Chapter 3True/FalseIndicate whether the statement is true or false.____ 1. The TCP/IP model explains how the protocol suite works to provide communications.____ 2. The Trivial File Transfer Protocol (TFTP) sends data using a reliable connection.____ 3. Both TCP and UDP use port numbers for communications between hosts.____ 4. The size of the TCP window determines the number of acknowledgments sent for a given data transfer.____ 5. A small TCP window size produces few acknowledgments.Multiple ChoiceIdentify the choice that best completes the statement or answers the question.____ 6. The invention and evolution of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite resulted from a coordinated effort by the U.S. ____. a. DOD c. UCLS b. SRI d. IEEE____ 7. The ____ layer in the TCP/IP model maps to the OSI Application, Presentation, and Session layers. a. Network Interface c. Application b. Transport d. Internetwork____ 8. The ____ layer in the TCP/IP model determines the connectionless or connection-oriented services. a. Network Interface c. Application b. Transport d. Internetwork____ 9. The ____ layer in the TCP/IP model is a direct equivalent to the Network layer in the OSI reference model. a. Network Interface c. Application b. Transport d. Internetwork____ 10. The ____ layer of the TCP/IP model maps to both the Data Link and Physical layers of the OSI reference model. a. Transport c. Network Interface b. Internetwork d. Application____ 11. ____ is a connection-oriented protocol that allows you to connect your computer to other computers on the Internet and view Web page content. a. SNMP c. TFTP b. SMTP d. HTTP____ 12. The TCP/IP ____ layer performs several functions, the most notable being end-to-end packet delivery, reliability, and flow control. a. Application c. Network Interface b. Transport d. Internetwork
____ 13. ____ is a communication method for network devices that is designed to reduce the flow of packets from their source. a. Congestion avoidance c. Sliding windows b. Buffering d. Collision avoidance____ 14. The ____ layer in the TCP/IP model handles software, or logical, addressing. a. Network Interface c. Transport b. Application d. Internetwork____ 15. The ____ protocol provides a connectionless delivery service. a. IP c. ARP b. ICMP d. RARP____ 16. Many network devices maintain tables of the MAC and IP addresses of other devices on the network. These tables are called ____. a. addressing tables c. ARP tables b. routing tables d. network tables____ 17. A(n) ____ supplies the MAC address of the destination host in a unicast packet. a. MAC frame c. RARP request b. ARP reply d. RARP reply____ 18. ____ provides the same basic functionality as RARP. a. DHCP c. SNMP b. HTTP d. IP____ 19. Network administrators and support personnel commonly use the ____ utility to verify connectivity between two points. a. Path c. SYN b. Ping d. Transport____ 20. The ____ utility uses ICMP echo request/reply messages and can verify Internetwork layer (OSI-Network layer) connectivity. a. Find c. Trace b. Path d. Route____ 21. Trace shows the exact path a packet takes from the source to the destination. This is accomplished through the use of the ____ counter. a. TPI c. FIN b. SYN d. TTL____ 22. A(n) ____ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (pings) to a target device in an attempt to crash or greatly reduce the performance of the target device. a. SYN flood c. Ping of Death b. ICMP flood d. smurf attack____ 23. A router references its ____ to determine which of its interfaces is connected to the destination network. a. ARP table c. interface table b. IP table d. routing table____ 24. ____ protocols allow the routers to be updated automatically. a. Internetwork c. Routing b. MAP d. TTL
____ 25. The Cisco ____ model does not describe how communications take place. Rather, it focuses on how best to design a network, especially a relatively large network or one that is expected to grow. a. Three-Layer Hierarchical c. Network state b. Link-state d. Three-way____ 26. ____ is the process of assigning unique IP addresses to devices on the network. a. Virtual addressing c. IP access b. Network addressing d. IP addressingCompletionComplete each statement. 27. A series of documents called ____________________ define, describe, and standardize the implementation and configuration of the TCP/IP protocol suite. 28. The ____________________ is the messaging or e-mail transfer protocol used with TCP/IP. 29. Before two computers can communicate over TCP, they must synchronize their ____________________. 30. ____________________, also known as windowing, is a method of controlling packet flow between hosts. 31. The ____________________ resolves IP addresses to MAC addresses for source hosts that know the IP address of the destination host but not the MAC address.Matching Match each item with a statement below: a. NFS f. Buffer b. SNMP g. RARP c. DNS service h. Routed protocol d. Three-way handshake i. Ping utility e. RST____ 32. provides TCP/IP host name to IP address resolution____ 33. a distributed file system developed by Sun Microsystems that allows data to be shared across a network____ 34. indicates that a TCP connection is to be terminated without further interaction____ 35. verifies connectivity between two points____ 36. a connectionless protocol that permits remote tracking and management of TCP/IP hosts____ 37. used by TCP to establish a reliable connection between two points____ 38. a portion of memory where the device stores incoming packets until they can be processed____ 39. contains enough information in its header to be routed through an internetwork____ 40. provides IP address to MAC address resolution in a manner similar to that of ARPShort Answer
41. Briefly describe the TCP and UDP protocols.42. Describe some Well Known TCP and UDP Port numbers from RFC 1700.43. What are the steps involved in the TCP/IP three-way handshake?44. Briefly describe ICMP.45. Briefly describe the RARP protocol.46. How does an ARP request work?47. Compare ARP and RARP.48. Briefly describe the TCP/IP Network Interface layer.49. Describe the Distribution layer of the Cisco Three-Layer Hierarchical model.50. Describe the Core layer of the Cisco Three-Layer Hierarchical model.