0% found this document useful (0 votes)
43 views

TCP/IP Internetworking Review Questions (Answers in Class Notes or Chapter 3 of Book.)

This document contains 15 multiple choice review questions about TCP/IP networking concepts. The questions cover topics like the difference between frames and packets, encapsulation and de-encapsulation in the OSI model, the functions of routers, characteristics of connectionless and connection-oriented protocols, components of IP addresses, how firewalls filter packets, handshake processes for TCP opening and closing connections, and port number usage.

Uploaded by

RainZZaK
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

TCP/IP Internetworking Review Questions (Answers in Class Notes or Chapter 3 of Book.)

This document contains 15 multiple choice review questions about TCP/IP networking concepts. The questions cover topics like the difference between frames and packets, encapsulation and de-encapsulation in the OSI model, the functions of routers, characteristics of connectionless and connection-oriented protocols, components of IP addresses, how firewalls filter packets, handshake processes for TCP opening and closing connections, and port number usage.

Uploaded by

RainZZaK
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

TCP/IP Internetworking Review Questions

(Answers in class notes or Chapter 3 of book.)


3-1.

What do we call messages at the data link layer?


a.
Frames
b.
Packets
c.
Both of the above.
d.
Neither a. nor b.

3-2.

Which of the following is true?


a.
Packets are encapsulated in frames.
b.
Frames are encapsulated in packets.
c.
Neither a. nor b.

3-3.

If Layer N receives a message, which layer de-encapsulates the message?


a.
N+1
b.
N
c.
N-1
d.
Any of the above
e.
None of the above

3-4.

Which of the following does a router do first when they receive?


a.
encapsulates
b.
decapsulates
c.
Neither a. nor b.
d.
Both a. and b.

3-5.

Which of the following is connectionless?


a.
IP
b.
UDP
c.
TCP
d.
Both a. and b.

3-6.

The network part of an IP address is ___ bits long.


a.
8
b.
16
c.
24
d.
32
e.
The length of the network part is variable.

3-7.

In general, how can you tell the size of an IP address network part?
a.
It is always 16 bits long.
b.
You can tell by knowing network or subnet mask.
c.
Both of the above are true.

3-8.

Firewalls read the IP _____ field to know how to filter the packets data field.
a.
protocol
b.
TTL
c.
Both of the above.
Page 1 of 2

3-9.

d.
Neither a. nor b.
How many messages are sent in a TCP opening?
a.
One
b.
Two (the message and its acknowledgement)
c.
Three
d.
Four
e.
Many

3-10. How many messages are sent in a normal TCP close?


a.
One
b.
Two (the message and its acknowledgement)
c.
Three
d.
Four
e.
Many
3-11. How many messages are sent in an abrupt TCP close, i.e. in a Reset?
a.
One
b.
Two (the message and its acknowledgement)
c.
Three
d.
Four
e.
Many
3-12. Mail servers use _____ port numbers in their source port number fields when they
transmit.
a.
ephemeral
b.
registered
c.
well-known
3-13. Which is more complex and so presents more opportunities for protocol abuse?
a.
TCP
b.
UDP
c.
Both of the above.
d.
Neither a. nor b.
3-14. The lowest possible host address in the /24 block of addresses containing host
60.37.12.98 is _____.
a.
60.0.0.1
b.
60.37.0.1
c.
60.37.12.1
d.
0.0.0.1
3-15. What is the address class of the network containing host 140.37.12.98?
a.
Class A
b.
Class B
c.
Class C

Page 2 of 2

You might also like