0% found this document useful (0 votes)
13 views15 pages

Ass 1

Uploaded by

Habtamu Sntayhu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views15 pages

Ass 1

Uploaded by

Habtamu Sntayhu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Assignment One

Name Natnael arega

Id-066/14
Choose and write the correct answer for the following Questions and
put your explanation to your answers.
1. Which of the following protocols are used to resolve the IP address into Mac

address?

A. ARP

B. RARP

C. DNS

D. DHCP

Answer
A. ARP

 ARP (Address Resolution Protocol) is used to resolve IP addresses to MAC addresses.

2. Which of the following protocols are used to resolve the domain name into IP address

and vice versa?

A. ARP

B. RARP

C. DHCP

D. DNS

Answer
D. DNS

 DNS (Domain Name System) is used to resolve domain names to IP addresses and vice
versa.

3. ICMP stands for ____________.

A. Internet Control Mapping Protocol

B. Internal Control Message Protocol

1
C. Internet Control Message Protocol

D. Internal Concept Message Protocol

Answer
C. Internet Control Message Protocol

 ICMP stands for Internet Control Message Protocol.

4. ______ is an application layer protocol that manages the IP pool to allocate IP

addresses to the hosts automatically.

A. DNS

B. DHCP

C. TCP/IP

D. POP

Answer
B. DHCP

 DHCP (Dynamic Host Configuration Protocol) is an application layer protocol that


manages the IP pool and allocates IP addresses to hosts automatically.

5. Which of the following protocols are used for the transmission of electronic mail from

an e-mail client to the mailing server?

A. POP3

B. ICMP

C. SMTP

D. FTP

Answer
C. SMTP

2
 SMTP (Simple Mail Transfer Protocol) is used for the transmission of electronic mail
from an email client to the mail server.

6. Which of the following are used to receive mail from the mail server? (choose any

two)

A. SMTP

B. POP3

C. IMAP

D. HTTP

Answer
B. POP3, C. IMAP

 POP3 (Post Office Protocol version 3) and IMAP (Internet Message Access Protocol)
are used to receive mail from the mail server.

7. __________ is an application protocol that ensures secure connection so that

information can be exchanged between the internet user and the web server in an

encrypted format.

A. HTTP

B. HTTPS

C. FTP

D. DNS

Answer
B. HTTPS

 HTTPS (Hypertext Transfer Protocol Secure) ensures a secure connection for


information exchange between the internet user and the web server in an encrypted
format.

8. Which of the following is the application layer protocol defined by the Internet

3
Architecture Board (IAB) and is used for the exchange of management information

between the network devices in a network?

A. IGMP

B. ICMP

C. SNMP

D. SMTP

Answer
C. SNMP

 SNMP (Simple Network Management Protocol) is used for the exchange of


management information between network devices.

9. The communication protocol is defined as :

A. the set of instructions and programming language.

B. the set of rules to govern the data communication between the two entities.

C. the set of network devices that are used to connect hosts.

D. All of the above.

Answer
B. the set of rules to govern the data communication between the two entities.

 Communication protocols are a set of rules governing data communication between


entities.

10. In the transport layer of the OSI model, the upper layer data is broken down into

smaller chunks called segments and then transmitted. Name the protocol that is

responsible for the reliable transmission of these smaller segments to the receiver and

the transmitter ensures each segment are delivered correctly by expecting ACK from the

receiver.

A. UDP

4
B. TCP

C. ICMP

D. IP

Answer
B. TCP

 TCP (Transmission Control Protocol) is responsible for the reliable transmission of data
segments and ensures correctness through acknowledgments.

11. Which of the following application layer services use the TCP connection? ( choose

any two)

A. SMTP

B. DHCP

C. TFTP

D. FTP

Answer
A. SMTP, D. FTP

 SMTP (Simple Mail Transfer Protocol) and FTP (File Transfer Protocol) use TCP
connections.

12. Which of the following is a protocol used by e-mail servers to store messages and

synchronize the message across multiple devices?

A. POP3

B. IMAP

C. HTTP

D. STP

Answer

5
B. IMAP

 IMAP (Internet Message Access Protocol) is used by email servers to store messages
and synchronize them across multiple devices.

13. Which of the followings are the transport layer protocols of the TCP/IP stack?

(choose any two)

A. TCP

B. IP

C. UDP

D. ICMP

Answer
A. TCP, C. UDP

 TCP and UDP are transport layer protocols in the TCP/IP stack.

14. Ethernet is the most popularly used protocol for local area connection. In which

layer of the OSI model does it belong to?

A. Layer 7

B. Layer 4

C. Layer 3

D. Layer 2

Answer
D. Layer 2

 Ethernet belongs to Layer 2 (Data Link Layer) of the OSI model.

15. This protocol deals with the addressing of hosts in a network with a unique

identifier network number.

A. TCP

6
B. IP

C. ARP

D. RARP

Answer
B. IP

 IP (Internet Protocol) deals with the addressing of hosts in a network with a unique
identifier.

16. Which of the following statement is false in connection with UDP?

A. UDP is connectionless.

B. It is an unreliable protocol.

C. It is used for real-time communication.

D. It uses three-way handshaking for session establishment.

Answer
D. It uses three-way handshaking for session establishment.

