CH02 Testbank DCC10e
CH02 Testbank DCC10e
TRUE OR FALSE
T F 10. Secure Shell (SSH) enables the user and the remote server to
authenticate each other.
T F 12. The driving force behind the development of IP was the need for
more addresses.
Data and Computer Communications, 10th Edition, by William Stallings
MULTIPLE CHOICE
1. In a ________ the modules are arranged in a vertical stack. Each layer in the
stack performs a related subset of the functions required to communicate
with another system.
2. Facsimile, computer aided design, publishing and medical imaging are all
________ based applications.
A) text B) image
C) video D) audio
3. The ________ layer contains the logic needed to support the various user
applications.
A) internet B) physical
C) transport D) application
A) presentation B) timing
A) internet B) physical
6. The ________ layer is concerned with the exchange of data between an end
system and the network to which it is attached.
A) internet B) physical
7. An example of ________ traffic is real time traffic such as voice and video.
A) request B) confirm
C) indication D) response
10. Information that can be entered via a keyboard and is directly readable and
printable is ________.
A) audio B) graphic
C) video D) text
Data and Computer Communications, 10th Edition, by William Stallings
A) 16 B) 8
C) 20 D) 160
A) TELNET B) SNMP
C) UDP D) SMTP
13. Electronic mail, remote logon, network management and Web access are
examples of ________ applications.
A) elastic B) real-time
14. The communication task can be organized into three relatively independent
layers: network access layer, application layer, and ________ layer.
A) transport B) media
C) physical D) processing
C) telecommunication D) entertainment
SHORT ANSWER
1. A ________ is the layered structure of hardware and software that supports the
exchange of data between systems and supports distributed applications such as
electronic mail and file transfer.
Data and Computer Communications, 10th Edition, by William Stallings
2. The most widely used protocol architecture is the ________ protocol suite, which
consists of physical, network access, internet, transport, and application layers.
3. In the TCP/IP protocol architecture, the ________ layer is concerned with specifying
the characteristics of the transmission medium, the nature of the signals and the
data rate.
4. Traffic that can adjust to changes in delay and throughput across an internet and
still meet the needs of its applications is ________ traffic.
8. If the initiator receives confirmation that the requested service has had the
desired effect at the other end, it is referred to as a ________ service.
12. ________ is when the sending TCP includes a code that is a function of the contents
of the remainder of the segment. The receiving TCP performs the same calculation
and compares the result with the incoming code. A discrepancy results if there has
been some error in transmission.
13. The standard network management protocol for TCP/IP networks is ________.
14. The two commonly used transport level protocols used as part of the TCP/IP
protocol suite are TCP and ________.
15. IPv6 includes ________ bit source and destination address fields.