b. IP c. )A)P d. none of the above
12: 7P is _________ datagram protocol. a. an unreliable b. a connectionless c. bot$ a and b d. none of the above 1!: The term ________ means that 7P provides no error chec$ing or trac$ing. 7P assumes the unreliability of the underlying layers and does its best to get a transmission through to its destination8 but with no guarantees. a. reliable delivery b. connectionoriented delivery c. best-effort deli%ery d. none of the above 1+: 7n 7Pv+8 an C>9 value of decimal 16 means _______. a. there are 16 bytes of options b. there are +6 bytes of options c. t$ere are => bytes in t$e $eader d. none of the above 1-: 7n 7Pv+8 which field or bit value unambiguously identifies the datagram as a fragment/ a. EiF*o not fragmentE@iF bit / 6 b. EiFore "ragmentE@iF bit / 6 c. !ragment offset J +>>> d. none of the above 10: The 7Pv+ header si,e _______. a. is ,> to 0> bytes long b. is 26 bytes long c. is 06 bytes long d. none of the above 1: 7n 7Pv+8 when a datagram is encapsulated in a frame8 the total si,e of the datagram must be less than the _______. a. ;T b. AT c. M d. none of the above
14: The 7Pv+ header field formerly $nown as the service type field is now called the _______ field. a. 7T" b. chec$sum c. differentiated ser%ices d. none of the above 15: 7n 7Pv08 options are inserted between the _________ and the ___________ data. a. base headerB e3tension header b. base $eader1 upper-layer data c. base headerB frame header d. none of the above 26: 7Pv0 allows _________ security provisions than 7Pv+. a. more b. less c. the same level d. none of the above 21: 7n 7Pv08 when a datagram needs to be discarded in a congested networ$8 the decision is based on the _______ field in the base header. a. hop limit b. priority c. ne3t header d. none of the above 22: 7n 7Pv08 the _______ field in the base header and the sender 7P address combine to indicate a uni#ue path identifier for a specific flow of data. a. flo( label b. ne3t header c. hop limit d. destination 7P address
"2APER ,+ 1: A _______ address is an internetwor$ address with universal Kurisdiction. a. physical b. logical c. a and b
d. none of the above
2: The logical addresses in the 7nternet are called _______ addresses. a. port b. IP c. mail d. none of the above !: A ________ is a local address. 7ts Kurisdiction is over a local networ$. a. p$ysical b. logical c. a and b d. none of the above +: 7f the sender is a host and wants to send a pac$et to another host on the same networ$8 the logical address that must be mapped to a physical address is ______. a. t$e destination IP address in t$e datagram $eader b. the 7P address of the router found in the routing table c. either a or b d. none of the above -: 7f the sender is a host and wants to send a pac$et to another host on another networ$8 the logical address that must be mapped to a physical address is ______. a. the destination 7P address in the datagram header b. t$e IP address of t$e router found in t$e routing table c. either a or b d. none of the above 0: The sender is a router that has received a datagram destined for a host on another networ$. The logical address that must be mapped to a physical address is ______. a. the destination 7P address in the datagram header b. t$e IP address of t$e router found in t$e routing table c. either a or b d. none of the above : The sender is a router that has received a datagram destined for a host on the same networ$. The logical address that must be mapped to a physical address is ______. a. t$e destination IP address in t$e datagram $eader b. the 7P address of the router found in the routing table c. either a or b d. none of the above
4: 7n _______8 a table associating a logical address with a physical address is updated manually. a. static mapping b. dynamic mapping c. physical mapping d. none of the above 5: _______ is a dynamic mapping protocol in which a physical address is found for a given logical address. a. ARP b. )A)P c. both a and b d. none of the above 16: The target hardware address on an thernet is _______ in an A)P re#uest. a. >x>>>>>>>>>>>> b. 6.6.6.6 c. variable d. class dependent 11: An A)P reply is normally _______. a. broadcast b. multicast c. unicast d. none of the above 12: An A)P re#uest is normally _______. a. broadcast b. multicast c. unicast d. none of the above 1!: A techni#ue called ______ is used to create a subnetting effect. a. A)P b. )A)P c. proxy ARP d. none of the above 1+: A _______ is an A)P that acts on behalf of a set of hosts. a. A)P b. )A)P c. proxy ARP d. none of the above
1-: 7(P is a _________ layer protocol. a. data lin$ b. transport c. net(or) d. none of the above 10: 7(P messages are divided into two broad categories: _____________. a. 6uery and error reporting messages b. re#uest and response messages c. re#uest and reply messages d. none of the above 1: An 7(P message has _____ header and a variablesi,e data section. a. a 10byte b. a !2byte c. an -byte d. none of the above 14: hich of the following is true about 7(P messages/ a. An 7(P error message may be generated for an 7(P error message. b. An 7(P error message may be generated for each fragment. c. An 7(P error message may be generated for a multicast datagram. d. none is true 15: hich of the following is true about 7(P messages/ a. An 7(P error message may be generated for an 7(P error message. b. An I"MP error message may be generated only for t$e first fragment. c. An 7(P error message may be generated for a multicast datagram. d. none is true 26: 7P is a companion to the ______ protocol. a. ;*P b. T(P c. 7( d. none of t$e abo%e 21: 7P is _______ protocol. a. an error reporting b. a group management c. a transmission d. none of the above
22: 7P helps a ________ router create and update a list of loyal members related to each router interface. a. broadcast b. unicast c. multicast d. none of the above 2!: 7P operates __________. a. locally b. globally c. both a and b d. none of the above 2+: An 7P #uery is sent from a _______ to a _______. a. hostB host b. hostB router c. router1 $ost or router d. none of the above 2-: The _______ is used by a router in response to a received leave report. a. general #uery message b. special 6uery message c. membership report d. none of the above 20: The least significant 2! bits in a +4bit thernet address identify a ________. a. multicast router b. host c. multicast group d. none of the above 2: The _______ field of the 7P message is all ,eros in a #uery message. a. version b. type c. group address d. none of the above 24: A multicast message is sent from _______ to _______. a. one sourceB one destination b. one source1 multiple destinations c. multiple sourcesB one destination d. none of the above
25: 7n networ$s that do not support physical multicast addressing8 multicasting can be accomplished through _______. a. mapping b. #ueries c. tunneling d. none of the above !6: 7f four hosts on a networ$ belong to the same group8 a total of _______ sent in response to a general #uery message. a. one membership report is b. t(o members$ip reports are c. three membership reports are d. none of the above !1: 7n 7P8 a membership report is sent _______. a. once b. t(ice c. three times d. none of the above !2: 7n 7P8 the general #uery message ___________________ group. a. does not define a particular b. e3plicitly defines a c. can define more than one d. none of the above !!: An 7P pac$et is carried in an __________ pac$et. a. ;*P b. IP c. thernet frame d. none of the above !+: The 7P pac$et that carries an 7P pac$et has a value of _______ in its protocol field. a. ! b. , c. 1 d. none of the above
"2APER ,, 1: 7n _______ delivery8 both the deliverer of the 7P pac$et and the destination are on the same networ$. a. a connectionless b. a direct c. an indirect d. none of the above 2: 7n _______ delivery8 the deliverer of the 7P pac$et and the destination are on different networ$s. a. a connectionoriented b. a direct c. an indirect d. none of the above !: 7n _______ forwarding8 the full 7P address of a destination is given in the routing table. a. ne3thop b. networ$specific c. $ost-specific d. default +: 7n _______ forwarding8 the mas$ and destination addresses are both 6.6.6.6 in the routing table. a. ne3thop b. networ$specific c. hostspecific d. default -: 7n _______ forwarding8 the destination address is a networ$ address in the routing table. a. ne3thop b. net(or)-specific c. hostspecific d. default 0: 7n _______ forwarding8 the routing table holds the address of Kust the ne3t hop instead of complete route information. a. next-$op b. networ$specific c. hostspecific d. default
: The idea of address aggregation was designed to alleviate the increase in routing table entries when using ________. a. classful addressing
b. classless addressing c. both a and b d. none of the above 4: The principle of ________ states that the routing table is sorted from the longest mas$ to the shortest mas$. a. first mas$ matching b. shortest mas$ matching c. longest mas) matc$ing d. none of the above 5: The use of hierarchy in routing tables can ________ the si,e of the routing tables. a. reduce b. increase c. both a and b d. none of the above 16: _______ deals with the issues of creating and maintaining routing tables. a. "orwarding b. Routing c. *irecting d. 9one of the above 11: A _______ routing table contains information entered manually. a. static b. dynamic c. hierarchical d. none of the above 12: A _______ routing table is updated periodically using one of the dynamic routing protocols. a. static b. dynamic c. hierarchical d. none of the above 1!: The input and output ports of a router perform the ________ layer functions of the router. a. p$ysical and data lin) b. networ$ c. transport d. none of the above 1+: The routing processor of a router performs the ________ layer functions of the router. a. physical and data lin$ b. net(or)
c. transport d. none of the above 1-: The tas$ of moving the pac$et from the input #ueue to the output #ueue in a router is done by _________. a. input and output ports b. routing processor c. s(itc$ing fabrics d. none of the above 10: A static table is one _______. a. (it$ manual entries b. which is updated automatically c. either a or b d. none of the above 1: A dynamic table is one _______. a. with manual entries b. ($ic$ is updated automatically c. either a or b d. none of the above 14: "or purposes of routing8 the 7nternet is divided into ___________. a. wide area networ$s b. autonomous networ$s c. autonomous systems d. none of the above 15: ____________ is a group of networ$s and routers under the authority of a single administration. a. An autonomous system b. An area c. a and b d. none of the above 26: )outing inside an autonomous system is referred to as _______________. a. interdomain routing b. intradomain routing c. both a and b d. none of the above 21: )outing between autonomous systems is referred to as ____________. a. interdomain routing b. intradomain routing c. both a and b
d. none of the above 22: 7n _______ routing8 the least cost route between any two nodes is the route with the minimum distance. a. path vector b. distance %ector c. lin$ state d. none of the above 2!: 7n ________8 each node maintains a vector %table& of minimum distances to every node. a. path vector b. distance %ector c. lin$ state d. none of the above 2+: 7n distance vector routing8 each node periodically shares its routing table with _________ and whenever there is a change. a. every other node b. its immediate neig$bors c. one neighbor d. none of the above 2-: The )outing 7nformation Protocol %)7P& is an intradomain routing based on _________ routing. a. distance %ector b. lin$ state c. path vector d. none of the above 20: The metric used by _______ is the hop count. a.
