Business Data Networks and Security, 11e (Panko)
Chapter 8 TCP/IP Internetworking I
1) Ethernet standards are set at the ________.
A) physical layer
B) transport layer
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 1a
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology, Application of Knowledge
2) TCP/IP standards are set at the ________.
A) physical layer
B) transport layer
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Basic
Question: 1b
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology, Application of Knowledge
3) UDP is a standard for ________.
A) packet delivery
B) supervision
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 1c
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
4) DNS is a ________ protocol.
A) packet delivery
B) supervisory
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Basic
Question: 1d
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
5) Router sockets for wire and optical fiber cords are called ________.
A) sockets
B) plugs
C) interfaces
D) ports
Answer: C
Difficulty: Basic
Question: 2a
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology
6) For cost reasons, you should ________ where you can, ________ where you must.
A) switch; switch
B) route; route
C) switch; route
D) route; switch
Answer: C
Difficulty: Basic
Question: 2b
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology
7) Which of the following is one of the three parts of an IPv4 address?
A) subnet part
B) subnet mask
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Deeper
Question: 3a
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
8) The network part of an IPv4 address is ________ bits long.
A) 8
B) 16
C) 32
D) 64
Answer: A
Difficulty: Basic
Question: 3b
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology, Application of Knowledge
9) The total length of an IPv4 address is ________ bits.
A) 8
B) 16
C) 32
D) 64
Answer: C
Difficulty: Basic
Question: 3c
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology
10) In the IPv4 address 1.2.3.4, what is the network part?
A) 1
B) 1.2
C) 1.2.3
D) We cannot say.
Answer: D
Difficulty: Basic
Question: 3d
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology, Application of Knowledge
11) If you see an IPv4 address, what do you know for certain?
A) the total length
B) the length of the network part
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 3e
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
12) A border router connects different IP ________.
A) subnets
B) networks
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Deeper
Question: 4a
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
13) An internal router connects different IP ________.
A) subnets
B) networks
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Deeper
Question: 4b
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
14) A mask has ________ bits.
A) 8
B) 16
C) 32
D) 64
Answer: C
Difficulty: Basic
Question: 5a
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology
15) In a network mask, the 1s correspond to the ________.
A) network part
B) subnet part
C) host part
D) Internet part
Answer: A
Difficulty: Basic
Question: 5b
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology
16) In a subnet mask, the 1s correspond to the ________.
A) network part
B) subnet part
C) host part
D) all of the above
Answer: D
Difficulty: Deeper
Question: 5c
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
17) In the mask 255.255.255.0, how many 1s are there?
A) 8
B) 16
C) 24
D) 48
Answer: C
Difficulty: Basic
Question: 6a
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology, Application of Knowledge
18) In the mask /14, how many 1s are there?
A) 8
B) 16
C) 24
D) none of the above
Answer: D
Difficulty: Basic
Question: 6b
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology
19) Express the mask /24 in dotted decimal notation.
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) none of the above
Answer: C
Difficulty: Basic
Question: 6c
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology, Application of Knowledge
20) Express the mask /18 in dotted decimal notation.
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) none of the above
Answer: D
Difficulty: Deeper
Question: 6c
Objective: Define hierarchical IP address concepts.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
21) The Internet is organized in a ________.
A) hierarchy
B) ring
C) mesh
D) none of the above
Answer: C
Difficulty: Basic
Question: 7
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology
22) In a routing table, a ________ represents a route for a group of IP addresses.
A) row
B) column
C) schema
D) metric
Answer: A
Difficulty: Basic
Question: 8a
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
23) There is a row for each host address in a(n) ________.
A) routing table
B) Ethernet switching table
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Basic
Question: 8b
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
24) For 100,000 addresses, which will have fewer rows?
A) a routing table
B) an Ethernet switching table
C) Both will be about the same number of rows.
Answer: A
Difficulty: Deeper
Question: 8c
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
25) If no other row matches, the router will select the ________ row as its best match.
A) First
B) Last
C) either A or B, depending on the circumstances
D) neither A nor B
Answer: B
Difficulty: Deeper
Question: 9d
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
26) In a routing table, Rows 47 and 3497 both match the destination IP address of an arriving packet’s IP address. What row will the router look at first when trying to find matching rows?
A) 1
B) 47
C) 3497
D) the default row
Answer: A
Difficulty: Deeper
Question: 9d
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
27) A packet arrives at a router with destination IP address 62.17.3.2. Row 47 has the destination value 62.17.4.0. Is Row 47 a match?
A) Yes
B) No
C) impossible to determine
Answer: B
Difficulty: Deeper
Question: 9e
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
28) A packet arrives at a router with destination IP address 128.171.3.2. Row 47 has the destination value 128.171.0.0. Is Row 47 a match?
