Vous êtes sur la page 1sur 16

Home > Chapter 11 > Quizzes

Course-wide Content
Lab Assignments
Quizzes
(See related pages)

Chapter 11
Quizzes
Quizzes Results Reporter
More Resources
Java Applets
Student Solutions Out of 20 questions, you answered 10 correctly with a final grade of 50%
10 correct (50%)
10 incorrect (50%)
0 unanswered (0%)
Your Results:
The correct answer for each question is indicated by a .

1 CORRECT HDLC is an acronym for _______.

A) High-Duplex Line Communication

B) Half-Duplex Link Combination

C) High-Level Data Link Control

D) Host Double-Level Circuit

2 CORRECT The shortest frame in HDLC protocol is usually the _______ frame.

A) information

B) management

C) supervisory

D) None of the choices are correct

3 CORRECT The address field of a frame in HDLC protocol contains the address of the _______ station.

A) primary

B) secondary

C) tertiary

D) primary or secondary

4 CORRECT The HDLC _______ field defines the beginning and end of a frame.

A) control

B) flag

C) FCS

D) None of the choices are correct

5 CORRECT What is present in all HDLC control fields?

A) N(R)

B) N(S)

C) Code bits

D) P/F bit

6 CORRECT According to the PPP transition-phase diagram, options are negotiated in the _______ state.

A) networking

B) terminating

C) establishing

D) authenticating

7 CORRECT According to the PPP transition-phase diagram, verification of user identification occurs in the _______ state.

A) networking

B) terminating

C) establishing

D) authenticating

8 CORRECT In the PPP frame, the _______ field defines the contents of the data field.

A) FCS

B) flag

C) control

D) protocol

9 In the PPP frame, the _______ field is similar to that of the U-frame in HDLC.
INCORRECT
A) flag

B) protocol

C) FCS

D) control

10 In the PPP frame, the _______ field has a value of 11111111 to indicate the broadcast address of HDLC.
INCORRECT
A) protocol

B) address

C) control

D) FCS

11 In PPP, what is the purpose of LCP packets?


INCORRECT
A) Configuration

B) Termination

C) Option negotiation

D) All of the choices are correct

12 In the PPP frame, the _______ field is for error control.


INCORRECT
A) FCS

B) flag

C) control

D) protocol

13 For CHAP authentication, the user takes the system’s _______ and its own _______ to create a result that is then sent to the system.
INCORRECT
A) authentication identification; password

B) password; authentication identification

C) challenge value; password

D) password; challenge value

14 In byte stuffing, we need sometimes to add a (an) ___________ in the payload.


INCORRECT
A) flag byte

B) ESC byte

C) null byte

D) None of the choices are correct

15 In bit stuffing, we sometimes need to add an extra ___________ bit in the payload.
CORRECT
A) 0’s

B) 1’s

C) 0’s or 1’s

D) None of the choices are correct

16 HDLC is a ________ oriented protocol


CORRECT
A) byte

B) bit

C) byte or bit

D) None of the choices are correct

17 PPP is a ________ oriented protocol


INCORRECT
A) byte

B) bit

C) byte or bit

D) None of the choices are correct

18 In PPP, the address field defines ___________ of the packet.


INCORRECT
A) the sender

B) the receiver

C) either the sender or the receiver

D) None of the choices are correct

19 In PPP, the ___________ field defines the type of payload encapsulated in the frame.
INCORRECT
A) address

B) control

C) protocol

None of the choices are correct


D)

20 In PPP, the CHAP protocol uses ____________ steps to authenticate the parties in communication.
INCORRECT
A) one

B) two

C) three

D) None of the choices are correct

E-mail Your Results

Date: Fri Dec 08 2017 12:41:33 GMT-0500 (EST)Fri Dec 08 2017 12:22:16 GMT-0500 (EST)
My name:

Section ID:
E-mail these results to:
E-mail address: Format:
Me: HTML

My Instructor: HTML

My TA: HTML

Other: HTML

E-mail The Results

To learn more about the book this website supports, please visit its Information Center.

Copyright 2017 McGraw-Hill Global Education Holdings, LLC. All rights reserved.
Any use is subject to the Terms of Use and Privacy Center | Report Piracy
Home > Chapter 17 > Quizzes

Course-wide Content
Lab Assignments
Quizzes
(See related pages)

Chapter 17
Quizzes
Quizzes Results Reporter
More Resources
Java Applets
Student Solutions Out of 10 questions, you answered 7 correctly with a final grade of 70%
7 correct (70%)
3 incorrect (30%)
0 unanswered (0%)
Your Results:
The correct answer for each question is indicated by a .

1 CORRECT A VLAN is a local area network configured by_____________.

A) software

B) physical wiring

C) software or physical wiring

D) None of the choices are correct

2 CORRECT A repeater is a connecting device that operates in the _______ layer(s).

A) physical

B) physical and data-link

C) data-link and network

D) physical, data-link, and network

3 CORRECT A link-layer switch is a connecting device that operates in the _______ layer(s).

A) physical

B) physical and data-link

C) data-link and network

D) physical, data-link, and network

4 CORRECT A router is a connecting device that operates in the _______ layer(s).

A) physical

B) physical and data-link

C) data-link and network

D) physical, data-link, and network

5 CORRECT A _________ has no filtering capability.

A) repeater

B) link-layer switch

C) router

D) None of the choices are correct

6 CORRECT A three-layer switch is a __________.

A) repeater

B) link-layer switch

C) router

D) None of the choices are correct

7 A router filters packets based on the __________ destination addresses.


INCORRECT
A) data-link

B) network-layer

C) transport-layer

D) None of the choices are correct

8 A link-layer switch filters packets based on the __________ destination addresses.


INCORRECT
A) data-link

B) network-layer

C) transport-layer

D) None of the choices are correct

9 Looping problems in a set of swtiches can be eliminated using ___________ algorithm.


INCORRECT
A) routing

B) spanning-tree

C) forwarding

D) None of the choices are correct

10 Membership in a VLAN can be based on ________.


CORRECT
A) interface numbers

B) MAC addresses

C) IP addresses

D) All of the choices are correct

E-mail Your Results

Date: Fri Dec 08 2017 12:45:34 GMT-0500 (EST)Fri Dec 08 2017 12:41:54 GMT-0500 (EST)
My name:

Section ID:
E-mail these results to:
E-mail address: Format:
Me: HTML

My Instructor: HTML

My TA: HTML

Other: HTML

E-mail The Results

To learn more about the book this website supports, please visit its Information Center.

Copyright 2017 McGraw-Hill Global Education Holdings, LLC. All rights reserved.
Any use is subject to the Terms of Use and Privacy Center | Report Piracy
Home > Chapter 18 > Quizzes

Course-wide Content
Lab Assignments
Quizzes
(See related pages)

Chapter 18
Quizzes
Quizzes Results Reporter
More Resources
Java Applets
Student Solutions Out of 26 questions, you answered 13 correctly with a final grade of 50%
13 correct (50%)
13 incorrect (50%)
0 unanswered (0%)
Your Results:
The correct answer for each question is indicated by a .

1 CORRECT Packetizing at the network layer involves ___________________________.

A) encapsulating the payload at the source

B) adds a header that contains the source and destination information

C) decapsulating the payload at the destination

D) All of the choices are correct

2 Routers in the path are not allowed to ___________________________.


INCORRECT
A) fragment the packet they receive

B) decapsulate the packet

C) change source or destination address

D) All of the choices are correct

3 CORRECT The network layer in the Internet provides _________________.

A) comprehensive error and flow control

B) limited error control, but no flow control

C) comprehensive error control but limited flow control

D) All of the choices are correct

4 CORRECT In a virtual-circuit approach, the forwarding decision is based on the value of the _____________ field
in the packet header.
A) source address

B) destination address

C) label

D) None of the choices are correct

5 CORRECT In a datagram approach, the forwarding decision is based on the value of the _____________ field in
the packet header.
A) source address

B) destination address

C) label

D) None of the choices are correct

6 CORRECT The performance of a network can be measured in terms of ________.

A) delay

B) throughput

C) packet loss

D) All of the choices are correct

7 CORRECT Transmission delay (time) is the ratio of______________________.

A) transmission rate to packet length


B) transmission rate to distance

C) packet length to transmission rate

D) processing time to transmission rate

8 CORRECT Propagation delay (time) is the ratio of______________________.

A) transmission rate to propagation speed

B) propagation speed to distance

C) packet length to propagation speed

D) distance to propagation speed

9 CORRECT When the load in the network reaches the network capacity, the packet delay ___________ and the
network throughput reaches ______________.
A) increases sharply; its minimum