2: The _________ routing uses the *iK$stra algorithm to build a routing table. a. distance vector b. lin) state c. path vector d. none of the above
24: The
!!: 7n
!+: 7n ________ routing8 we assume that there is one node %or more& in each autonomous system that acts on behalf of the entire autonomous system. a. distant vector b. pat$ %ector c. lin$ state d. none of the above !-: ___________ is an interdomain routing protocol using path vector routing. a. BHP b. )7P c.
!5: A onetomany communication between one source and a specific group of hosts is classified as a _______ _______ communication. communication. a. unicast b. multicast c. broadcast d. none of the above
+6: A onetoone communication between one source and one destination is classified as a _______ communication. a. unicast b. multicast c. broadcast d. none of the above +1: 7n ______8 the router forwards the received pac$et through only one of its interfaces. a. unicasting b. multicasting multicasti ng c. broadcasting d. none of the above +2: 7n _______8 the router may forward the received pac$et through several of its interfaces. a. unicasting b. multicasting c. broadcasting d. none of the above +!: mulation of ________ through ___________ is not efficient and may create long delays. a. unicastingB multiple unicasting b. multicasting1 multiple unicasting c. broadcastingB multicasting d. none of the above ++: 7n unicast routing8 each router in the domain has a table that defines a ______ path tree to possible destinations. a. average b. longest c. s$ortest d. none of the above
+-: 7n multicast routing8 each involved router needs to construct a ________ path tree for each group. a. average b. longest c. s$ortest d. none of the above +0: 7n the _______ tree approach8 each router needs to have one shortest path tree for each group.
a. groupshared b. source-based c. a or b d. none of the above +: 7n the groupshared tree approach8 _________ involved in multicasting. a. only t$e core router is b. all routers are c. only some routers are d. none of the above +4: ulticast lin$ state routing uses the _______ tree approach. a. source-based b. groupshared c. a or b d. none of the above +5: The ulticast
-1: _________ broadcasts pac$ets8 but creates loops in the systems. a. "orwarding b. !looding c. 'ac$warding d. none of the above -2: 7n )P"8 a router forwards only the copy that has traveled the _______ path from the source to the router. a. s$ortest b. longest
c. average d. none of the above
-!: )P" eliminates the ________ in the flooding process. a. forwarding b. bac$warding c. flooding d. none of t$e abo%e -+: )P" guarantees that each networ$ receives only ____ of the multicast pac$et. a. one copy b. two copies c. a or b d. none of t$e abo%e --: )P' creates a shortest path _______ tree from the source to each destination. a. unicast b. multicast c. broadcast d. none of the above -0: )P' guarantees that each destination receives _________ of the pac$et. a. one copy b. no copies c. multiple copies d. none of the above
-: 7n ________8 the multicast pac$et must reach only those networ$s that have active members for that particular group. a. )P" b. )P' c. RPM d. none of the above -4: _______ adds pruning and grafting to _______ to create a multicast shortest path tree that supports dynamic membership changes. a. RPM1 RPB b. )P'B )P c. )P": )P
d. none of the above -5: __________ is an implementation of multicast distance vector routing. 7t is a sourcebased routing protocol8 based on )7P. a.
0!: A _______ message tells an upstream router to start sending multicast messages for a specific group through a specific router. a. weed b. graft c. prune d. none of the above 0+: ('T is a ________ protocol that uses a core as the root of the tree. a. sourcebased b. group-s$ared c. a or b d. none of the above
0-: P7* is used in a _______ multicast environment8 such as a >A9. a. dense b. sparse c. a or b d. none of the above 00: P7S is used in a _______multicast environment such as a A9. a. dense b. sparse c. a or b d. none of the above 0: 7n _______8 a logical tunnel is established by encapsulating the multicast pac$et inside a unicast pac$et. a. ;97'<9 b. ;>T'<9 c. MB*NE d. none of the above
"2APER ,3 1:
2: ;*P is called a ________________transport protocol. a. connectionless8 reliable b. connectionoriented8 unreliable c. connectionless@ unreliable d. none of the above !: ;*P does not add anything to the services of 7P e3cept for providing _______ communication. a. nodetonode b. process-to-process c. hosttohost d. none of the above +: ;*P is an acronym for _______. a. ;ser *elivery Protocol
b. ;ser *atagram Procedure c. ser /atagram Protocol d. none of the above -: Although there are several ways to achieve processtoprocess communication8 the most common is through the __________ paradigm. a. client-ser%er b. clientclient c. serverserver d. none of the above 0: The local host and the remote host are defined using 7P addresses. To define the processes8 we need second identifiers called ____________. a. ;*P addresses b. transport addresses c. port addresses d. none of the above : The ports ranging from +581-2 to 0-8-!- can be used as temporary or private port numbers. They are called the ________ ports. a. well$nown b. registered c. dynamic d. none of the above
4: 7n the sending computer8 ;*P receives a data unit from the _______ layer. a. application b. transport c. 7P d. none of the above 5: 7n the sending computer8 ;*P sends a data unit to the _______ layer. a. application b. transport c. IP d. none of the above 16: ;*P and T(P are both _______ layer protocols. a. data lin$ b. networ$ c. transport
d. none of the above 11: hich of the following functions does ;*P perform/ a. process-to-process communication b. hosttohost communication c. endtoend reliable data delivery d. none of the above 12: hen the 7P layer of a receiving host receives a datagram8 _______. a. delivery is complete b. a transport layer protocol ta)es o%er c. a header is added d. none of the above 1!: ;*P needs the _______ address to deliver the user datagram to the correct application process. a. port b. application c. internet d. none of the above 1+: A port address in ;*P is _______bits long. a. 4 b. +0 c. !2 d. any of the above 1-: hich of the following does ;*P guarantee/ a. flow control b. connectionoriented delivery c. flow control d. none of t$e abo%e 10: The source port address on the ;*P user datagram header defines _______. a. the sending computer b. the receiving computer c. t$e process running on t$e sending computer d. none of the above 1: The combination of an 7P address and a port number is called a ____________. a. transport address b. networ$ address c. soc)et address d. none of the above