A) Yes
B) No
C) impossible to determine
Answer: A
Difficulty: Deeper
Question: 9f
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
29) The first step in the routing process involves ________.
A) selecting the best match row
B) comparing the packet’s destination IP address to all rows
C) comparing the packet’s destination IP address to matching rows
D) selecting an interface
Answer: B
Difficulty: Deeper
Question: 10a
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology
30) The second step in the routing process involves ________.
A) selecting the best-match row
B) comparing the packet’s destination IP address to all rows
C) comparing the packet’s destination IP address to matching rows
D) selecting an interface
Answer: A
Difficulty: Basic
Question: 10a
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology
31) A(n) ________ must find the best-matching row in its ________ table by comparing multiple row matches.
A) Ethernet switch; switching
B) router; routing
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Deeper
Question: 8d
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
32) If any row other than the default row matches an IPv4 address, the router will ________.
A) always choose the default row
B) sometimes choose the default row
C) never choose the default row
D) impossible to determine
Answer: C
Difficulty: Basic
Question: 10b
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
33) Row 2707 has the mask /16 and the cost metric 20. Row 4400 has the mask /14 and the cost metric 10. The default row has a metric cost of 2. Which row will the router choose if both are matches?
A) 2707
B) 4400
C) 2
D) impossible to determine
Answer: A
Difficulty: Deeper
Question: 10d
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
34) Row 2707 has the mask /16 and the reliability metric 20. Row 4400 has the mask /16 and the reliability metric 10. Which row will the router choose if both are matches?
A) 2707
B) 4400
C) either A or B
D) The router will choose the default row.
Answer: A
Difficulty: Deeper
Question: 10i
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
35) Deciding what interface and to what device to send the packet back out is step ________ in the routing process.
A) 1
B) 2
C) 3
D) none of the above.
Answer: C
Difficulty: Basic
Question: 11a
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology
36) Router ports are called ________.
A) sockets
B) plugs
C) interfaces
D) ports
Answer: C
Difficulty: Basic
Question: 11b
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology
37) In the final step, the router sends the packet ________.
A) to a particular device
B) out a particular interface
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Deeper
Question: 11d
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology, Application of Knowledge
38) The next-hop router listed in the last row is the ________ router.
A) local
B) best-match
C) socket
D) default
Answer: D
Difficulty: Deeper
Question: 11e
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology
39) If the next-hop router field in the best-match row says “local”, the router should address the packet to the ________.
A) local router
B) default router
C) destination host
D) none of the above.
Answer: C
Difficulty: Deeper
Question: 12a
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
40) If a router receives 20 packets in a row going to the same destination IP address, the standard calls for it to ________.
A) go through all three steps for each
B) use the decision it made for the first one
C) send them via different routers to create load balancing along different routes
D) none of the above
Answer: A
Difficulty: Basic
Question: 12a
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology
41) In decision cashing, when 20 packets arrive to the same destination IP address, the router will ________.
A) go through all three steps for each
B) use the decision it made for the first one
C) send them via different routers to create load balancing along different routes
D) none of the above
Answer: B
Difficulty: Basic
Question: 12b
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology
42) Decision caching ________.
A) reduces routing costs
B) is safe
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 12c
Objective: Explain how routers process arriving IPv4 addresses.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
43) The main version of Internet Protocol in use today is IP version ________.
A) 1
B) 4
C) 5
D) 6
Answer: B
Difficulty: Basic
Question: 14a
Objective: Describe the IPv4 fields we did not see in Chapter 2.
AACSB: Applying Information Technology
44) In IPv4, the ________ field is used to deal with congestion in the Internet.
A) ECN
B) DiffServ
C) time to live
D) header checksum
Answer: A
Difficulty: Basic
Question: 14c
Objective: Describe the IPv4 fields we did not see in Chapter 2.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
45) the identification field in IPv4 is used for ________.
A) route fragmentation
B) frame fragmentation
C) application message fragmentation
D) packet fragmentation
Answer: D
Difficulty: Deeper
Question: 15b
Objective: Describe the IPv4 fields we did not see in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
46) Which of the following allows packet fragmentation?
A) IPv4
B) IPv6
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Deeper
Question: 15d
Objective: Describe the IPv4 fields we did not see in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
47) A router will discard a packet if the Time to Live (TTL) value in an arriving packet is ________.
A) 0
B) 1
C) 254
D) 256
Answer: B
Difficulty: Deeper
Question: 16a
Objective: Describe the IPv4 fields we did not see in Chapter 2.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
48) In an IPv4 packet, the ________ field value tells the type of message contained in the IP packet’s data field.