B) increases sharply; its maximum

C) decreases sharply; its minimum

D) decreases sharply; its maximum

10 In open-loop congestion control, policies are applied ____________________.


CORRECT
A) to prevent congestion before it happens

B) to alleviate congestion after it happens

C) to either prevent congestion before it happens or alleviate congestion after it happens

D) None of the choices are correct

11 The __________________ technique is one of the open-loop congestion policies.


INCORRECT
A) backpressure

B) choke packet

C) implicit signaling

D) None of the choices are correct

12 The__________________ technique is one of the close-loop congestion policies.


INCORRECT
A) acknowledgment policy

B) choke packet

C) discarding policy

D) None of the choices are correct

13 An IPv4 address is normally represented in base ____ in dotted-decimal notation.


INCORRECT
A) 16

B) 256

C) 10

D) None of the choices are correct

14 In classful addressing, the IPv4 address space is divided into _______ classes.
INCORRECT
A) 3

B) 4

C) 5

D) None of the choices are correct

15 The number of addresses assigned to an organization in classless addressing _______.


INCORRECT
A) can be any number

B) must be a multiple of 256

C) must be a power of 2

D) None of the choices are correct

16 The first address assigned to an organization in classless addressing _______.


INCORRECT
A) must be evenly divisible by the number of addresses in the organization
B) must be divisible by 128

C) must belong to one of the A, B, or C classes

D) None of the choices are correct

17 In subnetting, the number of addresses in each subnet must _______.


INCORRECT
A) be a power of 2

B) be a multiple of 128

C) be divisible by 128

D) None of the choices are correct

18 What is the default prefix length for class A in CIDR notation?


CORRECT
A) 9

B) 8

C) 16

D) None of the choices are correct

19 What is the default prefix length for class B in CIDR notation?


CORRECT
A) 9

B) 8

C) 16

D) None of the choices are correct

20 What is the default prefix length for class C in CIDR notation?


INCORRECT
A) 24

B) 8

C) 16

D) None of the choices are correct

21 DHCP is a (an) ___________ layer protocol.


INCORRECT
A) application

B) transport

C) network

D) data-link

22 In DHCP, the client uses ________ port and the server uses _________port.
INCORRECT
A) an ephemeral; a well-known

B) a well-known; a well-known

C) a well-known; an ephemeral

D) None of the choices are correct

23 DHCP uses the services of _______.


INCORRECT
A) UDP

B) TCP

C) IP

D) None of the choices are correct

24 _________ allows a site to use a set of private addresses for internal communication and a set of global
CORRECT Internet addresses for communication with the rest of the world.
A) DHCP

B) NAT

C) IMCP

D) None of the choices are correct

25 The idea of address aggregation was designed to alleviate the increase in routing table entries when
CORRECT using ________ addressing.
A)
classful
B) classless

C) classful or classless

D) None of the choices are correct

26 The use of hierarchy in routing tables can ________ the size of the routing tables.
INCORRECT
A) reduce

B) increase

C) neither reduce nor increase

D) None of the choices are correct

E-mail Your Results

Date: Fri Dec 08 2017 12:50:17 GMT-0500 (EST)Fri Dec 08 2017 12:45:39 GMT-0500 (EST)
My name:

Section ID:
E-mail these results to:
E-mail address: Format:
Me: HTML

My Instructor: HTML

My TA: HTML

Other: HTML

E-mail The Results

To learn more about the book this website supports, please visit its Information Center.

Copyright 2017 McGraw-Hill Global Education Holdings, LLC. All rights reserved.
Any use is subject to the Terms of Use and Privacy Center | Report Piracy
Home > Chapter 19 > Quizzes

Course-wide Content
Lab Assignments
Quizzes
(See related pages)

Chapter 19
Quizzes
Quizzes Results Reporter
More Resources
Java Applets
Student Solutions Out of 17 questions, you answered 3 correctly with a final grade of 18%
3 correct (18%)
14 incorrect (82%)
0 unanswered (0%)
Your Results:
The correct answer for each question is indicated by a .

