (1.544 Mbps) is known as
Select one:
a. 4B/5B
b. B8ZS
c. NRZI
d. PAM-5
Feedback
Your answer is incorrect.
The correct answer is: B8ZS
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Bandwidth delay is more significant than propagation delay within a small LAN.
Select one:
True
False
Feedback
The correct answer is 'True'.
Question 3
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Wi-Fi WPA2 uses the presumptively stronger encryption system called:
Select one:
a. RC4
b. Advanced Encryption Standard (AES)
c. TKIP
d. DES-3
Feedback
Your answer is incorrect.
The correct answer is: Advanced Encryption Standard (AES)
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
All else being equal, the data rate achievable with a radio signal is proportional to:
Select one:
a. the signal power
b. the distance to the receiver
Question 5
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
For long (multi-kilometer) electrical serial lines, in addition to the clock-related serial-
line requirements, we also want the average voltage to be zero.
Select one:
True
False
Feedback
The correct answer is 'True'.
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The network layer interacts with the Wi-Fi LAN exactly as it does with Ethernet; no
changes are required.
Select one:
True
False
Feedback
The correct answer is 'True'.
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Bluetooth is a low-power network; for many applications the working range is about:
Select one:
a. 10 m
b. 50 m
c. 1 m
d. 100 m
Feedback
Your answer is correct.
The correct answer is: 10 m
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Ethernet-like collision detection is no longer feasible over radio communications:
Select one:
True
False
Feedback
The correct answer is 'True'.
Question 9
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
The use of _________ lets the base station receive CDMA messages from
unsynchronized mobile phones.
Select one:
a. large antennas
b. expensive digital filter components
c. sophisticated software algorithms
d. pseudorandom sequences
Feedback
Your answer is incorrect.
The correct answer is: pseudorandom sequences
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
If Wi-Fi error rates or collision rates are high, a sender can send a large packet as
multiple fragments, each receiving its own link-layer ACK.
Select one:
True
False
Feedback
The correct answer is 'True'.
A virtual private network, or VPN, supports creation of virtual links that join far-flung
nodes via:
Select one:
a. Leased data circuits only
b. The Internet
c. Asynchronous Transfer Mode virtual circuits only
d. A Wi-Fi network
Feedback
Your answer is incorrect.
The correct answer is: The Internet
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The Internet protocols use big-endian byte order (also referred to as network byte
order).
Select one:
True
False
Feedback
The correct answer is 'True'.
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In the Internet, most packet losses are due to:
Select one:
a. Packet corruption
b. Software bugs
c. Protocol flaws
d. Congestion
Feedback
Your answer is correct.
The correct answer is: Congestion
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
The terms “throughput” and “data rate” are considered to mean the same thing.
Select one:
True
False
Feedback
The correct answer is 'False'.
Question 5
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
A store-and-forward switch or router begins forwarding a packet before it has fully
arrived.
Select one:
True
False
Feedback
The correct answer is 'False'.
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
ATM packets are often called cells which are of the following size:
Select one:
a. Fixed-size 53 bytes
b. Variable-size up to 53 bytes
c. Variable-size up to 48 bytes
d. Fixed-size up to 48 bytes
Feedback
Your answer is correct.
The correct answer is: Fixed-size 53 bytes
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In the context of data networking, a protocol is a formal set of rules and conventions
that governs how computers exchange information over a network medium. A protocol
implements the functions of one or more of the OSI layers.
Select one:
True
False
Feedback
The correct answer is 'True'.
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
How is an Ethernet card (or network interface) assigned a unique MAC address?
Select one:
a. By the computer vendor
b. By the network administrator
Flag question
Question text
At the LAN layer, traffic-engineering mechanisms are historically/generally limited.
Select one:
True
False
Feedback
The correct answer is 'True'.
Question 10
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
In datagram switching, packets are addressed by destination. In virtual-circuit
switching, packets are “addressed” by a connection ID. So, datagram switching and
virtual-circuit switching are examples of:
Select one:
True
False
Feedback
Subnetting allows aggregation of IP address blocks in a way that is visible to the Internet backbone.
Select one:
True
False
Feedback
BGP implements policy through filtering rules which allow rejection of certain routes at three different
stages. Which of the following is NOT one of those stages?
Select one:
a. Import filtering
c. Export filtering
Feedback
The CIDR longest-match rule for choosing the routing table entry to be used means:
Select one:
Feedback
The correct answer is: using the most specific matching prefix
The Border Gateway Protocol’s primary goal is to provide support for choosing routes based on:
Select one:
b. link reliability
c. administrative input
Feedback
Internet Service Providers (ISPs) always connect to one another directly via high-speed links.
Select one:
True
False
Feedback
Select one:
True
False
Feedback
Routers have the option of fallback-to-flooding for unknown destinations (i.e. those which are not in
their routing table).
Select one:
True
False
Feedback
Select one:
True
False
Feedback
Select one:
d. A and B Only
Feedback
In distance-vector routing, each node has a complete view of the network topology.
Select one:
True
False
Feedback
Select one:
Feedback
CIDR has essentially eliminated the IPv4 Class A/B/C mechanism from the:
Select one:
a. smallest ISPs
b. entire IP network
Feedback
A link-state routing algorithm computes routes from the network map using:
Select one:
Feedback
The Split Horizon fix to the slow-convergence problem prevents all linear routing loops.
Select one:
True
False
Feedback
Select one:
True
False
Feedback
The job of handling exterior routing (that is handling exchange of routing information between
Autonomous Systems) is done by the following protocol:
Select one:
Feedback
In link-state routing, each node keeps a maximum amount of network information about of all nodes
and all links.
Select one:
True
False
Feedback
Select one:
b. Exterior routing
Feedback
In order to fix the slow-convergence problem, most flavors of the RIP protocol use a value of “infinity”
set to:
Select one:
a. a random value
b. 16
c. 0
d. 1000
Feedback
The link-state flooding algorithm avoids the usual problems of broadcast in the presence of loops by:
Select one:
Feedback
The correct answers are: discarding old or duplicate Link State Advertisements, None of the above
In order to fix the slow-convergence problem, most flavors of the RIP protocol use a value of “infinity”
set to:
Select one:
a. a random value
b. 16
c. 0
d. 1000
Feedback
CIDR has essentially eliminated the IPv4 Class A/B/C mechanism from the:
Select one:
a. smallest ISPs
b. entire IP network
Feedback
Select one:
True
False
Feedback
Select one:
d. A and B Only
Feedback
What kind of routing-update algorithm is a preferred choice for networks such as those of ISPs?
Select one:
b. Exterior routing
Feedback
Your answer is correct.
Select one:
True
False
Feedback
In link-state routing, each node keeps a maximum amount of network information about of all nodes
and all links.
Select one:
True
False
Feedback
The CIDR longest-match rule for choosing the routing table entry to be used means:
Select one:
Feedback
The link-state flooding algorithm avoids the usual problems of broadcast in the presence of loops by:
Select one:
Feedback
The correct answers are: discarding old or duplicate Link State Advertisements, None of the above
The Border Gateway Protocol’s primary goal is to provide support for choosing routes based on:
Select one:
b. link reliability
c. administrative input
Feedback
The Split Horizon fix to the slow-convergence problem prevents all linear routing loops.
Select one:
True
False
Feedback
A TCP connection cannot remain idle for a long period of time without getting terminated by the OS.
Select one:
True
False
Feedback
No matter the available bandwidth, every TCP connection must go through the slow-start phase.
Select one:
True
False
Feedback
Starting from the TCP ESTABLISHED state, the side that closes the connection first (active CLOSE) will end
up in the TIME WAIT state.
Select one:
True
False
Feedback
Select one:
a. 10 seconds
Feedback
In most TCP implementations, data can be sent only after the 3-way handshake completes. Therefore,
the delay before any data can be sent is:
Select one:
a. 2 RTTs
b. 1 RTT
c. 1.5 RTT
d. 2.5 RTTs
Feedback
The TCP Persist Timer is used to poll when the window size is zero. This timer is used by:
Select one:
Feedback
The TCP the Congestion Window is just another name for the receiver’s Advertised Window.
Select one:
True
False
Feedback
A TCP socket application can use setsockopt() with the TCP_NODELAY flag to:
Select one:
Feedback
The correct answer is: disable the TCP Nagle algorithm for the connection in question
Select one:
Feedback
The correct answer is: Allow communication with a specific process within the host
A TCP receiver can shrink the advertised window size to 0, so that the sender must stop sending data.
Select one:
True
False
Feedback
TCP is stream-oriented, meaning that the application can write very small or very large messages and
the TCP layer will take care of preserving message boundaries on the wire.
Select one:
True
False
Feedback
In TCP’s congestion avoidance phase, the Congestion Window adjustment rule introduced by TCP Tahoe
says that, after packet loss has been detected:
Select one:
Feedback
Path MTU is the smallest packet size which gets fragmented when sent along a path.
Select one:
True
False
Feedback
If there is no LISTENING TCP socket at the host TCP port to which a SYN request is sent, the response is
to ignore the SYN segment and send no reply.
Select one:
True
False
Feedback
The following TCP segment can be sent by either side at any time to abort the TCP connection:
Select one:
a. RST
b. SYN + ACK
c. FIN + ACK
d. FIN
Feedback
Select one:
d. Local <IP address, process id> and remote <IP address, process id>
Feedback
The correct answer is: Local <IP address, port> and remote <IP address, port>
To restart the flow after packet loss, TCP uses threshold slow start which transitions to congestion
avoidance.
Select one:
True
False
Feedback
Since essentially all links on the Internet have link-layer checksums to protect against data corruption,
TCP’s own checksum is strictly speaking unnecessary.
Select one:
True
False
Feedback
In terms of the TCP sequence and acknowledgment numbers, which of the following count as 1?
Select one:
Feedback
The correct answer is: SYN and FIN, but not ACK
The TCP congestion window update strategy called “Additive Increase, Multiplicative Decrease” (AIMD)
is used during the slow-start phase of TCP connections.
Select one:
True
False
Feedback
Select one:
True
False
How is an Ethernet card (or network interface) assigned a unique MAC address?
Select one:
a. By the computer vendor
b. By the network administrator
Select one:
a. Syntax
b. Entities
c. Semantics
d. Timing
Select one:
a. Connection-oriented, connectionless services respectively
Select one:
a. Transport (e.g. TCP)
b. Application (e.g. WWW)
The documents that contain all the formal Internet protocol standards are referred to as:
Select one:
a. IEEE 802 Standards
A store-and-forward switch or router begins forwarding a packet before it has fully arrived.
Select one:
True
False
Select one:
a. Packet corruption
b. Software bugs
c. Protocol flaws
d. Congestion
Select one:
True
False
The Wi-Fi 5 GHz band (vs. 2.4 GHz) has increased ability to penetrate walls, often resulting in a
higher effective range.
Select one:
True
False
Wi-Fi MAC (physical) addresses have the same 48-bit size as Ethernets and the same internal
structure.
Select one:
True
False
ATM Adaptation Layer AAL 5 uses a CRC-32 checksum and is able to detect lost ATM cells.
Select one:
True
False
Token Ring LAN is a simple multiple-access mechanism that is not only collision-free, but
which supports fairness in the sense that if N stations wish to send then each will receive 1/N of
the opportunities.
Select one:
True
False
Select one:
a. Improved radio modulation techniques
b. Improved error-correcting codes
c. Increasing the channel width
d. Allowing multiple spatial streams via multiple antennas
e. All of the above
Select one:
a. Packet switching
b. Routing
c. Flooding
d. Virtual circuits
Select one:
True
False
Select one:
a. NRZI
b. Manchester
c. AMI
d. 4B/5B
Select one:
The physical layer is concerned with the transmission of _______ over the physical medium.
Select one:
a. Programs
b. Protocols
c. Dialogs
d. Bits
Category 5 UTP cable is often used in which networks?
Select one:
a. Telephone
b. USB
c. 10 Mbps Ethernet
Fast Ethernet introduced the concept of full-duplex Ethernet which is entirely collision-free.
Select one:
True
False
A common recommendation is to have no more than _____ hosts per LAN or VLAN
Select one:
a. 10
b. 1000
c. 100
d. 100000
A VLAN looks like a single LAN and all VLAN members will see broadcast packets sent by
other members.
Select one:
True
False
Select one:
a. An IP router
c. A hub
d. A firewall
Select one:
b. Multicast
c. Spanning Tree
d. VLAN protocol
Ethernet switches have an additional privacy advantage in that traffic does not flow where it does
not need to flow.
Select one:
True
False
Select one:
True
False
Select one:
a. By means of wires
All Ethernet devices also agree on a broadcast address of all 1’s: a packet sent to the broadcast
address will be delivered to all attached hosts.
Select one:
True
False
Select one:
True
False
The popular USB (Universal Serial Bus) standard for connecting computer peripherals uses
Manchester encoding.
Select one:
True
False
The IEEE 802.1Q 32-bit VLAN tag is required to be added to frames with source and destination
ports on the same switch.
Select one:
True
False
If an Ethernet switch does not have an entry for a particular destination, it will:
Select one:
Select one:
a. Manchester
b. AMI
c. 4B/5B
d. PAM-5
Gigabit Ethernet slot time is largely irrelevant, as full-duplex (bidirectional) operation is almost
always supported.
Select one:
True
False
In 4B/5B encoding, some symbols are used for signaling rather than data. The following provide
an example of these:
Select one:
a. START
b. END
c. RESET
d. All of the above
Select one:
a. 5 GHz exclusively
b. 2.4 GHz exclusively
c. 2.4 GHz and 5 GHz
d. None of the above
Select one:
a. A timestamp
b. A sequence number
d. None
Select one:
True
False
What is the bandwidth delay to get 1500 bytes onto the wire for Gigabit Ethernet?
Select one:
a. 1 millisecond
b. 1 microsecond
c. 120 microseconds
d. 12 microseconds
AMI (Alternate Mark Inversion) still has synchronization problems with long runs of 0-bits. The
solution used on North American T1 lines (1.544 Mbps) is known as
Select one:
a. 4B/5B
b. B8ZS
c. NRZI
d. PAM-5
The telephone system is tightly intertwined with (wide area) computer networks. The limiting
factor for networking purposes turns out to be:
Select one:
Select one:
a. Data corruption
c. No checksum calculated
d. No error detected
For long (multi-kilometer) electrical serial lines, in addition to the clock-related serial-line
requirements, we also want the average voltage to be zero.
Select one:
True
False
Select one:
True
False
The Internet Checksum is usually better than CRC at detecting transposition errors.
Select one:
True
False
HDLC (High-level Data Link Control) supports the following method(s) for frame separation:
Select one:
a. byte stuffing over asynchronous links, bit stuffing over synchronous links
b. bit stuffing over asynchronous links, byte stuffing over synchronous links
c. only byte stuffing
d. only bit stuffing
Generally speaking, IPv6 addresses consist of a 64-bit network prefix (perhaps including subnet
bits) followed by a 64-bit part called:
Select one:
a. LAN address
b. link-local address
c. interface identifier
d. h/w address
Select one:
True
False
A possible Internet compatibility issue is that a packet is too large for a given network. IPv4
handles this by supporting:
Select one:
a. large packets
c. fragmentation
d. segmentation
ARP-cache entries eventually expire and the timeout interval is on the order of:
Select one:
a. 1 day
b. 1 hour
c. a few seconds
An essential feature of IPv4 (and IPv6) addresses is that they can be divided into 2 parts:
Select one:
Select one:
True
False
If a given IPv4 destination address matches the first k bits of one of the host’s addresses
(w.x.y.z/k), the destination is on the local LAN.
Select one:
True
False
IPv6’s link-local addresses are intended to be used only within a LAN and never routed.
Select one:
True
False
The IPv6 address ::1 (i.e. 127 0-bits followed by a 1-bit) is called the:
Select one:
a. null address
b. loopback address
c. default address
d. all-host multicast address
What enables an Internet site to appear to the outside world as a single IP network, but further
IP-layer routing to be supported inside the site?
Select one:
a. IPv6 only
b. source routing
c. subnets
Select one:
True
False
IPv6 routers periodically send Router Advertisement (RA) packets to the IPv6 broadcast
address.
Select one:
True
False
True
False
If the IPv4 “Don’t Fragment” (DF header flag) is set to 1 by the sender, then a router must not
fragment the packet and must _____ instead.
Select one:
a. forward it unchanged
b. return it to sender
c. truncate it
d. drop it
The checksum field in the IPv4 packet header is the “Internet checksum” applied to:
Select one:
Select one:
True
False
Select one:
a. LAN multicast
b. IP multicast
c. IP unicast
d. LAN broadcast
Which one of the following IPv4 addresses can be used as a valid host IP address?
Select one:
a. 10.0.0.0/24
b. 224.0.0.80
c. 10.0.0.80/24
d. 10.0.0.255/24
Two things are gained from station “A “ doing gratuitous ARP on starting up: first, all stations
that had A in their cache are now updated with A’s most current LAN address, and second:
Select one:
d. no other gain
In the IPv6 fixed header, the IPv4 header Time To Live (TTL) field has become the:
Select one:
a. Hop Limit
b. Flow Label
c. Traffic Class
d. None of the above
The number of bits in the network part of IPv4 class A, B, C addresses are:
Select one:
a. 8, 24, 16 respectively
b. 16, 24, 32 respectively
c. 24, 16, 8 respectively
d. 8, 16, 24 respectively
One thing DNS makes possible is changing a website’s IP address while leaving the fully
qualified domain name (FQDN) alone.
Select one:
True
False
b. 24.4.202.93
c. 172.16.1.1
d. 192.168.11.12
If an IPv4 address has all 1-bits for the host bits, it is of type:
Select one:
a. broadcast
b. invalid
c. unallocated
d. multicast
With IPv6, routers can use CIDR (Classless Internet Domain Routing) but must base forwarding
decisions on prefixes longer than /64.
Select one:
True
False
Select one:
a. broadcast traffic
b. multicast traffic
c. unicast traffic
d. anycast traffic
ARP (Address Resolution Protocol) takes advantage of the existence of LAN-level multicast
frames.
Select one:
True
False
The IPv6 fixed header is twice the size of the IPv4 header, so it amounts to:
Select one:
a. 32 bytes
b. 60 bytes
c. 50 bytes
d. 40 bytes
The IPv4 Time-to-Live (TTL) header field is incremented by 1 at each router; if it reaches 10,
the packet is discarded.
Select one:
True
False
Subnetting allows aggregation of IP address blocks in a way that is visible to the Internet
backbone.
Select one:
True
False
To avoid stop-and-wait becoming a performance bottleneck, TFTP has an option to allow small
window size sliding windows operation.
Select one:
True
False
TFTP prevents internal old duplicates simply by not allowing its 16-bit block numbers to wrap
around; this is effective, but limits the maximum file size to:
Select one:
a. about 64 MB
b. about 32 MB
c. about 20 MB
d. about 16 MB
In Stop-and-Wait, deadlock can be avoided by the sender side doing retransmit-on-timeout while
the receiver does not do retransmissions.
Select one:
True
False
If an 8 KB block of data is sent as a single UDP send operation over Ethernet (without jumbo
frames), IP fragmentation is just avoided.
Select one:
True
False
The most common binary data encoding on the Internet – at least below the application layer – is
big-endian encoding.
Select one:
True
False
UDP ports are considered a shared namespace with TCP ports. Therefore, 2 processes cannot
share the same port number even if one process is using UDP and the other is using TCP.
Select one:
True
False
Which application made the greatest use of early Remote Procedure Call?
Select one:
d. Email
Which of the following message types is NOT a valid TFTP message type?
Select one:
a. Read request
b. Write request
c. Connection request
d. Error
In the context of Sun RPC’s at-least-once semantics, duplicate request execution is a possibility.
Select one:
True
False
In Sliding Windows, once a full timeout has occurred, there are usually no packets remaining in
flight and this is referred to as:
Select one:
a. deadlock
b. packet starvation
c. congestion
d. pipeline drain
The UDP 16-bit Internet checksum on the data can be disabled by setting the checksum field to:
Select one:
a. all 0 bits
b. -1
c. 0xffff
d. 65535
If the TFTP client changes its port number on a subsequent connection, but the server does not,
what prevents an old duplicate data packet sent by the server from being accepted by the new
client?
