Sie sind auf Seite 1von 3

MSU-Iligan Institute of Technology Information Technology Department First Major Exam IT 122 Network Fundamentals Name: _________________________________________ A.

. Identify the numbed items in the figure

1. 2. 3.

1. 2. 3. 4. 5. 6. 7.

1. Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.) a. This exchange is part of the three-way handshake. b. The source port indicates that a Telnet session has been initiated. c. The data is flowing from server to client. d. The destination port indicates that an HTTP session has been initiated. e. The data listed is associated with the transport layer. f. The source port does not support communication with the destination port that is listed. 2. Which three statements characterize the transport layer protocols? (Choose three.) a. TCP and UDP port numbers are used by application layer protocols. b. TCP uses port numbers to provide reliable transportation of IP packets. c. UDP uses windowing and acknowledgments for reliable transfer of data. d. TCP uses windowing and sequencing to provide reliable transfer of data. e. TCP is a connection-oriented protocol. UDP is a connectionless protocol. 3. Why are port numbers included in the TCP header of a segment? a. to indicate the correct router interface that should be used to forward a segment b. to identify which switch ports should receive or forward the segment c. to determine which Layer 3 protocol should be used to encapsulate the data d. to enable a receiving host to forward the data to the appropriate application e. to allow the receiving host to assemble the packet in the proper order 4. Which event occurs during the transport layer three-way handshake? a. The two applications exchange data. b. TCP initializes the sequence numbers for the sessions. c. UDP establishes the maximum number of bytes to be sent. d. The server acknowledges the bytes of data received from the client. 5. Which two options represent Layer 4 addressing? (Choose two.) a. identifies the destination network

b. identifies source and destination hosts c. identifies the communicating applications d. identifies multiple conversations between the hosts e. identifies the devices communicating over the local media 6. Which email components are used to forward mail between servers? (Choose two.) a. MDA b. IMAP c. MTA d. POP e. SMTP f. MUA 7. As compared to SSH, what is the primary disadvantage of telnet? a. a. not widely available b. b. does not support encryption c. c. consumes more network bandwidth d. d. does not support authentication 8. What is a primary function of the trailer information added by the data link layer encapsulation? a. supports error detection b. ensures ordered arrival of data c. provides delivery to correct destination d. identifies the devices on the local network e. assists intermediary devices with processing and path selection 9. What is the purpose of the TCP/IP Network Access layer? a. path determination and packet switching b. data presentation c. reliability, flow control, and error detection d. network media control e. the division of segments into packets 10. Which layer encapsulates the segment into packets? a. Physical b. data link c. Network d. Transport
Identification: Identify what the statement is all about. 1. _______________Are web pages that groups of people can edit and view together. 2. _______________These are tools that give people the opportunity to work together on shared documents 3. _______________This allows company to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists. 4. _______________The size of the message and the complexity of the message are examples of what type of factors affecting communication of networks. 5. _______________Are the rules that the networked devices use to communicate with each other. 6. _______________ Are characteristics of network architecture wherein it expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users. 7. _______________It is the measure of the data carrying capacity of the network. 8. ________________The process used to interleave the pieces of separate conversations together on the network 9. _______________Provides the physical connection to the network at the PC or other host device. 10. _______________A group of inter-related protocols that are necessary to perform a communication function 11. _______________is a transport layer protocol that manages the individual conversations between web servers and web clients 12. _______________It is a layer in the TCP/IP model which supports communication between diverse devices across diverse networks. 13. _______________The form that a piece of data takes at any layer in an OSI model. 14. _______________Application layer protocol used to resolve Internet names to IP addresses. 15. _______________It is a transport layer addressing use to identify applications. 16. _______________A command use to show the default DNS server configured for your host. 17. _______________Email service used to forward e-mail.

18. _______________An application layer service which automates the assignment of IP addresses, subnet masks, gateway and other IP networking parameters. 19. _______________A client/server file sharing protocol which became the mainstay of Microsoft networking. 20. _______________This protocol defines these five different packet types (ping, pong, query, query hit, push). 21. ______________Are background programs that provide the connection between the Application layer and the lower layers of the networking model. 22. _______________Number of bytes used in the UDP datagram. 23. _______________These port numbers are assigned to user processes or applications. 24. _______________Command use to display active TCP connections open and running on a networked host. 25. ________________It is a field in the TCP header that enables the management of lost data and flow control. Acronym: Determine what the following acronyms stand for: 1. RIP 2. UDP 3. FIN 4. POP 5. VoIP 6. RFC 7. VTY 8. SMB Essay: 1. Explain how a conversation in Skype happens. (5 pts). 2. Explain how the faces of PDU changes. (5pts)

Das könnte Ihnen auch gefallen