1 IP is a _________ protocol.
INCORRECT
A) connection-oriented unreliable

B) connection-oriented reliable

C) connectionless unreliable

D) connectionless reliable

2 An HLEN value of decimal 10 means _______.


INCORRECT
A) there are 10 bytes of options

B) there are 10 bytes in the header

C) there are 40 bytes of options

D) there are 40 bytes in the header

3 If the fragment offset has a value of 100, it means that _______.


INCORRECT
A) the datagram has not been fragmented

B) the datagram is 100 bytes in size

C) the first byte of the datagram is byte 800

D) None of the choices are correct

4 What is needed to determine the number of the last byte of a fragment?


INCORRECT
A) offset number

B) total length

C) both offset number and the total length

D) None of the choices are correct

5 The IP header size is _______ bytes long.


INCORRECT
A) 20 to 60

B) 20

C) 60

D) None of the choices are correct

6 Packets in the IP layer are called _________.


INCORRECT
A) segments

B) datagrams

C) frames

D) None of the choices are correct

7 The total length field defines the total length of the datagram _________.
INCORRECT
A)
including the header
B) excluding the header

C) excluding the option length

D) None of the choices are correct

8 When a datagram is encapsulated in a frame, the total size of the datagram must be less than the
INCORRECT _______.
A) MUT

B) MAT

C) MTU

D) None of the choices are correct

9 CORRECT ICMP is a (an) _________ layer protocol.

A) application-layer protocol that helps TCP/IP at the network layer

B) transport-layer protocol that helps TCP/IP at the network layer

C) network-layer protocol

D) data-link layer protocol that helps TCP/IP at the network layer

10 Which of the following is true about ICMP messages?


INCORRECT
A) An ICMP error message may be generated for an ICMP error message

B) An ICMP error message may be generated for a fragmented datagram

C) An ICMP error message may be generated for a multicast datagram

D) None of the choices are correct

11 When a host moves to a new network, its original address is referred to as __________.
CORRECT
A) home

B) care-of

C) foreign

D) None of the choices are correct

12 Which of the following addresses are permanent in mobile IP?


INCORRECT
A) home

B) care-of

C) foreign

D) None of the choices are correct

13 To communicate with a remote host, a computer needs to go through __________ phase(s).


CORRECT
A) one

B) two

C) three

D) None of the choices are correct

14 In mobile IP communication, the first phase is called __________.


INCORRECT
A) agent discovery

B) registration

C) data transfer

D) None of the choices are correct

15 In mobile IP communication, the second phase is called __________.


INCORRECT
A) agent discovery

B) registration

C) data transfer

D) None of the choices are correct

16 In mobile IP communication, the third phase is called __________.


INCORRECT
A) agent discovery

B) registration

C) data transfer

D) None of the choices are correct

17 In mobile IP communication, inefficiency in triangle routing is ________ the one in double crossing.
INCORRECT
A) more severe than

B) less severe than

C) in the same level as

D) None of the choices are correct

E-mail Your Results

Date: Fri Dec 08 2017 12:52:15 GMT-0500 (EST)Fri Dec 08 2017 12:50:25 GMT-0500 (EST)
My name:

Section ID:
E-mail these results to:
E-mail address: Format:
Me: HTML

My Instructor: HTML

My TA: HTML

Other: HTML

E-mail The Results

To learn more about the book this website supports, please visit its Information Center.

Copyright 2017 McGraw-Hill Global Education Holdings, LLC. All rights reserved.
Any use is subject to the Terms of Use and Privacy Center | Report Piracy
Home > Chapter 23 > Quizzes

Course-wide Content
Lab Assignments
Quizzes
(See related pages)

Chapter 23
Quizzes
Quizzes Results Reporter
More Resources
Java Applets
Student Solutions Out of 20 questions, you answered 7 correctly with a final grade of 35%
7 correct (35%)
13 incorrect (65%)
0 unanswered (0%)
Your Results:
The correct answer for each question is indicated by a .

1 CORRECT One of the main duties of the transport layer is to provide ____________ communication.

A) node-to-node

B) host-to-host

C) process-to-process

D) None of the choices are correct

2 CORRECT A client program normally uses ____________ port number. A server program normally uses
__________ port number.
A) a well-known; an ephemeral

B) an ephemeral; a well-known

C) a private; a well-known

D) None of the choices are correct

3 A socket address is a combination of __________.


INCORRECT
A) a MAC address and a logical address

B) a MAC address and a port number

C) a user-specific address and a logical address

D) None of the choices are correct

4 CORRECT ______________ means accepting items from more than one source. ______________ means
delivering items to more than one source.
A) Demultiplexing; Multiplexing

B) Multiplexing; Demultiplexing

C) Encapsulation; Decapsulation

D) Pulling; Pushing

5 ________ means the producer delivers the items when they are produced. _______ means the
INCORRECT consumer takes the items when it is ready to do so.
A) Pushing; Pulling

B) Pulling; Pushing

C) Forwarding; Accepting

D) None of the choices are correct

6 In the stop-and-wait protocol, the maximum send window size is ______ and the maximum receive
INCORRECT window size is _______, where m is the number of bits in the sequence.
A) 1; 1

B) 2m; 1

C) 1; 2m

D) 2m; 2m

7 CORRECT In the Go-Back-N protocol, the maximum send window size is ______ and the maximum receive
window size is _______, where m is related to the number of bits in the sequence number.
A)
1; 1
B) 1; 2m

C) 2m − 1; 1

D) 2m − 1; 2m − 1

8 In the selective-repeat protocol, the maximum send window size is ______ and the maximum receive
INCORRECT window size is _______, where m is the number of bits in the sequence.
A) 1; 1

B) 1; 2m − 1

C) 2m − 1; 1

D) 2m − 1; 2m − 1

9 CORRECT UDP is a ________________transport protocol.

A) connectionless, reliable

B) connection-oriented, unreliable

C) connectionless, unreliable

D) None of the choices are correct

10 UDP is an acronym for _______.


INCORRECT
A) User Delivery Protocol

B) User Datagram Procedure

C) User Datagram Protocol

D) None of the choices are correct

11 At the transport layer, to define the processes, we need two identifiers called ____________.
INCORRECT
A) logical addresses

B) physical addresses

C) port addresses

D) None of the choices are correct

12 The ports ranging from 0 to 1,023 are called the ___________ ports. The ports ranging from 1,024 to
INCORRECT 49,151 are called ___________ ports. The ports ranging from 49,152 to 65,535 are called the
___________ ports.
A) well-known; registered; dynamic or private

B) registered; dynamic or private; well-known

C) private or dynamic; well-known; registered

D) private or dynamic; registered; well-known

13 UDP and TCP are two protocols at the ___________ layer.


INCORRECT
A) data-link

B) network

C) transport

D) application

14 A port number is _______ bits long.


INCORRECT
A) 8

B) 16

C) 32

D) 64

15 Communication at the transport layer is _________.


CORRECT
A) node-to-node

B) end-to-end

C) node-to-host

D) host-to-node

16 In Go-Back-N, the values of Sf = 3 and Sn = 7, after receiving a packet with ackNo = 6, the value of Sf
INCORRECT is _______________.
A) 6

B) 7

C) 5

D) None of the choices are correct

17 In Go-Back-N, the values of Sf = 3 and Sn = 7, after receiving a packet with ackNo = 6, the value of Sn
CORRECT is _______________.
A) 6

B) 7

C) 5

D) None of the choices are correct

18 In Go-Back-N, the values of Sf = 3 and Sn = 7, after receiving a packet with ackNo = 5, the window
INCORRECT ________.
A) slides two slots

B) slides one slot

C) slides three slots

D) does not slide

19 In Selective Repeat, the values of Sf = 3 and Sn = 7, after receiving a packet with ackNo = 5, the
INCORRECT window ________.
A) slides two slots

B) slides one slot

C) slides three slots

D) does not slide

20 In Selective Repeat, when a timeout occurs, the timer is ________.


INCORRECT
A) stopped

B) started

C) reset (stopped and started)

D) None of the choices are correct

E-mail Your Results

Date: Fri Dec 08 2017 12:54:00 GMT-0500 (EST)Fri Dec 08 2017 12:52:20 GMT-0500 (EST)
My name:

Section ID:
E-mail these results to:
E-mail address: Format:
Me: HTML

My Instructor: HTML

My TA: HTML

Other: HTML

E-mail The Results

To learn more about the book this website supports, please visit its Information Center.
Copyright 2017 McGraw-Hill Global Education Holdings, LLC. All rights reserved.
Any use is subject to the Terms of Use and Privacy Center | Report Piracy

Vous aimerez peut-être aussi