Select one:
b. both client and server UDP are wrong in the old dup packet
c. the old dup packet has the wrong client UDP port number
d. the old dup packet has the wrong server UDP port number
The Real-time Transport Protocol (RTP) is built on top of UDP because of its packet loss
intolerance.
Select one:
True
False
UDP packets with spoofed source address are difficult to deliver to the application.
Select one:
True
False
UDP (like TCP) avoids IP fragmentation by relying on the Path MTU Discovery mechanism.
Select one:
True
False
Suppose a Sun RPC read() request ends up executing twice. In between successive read()
operations, the block of data is updated by another process. So different data is returned. This is
failure of idempotence.
Select one:
True
False
Select one:
Select one:
a. packet loss
b. queueing delays
c. data corruption
In Sliding Windows, the sender is allowed to send up to this many packets (starting with the next
packet after the last acknowledged packet):
Select one:
c. window size
Sliding Windows can work even if the receiver assumes that the window size is much less than
the sender’s window size value.
Select one:
True
False
TCP is stream-oriented, meaning that the application can write very small or very large messages and
the TCP layer will take care of preserving message boundaries on the wire.
Select one:
True
False
Feedback
Question 2
Incorrect
Flag question
Question text
In TCP’s congestion avoidance phase, the Congestion Window adjustment rule introduced by TCP Tahoe
says that, after packet loss has been detected:
Select one:
Feedback
Question 3
Correct
Question text
Path MTU is the smallest packet size which gets fragmented when sent along a path.
Select one:
True
False
Feedback
Question 4
Incorrect
Flag question
Question text
If there is no LISTENING TCP socket at the host TCP port to which a SYN request is sent, the response is
to ignore the SYN segment and send no reply.
Select one:
True
False
Feedback
Question 5
Incorrect
Flag question
Question text
The following TCP segment can be sent by either side at any time to abort the TCP connection:
Select one:
a. RST
b. SYN + ACK
c. FIN + ACK
d. FIN
Feedback
Question 6
Incorrect
Flag question
Question text
Select one:
d. Local <IP address, process id> and remote <IP address, process id>
Feedback
Question 7
Correct
Flag question
Question text
To restart the flow after packet loss, TCP uses threshold slow start which transitions to congestion
avoidance.
Select one:
True
False
Feedback
Question 8
Incorrect
Flag question
Question text
Since essentially all links on the Internet have link-layer checksums to protect against data corruption,
TCP’s own checksum is strictly speaking unnecessary.
Select one:
True
False
Feedback
The correct answer is 'False'.
Question 9
Incorrect
Flag question
Question text
In terms of the TCP sequence and acknowledgment numbers, which of the following count as 1?
Select one:
Feedback
The correct answer is: SYN and FIN, but not ACK
Question 10
Correct
Flag question
Question text
The TCP congestion window update strategy called “Additive Increase, Multiplicative Decrease” (AIMD)
is used during the slow-start phase of TCP connections.
Select one:
True
False
Feedback
Making the stack non-executable prevents stack buffer overflow attacks that place a shellcode on
the stack and also prevents return-to-libc attacks.
Select one:
True
False
A protocol that allows mail users agents to copy email from the email server to the user is:
Select one:
a. POP3
b. SMTP
c. IMAP
d. MIME
Select one:
True
False
A DNS record which comes from a name resolver that manages the record and is thus always
correct is called:
Select one:
a. Administrative Record
b. Authoritative Record
c. Server Record
HTTP 1.1 supports persistent TCP connections. A persistent connection is a TCP connection
over which a client may send several HTTP requests.
Select one:
True
False
An attack that keeps changing in relatively trivial ways to avoid signature-based detection is
sometimes said to be:
Select one:
a. dynamic
b. unsophisticated
c. polymorphic
d. trivial
The following protocol assumes that all the e-mail will remain on the server indefinitely in
multiple mailboxes:
Select one:
a. POP3
b. SMTP
c. IMAP
d. MIME
The HTTP Content-Type header value used for HTML pages is text/html.
Select one:
True
False
In the C language, a stack buffer overflow is not detected at the time it occurs because:
Select one:
GET / HTTP/1.1
Select one:
True
False
Overlapping TCP segments raises the possibility of signature-based detection evasion (the
attacker might arrange the packets so that the detection reassembles them one way and the target
another way).
Select one:
True
False
The usual approach to prevent eavesdropping on a communication channel is the use of:
Select one:
a. secure authentication
b. encryption
c. checksums
Select one:
a. the web browser
Most network intrusion-detection systems (NIDS) detect intrusions based either on traffic
anomalies or on pattern-based signatures. Which of the following would fall under “traffic
anomalies”?
Select one:
The Simple Mail Transfer Protocol (SMTP) is used to retrieve email messages from older email
servers.
Select one:
True
False
Which HTTP header is used by the server to inform the client about how it agrees to use the
persistent connection?
Select one:
a. Cache-Control
b. Connection
c. Keep-Alive
d. Content-Length
Select one:
True
False
The 2 types of DNS Resource Records used to encode the IPv4 and IPv6 addresses that
correspond to the specified domain name are respectively:
Select one:
a. PTR and A
b. A and AAAA
c. A and PTR
d. AAAA and A
The essence of DNS is a hierarchical domain-based naming scheme and a distributed database
system for implementing this naming scheme.
Select one:
True
False
Linux systems support assigning to an unprivileged process any of several “capabilities”. One of
these is CAP_NET_BIND_SERVICE which allows the following:
Select one:
In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In
broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be
sent simultaneously.
Select one:
True
False
Select one:
a. Sequencing
b. Flow Control
c. Acknowledgement
d. Urgent data flag
e. Source and Destination Port
Switches are used to connect distant LANs whereas a Router is most often used to connect
individual computers.
Select one:
True
False
Select one:
a. security
b. header format specification
c. expanded addressing capabilities
d. addressing simplifications
Select one:
a. to identify the Layer 2 address of an end device on the local network.
b. to forward data to the local switch as the next hop to all destinations.
c. to transfer data to another host on the same network segment.
d. to transfer data to a host outside the local network when no other route to the destination
exists.
e. to send packets whose destination address is unknown
The Routing Information Protocol (RIP) is an intra-domain routing protocol based on _________
routing
Select one:
a. distance vector
b. link state
c. path vector
d. OSPF
e. path state
What OSI layer identifies the communicating applications?
Select one:
a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
Select one:
b. An improper signaling method will be implemented for data transmitted on that cable.
In bridged LANs, the _______ algorithm creates a topology in which each LAN can be reached
from any other LAN through one path only.
Select one:
a. binary tree
b. unary tree
c. routing
d. shortest path
e. spanning tree
What characteristic of UTP cable helps reduce the effects of interference?
Select one:
a. the metal braiding in the shielding
b. the reflective cladding around core
c. the twisting of the wires in the cable
d. the insulating material in the outer jacket
e. the type of metal used for the wires
Select one:
a. 256 bits
b. 96 bits
c. 32 bits
d. 128 bits
e. 64 bits
Select one:
a. security
b. header format specification
c. limited addressing capabilities
d. addressing simplifications
e. performance issues
Select one:
a. acknowledgement of data delivery
b. minimal delays in data delivery
c. high reliability of data delivery
d. same order data delivery
e. flow control
Select one:
True
False
Select one:
a. Network
b. Transport
c. Data Link
d. MAC
e. Physical
Select one:
a. It is used as a pad for data
b. It identifies the source address
c. It marks the end of timing information
d. It is used for timing synchronization with alternating patterns of ones and zeros
e. It identifies the destination address
The size of the UDP port field is:
Select one:
a. 8 bits
b. 16 bits
c. 32 bits
d. 48 bits
e. 64 bits
The reverse address resolution protocol (RARP) allows a host to discover its Internet address
when it knows only its physical address.
Select one:
True
False
Select one:
a. IPv3
b. IPng
c. IPv5
d. IPv6
e. IPv4
Which of the following is a characteristic of single-mode fiber-optic cable?
Select one:
a. generally uses LEDs as the light source
b. no longer in use
c. uses relatively larger core with multiple light paths
d. is cheaper than multi-mode fiber
e. generally uses semiconductor lasers as the light source