BytArch/source-mini
Text Generation • 0.4B • Updated
• 1
input stringlengths 16 740 | output stringlengths 1 831 |
|---|---|
Match the following descriptions with there functions: This protocol uses port 80. | HTTP (HyperText Transfer Protocol) |
is the protocol for the communication between a web client (a web browser) and a web server. This protocol is not only used a lot on the World Wide Web but also on local networks. The protocol defines the exact format of the requests, the requests of a web browser to the server and the format of the answers, and the responses returned by the web server. Each question contains a URL that refers to a web component or a static object such as a web page. | HTTP (Hypertext Transfer Protocol) |
is an extension on the HTTP protocol with the aim to exchange data safely. When using it, the data are encrypted. This makes it difficult for an outsider to intercept the data. It is in principle HTTP with SSL/TLS being used to encrypt the data and to verify the server. | HTTPS (Hypertext Transfer Protocol Secure) |
This protocol uses TCP port 443. | HTTPS (Hypertext Transfer Protocol Secure) |
HTTP is an example of a Layer 7 application. | True |
The Application Layer 7 provides service to applications that run for the benefit of network system users. | True |
Chrome Web Browser is an example of a Layer 7 application. | False |
Mach the following private IP Address Classes with their IP range. Class B networks | 172.16.0.0 → 172.31.255.255 |
Class C networks | 192.168.0.0 → 192.168.255.255 |
Class A networks | 10.0.0.0 → 10.255.255.255 |
the higher level guideline/requirement is represented here | Protocol |
the size in bytes of the complete IP packet | Total Length |
field of 4 bits that represents the IP version. | Version |
number of the sending participant | Source IP Address |
every time an IP packet passes a router, this value is reduced by 1. If this number is 0 then the relevant router will reject this message. This avoids that a message can exist forever. | Time to Live |
other network information that can be included in the IP header; can be filled with padding zeroes if necessary | Options |
used to follow up on the fragmentation of the packets | Flags |
when an IP packet has to be divided, each packet gets a unique number so that all packets can be merged back correctly on the receiving side | Identification |
if a data packet is divided then this indicates the position of the fragment in the entire packet as an 8-bit unit | Fragment Offset |
a check value for the IP header which every router will recalculate | Header Checksum |
You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use? | 255.255.255.224 |
A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts? | 1 and 5 only |
The IP address 135.1.1.25 mask 255.255.255.248 in CIDR notation | 135.1.1.25/29 |
You have been allocated a class B network address of 135.1.0.0 and and need to create 4 subnets each with around 200 hosts what is the easiest mask to use to satisfy the criteria? | 255.255.255.0 |
How can two different hosts, connected to a different network, at a great distance, communicate with each other? | by routers and the TCP/IP suite |
is a protocol used on Internet, that is the collection of thousands of networks, spread out worldwide, that connects research centers, universities, libraries, companies, individuals, etc. with each other. | TCP/IP |
The IP address 222.1.1.20 mask 255.255.255.192 in CIDR notation is: | 222.1.1.20/26 |
What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask? | 30 |
is a new way of addressing for the Internet which would lead to a more efficient use of IP addresses in comparison to the classes A,B and C. This results directly from the subnetting concept. | CIDER |
Communication between two different hosts over TCP/IP and is called the Client Server model: a Server application waits passively on contact while the Client application starts the communication actively. | True |
In order to make a cross-over cable, we have to switch the used pairs. Along one side, pair 2 has to be connected with pin 3 and pin 6 while pair 3 has to be connected with pin 1 and pin 2. | True |
IEEE802.11 uses CSMA/CD | False |
Due to its huge market share, Ethernet, despite some disadvantages, scores over all alternative technologies. | True |
IEEE 802.3 overlaps OSI Physical Layer 1 and Data Link Layer 2, however it further subdivides Layer 2 into the LLC layer and the MAC layer. | True |
Ethernet is only a specification of layers 1 and 2 in the OSI model. It is not a complete network protocol but a subnet on which other protocols such as the TCP/IP suite can work. | True |
Each level of the OSI model adds a header frame except the Physical Layer, however the Data Link Layer also adds a footer. | True |
