Question: MULTIPLE CHOICE (2 points each) Communication over the Internet is done: a through virtual circuits b through datagrams c both 1 and 2 d none
MULTIPLE CHOICE (2 points each)
Communication over the Internet is done:
a through virtual circuits
b through datagrams
c both 1 and 2
d none of the above
The basic difference between the original OSI and the IP layering model is
a OSI has 7 layers while IP has 5
b OSI has 5 layers while IP has 7
c No difference in number of layers, but the names are different
d There is a Presentation Layer in the IP model and none in the OSI model
Socket programming
a makes creating network applications easier and faster
b can be done only with the use of the C programming language
c can be done only with the use of the Java programming language
d is an old technique not used any more
We are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. Initially suppose there is only one link between source and destination. Also suppose that the entire MP3 file is sent as one packet. The transmission delay is:
a 50 milliseconds
b 3.05 seconds
c 3 seconds
d none of the above
What analogy in real life did I use to explain the IP Layering model during my lecture?
a Airline baggage check in
b Driving a vehicle from home to office
c Buying online
d Sending a letter within company offices
Internet telephony typically runs over:
a TCP
b UDP
c HTTP
d none of the above
A browser will generate header lines as a function of:
a user configuration of browser
b browser type and version
c whether the browser has a cache version of the requested
d all of the above
8. What is the port reserved for HTTP?
a 21
b 20
c 80
d 8080
TCP implements
a Go-Back-N
b Selective Repeat
c A hybrid between Go-Back-N and Selective Repeat
d none of the above
What does CIA stand for in information security?
a confidentiality, integrity, authentication
b confidentiality, integrity, availability
c confidentiality, integrity, authorization
d none of the above
The most common and easiest to implement DoS attack is
a Ping of Death
b Sniffing
c Botnet
d Distributed service
The ICMP protocol
a runs directly on top of IP
b runs on top of UDP
c runs on top of TCP
d none of the above
A channel partitioning protocol has which of the following characteristics:
a all transmitting nodes get the same amount of bandwidth
b it does not generate collisions
c there is no master node
d all of the above
14. Ethernet provides which of the following services to the network layer
a flow control
b reliable data transfer
c error detection
d all of the above
15. Worms are malware that
a Self-replicate but do not need user interaction
b Self-replicate but need user interaction
c Need user interaction but do not self-replicate
d Do not need user interaction and do not self-replicate
16. What is not a category of DoS attack?
a Vulnerability attack
b Bandwidth flooding
c Connection flooding
d Crash attack
17. Some of the best defenses against packet sniffing involve
a Firewall
b cryptography
c Network Address Translation (NAT)
d None of the above
18. "Due care" is an important term as a legal protection from
a Excessive damage suit by compromised customers in a data breach
b Nothing; it has no bearing on information security
c Direct attack in cyberwarfare
d Theft of copyrighted software
19. The concept of encapsulation is used in layering by
a Each layer adding payload to the packet received from previous layer
b Doing nothing; the concept is irrelevant
c Each layer adding its own header to the packet received from previous layer
d Assuring the integrity of each packet that passes through
20. A socket is identified by what two items?
a TCP + UDP
b Protocol + IP address
c TLA + IP address
d Port number + IP address
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