14: To use the services of ;*P8 we need ________ soc$et addresses. a. four b. t(o c. three d. none of the above 15: ;*P pac$ets are called __________. a. user datagrams b. segments c. frames d. none of the above 26: ;*P pac$ets have a fi3edsi,e header of _______ bytes. a. 10 b. c. +6 d. none of the above 21: ;*P pac$ets are encapsulated in ___________. a. an thernet frame b. an T(P segment c. an IP datagram d. none of the above
22: ;*P uses ________ to handle outgoing user datagrams from multiple processes on one host. a. flow control b. multiplexing c. demultiple3ing d. none of the above 2!: ;*P uses _______ to handle incoming user datagrams that go to different processes on the same host. a. flow control b. multiple3ing c. demultiplexing d. none of the above 2+: T(P is a __________protocol. a. stream-oriented b. messageoriented c. bloc$oriented d. none of the above
2-: T(P allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes. a. messageB message b. stream1 stream c. bloc$B bloc$ d. none of the above 20: 'ecause the sending and the receiving processes may not write or read data at the same speed8 T(P ________. a. speeds up the slower process b. slows down the faster process c. uses buffers d. none of the above 2: T(P groups a number of bytes together into a pac$et called a ___________. a. user datagram b. segment c. datagram d. none of the above
24: T(P is a ___________ protocol. a. connection-oriented b. connectionless c. both a and b d. none of the above 25: T(P is a%n& _______ transport protocol. a. unreliable b. besteffort delivery c. reliable d. none of the above !6: T(P uses _________________ to chec$ the safe and sound arrival of data. a. an ac)no(ledgment mec$anism b. outofband signalling c. the services of another protocol d. none of the above !1: The bytes of data being transferred in each connection are numbered by T(P. The numbering starts with a __________________. a. 6
b. 1 c. randomly generated number d. none of the above !2: T(P assigns a se#uence number to each segment that is being sent. The se#uence number for each segment is the number of the _______ byte carried in that segment. a. first b. last c. middle d. none of the above !!: (ommunication in T(P is ___________. a. simple3 b. halfduple3 c. full-duplex d. none of the above
!+: The value of the ac$nowledgment field in a segment defines the number of the ______byte a party e3pects to receive. a. first b. last c. next d. none of the above !-: The ac$nowledgment number is ________. a. independent b. randomly generated c. cumulati%e d. none of the above !0: The value of the window si,e is determined by _________. a. the sender b. t$e recei%er c. both the sender and receiver d. none of the above !: The inclusion of the chec$sum in the T(P segment is ________. a. optional b. mandatory
c. at the discretion of the application program d. none of the above !4: A T(P segment is encapsulated in __________. a. an IP datagram b. an thernet frame c. a ;*P user datagram d. none of the above !5: (onnection establishment in T(P is called __________ handsha$ing. a. twoway b. fourway c. oneway d. none of t$e abo%e +6: A SM9 segment cannot carry dataB it consumes _____ se#uence number%s&. a. no b. one c. two d. none of the above +1: A SM9 I A(D segment cannot carry dataB it consumes _____ se#uence number%s&. a. no b. three c. two d. none of t$e abo%e +2: An A(D segment8 if carrying no data8 consumes ______ se#uence number%s&. a. no b. one c. two d. none of the above +!: The connection establishment procedure in T(P is susceptible to a serious security problem called the _________ attac$. a. A(D flooding b. "79 flooding c. SKN flooding d. none of the above ++: The SM9 flooding attac$ belongs to a group of security attac$s $nown as a _____ attac$. a. denial of ser%ice b. replay c. maninthe middle
d. none of the above +-: The "79 segment consumes ____ se#uence numbers if it does not carry data. a. two b. three c. no d. none of t$e abo%e +0: The "79 I A(D segment consumes _____ se#uence number%s& if it does not carry data. a. two b. three c. one d. none of the above +: 7n T(P8 one end can stop sending data while still receiving data. This is called a ______. a. $alf-close b. halfopen c. oneway termination d. none of the above
+4: A%n& _________ machine is a machine that goes through a limited number of states. a. infinite state b. finite state c. both a and b d. none of the above +5: __________ control regulates the amount of data a source can send before receiving an ac$nowledgment from the destination. a. rror b. !lo( c. (ongestion d. none of the above -6: To accomplish flow control8 T(P uses a ___________ window protocol. a. limitedsi,e b. sliding c. fi3edsi,e d. none of the above -1: T(P sliding windows are __________ oriented. a. pac$et b. segment c. byte
d. none of the above -2: A(D segments consume _______ se#uence number%s& and _______ ac$nowledged. a. no1 are not b. oneB are not c. noB are d. none of the above -!: T(P delivers _______ outoforder segments to the process. a. all b. no c. some d. none of the above -+: 7P is responsible for _______ communication while T(P is responsible for _______ communication. a. $ost-to-$ost1 process-to-process b. processtoprocessB hosttohost c. processtoprocessB networ$tonetwor$ d. none of the above --: 7f a segment carries data along with an ac$nowledgment8 this is called _______. a. bac$pac$ing b. piggybac)ing c. piggypac$ing d. none of the above -0: ultiply the header length field by _______ to find the total number of bytes in the T(P header. a. 2 b. = c. 0 d. none of the above -: ;rgent data re#uires the urgent pointer field as well as the ;) bit in the _______ field. a. control b. offset c. se#uence number d. none of the above -4: The options field of the T(P header ranges from 6 to _______ bytes. a. 16 b. 26 c. => d. none of the above
-5: 7f the A(D value is 2668 then byte _______ has been received successfully. a. +CC b. 266 c. 261 d. none of the above 06: Stream (ontrol Transmission Protocol %S(TP& is a new _____________protocol. a. reliable8 characteroriented b. reliable@ message-oriented c. unreliable8 messageoriented d. none of the above 01: S(TP allows __________ service in each association. a. single stream b. multistream c. double stream d. none of the above 02: S(TP association allows _____________ for each end. a. only one 7P address b. multiple IP addresses c. only two 7P address d. none of the above 0!: 7n S(TP8 a data chun$ is numbered using ________. a. a SN b. an S7 c. an SS9 d. none of the above 0+: To distinguish between different streams8 S(TP uses ___________. a. a TS9 b. an SI c. an SS9 d. none of the above 0-: To distinguish between different data chun$s belonging to the same stream8 S(TP uses ___________. a. TS9s b. S7s c. SSNs d. none of the above 00: T(P has ____________B S(TP has ____________.
a. pac$etsB segments b. segments1 pac)ets c. segmentsB frames d. none of the above 0: The control information in S(TP is included in the ________. a. header control field b. control c$un)s c. data chun$s d. none of the above 04: An S(TP pac$et can carry __________. a. only one data chun$ b. se%eral data c$un)s c. no data chun$s d. none of the above
05: 7n S(TP8 the ac$nowledgment number and window si,e are part of each ________. a. data chun$ b. control c$un) c. a or b d. none of the above 6: There is no need for a header length field in S(TP because ________________. a. there are no options in the general header b. the si,e of the header is fi3ed c. bot$ a and b d. none of the above 1: The chec$sum in S(TP is ________ bits. a. 10 b. 3, c. 0+ d. none of the above 2: The association identifier in S(TP is __________________. a. a uni6ue %erification tag b. a combination of logical and port addresses c. either a or b d. none of the above !: 7n S(TP8 control information and data information are carried in _______ chun$s. a. the same chun$
b. different c$un)s c. either a or b d. none of the above +: 7n S(TP8 ac$nowledgment numbers are used to ac$nowledge _____________. a. both data chun$s and control chun$s b. only control chun$s c. only data c$un)s d. none of the above -: 7n an S(TP pac$et8 control chun$s come ___________ data chun$s. a. after b. before c. a or b d. none of the above
0: 7n S(TP8 ___________ can be carried in a pac$et that carries an 797T chun$. a. only data chun$s b. only control chun$s c. no ot$er c$un) d. none of the above : A connection in S(TP is called an ____________. a. negotiation b. association c. transmission d. none of the above
"2APER ,= 1: 7n ________ we try to avoid traffic congestion. a. congestion control b. #uality of service c. either %a& or %b& d. both %a& and %b& 2: 7n _________8 we try to create an appropriate environment for the traffic. a. congestion control b. 6uality of ser%ice c. either %a& or %b& d. both %a& and %b&
!: Traffic ______ are #ualitative values that represent a data flow. a. controls b. descriptors c. values d. none of the above +: The _______ defines the ma3imum data rate of the traffic. a. pea) data rate b. ma3imum burst si,e c. effective bandwidth d. none of the above
-: The________ normally refers to the ma3imum length of time the traffic is generated at the pea$ rate. a. pea$ data rate b. maximum burst si5e c. effective bandwidth d. none of the above 0: The ________ is a function of three values: average data rate8 pea$ data rate8 and ma3imum burst si,e. a. pea$ data rate b. ma3imum burst si,e c. effecti%e band(idt$ d. none of the above : A _________ traffic model has a data rate that does not change. a. constant bit rate b. variable bit rate c. bursty d. none of the above 4: 7n the ________ traffic model8 the rate of the data flow changes in time8 with the changes smooth instead of sudden and sharp. a. constant bit rate b. %ariable bit rate c. bursty d. none of the above
5: 7n the ______ traffic model8 the data rate changes suddenly in a very short time. a. constant bit rate b. variable bit rate c. bursty d. none of the above 16: _______ happens in any system that involves waiting. a. "ongestion b. Namming c. rror d. none of the above
11: (ongestion in a networ$ or internetwor$ occurs because routers and switches have _______. a. tables b. 6ueues c. crosspoints d. none of the above 12: 7n a networ$8 when the load is much less than the capacity of the networ$8 the delay is _________. a. at a ma3imum b. at a minimum c. constant d. none of the above 1!: 7n a networ$8 when the load reaches the networ$ capacity8 the delay _______. a. increases s$arply b. decreases sharply c. remains constant d. cannot be predicted 1+: 7n a networ$8 when the load is below the capacity of the networ$8 the throughput ______________. a. increases sharply b. increases proportionally (it$ t$e load c. declines sharply d. declines proportionally with the load
1-: 7n a networ$8 after the load reaches the capacity8 throughput _______. a. increases sharply b. increases proportionally with the load
c. declines s$arply d. declines proportionally with the load 10: 7n ________ congestion control8 policies are applied to prevent congestion before it happens. a. open-loop b. closedloop c. either %a& or %b& d. neither %a& nor %b&
1: 7n _______ congestion control8 mechanisms are used to alleviate congestion after it happens. a. openloop b. closed-loop c. either %a& or %b& d. neither %a& nor %b& 14: The techni#ue of ________refers to a congestion control mechanism in which a congested node stops receiving data from the immediate upstream node or nodes. a. bac)pressure b. cho$e pac$et c. implicit signaling d. e3plicit signaling 15: A ___________ is a pac$et sent by a node to the source to inform it of congestion. a. bac$pressure b. c$o)e pac)et c. implicit signaling d. e3plicit signaling 26: 7n __________8 there is no communication between the congested node or nodes and the source. The source guesses that there is a congestion somewhere in the networ$ from other symptoms. a. bac$pressure b. cho$e pac$et c. implicit signaling d. e3plicit signaling 21: 7n the __________ method8 the signal is included in the pac$ets that carry data. a. bac$pressure b. cho$e pac$et c. implicit signaling d. explicit signaling
22: 7n the ________ algorithm of T(P8 the si,e of the congestion window increases e3ponentially until it reaches a threshold. a. slo(-start b. congestion avoidance c. congestion detection d. none of the above
2!: 7n the _________ algorithm of T(P8 the si,e of the congestion window increases additively until congestion is detected. a. slowstart b. congestion a%oidance c. congestion detection d. none of the above 2+: 7n the ___________ algorithm of T(P8 the si,e of the threshold is dropped to onehalf8 a multiplicative decrease. a. slowstart b. congestion avoidance c. congestion detection d. none of the above 2-: 7n "rame )elay8 the ________ bit warns the sender of congestion in the networ$. a. BE"N b. "(9 c. either %a& or %b& d. neither %a& nor %b& 20: 7n "rame )elay8 the ________ bit is used to warn the receiver of congestion in the networ$. a. '(9 b. !E"N c. either %a& or %b& d. neither %a& nor %b& 2: Traditionally8 ________types of characteristics are attributed to a flow. a. two b. three c. four d. five 24: _________ is a characteristic that a flow needs. >ac$ of it means losing a pac$et or ac$nowledgment8 which entails retransmission. a. Reliability b. *elay
c. Nitter d. 'andwidth
25: _______ is a flow characteristic that applications can tolerate in different degrees. a. )eliability b. /elay c. Nitter d. 'andwidth !6: ________ is the variation in delay for pac$ets belonging to the same flow. a. )eliability b. *elay c. Litter d. 'andwidth !1: 7n ________8 #ueuing pac$ets wait in a buffer %#ueue& until the node %router or switch& is ready to process them. a. !I!* b. priority c. weighted fair d. none of the above !2: 7n ________ #ueuing8 pac$ets are first assigned to a priority class. ach class has its own #ueue. a. "7"< b. priority c. weighted fair d. none of the above !!: 7n _________ #ueuing8 the pac$ets are assigned to different classes and admitted to different #ueues. The #ueues8 however8 are weighted based on the priority of the #ueuesB higher priority means a higher weight. The system processes pac$ets in each #ueue in a roundrobin fashion with the number of pac$ets selected from each #ueue based on the corresponding weight. a. "7"< b. priority c. (eig$ted fair d. none of the above !+: 7n the ______ buc$et algorithm8 bursty chun$s are stored in the buc$et and sent out at an average rate.
a. lea)y b. to$en c. either %a& or %b& d. neither %a& nor %b& !-: The _______ buc$et algorithm allows idle hosts to accumulate credit for the future in the form of to$ens. a. lea$y b. to)en c. either %a& or %b& d. neither %a& nor %b& !0: 7n _________8 when a source ma$es a reservation8 it needs to define a flow specification. a. Integrated Ser%ices b. *ifferentiated Services c. (onnectionless d. (onnection
send during a predefined time. a. access rate b. committed burst si,e c. committed information rate d. excess burst si5e +2: 7n AT8 the _________ class is designed for customers who need realtime audio or video services. The service is similar to that provided by a dedicated line such as a T line. a. "BR b. G') c. A') d. ;') +!: 7n AT8 the _________ class is divided into two subclasses: realtime %G'))T& and nonrealtime %G')9)T&. G'))T is designed for those users who need realtime services %such as voice and video transmission& and use compression techni#ues to create a variable bit rate. G')9)T is designed for those users who do not need realtime services but use compression techni#ues to create a variable bit rate. a. (') b. BR c. A') d. ;') ++: 7n AT8 the _________ class delivers cells at a minimum rate. 7f more networ$ capacity is available8 this minimum rate can be e3ceeded. a. (') b. G') c. ABR d. ;') +-: 7n AT8 the _________ class is a besteffort delivery service that does not guarantee anything. a. (') b. G') c. A') d. BR
"2APER ,7 1: 7n a _______ name space8 a name is assigned to an address. A name in this space is a se#uence of characters without structure. a. flat b. hierarchical c. organi,ed
d. none of the above
2: 7n a _________name space8 each name is made of several parts. a. flat b. $ierarc$ical c. organi,ed d. none of the above !: To have a hierarchical name space8 a ______________ was designed. a. domain space b. domain name c. domain name space +: 7n the *9S8 the names are defined in ___________ structure. a. a linear list b. an in%erted-tree c. a graph d. none of the above -: ach node in the tree has a _______8 which is a string with a ma3imum of ___ characters. a. labelB 12 b. nameB 2-c. label1 03 d. none of the above 0: The root of the *9S tree is _______. a. a string of characters b. a string of 0! characters c. an empty string d. none of the above : A full domain name is a se#uence of labels separated by ________. a. semicolons b. dots c. colons d. none of the above 4: 7f a label is terminated by a null string8 it is called a __________. a. PJ*9 b. !/N c. SJ*9 d. none of the above
5: 7f a label is not terminated by a null string8 it is called a __________. a. P/N b. "J*9 c. SJ*9 d. none of the above 16: A _________ is a subtree of the domain name space. a. label b. name c. domain d. none of the above 11: hat a server is responsible for or has authority over is called a _________. a. domain b. label c. 5one d. none of the above 12: A _______ is a server whose ,one consists of the whole tree. a. domain server b. ,one server c. root ser%er d. none of the above 1!: A ________ server loads all information from the dis$ file. a. primary b. secondary c. ,one d. none of the above 1+: A ________ server loads all information from the primary server. a. primary b. secondary c. ,one d. none of the above 1-: hen the secondary downloads information from the primary8 it is called ______ transfer. a. domain b. 5one c. label d. none of the above
10: 7n the 7nternet8 the domain name space %tree& is divided into _______ different sections: a. t$ree b. two c. four d. none of the above 1: The _______ domains define registered hosts according to their generic behavior. a. generic b. country c. inverse d. none of the above 14: The first level in the generic domains section allows ______ possible labels. a. 16 b. 12 c. 10 d. none of t$e abo%e 15: The ____________ domain section uses twocharacter country abbreviations. a. generic b. country c. inverse d. none of the above 26: The _________ domain is used to map an address to a name. a. generic b. country c. in%erse d. none of the above 21: 7n __________ resolution8 the resolver e3pects the server to supply the final answer. a. iterative b. recursi%e c. straight d. none of the above 22: 7n __________ resolution8 the server returns the 7P address of the server that it thin$s can resolve the #uery. a. iterati%e b. recursive c. straight d. none of the above
2!: 7n the domain name EiF chal.atc.fhda.edu E@iF8 _______ is the least specific label. a. chal b. atc c. edu d. none of the above 2+: 7n the domain name EiF chal.atc.fhda.edu E@iF8 _______ is the most specific label. a. c$al b. atc c. fhda d. none of the above 2-: A host with the domain name EiF pit.arc.nasa.gov E@iF. is on the _______ level of the *9S hierarchical tree. %The root is level one.& a. third b. fourth c. fift$ d. none of the above 20: A pointer #uery involves the _______ domain. a. in%erse b. reverse c. root d. none of the above 2: *9S can use the services of ________ using the well$nown port -!. a. ;*P b. T(P c. eit$er ;a< or ;b< d. none of the above
"2APER ,0 1: T>9T is an abbreviation for ____________. a. terminal net(or) b. telephone networ$ c. telecommunication networ$ d. none of the above
2: T>9T is a ________ clientserver application program. a. specificpurpose b. general-purpose c. both a and b d. none of the above !: hen a user logs into a local timesharing system8 it is called ________ login. a. local b. remote c. temporary d. none of the above +: hen a user wants to access an application program or utility located on a remote machine8 he or she performs ___________ login. a. local b. remote c. temporary d. none of the above -: 9GT uses two sets of characters8 one for _____and one for __________. a. sendingB receiving b. re#uestB reply c. data1 control d. none of the above 0: "or data8 9GT uses ;S AS(77 characters with the highest order bit set to ______. a. 1 b. > c. a or b d. none of the above : "or control8 9GT uses ;S AS(77 characters with the highest order bit set to ______. a. + b. 6 c. a or b d. none of the above 4: T>9T uses only one T(P connection. The server uses ________ port and the client uses ________ port. a. a well$nownB another well$nown b. an ephemeralB another ephemeral c. a (ell-)no(n1 an ep$emeral d. none of the above
5: To distinguish data from control characters8 each se#uence of control characters is preceded by a special control character called ________. a. 7(A b. IA" c. A7( d. none of the above 16: 7n the _______ mode8 the echoing is done by the client. a. default b. character c. line d. none of the above 11: 7n the _______ mode8 each character typed is sent by the client to the server. a. default b. c$aracter c. line d. none of the above 12: 7n the ____ mode8 line editing %echoing8 character erasing8 line erasing8 and so on& is done by the client. a. default b. character c. line d. none of the above 1!: The _______ is software residing on the remote system that allows the remote system to receive characters from a T>9T server. a. terminal driver b. pseudoterminal dri%er c. T>9T client d. none of the above 1+: The _______ translates local characters into 9GT form. a. terminal driver b. E&NE client c. T>9T server d. none of the above
1-: The _______ translates 9GT characters into a form acceptable by the remote operating system.
a. terminal driver b. T>9T client c. E&NE ser%er d. none of the above 10: 7f the sender wants to disable an option8 it sends a _______ command. a. 7>> b. *< c. '*N d. none of the above 1: 7f the sender wants to enable an option8 it sends a _______ command. a. 'I&& b. *< c. <9T d. none of the above 14: 7f the sender wants an option disabled by the receiver8 it sends a _______ command. a. 7>> b. *< c. /*N d. none of the above 15: 7f the sender wants an option enabled by the receiver8 it sends a _______ command. a. 7>> b. /* c. <9T d. none of the above 26: _______ is the standard mechanism provided by T(P@7P for copying a file from one host to another. a. T>9T b. STP c. T"TP d. none of t$e abo%e 21: "TP uses the services of ________. a. ;*P b. 7P c. "P d. none of the above 22: 7n "TP8 the well$nown port ____ is used for the control connection and the well$nown port ________ for the data connection. a. 21B 22
b. ,+1 ,> c. 26B 21 d. none of the above 2!: 7n "TP8 _______ is the service type used by the 7P protocol because this is an interactive connection between a user %human& and a server. a. ma3imi,e throughput b. minimi5e delay c. minimi,e error d. none of the above 2+: "or the control connection8 "TP uses the __________ character set a. regular AS(77 b. '(*7( c. N AS"II d. none of the above 2-: *uring an "TP session the control connection is opened _______. a. exactly once b. e3actly twice c. as many times as necessary d. none of the above 20: *uring an "TP session the data connection is opened _______. a. e3actly once b. e3actly twice c. as many times as necessary d. none of the above 2: 7n "TP8 a file can be organi,ed into records8 pages8 or a stream of bytes. These are types of an attribute called _______. a. file types b. data structures c. transmission modes d. none of the above 24: 7n "TP8 there are three types of _______: stream8 bloc$8 and compressed. a. file types b. data structures c. transmission modes d. none of the above 25: 7n "TP8 AS(778 '(*7(8 and image define an attribute called _______. a. file type
b. data structure c. transmission mode d. none of the above !6: 7n "TP8 when we _______8 it is copied from the server to the client. a. retrieve a file b. retrieve a list c. a and c d. none of the above !1: 7n "TP8 when we _______8 it is copied from the client to the server. a. retrieve a file b. store a file c. retrieve a list d. none of the above !2: ________ is part of a local hard drive8 a special file with permission restrictions. a. A message b. A response c. An agent d. None of t$e abo%e !!: hen the sender and the receiver of an email are on the same system8 we need only ___________. a. one ;A b. t(o As c. one ;A and one TA d. none of the above !+: hen the sender and the receiver of an email are on different systems8 we need only _____________. a. one TA b. two ;As c. t(o As and one pair of MAs d. none of the above
!-: hen the sender is connected to the mail server via a >A9 or a A98 we need ______________. a. two TA b. t(o As and t(o pairs of MAs c. two ;As and a pair of TAs
d. none of the above !0: hen both sender and receiver are connected to a mail server via a >A9 or a A98 we need ___________________. a. t(o As@ t(o pairs of MAs@ and a pair of MAAs b. two ;As8 and two pairs of TAs c. two ;As8 two pairs of TAs8 and two pairs of AAs d. none of the above !: ________ provides service to the user to ma$e the process of sending and receiving a message easier. a. An TA b. An AA c. A A d. none of the above !4: hich of the following services is not provided by a ;A/ a. composing messages b. reading messages c. replying messages d. all are !5: There are two types of user agents: _________ and ___________. a. commanddrivenB datadriven b. command-dri%en1 HI-based c. commandbased and databased d. none of the above +6: The ________ usually contains the sender address8 the receiver address8 and other information. a. message b. en%elope c. both a and b d. none of the above
+1: The message contains the ________ and the __________. a. headerB envelop b. $eader1 body c. envelopB body d. none of the above +2: 7n the 7nternet8 the email address consists of two parts: a _______ and a _______.
a. local part1 domain name b. global partB domain name c. labelB domain name d. none of the above +!: _________ is a supplementary protocol that allows nonAS(77 data to be sent through email. a. NP b. P c. MIME d. none of the above ++: The actual mail transfer is done through ____________. a. ;As b. MAs c. AAs d. none of the above +-: The formal protocol that defines the TA client and server in the 7nternet is called ___________. a. SMP b. S9P c. T>9T d. none of the above +0: The process of transferring a mail message occurs in ________ phases. a. two b. four c. five d. none of t$e abo%e
+: STP is a __________protocol. a. pull b. pus$ c. both a and b d. none of the above +4: The third stage in an email transfer needs a ________ protocol. a. pull b. push c. both a and b
d. none of the above +5: The third stage in an email transfer uses a%n& ________ protocol. a. ;A b. TA c. MAA d. none of the above -6: (urrently two message access protocols are available: _______ and _________. a. P
"2APER ,8 1: _________ is a repository of information lin$ed together from points all over the world. a. $e ''' b. CTTP c. CT> d. none of the above 2: The today is a _______ clientserver service8 in which a client using a browser can access a service using a server. a. limited
b. vast c. distributed d. none of the above !: The _________ is a standard for specifying any $ind of information on the 7nternet. a. R& b. ;>) c. )>; d. none of the above +: 7n a ;)>8 the _______ is the clientserver program used to retrieve the document. a. path b. protocol c. host d. none of the above -: 7n a ;)>8 the ______ is the computer on which the information is located. a. path b. protocol c. $ost d. none of the above 0: 7n a ;)>8 an optional ________ can be inserted between the host and the path8 and it is separated from the host by a colon. a. path b. protocol c. host d. none of t$e abo%e
: 7n a ;)>8 the _______ is the full name of the file where the information is located. a. pat$ b. protocol c. host d. none of the above 4: A coo$ie is made by the ________ and eaten by the _________. a. clientB client b. clientB server c. ser%er1 ser%er d. none of the above
5: The documents in the can be grouped into ______ broad categories. a. two b. t$ree c. four d. none of the above 16: A _______ document is a fi3edcontent document that is created and stored in a server. The client can get a copy of the document only. a. static b. dynamic c. active d. none of the above 11: _____________ is a language for creating eb pages. a. CTTP b. 2M& c. "TTP d. none of the above 12: A _______ document is created by a eb server whenever a browser re#uests the document. a. static b. dynamic c. active d. none of the above 1!: ___________ is a technology that creates and handles dynamic documents. a. 7( b. "HI c. (7 d. none of the above 1+: *ynamic documents are sometimes referred to as _________ dynamic documents. a. clientsite b. ser%er-site c. both a and b d. none of the above 1-: "or many applications8 we need a program or a script to be run at the client site. These are called _______________ documents. a. static b. dynamic c. acti%e d. none of the above
10:
2!: 7n CTTP8 a _______ server is a computer that $eeps copies of responses to recent re#uests. a. regular b. proxy c. both a and b d. none of the above 2+: An CTTP re#uest message always contains _______. a. a header and a body b. a re6uest line and a $eader c. a status line8 a header8 and a body d. none of the above 2-: hich of the following is present in both an CTTP re#uest line and a status line/ a. 2P %ersion number b. ;)> c. status code d. none of the above 20: The CTTP re#uest line contains a _______ method to re#uest a document from the server. a. HE b. P
b. an acti%e c. a passive d. a dynamic
"2APER , 1: S9P defines the ___________________ to be sent from a manager to an agent and vice versa. a. format of t$e pac)ets b. encoding of the pac$ets c. number of pac$ets d. none of the above 2: A manager is a host that runs the S9P _______ process. a. client b. server c. both a and b d. none of the above !: An agent is a host or computer that runs the S9P _______ process. a. client b. ser%er c. both a and b d. none of the above
+: S9P uses two other protocols:________ and _________. a. 7'B STP b. SMI1 MIB c. "TPB S7 d. none of the above -: ________ defines the general rules for naming obKects8 defining obKect types8 and showing how to encode obKects and values. a. 7' b. ') c. SMI d. none of the above 0: e can compare the tas$ of networ$ management to the tas$ of writing a program. 'oth tas$s need rules. 7n networ$ management this is handled by ___________. a. S9P
b. 7' c. SMI d. none of the above : e can compare the tas$ of networ$ management to the tas$ of writing a program. 'oth tas$s need variable declarations. 7n networ$ management this is handled by _________. a. S9P b. MIB c. S7 d. none of the above 4: e can compare the tas$ of networ$ management to the tas$ of writing a program. 'oth tas$s have actions performed by statements. 7n networ$ management this is handled by _______. a. SMNP b. 7' c. S7 d. none of the above 5: S7 emphasi,es three attributes to handle an obKect: _____8 ________8 and _________. a. nameB data typeB si,e b. nameB si,eB encoding method c. name1 data type1 encoding met$od d. none of the above
16: To name obKects globally8 S7 uses an obKect identifier8 which is a hierarchical identifier based on a _______ structure a. linear b. tree c. graph d. none of the above 11: All obKects managed by S9P are given an obKect identifier. The obKect identifier always starts with _______. a. +.3.0.+.,.+ b. 1.!.0.1.2.2 c. 1.!.0.1.2.! d. none of the above
12: To define the data type8 S7 uses fundamental _______ definitions and adds some new definitions. a. AS.1 b. ASN.+ c. AS9.2
d. none of the above 1!: S7 has two broad categories of data type: _______ and _______. a. simpleB comple3 b. simple1 structured c. structuredB unstructured d. none of the above 1+: The _______ data types are atomic data types. a. structure b. simple c. both a and b d. none of the above 1-: S7 defines two structured data types: ________ and _________. a. se#uenceB atomic b. se6uence1 se6uence of c. a se#uence ofB array d. none of the above
10: S7 uses another standard8 ___________8 to encode data to be transmitted over the networ$. a. 7' b. A9S.1 c. BER d. none of the above 1: The _________ ordering enables a manager to access a set of variables one after another by defining the first variable. a. lexicograp$ic b. linear c. nonlinear d. none of the above 14: The et)e#uest P*; is sent from the _______ to the __________ to retrieve the value of a variable or a set of variables. a. client1 ser%er b. serverB client c. serverB networ$ d. none of the above
15: The )esponse P*; is sent from the ______ to the ______ in response to et)e#uest or et9e3t)e#uest. a. ser%er1 client b. clientB server c. networ$B host d. none of the above 26: The Trap P*; is sent from the ______ to the _______ to report an event. a. ser%er1 client b. clientB server c. networ$B host d. none of the above 21: S9P uses the services of ;*P on two well$nown ports8 _______ and _______. a. +0+1 +0, b. 106B 101 c. 106B 102 d. none of the above
22: _______ runs the S9P client programB _______ runs the S9P server program. a. A managerB a manager b. An agentB an agent c. A manager1 an agent d. An agentB a manager 2!: 79T)8 <(TT ST)798 and
c. a and b d. none of the above 20: "or a 1byte length field8 what is the ma3imum value for the data length/ a. +,8 b. 124 c. 2-d. none of the above 2: An obKect id defines a _______. Add a ,ero suffi3 to define the _______. a. variableB table b. tableB variable c. %ariable1 %ariable contents d. none of the above 24: An S9P agent can send _______ messages. a. et)e#uest b. SetRe6uest c. rap d. none of the above
25: An S9P agent can send _______ messages. a. Response b. et)e#uest c. Set)e#uest d. none of the above !6: The _______ field in the S9P P*; is an offset that points to the variable in error. a. community b. enterprise c. error index d. none of the above !1: The _______ field in the S9P P*; reports an error in a response message. a. community b. enterprise c. error status d. none of the above !2: The _______ field in the S9P P*; consists of a se#uence of variables and their corresponding values. a. version b. community
c. arBind&ist
"2APER ,C 1: e can divide audio and video services into _______ broad categories. a. t$ree b. two c. four d. none of the above 2: ________ audio@video refers to ondemand re#uests for compressed audio@video files. a. Streaming live b. Streaming stored c. 7nteractive d. none of the above
!: ___________ audio@video refers to the broadcasting of radio and TG programs through the 7nternet. a. 7nteractive b. Streaming li%e c. Streaming stored d. none of the above +: _________ audio@video refers to the use of the 7nternet for interactive audio@video applications. a. Interacti%e b. Streaming live c. Streaming stored d. none of the above -: According to the 9y#uist theorem8 we need to sample an analog signal ________times the highest fre#uency. a. three b. t(o c. four d. none of the above 0: 7n ________ encoding8 the differences between the samples are encoded instead of encoding all the sampled values. a. predicti%e
b. perceptual c. both a and b d. none of the above : __________ encoding is based on the science of psychoacoustics8 which is the study of how people perceive sound. a. Predictive b. Perceptual c. both a and b d. none of the above 4: ____________ is used to compress images. a. P b. LPEH c. either a or b d. none of the above
5: ____________ is used to compress video. a. MPEH b. NP c. either a or b d. none of the above 16: The first phase of NP is ___________. a. /" transformation b. #uanti,ation c. data compression d. none of the above 11: The second phase of NP is ___________. a. *(T transformation b. 6uanti5ation c. data compression d. none of the above 12: The third phase of NP is ___________. a. *(T transformation b. #uanti,ation c. data compression d. none of the above 1!: Nitter is introduced in realtime data by the _______________. a. error caused during transmission
b. delay bet(een pac)ets c. both a and b d. none of the above 1+: To prevent _________8 we can timestamp the pac$ets and separate the arrival time from the playbac$ time. a. error b. itter c. either a or b d. none of the above 1-: A ________buffer is re#uired for realtime traffic. a. playbac) b. reordering c. sorting d. none of the above 10: A __________on each pac$et is re#uired for realtime traffic. a. timestamp b. se#uence number c. bot$ a and b d. none of the above 1: )ealtime traffic needs the support of ____________. a. broadcasting b. multicasting c. both a and b d. none of the above 14: __________ means changing the encoding of a payload to a lower #uality to match the bandwidth of the receiving networ$. a. ranslation b. i3ing c. both a and b d. none of the above 15: __________ means combining several streams of traffic into one stream. a. Translation b. Mixing c. both a and b d. none of the above 26: _________ is not suitable for interactive multimedia traffic because it retransmits pac$ets in case of errors.
a. ;*P b. "P c. both a and b d. none of the above 21: __________ is the protocol designed to handle realtime traffic on the 7nternet. a. T(P b. ;*P c. RP d. none of the above 22: )TP uses a temporary evennumbered _______ port. a. /P b. T(P c. both a and b d. none of the above 2!: ___________ is a protocol for controlling the flow and #uality of data. a. )TP b. R"P c. ;*P d. none of the above 2+: )T(P uses an oddnumbered _______ port number that follows the port number selected for )TP. a. /P b. T(P c. both a and b d. none of the above 2-: ___________ is an application protocol that establishes8 manages8 and terminates a multimedia session a. )7P b. SIP c. *7P d. none of the above 20: _______ is a standard to allow telephones on the public telephone networ$ to tal$ to computers connected to the 7nternet. a. S7P b. 2.3,3 c. J.551 d. none of the above 2: A realtime video performance lasts 16 min. 7f there is Kitter in the system8 the viewer spends
_______ minutes watching the performance. a. less than 16 b. more t$an +> c. e3actly 16 d. none of the above 24: A _______ shows the time a pac$et was produced relative to the first or previous pac$et. a. timestamp b. playbac$ buffer c. se#uence number d. none of the above
25: _______ are used to number the pac$ets of a realtime transmission. a. Timestamps b. Playbac$ buffers c. Se6uence numbers d. none of the above !6: 7n a realtime video conference8 data from the server is _______ to the client sites. a. unicast b. multicast c. broadcast d. none of the above !1: A _______ adds signals from different sources to create a single signal. a. timestamp b. se#uence number c. mixer d. none of the above !2: A _______ changes the format of a highbandwidth video signal to a lower #uality narrowbandwidth signal. a. timestamp b. se#uence number c. translator d. none of the above !!: An )TP pac$et is encapsulated in _______. a. a /P user datagram
b. a T(P segment c. an 7P datagram d. none of the above !+: hen there is more than one source8 the _______ identifier defines the mi3er. a. sync$roni5ation source b. contributor c. timestamp d. none of the above
"2APER 3> 1: ________ is the science and art of transforming messages to ma$e them secure and immune to attac$s. a. "ryptograp$y b. (ryptoanalysis c. either %a& or %b& d. neither %a& nor %b& 2: The ________is the original message before transformation. a. cipherte3t b. plaintext c. secrette3t d. none of the above !: The ________ is the message after transformation. a. cip$ertext b. plainte3t c. secrette3t d. none of the above +: A%n& _______ algorithm transforms plainte3t to cipherte3t a. encryption b. decryption c. either %a& or %b& d. neither %a& nor %b& -: A%n& ______ algorithm transforms cipherte3t to plainte3t.
a. encryption b. decryption c. either %a& or %b& d. neither %a& nor %b& 0: A combination of an encryption algorithm and a decryption algorithm is called a ________. a. cip$er b. secret c. $ey d. none of the above : The _______ is a number or a set of numbers on which the cipher operates. a. cipher b. secret c. )ey d. none of the above 4: 7n a%n& ________ cipher8 the same $ey is used by both the sender and receiver. a. symmetric-)ey b. asymmetric$ey c. either %a& or %b& d. neither %a& nor %b& 5: 7n a%n& ________8 the $ey is called the secret $ey. a. symmetric-)ey b. asymmetric$ey c. either %a& or %b& d. neither %a& nor %b& 16: 7n a%n& ________ cipher8 a pair of $eys is used. a. symmetric$ey b. asymmetric-)ey c. either %a& or %b& d. neither %a& nor %b& 11: 7n an asymmetric$ey cipher8 the sender uses the__________ $ey. a. private b. public c. either %a& or %b& d. neither %a& nor %b& 12: 7n an asymmetric$ey cipher8 the receiver uses the ______ $ey. a. pri%ate b. public
c. either %a& or %b& d. neither %a& nor %b& 1!: A ________ cipher replaces one character with another character. a. substitution b. transposition c. either %a& or %b& d. neither %a& nor %b& 1+: _________ ciphers can be categori,ed into two broad categories: monoalphabetic and polyalphabetic. a. Substitution b. Transposition c. either %a& or %b& d. neither %a& nor %b& 1-: The _______ cipher is the simplest monoalphabetic cipher. 7t uses modular arithmetic with a modulus of 20. a. transposition b. additive c. s$ift d. none of the above 10: The (aesar cipher is a _______cipher that has a $ey of !. a. transposition b. additive c. s$ift d. none of the above 1: The ________ cipher reorders the plainte3t characters to create a cipherte3t. a. substitution b. transposition c. either %a& or %b& d. neither %a& nor %b& 14: A%n& ______ is a $eyless substitution cipher with EiF9E@iF inputs and EiFE@iF outputs that uses a formula to define the relationship between the input stream and the output stream. a. S-box b. Pbo3 c. Tbo3 d. none of the above 15: A%n& _______is a $eyless transposition cipher with EiF9E@iF inputs and EiFE@iF outputs that uses a table to define the relationship between the input stream and the output stream.
a. Sbo3 b. P-box c. Tbo3 d. none of the above 26: A modern cipher is usually a comple3 _____cipher made of a combination of different simple ciphers. a. round b. circle c. s#uare d. none of the above
21: *S is a%n& ________ method adopted by the ;.S. government. a. symmetric-)ey b. asymmetric$ey c. either %a& or %b& d. neither %a& nor %b& 22: *S has an initial and final permutation bloc$ and _________ rounds. a. 1+ b. 1c. +0 d. none of the above 2!: The *S function has _______ components. a. 2 b. ! c. = d. 2+: *S uses a $ey generator to generate si3teen _______ round $eys. a. !2bit b. =-bit c. -+bit d. +2bit 2-: ________ *S was designed to increase the si,e of the *S $ey a. *ouble b. riple c. Juadruple
d. none of the above 20: _______ is a round cipher based on the )iKndael algorithm that uses a 124bit bloc$ of data. a. A b. A* c. A) d. AES 2: AS has _____ different configurations a. two b. t$ree c. four d. five
24: (' and ('( are ________ ciphers. a. bloc) b. stream c. field d. none of the above 25:
"2APER 3+
1: essage ________ means that the sender and the receiver e3pect privacy. a. confidentiality b. integrity c. authentication d. none of the above 2: essage_____ means that the data must arrive at the receiver e3actly as sent. a. confidentiality b. integrity c. authentication d. none of the above
!: essage _______ means that the receiver is ensured that the message is coming from the intended sender8 not an imposter. a. confidentiality b. integrity c. aut$entication d. none of the above +: _________ means that a sender must not be able to deny sending a message that he sent. a. (onfidentiality b. 7ntegrity c. Authentication d. Nonrepudiation -: ________ means to prove the identity of the entity that tries to access the system?s resources. a. essage authentication b. Entity aut$entication c. essage confidentiality d. none of the above 0: A%n& _________ can be used to preserve the integrity of a document or a message. a. message digest b. message summary c. encrypted message d. none of the above : A%n& ________function creates a message digest out of a message. a. encryption b. decryption c. $as$ d. none of the above
4: A hash function must meet ________ criteria. a. two b. t$ree c. four d. none of the above 5: A _______ message digest is used as an *(. a. )eyless b. $eyed c. either %a& or %b& d. neither %a& nor %b& 16: To authenticate the data origin8 one needs a%n& _______. a. *( b. MA" c. either %a& or %b& d. neither %a& nor %b& 11: A ________ signature is included in the documentB a _______ signature is a separate entity. a. con%entional1 digital b. digitalB digital c. either %a& or %b& d. neither %a& nor %b& 12: *igital signature provides ________. a. authentication b. nonrepudiation c. bot$ ;a< and ;b< d. neither %a& nor %b& 1!: *igital signature cannot provide ________ for the message. a. integrity b. confidentiality c. nonrepudiation d. authentication 1+: 7f _________ is needed8 a cryptosystem must be applied over the scheme. a. integrity b. confidentiality c. nonrepudiation d. authentication 1-: A digital signature needs a%n&_________ system. a. symmetric$ey
b. asymmetric-)ey c. either %a& or %b& d. neither %a& nor %b& 10: A witness used in entity authentication is ____________. a. something $nown b. something possessed c. something inherent d. all of t$e abo%e
1: 7n _______8 a claimant proves her identity to the verifier by using one of the three $inds of witnesses. a. message authentication b. entity aut$entication c. message confidentiality d. message integrity 14: Passwordbased authentication can be divided into two broad categories: _______ and _______. a. fi3edB variable b. timestampedB fi3ed c. fixed1 one-time d. none of the above 15: 7n ________ authentication8 the claimant proves that she $nows a secret without actually sending it. a. passwordbased b. c$allenge-response c. either %a& or %b& d. neither %a& nor %b& 26: (hallengeresponse authentication can be done using ________. a. symmetric$ey ciphers b. asymmetric$ey ciphers c. $eyedhash functions d. all of t$e abo%e 21: A%n& _____ is a trusted third party that assigns a symmetric $ey to two parties. a. 4/" b. (A c. D** d. none of the above 22: A%n&______ creates a secret $ey only between a member and the center. a. (A b. 4/"
c. D** d. none of the above
2!: The secret $ey between members needs to be created as a ______ $ey when two members contact D*(. a. public b. session c. complimentary d. none of the above 2+: __________ is a popular session $ey creator protocol that re#uires an authentication server and a tic$etgranting server. a. D*( b. 4erberos c. (A d. none of the above 2-: A%n& ________is a federal or state organi,ation that binds a public $ey to an entity and issues a certificate. a. D*( b. Derberos c. "A d. none of the above 20: A%n& ______ is a hierarchical system that answers #ueries about $ey certification. a. D*( b. PD7 c. "A d. none of the above 2: The _______ criterion states that it must be e3tremely difficult or impossible to create the message if the message digest is given. a. one-(ayness b. wea$collisionresistance c. strongcollisionresistance d. none of the above 24: The ________ criterion ensures that a message cannot easily be forged. a. onewayness
b. (ea)-collision-resistance c. strongcollisionresistance d. none of the above
25: The _______criterion ensures that we cannot find two messages that hash to the same digest. a. onewayness b. wea$collisionresistance c. strong-collision-resistance d. none of the above
"2APER 3, 1: _________ is a collection of protocols designed by the 7T" %7nternet ngineering Tas$ "orce& to provide security for a pac$et at the networ$ level. a. IPSec b. SS> c. PP d. none of the above
2: _________ operates in the transport mode or the tunnel mode. a. IPSec b. SS> c. PP d. none of the above !: 7n the ______ mode8 7PSec protects information delivered from the transport layer to the networ$ layer. a. transport b. tunnel c. either %a& or %b& d. neither %a& nor %b& +: 7PSec in the ______ mode does not protect the 7P header. a. transport b. tunnel c. either %a& or %b& d. neither %a& nor %b& -: The _______ mode is normally used when we need hosttohost %endtoend& protection of data.
a. transport b. tunnel c. either %a& or %b& d. neither %a& nor %b& 0: 7n the _______ mode8 7PSec protects the whole 7P pac$et8 including the original 7P header. a. transport b. tunnel c. either %a& or %b& d. neither %a& nor %b& : 7PSec defines two protocols: _______ and ________. a. ACB SS> b. PPB SP c. A21 ESP d. none of the above 4: ______ provides authentication at the 7P level. a. A2 b. SP c. PP d. SS> 5: ______ provides either authentication or encryption8 or both8 for pac$ets at the 7P level. a. AC b. ESP c. PP d. SS> 16: 7PSec uses a set of SAs called the ________. a. SA* b. SA' c. SA/B d. none of the above 11: ______ is the protocol designed to create security associations8 both inbound and outbound. a. SA b. (A c. D*( d. I4E 12: 7D creates SAs for _____. a. SS> b. PP
c. IPSec d. GP
1!: 7D is a comple3 protocol based on ______ other protocols. a. two b. t$ree c. four d. five 1+: 7D uses _______. a.
A9s that must communicate through the global 7nternet. a. GPP b. G9P c. G99
d. PN
26: A _______ layer security protocol provides endtoend security services for applications. a. data lin$ b. networ$ c. transport d. none of the above 21: ______ is actually an 7T" version of _____ a. T>SB TSS b. SS>B T>S c. &S1 SS& d. SS>B S>T 22: _______ provide security at the transport layer. a. SS> b. T>S c. either %a& or %b& d. bot$ ;a< and ;b< 2!: ______ is designed to provide security and compression services to data generated from the application layer. a. SS> b. T>S c. either %a& or %b& d. bot$ ;a< and ;b< 2+: Typically8 ______ can receive application data from any application layer protocol8 but the protocol is normally CTTP. a. SS> b. T>S c. either %a& or %b& d. bot$ ;a< and ;b< 2-: SS> provides _________. a. message integrity b. confidentiality c. compression d. all of t$e abo%e
20: The combination of $ey e3change8 hash8 and encryption algorithms defines a ________ for each SS> session. a. list of protocols b. cip$er suite c. list of $eys d. none of the above 2: 7n _______8 the cryptographic algorithms and secrets are sent with the message. a. 7PSec b. SS> c. T>S d. PHP 24: c. PHP d. none of the above 25: ______ was invented by Phil Himmerman. a. 7PSec b. SS> c. PHP d. none of the above !6: ________ provides privacy8 integrity8 and authentication in email. a. 7PSec b. SS> c. PHP d. none of the above !1: 7n PP8 to e3change email messages8 a user needs a ring of _______ $eys. a. secret b. public c. either %a& or %b& d. both %a& and %b& !2: 7n ______8 there is a single path from the fully trusted authority to any certificate. a. D7>C b. PP c. D*( d. none of the above