Introduction to PowerPoint Slides
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of the transport layer in the Internet protocol stack?

  • Data transfer between neighboring network elements
  • Routing of datagrams from source to destination network
  • Process-process data transfer (correct)
  • Supporting network applications

What is the main difference between the Internet protocol stack and the ISO/OSI reference model?

  • The ISO/OSI reference model has more layers
  • The ISO/OSI reference model is missing the physical layer
  • The Internet protocol stack is missing the presentation and session layers (correct)
  • The Internet protocol stack has more layers

What is the primary function of the application layer in the Internet protocol stack?

  • Data transfer between neighboring network elements
  • Process-process data transfer
  • Routing of datagrams from source to destination network
  • Supporting network applications such as FTP and HTTP (correct)

What is the primary focus of the field of network security?

<p>Defending networks against attacks (C)</p> Signup and view all the answers

What is the term for the process of adding headers to data as it moves down the protocol stack?

<p>Encapsulation (A)</p> Signup and view all the answers

What is the main reason why the Internet protocol designers are playing "catchup" in terms of security?

<p>The Internet was originally designed without much security in mind (C)</p> Signup and view all the answers

What is the term for the process of moving data between neighboring network elements?

<p>Data transfer (D)</p> Signup and view all the answers

What is the primary function of the network layer in the Internet protocol stack?

<p>Routing of datagrams from source to destination network (A)</p> Signup and view all the answers

What is the primary function of the physical layer in the Internet protocol stack?

<p>Transmitting bits over a physical medium (C)</p> Signup and view all the answers

What is the term for the combination of delay, loss, and throughput in networks?

<p>Network performance (B)</p> Signup and view all the answers

Malware can only get into a host through a virus.

<p>False (B)</p> Signup and view all the answers

Infected hosts can be used for spam and DDoS attacks.

<p>True (A)</p> Signup and view all the answers

Packet sniffing is only possible in wireless networks.

<p>False (B)</p> Signup and view all the answers

Wireshark is a proprietary packet-sniffer software.

<p>False (B)</p> Signup and view all the answers

IP spoofing is only possible in IPv6 networks.

<p>False (B)</p> Signup and view all the answers

The first ARPAnet node was operational in 1965.

<p>False (B)</p> Signup and view all the answers

Cerf and Kahn's internetworking principles included a stateful router architecture.

<p>False (B)</p> Signup and view all the answers

The Internet had 100,000 hosts connected to it by 1980.

<p>False (B)</p> Signup and view all the answers

ARPAnet was decommissioned in 1990.

<p>False (B)</p> Signup and view all the answers

The Internet had approximately 50 million users by 2000.

<p>True (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser