Professional Documents
Culture Documents
Business Data Communications Infrastructure Networking and Security 7th Edition Stallings Test Bank 1
Business Data Communications Infrastructure Networking and Security 7th Edition Stallings Test Bank 1
Business Data Communications Infrastructure Networking and Security 7th Edition Stallings Test Bank 1
CHAPTER 8: TCP/IP
TRUE OR FALSE
T F 12. There are many protocols and technologies to select from when
building an entire communication system.
T F 15. The network access layer contains the logic needed to support the
various user applications.
MULTIPLE CHOICE
A. two B. three
C. four D. five
A. VoIP B. SKINNY
C. SMTP D. SIP
A. SLA B. ISO
C. POP D. TCP/IP
A. hub B. router
C. switch D. repeater
7. The current IP specification uses addresses to identify hosts that consist of:
A. 16 bits B. 64 bits
8. The newer IPv6 specification uses addresses to identify hosts that consist of:
C. 32 bits D. 16 bits
9. The ________ layer is concerned with the exchange of data between a computer
and the network to which it is attached.
A. transport B. application
10. The ________ layer contains the logic needed to support the various user
applications.
C. application D. transport
A. channels B. segments
C. bridges D. frames
12. The ________ layer covers the physical interface between a data transmission
device and a transmission medium or network.
A. physical B. transport
C. application D. network
C. checksum D. port
A. SNMP B. SSH
C. HTTP D. SMTP
15. The _________ is used to send files from one system to another under user
command.
A. UDP B. SMTP
C. FTP D. SSH
SHORT ANSWER
3. The combination of data from the next higher layer and control information
is known as a __________.
4. The network access protocol appends a network access header to the data it
receives from the transport layer, creating a network access PDU, typically
called a __________.
6. Two protocol architectures have served as the basis for the development of
interoperable protocol standards: the OSI reference model and the ________.
10. In 1995 the Internet Engineering Task Force issued a specification for a next-
generation IP; this specification was turned into a standard in 1996 known as
_________.
11. Features of ________ include mailing lists, return receipts, and forwarding.
12. ________ provides a secure remote logon capability, which enables a user at a
terminal or personal computer to logon to a remote computer and function
as if directly connected to that computer.
13. _________ connects client systems to Web servers on the Internet and its
primary function is to establish a connection with the server and send HTML
pages back to the user’s browser.
15. A _________ is a facility that provides a data transfer service among devices
attached to the network.
Business Data Communications Infrastructure, Networking, and Security, 7th Edition, by
William Stallings and Tom Case
CHAPTER 8: TCP/IP
TRUE OR FALSE
1. T
2. T
3. F
4. F
5. T
6. T
7. T
8. T
9. F
10. F
11. T
12. T
13. T
14. F
15. F
MULTIPLE CHOICE
1. D
Business Data Communications Infrastructure, Networking, and Security, 7th Edition, by
William Stallings and Tom Case
2. D
3. B
4. B
5. D
6. B
7. C
8. A
9. C
10. C
11. B
12. A
13. A
14. D
15. C
SHORT ANSWER
1. Wireless
2. TCP/IP
3. PDU (protocol data unit)
4. packet
5. checksum
6. TCP/IP suite
7. router
8. TCP
9. SNMP (Simple Network Management Protocol)
10. IPv6
11. SMTP (Simple Mail Transfer Protocol)
12. SSH (Secure Shell)
13. HTTP (HyperText Transfer Protocol)
14. ISs (intermediate systems)
15. Communication network