 This statement is false. UDP is connectionless and does not use three-way
handshaking.

17. _________ protocol is used by servers, hosts and network devices to check the

connectivity status of the remote host by generating the error message.

A. IGMP

B. SNMP

C. ICMP

D. SMTP

Answer
C. ICMP

7
 ICMP is used to check the connectivity status of the remote host by generating error
messages.

18. Most of the application layer services either use TCP or UDP for connection. Which

of the following protocols use both?

A. Telnet

B. FTP

C. DHCP

D. DNS

Answer
A. Telnet

 Telnet uses both TCP and UDP.

19. Which statement accurately describes a TCP/IP encapsulation process when a PC is

sending data to the network?

A. Data is sent from the internet layer to the network access layer.

B. Packets are sent from the network access layer to the transport layer.

C. Segments are sent from the transport layer to the internet layer.

D. Frames are sent from the network access layer to the internet layer.

Answer
C. Segments are sent from the transport layer to the internet layer.

 In the TCP/IP model, segments are sent from the transport layer to the internet layer.

20. What three application layer protocols are part of the TCP/IP protocol suite?

(Choose three.)

A. ARP

B. DHCP

8
C. DNS

D. FTP

E. NAT

F. PPP

Answer
C. DNS, D. FTP, E. NAT

 DNS, FTP, and NAT are part of the TCP/IP protocol suite.

21. Which name is assigned to the transport layer PDU?

A. bits

B. data

C. frame

D. packet

E. segment

Answer
E. segment

 The transport layer PDU is called a segment.

22. What process involves placing one PDU inside of another PDU?

A. encapsulation

B. encoding

C. segmentation

D. flow control

Answer
A. encapsulation

 Encapsulation involves placing one PDU inside another.

9
23. What layer is responsible for routing messages through an internetwork in the

TCP/IP model?

A. internet

B. transport

C. network access

D. session

Answer
A. internet

 The internet layer is responsible for routing messages through an internetwork in the
TCP/IP model.

24. Which PDU format is used when bits are received from the network medium by the

NIC of a host?

A. file

B. frame

C. packet

D. segment

Answer
B. frame

 When bits are received from the network medium by the NIC, they form a frame.

25 Which method allows a computer to react accordingly when it requests data from a

server and the server takes too long to respond?

A. encapsulation

B. flow control

C. access method

10
D. response timeout

Answer
D. response timeout

 Response timeout allows a computer to react when a server takes too long to
respond.

26. A web client is receiving a response for a web page from a web server. From the

perspective of the client, what is the correct order of the protocol stack that is used

to decode the received transmission?

A. Ethernet, IP, TCP, HTTP

B. HTTP, TCP, IP, Ethernet

C. Ethernet, TCP, IP, HTTP

D. HTTP, Ethernet, IP, TCP

Answer
C. Ethernet, TCP, IP, HTTP

 The correct order of the protocol stack for decoding a received transmission is
Ethernet, TCP, IP, HTTP.

27. Which two OSI model layers have the same functionality as a single layer of the

TCP/IP model? (Choose two.)

A. data link

B. network

C. physical

D. session

E. transport

Answer

11
B. network, E. transport

 The network and transport layers of the OSI model have the same functionality as a
single layer of the TCP/IP model.

28. At which layer of the OSI model would a logical address be added during

encapsulation?

A. physical layer

B. data link layer

C. network layer

D. transport layer

Answer
C. network layer

 A logical address is added at the network layer during encapsulation.

29. What is a characteristic of multicast messages?

A. They are sent to a select group of hosts.

B. They are sent to all hosts on a network.

C. They must be acknowledged.

D. They are sent to a single destination.

Answer
A. They are sent to a select group of hosts.

 Multicast messages are sent to a select group of hosts.

30. Which statement is correct about network protocols?

A. Network protocols define the type of hardware that is used and how it is

mounted in racks.

B. They define how messages are exchanged between the source and the

12
destination.

C. They all function in the network access layer of TCP/IP.

D. They are only required for exchange of messages between devices on

remote networks.

Answer
B. They define how messages are exchanged between the source and the destination.

 Network protocols define how messages are exchanged between devices.

31. What is an advantage of network devices using open standard protocols?

A. Network communications is confined to data transfers between devices

from the same vendor.

B. A client host and a server running different operating systems can

successfully exchange data.

C. Internet access can be controlled by a single ISP in each market.

D. Competition and innovation are limited to specific types of products.

Answer
B. A client host and a server running different operating systems can successfully exchange
data.

 Open standard protocols allow different devices to exchange data successfully.

32. Which device performs the function of determining the path that messages should

take through internetworks?

A. a router

B. a firewall

C. a web server

D. a DSL modem

13
Answer
A. a router

 A router determines the path that messages should take through internetworks.

33. What term describes a private collection of LANs and WANs that belongs to an

organization?

A. intranet

B. internet

C. extranet

D. peer-to-peer

Answer
A. intranet

 A private collection of LANs and WANs within an organization is called an intranet.

14

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy