Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem1) Which of the following protocols are exs of TCP/IP transport layer protocols?

a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP

problem2) Which of the following protocols are exs of TCP/IP network access layer protocols?

a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP
g. PPP

problem3) The process of HTTP asking TCP to send some data and make sure that it is received correctly is an ex of what?

a. Same-layer interaction
b. Adjacent-layer interaction
c. The OSI model
d. All the other answers are correct.

problem4) The process of TCP on one computer marking a segment as segment 1, and the receiving computer then acknowledging the receipt of segment 1, is an ex of what?

a. Data encapsulation
b. Same-layer interaction
c. Adjacent-layer interaction
d. The OSI model
e. None of these answers are correct.

Qustion5) The process of a web server adding a TCP header to a web page, followed by adding an IP header, and then a data link header and trailer is an ex of what?

a. Data encapsulation
b. Same-layer interaction
c. The OSI model
d. All of these answers are correct.

problem6) Which of the following terms is used specifically to identify the entity that is created when encapsulating data inside data link layer headers and trailers?

a. Data
b. Chunk
c. Segment
d. Frame
e. Packet
f. None of these—there is no encapsulation by the data link layer.

problem7) Which OSI layer defines the functions of logical network-wide addressing and routing?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7

problem8) Which OSI layer defines standards for cabling and connectors?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7

problem9) Which OSI layer defines standards for data formats and encryption?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7

problem10) Which of the following terms are not valid terms for the names of the seven OSI layers?

a. Application
b. Data link
c. Transmission
d. Presentation
e. Internet
f. Session

Fill In The Blanks:

1. Number of links to connect n nodes in a mesh topology is = _______.

2. Mesh Topology is _______ flexible and has a ________ expandability

3. In BUS topology, at each end of the bus is a ____________, which absorbs any signal, removing it from the bus. 

4. In BUS topology, One could easily add any new node or delete any node with-out affecting other nodes; this makes this topology easily _____________. 

5. _________ and ______________ would force a maximum length of shared medium which could be used in BUS topology. 

6. The two alternatives for the operation of the central node in STAR topology are: __________ and ___________. 

7. In Ring Topology, the links are _____________; that is, data are transmitted in __________ direction only and all are oriented in a same way

8. In Ring Topology, Repeater works in 3 modes: ____________, _____________ and ______________.

9. ___________ topology could be considered as an extension to BUS topology.

10. ______________ is appropriate for use in star and ring topologies

11. Coaxial cable is appropriate for use in __________ topology.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93001
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question? 


Related Questions in Computer Network & Security

Assessment project network securityyou have been recently

Assessment Project Network Security You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your ...

Discussionip basic concepts please respond to the

Discussion "IP Basic Concepts" Please respond to the following: - Suppose that you work for a company that has been using IPv4 in each of its networks. After hearing a discussion about the differences between IPv4 and IP ...

Assignment1 as a new security manager for a retail

Assignment 1. As a new security manager for a retail operation, you have been asked to create a new loss prevention and risk management program that will be presented to upper management. Create a 10- to 12-slide Microso ...

System reference guide - diagrammingyou have been called

System Reference Guide - Diagramming You have been called upon to put together some reference materials for other groups to follow, since up until now they have not created any formal architectural documents. As a contin ...

Analyzing network trafficone of our goals for this week is

Analyzing Network Traffic One of our goals for this week is to install and run a packet-capture utility, such as Wireshark. If you are successful with this task, run the packet capture while you do a familiar online task ...

1 what attributes do organizations seek in a candidate when

1. What attributes do organizations seek in a candidate when hiring InfoSec professionals? Prioritize this list of attributes and justify your ranking 2. What are the critical actions that management must consider taking ...

Assignmentyou have been tasked with reconfiguring the

Assignment You have been tasked with reconfiguring the network for your company, which has grown considerably over the past year. You have used only static routing in the past, but you do not wish to spend the administra ...

Proposal projectchoose one of the following for this

Proposal Project Choose one of the following for this project and See attachment for complete instruction and please remember to send a turnitin report. 1) Metasploit 2) Wireshark 3) Back Track 4) Nessus 5) Cain & Abel P ...

Q1 a subnetted or hierarchical backbone can also be called

Q1. A subnetted or hierarchical backbone can also be called: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone Q2. A backbone network that connects many backbone networks span ...

Network management paperin this paper you will research and

Network Management Paper In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro