Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Chapter 9 TCP/IP Applications 1. Two computers first acknowledges the other, aft

ID: 3850489 • Letter: C

Question

Chapter 9

TCP/IP Applications

1. Two computers first acknowledges the other, after which they conduct their communication. They end by closing the communication. Which term describes this communication process?

A. Broadcast

B. Connection-oriented

C. Connectionless

D. Multicast

2. Which protocol is by far the most common type of session on a typical TCP/IP network?

A. UDP

B. TCP

C. ICMP

D. IGMP

3. The Internet Control Message Protocol (ICMP) works at __________ to deliver connectionless packets.

A. Layer 1

B. Layer 2

C. Layer 3

D. Layer 4

4. Which protocol is best for simple, connectionless applications that never need more than a single packet?

A. TCP

B. ICMP

C. UDP

D. IGMP

5. Which Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?

A. UDP

B. TCP

C. ICMP

D. IGMP

6. Which protocol is popular for moving files between computers on the same LAN, where the chances of losing packets are very small?

A. HTTP

B. TFTP

C. ICMP

D. SMTP

7. Which protocol does the ping application use?

A. SMTP

B. HTTP

C. ICMP

D. DHCP

8. Using the ping command, which message is displayed if your computer has no route to the address listed?

A. Destination host unreachable

B. Source host unreachable

C. Destination port missing

D. Source port missing

9. A particular multicast called an IGMP group is assigned to which address?

A. 128.0.0.0/24

B. 0.0.0.0

C. FF-FF-FF-FF

D. 224.0.0.0/4

10. Many years ago, the ping command had a bug that allowed malicious users to send malformed ping packets to a destination causing the __________ issue.

A. buffer overload

B. man-in-the middle attack

C. blue screen of death

D. ping of death

11. If you ping a device and no echo reply comes back before the 1-second default time, ping will respond with a __________ message.

A. server overload issue

B. request timed out

C. time to live (TTL) exceeded

D. hop count exceeded

12. What name is given to the port numbers in the range of 0 to 1023?

A. Private port numbers

B. Dynamic port numbers

C. Well-known port numbers

D. Listening ports

13. A Web client’s source port number, generated pseudo-randomly by the Web client computer, is classically assigned as a(n) __________.

A. well-known port number

B. ephemeral port number

C. listening port number

D. logical port number

14. What function is being used if a packet is sent to port 80?

A. FTP

B. Telnet

C. Web browsing

D. E-mail

15. Which type of port has a number in the 1024 to 49151 range?

A. Well-known port

B. Dynamic port

C. Private port

D. Registered port

16. Which term refers to ports in the 49152 to 65535 range?

A. Well-known port

B. Dynamic port

C. Listening port

D. Registered port

17. Which term refers to session information stored in RAM by a computer on one side of a session?

A. Connection

B. Packet

C. Session

D. Endpoint

18. Which term refers to another name for a session?

A. Web site

B. Endpoint

C. Connection

D. Port

19. Which command is known as the “show me the endpoint” command?

A. RSH

B. Netstat

C. RCP

D. rlogin

20. Which term describes the status for a socket that is prepared to respond to any IP packets destined for that socket’s port number?

A. Open port

B. Closed-wait

C. Established port

D. Ready port

21. Which term describes the status of a port that is part of an active working endpoint pair?

A. Open port

B. Close-wait

C. Established port

D. Listening port

22. Which switch is used with the Windows netstat command to show the process ID?

A. -p

B. -o

C. -n

D. -b

23. Which switch is used with the Windows netstat command to show name of a running program?

A. -p

B. -o

C. -n

D. -b

24. Which term defines a number used by the operating system to track all the running programs?

A. Private port number

B. Process ID (PID)

C. Socket

D. Dynamic port number

25. Which protocol is the underlying protocol used by the World Wide Web?

A. HTML

B. IIS

C. JavaScript

D. HTTP

26. Which free Web server was originally created for the UNIX/Linux platforms, but now runs on multiple operating systems (including Windows)?

