Term
True or False: IP addresses are used to identify individual IP hosts on a TCP/IP internetwork. |
|
Definition
|
|
Term
_____ is a method that allows an IP host to use a simpified subnetting design. |
|
Definition
|
|
Term
_____ is used to obtain an IP address for an associated data link address. |
|
Definition
|
|
Term
_____ enables a larger packet (for example, a token ring, 4,096-byte packet) to be automatically fragmented by a router into smaller packets to cross a link that supports a smaller MTU, such as an Ethernet link. |
|
Definition
|
|
Term
_____ occurs when network traffic starts to exceed handling capacities. |
|
Definition
|
|
Term
_____ permits a gateway (router) on a non-optimal route between sender and receiver to redirect traffic to a more optimal path. |
|
Definition
|
|
Term
True or False: ICMP's job is to provide a variety of information about IP routing behavior, reachability, routes between specific pairs of hosts, delivery errors, and so forth. |
|
Definition
|
|
Term
True or False: ICMP's reports errors only about processing of non-ICMP IP datagrams. |
|
Definition
|
|
Term
True or False: The ICMP Echo Request guarantees packet delivery. |
|
Definition
|
|
Term
The TRACEROUTE utility uses _____ to identify a path from the sender to the target host. |
|
Definition
|
|
Term
_____ provide the simplest kind of transport services because they simply package messages, taken as is from the TCP/IP Application layer, into datagrams. |
|
Definition
|
|
Term
True or False: Although connectionless protocols don't track transmission behavior or completeness of delivery (that's what best-effort delivery means), they can optionally include a checksum for each datagram. |
|
Definition
|
|
Term
True or False: Datagrams are not sequenced but they are acknowledged. |
|
Definition
|
|
Term
The _____ field defines the application or process that sends the packet using the UDP header. |
|
Definition
|
|
Term
TCP hosts create a virtual connection with each other using a(n) _____ process. |
|
Definition
|
|
Term
Once the TCP connection is established, a(n) _____ process can maintain the connection when there is no data sent across the wire. |
|
Definition
|
|
Term
True or False: The TCP connection termination process requires six packets. |
|
Definition
|
|
Term
_____ is the overloading of the network or a receiver. |
|
Definition
|
|
Term
True or False: TCP is robust and reliable but it carries a lot of baggage. |
|
Definition
|
|
Term
True or False: Historically, UDP is a more important transport than TCP. |
|
Definition
|
|
Term
True or False: For applications, such as RIP, that rely on regular updates of routing tables and track timeout values as part of ordinary behavior, the extra reliabilty of TCP is absolutely necessary. |
|
Definition
|
|
Term
True or False: TCP was designed in an era when 300-bps communication was considered fast, and noisy lines or intermittent communications problems made a long-haul, reliable transmission of data inherently risky without access to a robust, reliable transport service. |
|
Definition
|
|
Term
_____ offers a method for transferring files over a connection-oriented transport, or TCP. |
|
Definition
|
|
Term
The _____ is the process of moving the data across the data connection only. |
|
Definition
|
|
Term
True or False: Telnet hosts exchange information about options that they support as they establish a connection with another host. |
|
Definition
|
|
Term
The FTP _____ offers the visual front end to the user. |
|
Definition
|
|
Term
HTTP has been in use on the Web since _____. |
|
Definition
|
|
Term
True or False: HTTP uses a request/response model, in which HTTP clients send a request to the server and expect a reply packet that contains a status code. |
|
Definition
|
|
Term
A(n) _____ is a combination of a Uniform Resource Locator (URL) and a Uniform Resource Name (URN). |
|
Definition
Uniform Resource Indicator (URI) |
|
|
Term
HTTP _____ are commands that the HTTP client issues to the HTTP server. |
|
Definition
|
|
Term
The _____ command looks up domain names, indicates where they are registered, and identifies primary and secondary DNS servers for the DNS databse in which the entry resides. |
|
Definition
|
|
Term
_____ was originally designed as a debugging tool to solicit random inout simply and easily without having to generate significant input. |
|
Definition
|
|
Term
_____ is the necessary name-to-numbers correlation similar to the coupling between hostnames and IP addresses. |
|
Definition
|
|
Term
A(n) _____ is defined as the end-point in the conversation, which can be a client interface in executable or Web script form, or a programmed automaton called a bot (short for robot). |
|
Definition
|
|
Term
True or False: The structure of the DNS database mirrors the structure of the domain namespace itself. |
|
Definition
|
|
Term
A(n) _____ record stores domain name-to-IP address translation data. |
|
Definition
|
|
Term
The _____ is distinguished from other name servers for a domain by its ability to always read its data from a zone file on disk when the DNS service starts up. |
|
Definition
|
|
Term
_____ store recently accessed DNS record from other domains to avoid incurring the performance overhead involved in making a remote query each time a resource outside the local domain is accessed. |
|
Definition
|
|
Term
True or False: A TCP/IP server is usually some application or service that encounters a domain name for which it needs an IP address. |
|
Definition
|
|
Term
When one DNS server receives a recursive request, that DNS server issues what are called _____ , to the name servers in its hierarchy, or to servers provided as pointers in reply to earlier iterative requests, until an answer is received. |
|
Definition
|
|
Term
True or False: The reason some recursive name queries involve a root server is because the root servers keep all names in the entire DNS namespace close at hand. |
|
Definition
|
|
Term
True or False: Supplying one or more DNS server addresses is yet another service that DHCP performs automatically for its clients as part of the DHCP server "options". |
|
Definition
|
|
Term
Most DNS servers can store the results of previous name queries using a form of local data storage called _____. |
|
Definition
|
|
Term
The files that map host names to addresses are usually named _____. |
|
Definition
|
|
Term
True or False: The first entry in any DNS file must be an SOA record. |
|
Definition
|
|
Term
The records in the _____ file are provided to support reverse DNS lookups. |
|
Definition
|
|
Term
True or False: DNS response packets include the original question as well as the reply. |
|
Definition
|
|
Term
The two-byte _____ field is used to associate DNS queries with their responses. |
|
Definition
|
|
Term
The _____ field is used in DNS responses to indicate if any errors occured. |
|
Definition
|
|
Term
True or False: Active Directory automates what a DNS administrator would have to do manually otherwise. |
|
Definition
|
|
Term
The _____ utility is a command-line utility that uses ICMP Echo packets to test router and link latency, as well as packet loss. |
|
Definition
|
|
Term
_____ enables a source to learn the currently supported MTU across an entire path, without requiring fragmentation. |
|
Definition
|
|
Term
ICMP packets contain only three required fields after the header: Type, Code, and _____. |
|
Definition
|
|
Term
The _____ field identifies types of ICMP messages that can be sent on the network. |
|
Definition
|
|
Term
True or False: The Code field provides error detection for the ICMP header only. |
|
Definition
|
|
Term
ICMP Type _____ is used for Echo Reply packets. |
|
Definition
|
|
Term
True or False: Garrick is a douche |
|
Definition
|
|