Term
Which of the following is a method of assigning a unique symbolic name or numerical identifier to an individual network interface on a network segment to make every such interface uniquely identifiable? |
|
Definition
|
|
Term
Which of the following layers is the uppermost layer of the ISO/OSI network reference model, where the interface between the protocol suite and actual applications resides? |
|
Definition
|
|
Term
Which of the following filters are applied to the packets that reside in the trace buffer for the purpose of viewing only the packets of interest? |
|
Definition
|
|
Term
Which of the following organizations sets standards for all kinds of electrical and electronic equipment, including network interfaces and communications technologies? |
|
Definition
|
|
Term
Which of the following organizations within the Internet Society is responsible for proper assignment of all domain names and numeric IP addresses for the global Internet? |
|
Definition
|
|
Term
Which of the following is the parent organization under which the rest of the Internet governing bodies fall? |
|
Definition
|
|
Term
Which of the following is a Layer 2 or TCP/IP network Interface layer protocol that permits a client and a server to establish a communications link that can accommodate a variety of higher-layer protocols? |
|
Definition
|
|
Term
Which of the following is a type of network communication where pairs of devices establish the communication link to exchange data with one another? |
|
Definition
b. Point-to-Point Transmission |
|
|
Term
Which of the following is an 8-bit numeric identifier associated with some specific TCP/IP protocol? |
|
Definition
|
|
Term
Which of the following is a TCP/IP Application layer protocol that provides basic network device registration and management capabilities? |
|
Definition
|
|
Term
Which of the following is a form of subnet masking that does away with placing network and host address portions precisely on octet boundaries, but instead uses the /n prefix notation? |
|
Definition
b. Constant Length Domain Routing |
|
|
Term
Which of the following is a symbolic name for a TCP/IP network resource? |
|
Definition
|
|
Term
Which of the following refers to the name of the format used to denote numeric IP addresses? |
|
Definition
a. Dotted decimal notation |
|
|
Term
Which of the following is the portion of an IP address that represents the sum of the network portion of the address, plus the number of bits used for subnetting that network address? |
|
Definition
|
|
Term
Which of the following is a type of networking device that combines hubs, router, and network management functions within a single box? |
|
Definition
|
|
Term
A(n) ____ is one of a block of addresses reserved for use in sending the same message to multiple interfaces or nodes. |
|
Definition
|
|
Term
The ____ refers to the leftmost octets or bits in a numeric IP address. |
|
Definition
|
|
Term
A specific level of service guarantee associated with Application layer protocols in which time-sensitivity requirements for data require that delays be controlled within definite guidelines to deliver viewable or audible data streams is known as which |
|
Definition
|
|
Term
The technique whereby a proxy server presents an internal network resource as if it were present on the proxy server itself so that external clients can access internal network resources without seeing internal network IP address structures is known as |
|
Definition
|
|
Term
A(n) ____ is a special bit pattern that masks off the network portion of an IP address with all 1s. |
|
Definition
|
|
Term
The technique of stealing bits from the network portion of an IP address and lending those bits to the host part, creating a larger address space for host addresses is known as which of the following? |
|
Definition
|
|
Term
____ does away with source and destination address information as data is translated across a link. |
|
Definition
|
|
Term
Which of the following is a technique whereby higher-level protocol data is enclosed within the payload of a lower-layer protocol unit and labeled with a header so that the protocol data unit may be safely transmitted from a sender to a receiver? |
|
Definition
|
|
Term
Which of the following is the name given to the router IP address through which a machine attached to a local network must pass outbound traffic to reach beyond the local network? |
|
Definition
|
|
Term
An IP host must perform a(n) ____ task upon bootup to ensure that the address is NOT already assigned to another IP host. |
|
Definition
|
|
Term
Which of the following is a synchronous communication protocol? |
|
Definition
|
|
Term
A(n) ____ is the transmission path used by token ring networks, where packets are repeated back onto a ring and passed in a methodical sequential order from one ring station to the next. |
|
Definition
a. logical ring transmission path |
|
|
Term
Which of the following is the process of obtaining an IP address based on a symbolic name? |
|
Definition
c. Name resolution process |
|
|
Term
Which of the following designs refers to a physical layer out of a token ring network, where all devices on the network are connected via cable back to a central device? |
|
Definition
|
|
Term
The known functional routes on an internetwork are known as ____. |
|
Definition
|
|
Term
A router that can NOT forward packets for some reason and does NOT inform the source of the communication fault is known as a(n) ____. |
|
Definition
|
|
Term
Packets may be fragmented to reach the ____, or the PMTU process can be used to determine the minimum size. |
|
Definition
a. end-to-end minimum MTU size |
|
|
Term
A packet must have the “May Fragment bit” set in order to allow an IP packet to be ____ if necessary. |
|
Definition
|
|
Term
The process that a host can perform to learn of local routers is known as which of the following? |
|
Definition
b. ICMP Router Solicitation |
|
|
Term
Measurements that may be based on distance, time, or other values are known as ____. |
|
Definition
|
|
Term
A reconnaissance process used to learn which processes are active on a host device is known as which of the following? |
|
Definition
|
|