OSI is an International Organization for Standardization that has developed the Open Systems Interconnection (OSI) reference model. | False |
ISO is a reference model whereby mutual communication between two systems, e.g. two computers, could take place. | False |
The 802 committee of the Institute for Electrical and Electronic Engineers has established a number of standards for LANs. | True |
The TCP/IP Model consists of 4 layers: Application, Transportation, Network & Network Interface Layers. | True |
The transport layer ensures the transport of messages from one node to the other on the sender's route to the final receiver. | False |
Every participant has an Ethernet address, a physical address that is unique for the network card: the MAC address (Medium Access Control Address) stored on the card's ROM. | True |
For IPv4, this pool is 32-bits (232) in size and contains 4,294,967,296 IPv4 addresses. The IPv6 address space is 128-bits (2128) in size, containing 340,282,366,920,938,463,463,374,607,431,768,211,456 IPv6 addresses. | True |
1. In computer networks, a random quantity of data is not transported uninterruptedly. | True |
IP address are divided into private IP address and public IP address. | True |
The server with the IP address 203.125.72.28/28 and the server with IP address 203.125.72.34/28 do not belong to the same network. | True |
Several Clients and Servers can be active at the same time on computer systems. It is important here that every application is identified unambiguously although the computer, on which several applications run, only has one physical connection with the Internet. For this reason, transport protocols give each communication service a unique name. TCP uses protocol port numbers. A specific protocol port number is assigned to each Server. The Server waits passively for communication via this port number. When sending a request, the Client mentions the port number of the required service. The TCP software on the Server's computer uses the destination port number in an incoming message to determine which Server has to handle the request. | True |
The given IP address of a host is 192.168.100.102/27. The host 192.168.100.96/27 is in the a different network. | False |
Transport Layer Security (TLS), the successor to Secure Sockets Layer (SSL), is an encryption protocol for creating a secure data channel on an insecure network such as the internet. Both protocols run on the Presentation Level 6. | True |
The variants on the basis of twisted pair have evolved from 10Base-T (10Mbps) to 100Base-T (100Mbps) to 1000Base-T (1000Mbps). | True |
A typical example of UDP is real time audio loosing data packets is a shame but has no influence on the further functioning of the application. | True |
Dynamic VLANs: are not based on ports of a switch but on the address of the user or the used protocol. | True |
Chrome Web Browser is an example of a Layer 7 application. | False |
Match the IEEE Working Group with its task. | IEEE802.11: Wireless LAN & Mesh (Wi-Fi certification), IEEE802.3: CSMA CD (Ethernet), IEEE802.15: Wireless PAN |
Match the description with the OSI Layer. Options: This layer provides service to applications that run for the benefit of network system users.; The control structure of the dialogue (session) between two applications over the network is provided for here, as well as the setting up and termination of such a session.; The protocols of layer 2 specify how the frames eventually will be converted to a signal on the transmission medium. | Application Layer (7): This layer provides service to applications that run for the benefit of network system users.; Session Layer (5): The control structure of the dialogue (session) between two applications over the network is provided for here, as well as the setting up and termination of such a session.; Data Link Layer: The protocols of layer 2 specify how the frames eventually will be converted to a signal on the transmission medium. |
Each level of the OSI model adds a header frame except the Physical Layer, however the Data Link Layer also adds a footer. | True |
OSI is an International Organization for Standardization that has developed the Open Systems Interconnection (OSI) reference model. | False |
ISO is a reference model whereby mutual communication between two systems, e.g. two computers, could take place. | False |
The 802 committee of the Institute for Electrical and Electronic Engineers has established a number of standards for LANs. | True |
The TCP/IP Model consists of 4 layers: Application, Transportation, Network & Network Interface Layers. | True |
The transport layer ensures the transport of messages from one node to the other on the sender’s route to the final receiver. | False |
Which of the following is not a function of the Physical Layer? a. Data transformation; b. data encoding; c. bit synchronisation; d. multiplexing | a. Data transformation |
