• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/49

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

49 Cards in this Set

  • Front
  • Back
Permanently assigning an IP address is referred to as:_________
static IP
Which of the following is the default subnet mask for a Class A IP address:____
255.0.0.0
Which protocol is used to map IP address to physical MAC address?
ARP
How many bits is an IPv4 address:______________
32
Which protocol is used to map physical MAC address to IP address?
RARP
The protocol data unit used by the network layer is called a _____
Packet
Which of the following is an example of a Class C IP address :____
192.169.20.1
Which of the following is an example of a Class B IP address :____
176.150.20.1
Layer 3 devices differ from the layer 2 devices in that the layer 3 device can____[choose all that apply]
Filter packets based on an IP address
Filter packets based on protocol
The IP protocol operates at which layer of the OSI model?_____
Network
Which of the following is not a function of the network layer?[choose all that apply] ___
Establish and maintain a communication session
Maintaining proper voltages on the wire
You ISP assigned you a block of Class A address to use on your network. Which of the following might possibly be one of those addresses? Ignore the fact that most of these addresses are already taken. [choose all that apply]
116.25.43.7
26.56.78.109
Class D addresses are used for what purpose?__________
Multicast address
The IPX/SPX protocol derives its host address from:________
The MAC address of the interface
How many bits is an IPv6 address:______________
128
Which of the following is the default subnet mask for a Class B IP address:____
255.255.0.0
Which of the following is the default subnet mask for a Class C IP address:____
255.255.255.0
The collection of eight bit sets that make up a typical IPv4 address is called a/an:_______
octet
What is the maximum number of hosts in a Class B network that has not been subnetted?
65,534
Which of the following is an example of a Class A IP address :____
10.145.20.1
A JPEG file is an example of_______
lossy compression
The session layer is responsible for______
Providing dialogue management and synchronization
What event leads to an unexpected disconnect?
a system crash
The process of assuring that the communication devices are capable of sending and receiving at the same speed is referred to as:_________
flow control
A session, by definition, consist of a series of__________
Activities
If the transmitting device does not receive an ACK it will automatically resend that frame, based on: _________
time to live
The process two devices go through in order to agree on protocol, connection speed, etc., is referred to as: __________
handshake
Which of the following protocols is connection oriented?
TCP
The actual type of data that is moved or stored is referred to as:_________
abstract syntax
The process of breaking data down into smaller pieces and then adding information from other layers before sending over the wire is _________
encapsulation
A flow control method that only retransmits bad packets is referred to as:_____
selectively repeat
What is the direction of travel in a full duplex data communication device?
both directions at the same time
Which of the networking protocol does not make very much use of Connection ID?_____
TCP/IP
When a user chooses to send a file over the network to another device, it is the responsibility of the_________layer to determine whether or not compression is used?
Presentation
A port number is_____
A logical address of a process or application
A flow control method that allows a fix number of packets to be sent, then waits for ACKs from each of those packets before sending the next group of packets is referred to as:_______
static window
In a half-duplex session, communications are controlled by the exchange of______
Tokens
User information such as user ID and password that permit access to networks resources is referred to as: _________
credentials
The form the data will assume as it moves over the wire is referred to as:
transfer syntax
The complete set of syntaxes used in the transfer of data is referred to as:
presentation context
Which of the following is not a responsibility of the Transport layer ?
Physical addressing
Which of the following Session Layer activities will result in a new Connection ID and acknowledgment numbering sequence?
Synchronize major
A logical address added to each segment of data transmitted that indicates what application or protocol is expecting the data is referred to as:_________
port
The purpose of checkpoints is to _________
allow the retransmission of data to resume where it left off
A sequence of numbers, beginning with a randomly generated number, that identifies each packet in a transmission and the order in which it goes is called: ______
acknowledgement number
Which of the following is the most secure form of encryption mentioned by our author_________
data encryption standard
What is the general name for a flow control method that allows for several frames to be transmitted before an ACK is required___________
sliding window
The form of flow control that can adjust the number of packets transmitted before the ACKs must begin to flow is called ________
Sliding window
FTP uses port_____
21