Business Data Communications Infrastructure Networking and Security 7th Edition Stallings Test Bank 1

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Business Data Communications Infrastructure, Networking, and Security, 7th Edition, by

William Stallings and Tom Case

Business Data Communications


Infrastructure Networking and Security 7th
Edition by Stallings ISBN 0133023893
9780133023893
Download full test bank at :
https://testbankpack.com/p/test-bank-for-business-data-
communications-infrastructure-networking-and-security-7th-
edition-by-stallings-isbn-0133023893-9780133023893/

CHAPTER 8: TCP/IP

TRUE OR FALSE

T F 1. Protocol architectures are a set of complementary protocol


modules governing communication between entities in a network.

T F 2. TCP/IP is a protocol architecture.

T F 3. UDP provides guaranteed delivery of messages.

T F 4. LANs and WANs are usually isolated entities.

T F 5. A router is a more complex intermediate system than a bridge.

T F 6. EOIP encourages the development of IP applications for all major


types of business data as well as IP-based, or IP-compliant,
telecommunications transport.

T F 7. The System Network Architecture of IBM is a proprietary layered


protocol architecture.

T F 8. Standards can be developed simultaneously for protocols at each


layer of the architecture.

T F 9. Wireless networks cannot be deployed without the aid of the


network administrators.
Business Data Communications Infrastructure, Networking, and Security, 7th Edition, by
William Stallings and Tom Case

T F 10. WLAN standards have been designed to replace Ethernet.

T F 11. IP is also becoming the language of the telephone system.

T F 12. There are many protocols and technologies to select from when
building an entire communication system.

T F 13. OSI is another standardized architecture that is often used to


describe communications functions but is now rarely
implemented.

T F 14. When two or more computers are interconnected via a


communication network, the set of computer stations is referred
to as a “computer connection”.

T F 15. The network access layer contains the logic needed to support the
various user applications.

MULTIPLE CHOICE

1. The TCP/IP architecture contains ________ layers.

A. two B. three

C. four D. five

2. Wireless networking brings:

A. increased security risks B. management headaches

C. increased demands on support staff D. all of the above

3. ________ is a Cisco proprietary product.

A. VoIP B. SKINNY

C. SMTP D. SIP

4. The key elements of a protocol are:


Business Data Communications Infrastructure, Networking, and Security, 7th Edition, by
William Stallings and Tom Case
A. syntax, structure, timing

B. syntax, semantics, structure

C. structure, semantics, format

D. format, syntax, semantics

5. Which of the following is a commonly used set of standards for computer


communications?

A. SLA B. ISO

C. POP D. TCP/IP

6. A device that connects networks with differing addressing schemes, packet


sizes and interfaces is called a ___________.

A. hub B. router

C. switch D. repeater

7. The current IP specification uses addresses to identify hosts that consist of:

A. 16 bits B. 64 bits

C. 32 bits D. 128 bits

8. The newer IPv6 specification uses addresses to identify hosts that consist of:

A. 128 bits B. 64 bits

C. 32 bits D. 16 bits

9. The ________ layer is concerned with the exchange of data between a computer
and the network to which it is attached.

A. transport B. application

C. network access D. physical

10. The ________ layer contains the logic needed to support the various user
applications.

A. network access B. physical


Business Data Communications Infrastructure, Networking, and Security, 7th Edition, by
William Stallings and Tom Case

C. application D. transport

11. Transport PDUs are typically called ________.

A. channels B. segments

C. bridges D. frames

12. The ________ layer covers the physical interface between a data transmission
device and a transmission medium or network.

A. physical B. transport

C. application D. network

13. IP appends a header of control information to each segment to form


a(n) __________.

A. IP datagram B. end system

C. checksum D. port

14. The ________ supports a basic electronic mail facility by providing a


mechanism for transferring messages among separate hosts.

A. SNMP B. SSH

C. HTTP D. SMTP

15. The _________ is used to send files from one system to another under user
command.

A. UDP B. SMTP

C. FTP D. SSH

SHORT ANSWER

1. __________ networking brings with it the advantages of connectivity without


being tethered, faster/lower cost deployment and the connection of
geographically remote sites.
Business Data Communications Infrastructure, Networking, and Security, 7th Edition, by
William Stallings and Tom Case
2. ________ is an Internet-based standard and is the framework for developing a
complete range of computer communications standards.

3. The combination of data from the next higher layer and control information
is known as a __________.

4. The network access protocol appends a network access header to the data it
receives from the transport layer, creating a network access PDU, typically
called a __________.

5. An error detection code is also referred to as a frame check sequence or a


________.

6. Two protocol architectures have served as the basis for the development of
interoperable protocol standards: the OSI reference model and the ________.

7. A _________ is a device that connects two networks and whose primary


function is to relay data from one network to the other on a route from the
source to the destination end system.

8. For most applications running as part of the TCP/IP architecture, the


transport layer protocol is _________.

9. The standard network management protocol for TCP/IP networks is _________.

10. In 1995 the Internet Engineering Task Force issued a specification for a next-
generation IP; this specification was turned into a standard in 1996 known as
_________.

11. Features of ________ include mailing lists, return receipts, and forwarding.

12. ________ provides a secure remote logon capability, which enables a user at a
terminal or personal computer to logon to a remote computer and function
as if directly connected to that computer.

13. _________ connects client systems to Web servers on the Internet and its
primary function is to establish a connection with the server and send HTML
pages back to the user’s browser.

14. Subnetworks are connected by devices referred to as __________, which


provide a communications path and perform the necessary relaying and
routing functions so that data can be exchanged between devices attached to
different subnetworks in the internet.

15. A _________ is a facility that provides a data transfer service among devices
attached to the network.
Business Data Communications Infrastructure, Networking, and Security, 7th Edition, by
William Stallings and Tom Case

CHAPTER 8: TCP/IP

TRUE OR FALSE

1. T
2. T
3. F
4. F
5. T
6. T
7. T
8. T
9. F
10. F
11. T
12. T
13. T
14. F
15. F

MULTIPLE CHOICE

1. D
Business Data Communications Infrastructure, Networking, and Security, 7th Edition, by
William Stallings and Tom Case
2. D
3. B
4. B
5. D
6. B
7. C
8. A
9. C
10. C
11. B
12. A
13. A
14. D
15. C

SHORT ANSWER

1. Wireless
2. TCP/IP
3. PDU (protocol data unit)
4. packet
5. checksum
6. TCP/IP suite
7. router
8. TCP
9. SNMP (Simple Network Management Protocol)
10. IPv6
11. SMTP (Simple Mail Transfer Protocol)
12. SSH (Secure Shell)
13. HTTP (HyperText Transfer Protocol)
14. ISs (intermediate systems)
15. Communication network

You might also like