The function of data encoding is... a. converting data into a form that can be transmitted over a physical medium; b. translating data from one format to another; c. compressing data to reduce its size; d. convert data from bits to a physical medium signal. | d. convert data from bits to a physical medium signal. |
The physical layer ensures the transport of messages from one node to the other on the sender's route to the final receiver. | False |
The main characteristic of a bus topology is... | d. a single shared cable with terminators at the end. |
Match the Ethernet version with its characteristics. Options: Gigabit Ethernet over twisted pair, Fast Ethernet Network speed up to 100 Mbps, full-duplex Ethernet, Ethernet over twisted pair. Uses UTP (unshielded twisted pair) 3 cable, utilizing only 2 of the 4 pairs of wires. | IEEE802.3ab 1000Base-T: Gigabit Ethernet over twisted pair, IEEE802.3u 100Base-T: Fast Ethernet, IEEE802.3x: full-duplex Ethernet, IEEE802.3i - 10Base-T: Ethernet over twisted pair. Uses UTP (unshielded twisted pair) 3 cable, utilizing only 2 of the 4 pairs of wires. |
The maximum length of a coaxial bus segment is 185m. | True |
100Base-T is a variant of the Ethernet standard and runs over UTP category 5 cables and has a full duplex capability. | True |
100Base-T and 1000Base-T are variants on the basis of twisted pair have evolved from 10Base-T. | True |
Which of the following describes the characteristics of the 10Base-2 standard? a. Runs over coaxial cable; b. Data transmission at a speed of 100Mbps; c. Data transmission at a speed of 10Mbps, runs over coax cable, can be full-duplex with a switch; d. Runs over twisted pair. | c. Data transmission at a speed of 10Mbps, runs over coax cable, can be full-duplex with a switch. |
The IEEE specification for Ethernet 10/100Base-T requires that the one used pair is connected to pin ___ and pin ___ of the connector while the second pair is connected to pin ___ and pin __. | 1, 2, 3, 6 |
In order to make a cross-over cable, we have to switch the used pairs. Along one side, pair 2 has to be connected with pin 3 and pin 6 while pair 3 has to be connected with pin 1 and pin 2. | True |
Due to its huge market share, Ethernet, despite some disadvantages, scores over all alternative technologies. | True |
Ethernet is only a specification of layers 1 and 2 in the OSI model. It is not a complete network protocol. | True |
Match the following fields of an Ethernet data frame. Options: FCS, DATA, TYPE, Destination address. | FCS: the check sum is a 4-byte CRC value that the sender creates and sends. The receiver can check the integrity of the data with this code.; DATA: the data field contains the data to be sent. This data field is transparent- this means that the content of this field is completely free for Ethernet. Only the length has to be a minimum of 46 bytes and not more than 1500 bytes.; TYPE: The IEEE802.3 defines this field as LENGTH field in order to be able to send the number of actual data bytes.; Destination address: The destination MAC address field identifies the station or the stations for which the frame is destined. |
Dynamic VLANs are not based on ports of a switch but on the address of the user or the used protocol. | True |
Spanning Tree Protocol (STP) prevents network loops by creating a logical tree topology of the network. | True |
A Hub is a Repeater with multiple ports and operates at OSI Layer... | 1 |
You can find out the manufacturer of any network device's Network Interface Card (NIC) by the ___ of the Media Access Control (MAC) address. | highest 3 bytes |
A Switch is a Bridge with multiple ports and operates at OSI Layer... | 2 |
IEEE802.11 uses CSMA/CD | False |
Match the 3 TCP techniques to their description. Options: Acknowledgement and retransmission, Connection Management, Flow control. | Acknowledgement and retransmission: When TCP receives data, it sends an acknowledgement to the sender. Every time that TCP sends data it starts a timer. If the timer ends before the confirmation was received, then the sender sends the data again.; Connection Management: In order to guarantee that connections are made and ended in a reliable way, TCP uses a three-way handshake in which three messages are exchanged...; Flow control: In order to avoid that the receiver is inundated with data when the sender can send faster than the receiver can process... |
Match the TCP header fields with their description. Options: Source port, Destination port, Acknowledgement number, Sequence number. | Source port: contains the number of the logical communication port of the sender; Destination port: contains the number of the logical communication port of the receiver; Acknowledgement number: contains the sequence number of the byte that is expected next from the sender; Sequence number: contains the sequence number of the first byte of data in the current segment. |