A) data
B) next-hop
C) next-header
D) protocol
Answer: D
Difficulty: Basic
Question: 16c
Objective: Describe the IPv4 fields we did not see in Chapter 2.
AACSB: Applying Information Technology
49) The version of Internet Protocol that is growing rapidly is IP version ________.
A) 1
B) 2
C) 4
D) none of the above
Answer: D
Difficulty: Basic
Question: 18a
Objective: Describe IPv6 header fields.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
50) Which is a problem with IPv4 addresses?
A) They are incompatible with wireless devices.
B) They are too complex.
C) Routers find it difficult to handle them.
D) We have run out of them.
Answer: D
Difficulty: Basic
Question: 18a
Objective: Describe IPv6 header fields.
AACSB: Applying Information Technology, Application of Knowledge
51) The main benefit of IPv6 over IPv4 is ________.
A) having two more bits in the IP address
B) having two more bytes in the IP address
C) the ability to have quality-of-service guarantees
D) the ability to support more hosts
Answer: D
Difficulty: Deeper
Question: 18b
Objective: Describe IPv6 header fields.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
52) What is pushing IPv6 adoption now?
A) pressure from ISPs
B) pressure from the IETF
C) pressure from ISO
D) none of the above
Answer: D
Difficulty: Deeper
Question: 19
Objective: Describe IPv6 header fields.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
53) IPv6 addresses help to ________.
A) simplify writing
B) simplify memorization
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Deeper
Question: 20a
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
54) Simplification of IPv6 addresses must be standardized ________.
A) to maximize text compression
B) for the retrieval of IPv6 addresses in text fields of documents and spreadsheets
C) both A and B
D) neither A nor B
Answer: B
Difficulty: Deeper
Question: 20b
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
55) In IPv6 address simplification, text characters are expressed in ________.
A) upper case
B) lower case
C) either A or B
D) neither A nor B
Answer: B
Difficulty: Basic
Question: 20c
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology
56) For human reading, IPv6 addresses are written in ________ notation.
A) dotted decimal
B) hexadecimal
C) binary
D) all of the above
Answer: B
Difficulty: Deeper
Question: 20d
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Application of Knowledge
57) In IPv6 addresses before simplification, there are ________ in a field.
A) 4 symbols
B) 16 bits
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Deeper
Question: 20e
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
58) In IPv6 addresses before simplification, there are ________ in a field.
A) 2 symbols
B) 8 bits
C) both A and B
D) neither A nor B
Answer: D
Difficulty: Deeper
Question: 20f
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
59) In IPv6 addresses, ________ are separated by ________.
A) segments; dots
B) segments; colons
C) fields; dots
D) fields; colons
Answer: D
Difficulty: Deeper
Question: 20g
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology
60) How many fields are there in an IPv6 address written for human reading?
A) 8
B) 16
C) 32
D) 128
Answer: A
Difficulty: Deeper
Question: 20h
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
61) If I simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef, I get ________.
A) 2001:0:0:fe::cdef
B) 2001::fe:0:0:0:cdef
C) 2001:0:0:fe:0:0:0:cdef
D) 2001::00fe:0::cdef
Answer: A
Difficulty: Deeper
Question: 21a
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
62) If I simplify the address 2001:0ed2:056b:00d3:00c0:abcd:0bcd:0fe0, I get ________.
A) 2001:ed2:56b:d3:c0:abcd:bcd:0fe0
B) 2001:ed2:56b:d3:c:abcd:bcd:0fe
C) either A or B
D) neither A nor B
Answer: A
Difficulty: Deeper
Question: 21b
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
63) If I simplify the IPv4address 2001:0000:0000:00fe:3270:0000:0000:cdef., I get ________.
A) 2001:0:0:00fe:3270:0:0:cdef
B) 2001::00fe:3270:0:0:cdef
C) 2001:0:0:00fe:3270::cdef
D) 2001::00fe:3270::cdef
Answer: C
Difficulty: Deeper
Question: 21c
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
64) Which RFC standardizes how to write IPv6 addresses in canonical form?
A) RFC 791
B) RFC 2707
C) RFC 5952
D) RFC 7600
Answer: C
Difficulty: Deeper
Question: 21f
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology
65) The version number field in IPv6 has the value ________.
A) 0001
B) 0100
C) 0101
D) 0110
Answer: D
Difficulty: Deeper
Question: 22a
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
66) The diffserv field in IPv4 is for ________.
A) congestion
B) compression
C) quality of service
D) options
Answer: C
Difficulty: Basic
Question: 22b
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
67) The packets in an IPv6 flow are handed ________.
A) sequentially
B) in parallel
C) in ripples
D) identically
Answer: D
Difficulty: Deeper
Question: 22c
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
68) IPv6 uses ________ to know the packet length.
A) header length fields
B) total length fields
C) payload lengths
D) hop limits
Answer: C
Difficulty: Deeper
Question: 22d
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology
69) In IPv6, the payload length gives the number of octets in the ________.
A) entire packet
B) entire packet minus the main header
C) entire packet minus the main and extension headers
D) entire packet minus the extension headers
Answer: B
Difficulty: Deeper
Question: 22e
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology
70) The hop limit field in IPv6 corresponds to the ________ field in IPv4
A) header checksum
B) protocol
C) length
D) none of the above
Answer: D
Difficulty: Basic
Question: 22f
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
71) Which of the following checks for errors in the packet header?
A) IPv4
B) IPv6
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 22g
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Application of Knowledge
72) Using a header checksum field to check for errors ________.
A) increases routing time
B) decreases routing time
C) makes the protocol reliable
D) checks the entire packet to look for errors
Answer: A
Difficulty: Deeper
Question: 22h
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
73) Which has a better system for handling options beyond the main header?
A) IPv4
B) IPv6
C) Both use the same method.
D) Neither can handle options.
Answer: B
Difficulty: Basic
Question: 23a
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology
74) ________ are the only extension headers that all routers must consider.
A) Destination options
B) Mobility headers
C) Encapsulating security protocol headers
D) Hop-by-hop options
Answer: D
Difficulty: Deeper
Question: 23c
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
75) If you see 0 in the Next Header Field of a header, what will follow this header?
A) hop-by-hop options
B) destination options
C) mobility header
D) none of the above
Answer: A
Difficulty: Deeper
Question: 23e
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
76) The terms payload and data field ________ in IPv6.
A) are synonymous
B) have nothing in common
C) are related but different
D) none of the above
Answer: C
Difficulty: Deeper
Question: 23f
Objective: Describe how to write IPv6 addresses in canonical notation.
AACSB: Applying Information Technology
77) Sequence numbers are ________ bits long.
A) 8
B) 16
C) 24
D) 32
Answer: D
Difficulty: Basic
Question: 24a
Objective: Explain TCP segment fields and UDP datagram fields that we did not see in Chapter 2.
AACSB: Applying Information Technology
78) One-bit fields are called ________ fields.
A) SYN
B) flag
C) ACK
D) none of the above
Answer: B
Difficulty: Basic
Question: 24b
Objective: Explain TCP segment fields and UDP datagram fields that we did not see in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
79) TCP has ________ flag field(s).
A) 1
B) 2
C) 6
D) 9
Answer: D
Difficulty: Deeper
Question: 24b
Objective: Explain TCP segment fields and UDP datagram fields that we did not see in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
80) If someone says that a 1-bit flag is not set, this means its value is ________.
A) 0
B) 1
C) blank
D) We cannot say.
Answer: A
Difficulty: Basic
Question: 24b
Objective: Explain TCP segment fields and UDP datagram fields that we did not see in Chapter 2.
AACSB: Applying Information Technology
81) A TCP ________ segment is a request to the other transport process to close a connection.
A) FIN
B) ACK
C) CLS
D) SYN
Answer: A
Difficulty: Basic
Question: 25a
Objective: Explain TCP segment fields and UDP datagram fields that we did not see in Chapter 2.
AACSB: Applying Information Technology
82) Four-way closes use ________ segments.
A) FIN
B) RST
C) either A or B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 25b
Objective: Explain TCP segment fields and UDP datagram fields that we did not see in Chapter 2.
AACSB: Applying Information Technology
83) An abrupt close uses a ________ segment.
A) FIN
B) RST
C) either A or B
D) neither A nor B
Answer: B
Difficulty: Basic
Question: 25b
Objective: Explain TCP segment fields and UDP datagram fields that we did not see in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
84) Which of the following segments types is acknowledged?
A) FIN
B) RST
C) Both of the above are acknowledged.
D) Neither A nor B is acknowledged.
Answer: A
Difficulty: Basic
Question: 25d
Objective: Explain TCP segment fields and UDP datagram fields that we did not see in Chapter 2.
AACSB: Applying Information Technology, Application of Knowledge
85) Which of the following can handle an application message that is one megabyte in size?
A) TCP
B) UDP
C) both A and B
D) neither A nor B
Answer: A
Difficulty: Basic
Question: 26a
Objective: Describe why UDP cannot handle long application messages.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
86) The maximum application message size when UDP is used at the transport layer is approximately ________.
A) 16,000 bytes
B) 64,000 bytes
C) 1 million bytes
D) none of the above
Answer: B
Difficulty: Deeper
Question: 26c
Objective: Describe why UDP cannot handle long application messages.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
PAGE \* MERGEFORMAT 22
Copyright © 2019 Pearson Education, Inc.