1. (p. 225) At what layer of the OSI model does the set of protocols indicated by the TCP part of TCP/IP work?
A. Data Link
B. Transport
C. Application
D. Network
A. Data Link
B. Transport
C. Application
D. Network
2. (p. 243) What protocol, replaced in recent years by a more secure protocol, was for many years the primary protocol used to allow a user to log in remotely and execute text-based commands on a remote host?
A. FTP
B. Telnet
C. HTTPS
D. SMTP
A. FTP
B. Telnet
C. HTTPS
D. SMTP
3. (p. 225) A communication between computers that begins with an acknowledgement, followed by a message, and ends with a closing acknowledgement, is which type of communication?
A. broadcast
B. connection-oriented
C. connectionless
D. multicast
A. broadcast
B. connection-oriented
C. connectionless
D. multicast
4. (p. 225-226) Most computer connections use this Transport layer protocol.
A. UDP
B. ICMP
C. TCP
D. IGMP
A. UDP
B. ICMP
C. TCP
D. IGMP
5. (p. 228) What function is being used if a packet is sent to port 80?
A. FTP
B. Web browsing
C. Telnet
D. e-mail
A. FTP
B. Web browsing
C. Telnet
D. e-mail
6. (p. 227) What is the protocol of choice for very simple applications that never need more than a single packet?
A. TCP
B. UDP
C. ICMP
D. IGMP
A. TCP
B. UDP
C. ICMP
D. IGMP
7. (p. 227) What Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?
A. UDP
B. ICMP
C. TCP
D. IGMP
A. UDP
B. ICMP
C. TCP
D. IGMP
8. (p. 227) Which protocol, not appropriate for use over the Internet, is used for transferring files between servers and clients without requiring a user login?
A. HTTP
B. FTP
C. TFTP
D. SMTP
A. HTTP
B. FTP
C. TFTP
D. SMTP
9. (p. 227) Which protocol does the ping application use?
A. UDP
B. ICMP
C. HTTP
D. DHCP
A. UDP
B. ICMP
C. HTTP
D. DHCP
10. (p. 246) If you cannot receive e-mail, which of the following protocols should you suspect is not working properly?
A. POP3
B. SMTP
C. SNMP
D. HTTP
A. POP3
B. SMTP
C. SNMP
D. HTTP
11. (p. 228) Which protocol enables routers to communicate with hosts to determine a group membership for multicast communications?
A. SNMP
B. ICMP
C. SMTP
D. IGMP
A. SNMP
B. ICMP
C. SMTP
D. IGMP
12. (p. 228) What name is given to the port numbers in the range of 0 to 1023?
A. private port numbers
B. well-known port numbers
C. dynamic port numbers
D. listening ports
A. private port numbers
B. well-known port numbers
C. dynamic port numbers
D. listening ports
13. (p. 229) When a Web browser sends a message to a Web server, it generates this type of port number pseudo-randomly as the source port for the packet.
A. well-known port number
B. listening port number
C. ephemeral port number
D. logical port number
A. well-known port number
B. listening port number
C. ephemeral port number
D. logical port number
14. (p. 229) This type of port has a number in the 1024 to 49151 range.
A. well-known port
B. private port
C. dynamic port
D. registered port
A. well-known port
B. private port
C. dynamic port
D. registered port
15. (p. 229) This is a name used for ports in the 49152 to 65535 range. (Select all that apply.)
A. well-known port
B. private port
C. dynamic port
D. registered port
E. both B and C
A. well-known port
B. private port
C. dynamic port
D. registered port
E. both B and C
16. (p. 230) What is the name for the session information stored in RAM by a computer on one side of a session? (Select all that apply.)
A. connections
B. session
C. socket
D. endpoint
E. both C and D
A. connections
B. session
C. socket
D. endpoint
E. both C and D
17. (p. 230) This is another name for a session.
A. Web site
B. connection
C. endpoint
D. port
A. Web site
B. connection
C. endpoint
D. port
18. (p. 249) Which TCP port(s) does File Transfer Protocol (FTP) use?
A. 80
B. 20 and 21
C. 25 and 110
D. 23
A. 80
B. 20 and 21
C. 25 and 110
D. 23
19. (p. 246) What protocol handles outgoing e-mail?
A. POP3
B. SMTP
C. IGMP
D. TFTP
A. POP3
B. SMTP
C. IGMP
D. TFTP
20. (p. 227) What file transfer protocol uses UDP port 69, and does not use user names and passwords?
A. FTP
B. Web browsing
C. e-mail
D. TFTP
A. FTP
B. Web browsing
C. e-mail
D. TFTP
21. (p. 230) This is the "show me the endpoint" command.
A. RSH
B. RCP
C. netstat
D. rlogin
A. RSH
B. RCP
C. netstat
D. rlogin
22. (p. 232) What is the status for a socket that is prepared to respond to any IP packets destined for that socket's port number? (Select all that apply.)
A. open port
B. established port
C. closed-wait
D. listening port
E. both A and D
A. open port
B. established port
C. closed-wait
D. listening port
E. both A and D
23. (p. 234) What is the status of a port that is part of an active working endpoint pair?
A. open port
B. established port
C. close-wait
D. listening port
A. open port
B. established port
C. close-wait
D. listening port
24. (p. 234) What status indicates that a connection has made a graceful closure?
A. open port
B. time_wait
C. close_wait
D. listening port
A. open port
B. time_wait
C. close_wait
D. listening port
25. (p. 234) What status indicates that a connection has been lost to the other side, and has not yet closed?
A. open port
B. time-wait
C. close-wait
D. listening port
A. open port
B. time-wait
C. close-wait
D. listening port
26. (p. 234) What is the name for the number used by the operating system to track all running programs?
A. private port number
B. socket
C. process ID (PID)
D. dynamic port number
A. private port number
B. socket
C. process ID (PID)
D. dynamic port number
27. (p. 240) Microsoft Internet Explorer and Mozilla Firefox are examples of this type of TCP/IP application.
A. mail client
B. Web client
C. Web server
D. FTP client
A. mail client
B. Web client
C. Web server
D. FTP client
28. (p. 236) This Web server was originally created for the UNIX/Linux platforms, but now comes in a version for Windows.
A. Internet Information Services (IIS)
B. Apache HTTP Server
C. Google Chrome
D. IMAP4
A. Internet Information Services (IIS)
B. Apache HTTP Server
C. Google Chrome
D. IMAP4
29. (p. 238) This is the underlying protocol on the World Wide Web.
A. HTML
B. JavaScript
C. IIS
D. HTTP
A. HTML
B. JavaScript
C. IIS
D. HTTP
30. (p. 241) This is the secure counterpart of HTTP.
A. SSL
B. HTTPS
C. Telnet
D. RSH
A. SSL
B. HTTPS
C. Telnet
D. RSH
31. (p. 242) Almost every server application has a way for you to access and administer it using this older protocol.
A. RSH
B. RCP
C. TLS
D. Telnet
A. RSH
B. RCP
C. TLS
D. Telnet
32. (p. 246) This protocol is an alternative to POP3, with special enhancements.
A. SMTP
B. POP4
C. IMAP4
D. Web-based e-mail
A. SMTP
B. POP4
C. IMAP4
D. Web-based e-mail
33. (p. 247) While there are many e-mail server programs, this one is the leader among those used on Linux and UNIX systems, controlling about 20 percent of all e-mail servers, and only running the SMTP protocol.
A. IMAP4
B. Exchange Server
C. Eudora's Qpopper
D. sendmail
A. IMAP4
B. Exchange Server
C. Eudora's Qpopper
D. sendmail
No comments:
Post a Comment