A UDP segment consists of a header of 8 bytes followed by the data. The header consists of the following. Match the segments with their descriptions. Options: Length (2 bytes), Destination port (2 bytes), Checksum (2 bytes), Source port (2 bytes). | Length (2 bytes): the length in bytes of the UDP header and the encapsulated data.; Destination port (2 bytes): port of the application to which this message is destined.; Checksum (2 bytes): Checks for errors in transmission.; Source port (2 bytes): port number of the sender; this is equal to zero if no port is used. |
A typical example of UDP is real time audio loosing data packets is a shame but has no influence on the further functioning of the application. | True |
Please match the descriptions to either Client or Server software. | Client software: Is an application program that temporarily becomes a Client when remote access to a computer is required but that also carries out local calculations and operations.; Client software: Does not require special hardware or an advanced control system; Client software: Runs locally on the user's PC.; Server software: Is a specially designed application program that supplies one specific service but can handle different Clients at the same time.; Client software: Establishes active contact with a Server; Client software: Is directly started by the user and is only carried out for one session.; Client software: If necessary, can access several Servers but establishes active contact with one Server at a time.; Server software: Is automatically activated when a system starts and remains active for many sessions |
Communication between two different hosts over TCP/IP and is called the Client Server model: a Server application waits passively on contact while the Client application starts the communication actively. | True |
Several Clients and Servers can be active at the same time on computer systems. It is important here that every application is identified unambiguously although the computer, on which several applications run, only has one physical connection with the Internet. For this reason, transport protocols give each communication service a unique name. TCP uses protocol port numbers. A specific protocol port number is assigned to each Server. The Server waits passively for communication via this port number. When sending a request, the Client mentions the port number of the required service. The TCP software on the Server's computer uses the destination port number in an incoming message to determine which Server has to handle the request. | True |
TLS provides the following safeguards for client/server applications via TCP/IP, please match the function and its description. Options: Privacy, Authentication, Integrity. | Privacy: data that are transferred between applications cannot be misused or read.; Authentication: an application permitted to verify the identity of another application with which it is communicating.; Integrity: applications detect whether data have been amended during transmission. |
Please select the 3 functions of the Presentation Layer 6. Options: a. Data Format; b. Compression; c. Control Structure; d. Addressing; e. Encryption | Compression, Encryption, Data Format |
Transport Layer Security (TLS), the successor to Secure Sockets Layer (SSL), is an encryption protocol for creating a secure data channel on an insecure network such as the internet. Both protocols run on the Presentation Level 6. | True |
Mach the following private IP Address Classes with their IP range. Options: Class B networks, Class C networks, Class A networks. | Class A networks: 10.0.0.0-10.255.255.255, Class B networks: 172.16.0.0-172.31.255.255, Class C networks: 192.168.0.0-192.168.255.255 |
The concept of Classless Inter-Domain Routing allows for more efficient use of IP addresses. a. CIDR; b. HTTP; c. MAC; d. CIDER | a. CIDR |
For IPv4, this pool is 32-bits (2^32) in size and contains 4,294,967,296 IPv4 addresses. The IPv6 address space is 128-bits (2^128) in size, containing 340,282,366,920,938,463,463,374,607,431,768,211,456 IPv6 addresses. | True |
An IP address is a 48 bit number used to uniquely identify a computer or other device on a TCP/IP network. | False |
What is the decimal equivalent of the binary number 00000010? | 2 |
What is the decimal equivalent of the binary number 00000100? | 4 |
What is the decimal equivalent of the binary number 10101010? | 170 |
A broadcast IP address of a subnet can be used to send a message to all the computers in that subnet. | True |
The variants on the basis of twisted pair have evolved from 10Base-T (10Mbps) to 100Base-T (100Mbps) to 1000Base-T (1000Mbps). | True |