A. Internet Information Services (IIS)

B. Apache HTTP Server

C. Google Chrome

D. IMAP4

27. Which protocol is the secure counterpart of HTTP?

A. SSL

B. HTTPS

C. Telnet

D. RSH

28. Google Chrome and Mozilla Firefox are examples of __________ applications.

A. Mail client

B. Web client

C. Web server

D. FTP client

29. What type of key does SSL use to encrypt communication?

A. Public

B. Private

C. Open

D. Netscape proprietary

30. Which protocol enables you to control a remote computer from a local computer over a network?

A. FTP

B. HTTPS

C. Telnet

D. SMTP

31. Which protocol is an enhanced alternative to POP3 and runs on TCP port 143?

A. SMTP

B. IMAP4

C. POP4

D. Web-based e-mail

32. Which Linux and UNIX e-mail server program controls about 20 percent of the market and only runs the SMTP protocol?

A. IMAP4

B. Eudora’s Qpopper

C. Exchange Server

D. Sendmail

33. Which TCP ports does the old active File Transfer Protocol (FTP) use by default?

A. 80 and 81

B. 25 and 110

C. 20 and 21

D. 22 and 23

34. Which protocol is used to send e-mail over TCP port 25 and is used by clients to send messages?

A. POP3

B. IGMP

C. SMTP

D. TFTP

35. What file transfer protocol uses UDP port 69?

A. FTP

B. E-mail

C. Web browsing

D. TFTP

Explanation / Answer

3. The Internet Control Message Protocol (ICMP) works at __________ to deliver connectionless packets.


C. Layer 3

4) Which protocol is best for simple, connectionless applications that never need more than a single packet?

B. ICMP

5. Which Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?
A. UDP


6. Which protocol is popular for moving files between computers on the same LAN, where the chances of losing packets are very small?

B . TFTP is popular for moving files btw computers on the same LAN, where the chances of losing packets is very small.


7)Which protocol does the ping application use?

c.ICMP

8. Using the ping command, which message is displayed if your computer has no route to the address listed?

9. A particular multicast called an IGMP group is assigned to which address?
D. 224.0.0.0/4

10.. Many years ago, the ping command had a bug that allowed malicious users to send malformed ping packets to a destination causing the __________ issue.

D. ping of death


11. If you ping a device and no echo reply comes back before the 1-second default time, ping will respond with a __________ message.

B. request timed out


12.What name is given to the port numbers in the range of 0 to 1023?

b. well-known port numbers

13. A Web client’s source port number, generated pseudo-randomly by the Web client computer, is classically assigned as a(n) __________.

B. ephemeral port number

14.14. What function is being used if a packet is sent to port 80?


c. Web browsing


15. Which type of port has a number in the 1024 to 49151 range?
b. registered port

16. Which term refers to ports in the 49152 to 65535 range?
B. Dynamic port

17. Which term refers to session information stored in RAM by a computer on one side of a session?
C. Session

18. Which term refers to another name for a session?
C. Connection

19. Which command is known as the “show me the endpoint” command?

B. Netstat


20. Which term describes the status for a socket that is prepared to respond to any IP packets destined for that socket’s port number?

A. Open port


21. Which term describes the status of a port that is part of an active working endpoint pair?

C. Established port


22. Which switch is used with the Windows netstat command to show the process ID?
B. -o

23. Which switch is used with the Windows netstat command to show name of a running program?

D. -b


24. Which term defines a number used by the operating system to track all the running programs?
B. Process ID (PID)

25. Which protocol is the underlying protocol used by the World Wide Web?

D. HTTP

26. Which free Web server was originally created for the UNIX/Linux platforms, but now runs on multiple operating systems (including Windows)?
C. Google Chrome

27. Which protocol is the secure counterpart of HTTP?
B. HTTPS


28. Google Chrome and Mozilla Firefox are examples of __________ applications

D. FTP client

29. What type of key does SSL use to encrypt communication?
A. Public


30. Which protocol enables you to control a remote computer from a local computer over a network?

C. Telnet


31. Which protocol is an enhanced alternative to POP3 and runs on TCP port 143?

B. IMAP4


32. Which Linux and UNIX e-mail server program controls about 20 percent of the market and only runs the SMTP protocol?

D. Sendmail


34. Which protocol is used to send e-mail over TCP port 25 and is used by clients to send messages?

C. SMTP

35. What file transfer protocol uses UDP port 69?
D.TFTP

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote