Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem1) Which of the following protocols are exs of TCP/IP transport layer protocols?

a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP

problem2) Which of the following protocols are exs of TCP/IP network access layer protocols?

a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP
g. PPP

problem3) The process of HTTP asking TCP to send some data and make sure that it is received correctly is an ex of what?

a. Same-layer interaction
b. Adjacent-layer interaction
c. The OSI model
d. All the other answers are correct.

problem4) The process of TCP on one computer marking a segment as segment 1, and the receiving computer then acknowledging the receipt of segment 1, is an ex of what?

a. Data encapsulation
b. Same-layer interaction
c. Adjacent-layer interaction
d. The OSI model
e. None of these answers are correct.

Qustion5) The process of a web server adding a TCP header to a web page, followed by adding an IP header, and then a data link header and trailer is an ex of what?

a. Data encapsulation
b. Same-layer interaction
c. The OSI model
d. All of these answers are correct.

problem6) Which of the following terms is used specifically to identify the entity that is created when encapsulating data inside data link layer headers and trailers?

a. Data
b. Chunk
c. Segment
d. Frame
e. Packet
f. None of these—there is no encapsulation by the data link layer.

problem7) Which OSI layer defines the functions of logical network-wide addressing and routing?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7

problem8) Which OSI layer defines standards for cabling and connectors?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7

problem9) Which OSI layer defines standards for data formats and encryption?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7

problem10) Which of the following terms are not valid terms for the names of the seven OSI layers?

a. Application
b. Data link
c. Transmission
d. Presentation
e. Internet
f. Session

Fill In The Blanks:

1. Number of links to connect n nodes in a mesh topology is = _______.

2. Mesh Topology is _______ flexible and has a ________ expandability

3. In BUS topology, at each end of the bus is a ____________, which absorbs any signal, removing it from the bus. 

4. In BUS topology, One could easily add any new node or delete any node with-out affecting other nodes; this makes this topology easily _____________. 

5. _________ and ______________ would force a maximum length of shared medium which could be used in BUS topology. 

6. The two alternatives for the operation of the central node in STAR topology are: __________ and ___________. 

7. In Ring Topology, the links are _____________; that is, data are transmitted in __________ direction only and all are oriented in a same way

8. In Ring Topology, Repeater works in 3 modes: ____________, _____________ and ______________.

9. ___________ topology could be considered as an extension to BUS topology.

10. ______________ is appropriate for use in star and ring topologies

11. Coaxial cable is appropriate for use in __________ topology.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93001
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question? 


Related Questions in Computer Network & Security

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Objectivesthis assignment is designed to assess students

OBJECTIVES This assignment is designed to assess students' ability to: - Produce a concise detailed report about the importance of information security audit policy and its components - To have excellent understanding re ...

Project infrastructure and securitythis assignment consists

Project: Infrastructure and Security This assignment consists of two sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of t ...

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

Project on security policyin this running case project you

Project on Security Policy In this running case project, you continue developing a secure network for SunGrafix, the video game development company for which you designed a network in the first week and are starting to p ...

Discussionip basic concepts please respond to the

Discussion "IP Basic Concepts" Please respond to the following: - Suppose that you work for a company that has been using IPv4 in each of its networks. After hearing a discussion about the differences between IPv4 and IP ...

Explain the key differences between symmetric and

Explain the key differences between symmetric and asymmetric encryption. Which can the computer process faster? Which lowers the costs associated with key management? What is a VPN? Why are VPNs widely used?

Develop a wlan plan for acme graphic design based on a

Develop a WLAN plan for Acme Graphic Design based on a chosen Blueprint and security to the owner. Write a 700- to 1,750-word document using Microsoft® Word finalizing describing your final network design incorporating y ...

Topic 1 wireless technologiescreate a short essay 1 to 3

Topic 1: Wireless Technologies Create a short essay (1 to 3 pages) that describes how you will set up a wireless network for the Nardi Pardy Corporation (a fictitious company). In this simple scenario, the company office ...

Assignmentyou have been hired as the chief security officer

Assignment You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that a ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen