1.
Which of the following items represent design goals that motivated the developement of TCP/IP? (Choose all that apply.)
Correct Answer(s)
A. Robust network architecture
B. Reliable delivery mechanisms
C. Ability of dissimilar systems to exchange data
D. Support for long-haul connections
Explanation
The development of TCP/IP was motivated by the design goals of having a robust network architecture, reliable delivery mechanisms, the ability of dissimilar systems to exchange data, and support for long-haul connections. These goals were important in creating a network protocol that could handle different types of systems, ensure reliable data delivery, and support long-distance connections. High performance was not explicitly mentioned as a design goal for TCP/IP.
2.
What is the name of the version of IP most widely used today?
Correct Answer
C. IPv4
Explanation
IPv4 is the most widely used version of IP today because it was the first version to be widely implemented and adopted. It provides a large address space, allowing for a large number of unique IP addresses. IPv4 addresses are written in a dotted decimal format, consisting of four sets of numbers separated by periods. However, due to the limited number of available addresses in IPv4, the transition to IPv6 is underway to accommodate the growing number of devices connected to the internet.
3.
Which of the following milestone events for TCP/IP occured in 1983? (Choose all that apply.)
Correct Answer(s)
B. The Department of Defense mandates TCP/IP as the "official ARPANET protocol."
C. TCP/IP appears in the 4.2BSD UNIX distribution.
D. Initial developement of name server technology occurs.
Explanation
In 1983, three milestone events for TCP/IP occurred. The Department of Defense mandated TCP/IP as the "official ARPANET protocol," which solidified its status as the standard protocol for the network. TCP/IP also appeared in the 4.2BSD UNIX distribution, making it more widely available and accessible. Additionally, the initial development of name server technology occurred, which played a crucial role in the growth and expansion of the internet. These events marked significant advancements and milestones in the adoption and development of TCP/IP.
4.
Which of the following organizations develops and maintains RFCs?
Correct Answer
D. IETF
Explanation
The IETF (Internet Engineering Task Force) is the correct answer because it is the organization responsible for developing and maintaining RFCs (Request for Comments). RFCs are documents that describe various protocols, standards, and technologies used on the internet. The IETF is a global community of volunteers who work together to develop and improve internet standards. The other organizations listed (ISOC, IAB, and IRTF) are also involved in internet governance and research, but they do not have the primary responsibility for developing and maintaining RFCs.
5.
Which of the following organizations manages Internet domain names and network addresses?
Correct Answer
A. ICANN
Explanation
ICANN (Internet Corporation for Assigned Names and Numbers) is the correct answer because it is the organization responsible for managing and coordinating the domain name system (DNS) and IP addresses on the internet. It oversees the allocation and administration of domain names and IP addresses, ensuring that they are unique and properly distributed. ICANN also plays a crucial role in establishing policies and standards for the internet's global domain name system. IETF (Internet Engineering Task Force), IRTF (Internet Research Task Force), and ISOC (Internet Society) are other organizations involved in internet governance, but they do not specifically manage domain names and network addresses like ICANN does.
6.
What is the tital of RFC 3300?
Correct Answer
C. Internet Official Protocol Standards
Explanation
The correct answer is "Internet Official Protocol Standards." This is the title of RFC 3300, which is a document that provides information about the standards and protocols used on the internet. The other options mentioned are not the correct title of RFC 3300.
7.
Which of the following steps must a Standard RFC go through to become an official standard? (Choose all that apply.)
Correct Answer(s)
A. Draft Standard
C. Proposed Standard
E. Standard (sometimes called "Internet Standard")
Explanation
A Standard RFC must go through three steps to become an official standard: Draft Standard, Proposed Standard, and Standard (sometimes called "Internet Standard"). The Draft Standard stage is the initial version of the RFC that is being developed and reviewed by the Internet Engineering Task Force (IETF). The Proposed Standard stage is the next step where the RFC is further refined and reviewed by the IETF community. Finally, if the RFC meets all the criteria and requirements, it can be elevated to the Standard stage, which is the official standard recognized by the IETF. The other options, Historic Standard and Retired Standard, do not represent the progression of an RFC towards becoming an official standard.
8.
A Best Current Practice (BCP) RFC is a special form of Standard RFC.
Correct Answer
B. False
Explanation
A Best Current Practice (BCP) RFC is not a special form of Standard RFC. BCP RFCs are documents that provide guidelines, recommendations, or best practices for network operations, protocols, or procedures. They are not considered standards like Standard RFCs, which define specific protocols or specifications. Therefore, the correct answer is false.
9.
List the seven layers of the ISO/OSI network reference model in ascending order starting with Layer 1 seperated by a comma.Example:Session, Physical, Data Link, ETC....NOT f, g, b, c..etccheck your spelling...this is fill in the blank and there is only one way to do it!!!!
Correct Answer
Physical, Data Link, Network, Transport, Session, Presentation, Application
Explanation
The answer provided lists the seven layers of the ISO/OSI network reference model in ascending order starting with Layer 1. The layers are organized as follows: Physical, Data Link, Network, Transport, Session, Presentation, Application.
10.
Whic of the following statements represent benefits of a layered approace to networking? (Choose all that apply.)
Correct Answer(s)
A. Takes a big problem and breaks it into a series of smaller interrelated problems
B. Allows individual layers to be insulated from one another
C. Permits expertise to be applied from differnt disciplines for different layers
D. Permits hardware issues to be kept separate from software issues
Explanation
A layered approach to networking provides several benefits. Firstly, it takes a big problem and breaks it into a series of smaller interrelated problems, making it easier to manage and troubleshoot. Secondly, it allows individual layers to be insulated from one another, which increases flexibility and modularity. Thirdly, it permits expertise to be applied from different disciplines for different layers, ensuring that each layer is optimized by the relevant experts. Lastly, it permits hardware issues to be kept separate from software issues, simplifying the maintenance and troubleshooting process.
11.
Which terms represent parts of the PDU that are always present in an y PDU? (Choose all that apply.)
Correct Answer(s)
A. Header
B. Payload
Explanation
The header and payload are always present in any PDU. The header contains control information and metadata about the PDU, while the payload contains the actual data being transmitted. The checksum is not always present in a PDU, as it is used for error detection and may be optional depending on the protocol being used. The trailer is also not always present, as it is used for additional information or error detection and may be optional.
12.
Which of the following components operate at the Physical layer? (Choose all that apply.)
Correct Answer(s)
A. Network interface cards (NICs)
C. Connectors
D. Cables
Explanation
The components that operate at the Physical layer are network interface cards (NICs), connectors, and cables. Network interface cards (NICs) are responsible for connecting a device to a network, while connectors and cables are used to physically connect devices together. These components are all involved in the transmission of raw data bits over a physical medium, which is the main function of the Physical layer in the OSI model.
13.
What is the common name for PDUs at the Data Link Layer?
Correct Answer
A. Frames
Explanation
The common name for PDUs at the Data Link Layer is "Frames". Frames are the units of data that are transmitted over a network at the Data Link Layer. They contain the necessary information for error detection and correction, as well as the source and destination addresses. Frames are used to encapsulate packets and are responsible for the reliable transmission of data between adjacent network nodes.
14.
What functions does the Session layer provide? (Choose all that apply.)
Correct Answer(s)
B. Session setup, maintenance, and tear-down
C. Checkpoint controls
Explanation
The Session layer provides session setup, maintenance, and tear-down functions. This means that it is responsible for establishing and managing communication sessions between two devices. It handles the initiation, maintenance, and termination of these sessions. Additionally, the Session layer also provides checkpoint controls, which allow for the synchronization and recovery of data during a session.
15.
Which of the following TCP/IP network model layers maps most nearly to single layers in the ISO/OSI network reference model? (Choose all that apply.)
Correct Answer(s)
B. TCP/IP Internet layer
C. TCP/IP Transport layer
Explanation
The TCP/IP Internet layer maps most nearly to the Network layer in the ISO/OSI network reference model. This layer is responsible for addressing, routing, and forwarding data packets across different networks. Similarly, the TCP/IP Transport layer maps most nearly to the Transport layer in the ISO/OSI model. This layer ensures reliable delivery of data between end systems and provides services such as segmentation, flow control, and error recovery.
16.
Whic of the follwing two TCP/IP protocols operate at the TCP/IP Transport layer? (Choose all that apply.)
Correct Answer(s)
C. TCP
D. UDP
Explanation
TCP and UDP are both protocols that operate at the TCP/IP Transport layer. TCP (Transmission Control Protocol) is a reliable and connection-oriented protocol that ensures the delivery of data packets in the correct order and provides error checking and flow control. UDP (User Datagram Protocol) is a connectionless and unreliable protocol that does not guarantee the delivery of data packets or their order, making it suitable for real-time applications such as video streaming or online gaming. ARP (Address Resolution Protocol) operates at the TCP/IP Network layer, while PPP (Point-to-Point Protocol) is a data link layer protocol. XNET is not a recognized TCP/IP protocol.
17.
In UNIX terminology, a listener process that operates on a server to handle incomming requests for services is called a _______________.
Correct Answer
C. Daemon (day-mon)
Explanation
A listener process in UNIX terminology is referred to as a daemon. A daemon is a background process that operates on a server and handles incoming requests for services. It runs continuously and independently of user interaction, ensuring that services are always available and responsive. The term "daemon" is derived from the Greek mythological figure, a supernatural being that performs tasks without human intervention.
18.
The process of combining multiple outgoing protocol streams at the Transport and Network layers in TCP/IP is called ___________.
Correct Answer
B. Multiplexing
Explanation
Multiplexing is the process of combining multiple outgoing protocol streams at the Transport and Network layers in TCP/IP. It allows multiple streams of data to be transmitted over a single communication channel, increasing efficiency and reducing the need for multiple connections. By multiplexing, different protocols or data streams can share the same network connection, saving bandwidth and improving overall network performance.
19.
On any system, only those protocol numbers for protocols that are actually in use must be defined on that system. True or False?
Correct Answer
A. True
Explanation
This statement is true because defining protocol numbers for protocols that are not in use would be unnecessary and would consume system resources. It is more efficient to only define protocol numbers for the protocols that are actually being used on the system.
20.
The purpose of a TCP/IP port number is to identify which aspect of a system's operation for incoming and outgoing protocol data?
Correct Answer
C. Sending or receiving application process
Explanation
The purpose of a TCP/IP port number is to identify the sending or receiving application process for incoming and outgoing protocol data. Port numbers allow multiple applications to communicate over a network by assigning unique identifiers to each process. This ensures that the data is correctly delivered to the intended application on the receiving end. The network layer protocol and transport layer protocol are responsible for handling the transmission of data, but the port number specifically identifies the application process involved.
21.
Which of the following terms is a synonym for a dynamically assigned port address, used to service a temporary TCP/IP connection for data exchange?
Correct Answer
D. Socket address
Explanation
A socket address is a term used to refer to a dynamically assigned port address that is used to service a temporary TCP/IP connection for data exchange. It is a synonym for the given description as it represents the combination of an IP address and a port number, which allows communication between different applications over a network. The socket address is dynamically assigned and can change for each new connection, making it suitable for temporary connections.
22.
Which of the following activities may occur during the protocol analysis process? (Choose all that apply.)
Correct Answer(s)
A. Tapping into network communications
B. Capturing packets "off the wire"
C. Gathering statistics
D. Decoding packets into readable form
Explanation
The protocol analysis process involves several activities. Tapping into network communications refers to accessing and monitoring the data being transmitted over a network. Capturing packets "off the wire" means capturing the network packets as they are transmitted. Gathering statistics involves collecting and analyzing data about the network traffic. Decoding packets into readable form involves converting the captured packets into a format that can be easily understood and analyzed. Retransmitting captured packets for testing is not mentioned as an activity that occurs during the protocol analysis process.
23.
Why is promiscuous mode operation important for protocol analysis?
Correct Answer
B. It allows the protocol analyzer to capture and inspect all traffic on the network medium, including erros and malformed packets.
Explanation
Promiscuous mode operation is important for protocol analysis because it enables the protocol analyzer to capture and inspect all traffic on the network medium, including errors and malformed packets. This is crucial for accurately analyzing and troubleshooting network protocols, as it allows for the detection and identification of any issues or abnormalities in the network traffic. By capturing all traffic, the protocol analyzer can provide a comprehensive view of the network, helping to identify and resolve any potential problems.
24.
A packet filter that's applied to incoming data in a a protocol analyzer may be called a ______________. (Choose all that apply.)
Correct Answer(s)
A. Capture filter
C. Pre-filter
Explanation
A packet filter that's applied to incoming data in a protocol analyzer may be called a capture filter or a pre-filter. A capture filter is used to select which packets should be captured and analyzed based on specific criteria, such as source or destination IP address, port number, or protocol type. A pre-filter, on the other hand, is used to filter out unwanted packets before they are captured and analyzed, reducing the amount of data that needs to be processed. Therefore, both capture filter and pre-filter are applicable terms for describing a packet filter in this context.
25.
Which of the following features are typical for most protocol analyzers? (Choose all that apply.)
Correct Answer(s)
A. Packet filters may be applued to incoming data before capture, or to store data after capture.
B. Decodes may be applied to packets in the trace buffer.
C. Alarms may be set to flag unusual network events or conditions
D. Packet filters display various statistical reports and grapHs based on traffic analysis.
Explanation
Protocol analyzers typically have the following features: packet filters that can be applied to incoming data before capture or to store data after capture, decodes that can be applied to packets in the trace buffer, alarms that can be set to flag unusual network events or conditions, and packet filters that display various statistical reports and graphs based on traffic analysis. Additionally, packet filters may include built-in trend analysis and capacity-planning tools.