Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem1) Which of the following protocols are exs of TCP/IP transport layer protocols?

a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP

problem2) Which of the following protocols are exs of TCP/IP network access layer protocols?

a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP
g. PPP

problem3) The process of HTTP asking TCP to send some data and make sure that it is received correctly is an ex of what?

a. Same-layer interaction
b. Adjacent-layer interaction
c. The OSI model
d. All the other answers are correct.

problem4) The process of TCP on one computer marking a segment as segment 1, and the receiving computer then acknowledging the receipt of segment 1, is an ex of what?

a. Data encapsulation
b. Same-layer interaction
c. Adjacent-layer interaction
d. The OSI model
e. None of these answers are correct.

Qustion5) The process of a web server adding a TCP header to a web page, followed by adding an IP header, and then a data link header and trailer is an ex of what?

a. Data encapsulation
b. Same-layer interaction
c. The OSI model
d. All of these answers are correct.

problem6) Which of the following terms is used specifically to identify the entity that is created when encapsulating data inside data link layer headers and trailers?

a. Data
b. Chunk
c. Segment
d. Frame
e. Packet
f. None of these—there is no encapsulation by the data link layer.

problem7) Which OSI layer defines the functions of logical network-wide addressing and routing?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7

problem8) Which OSI layer defines standards for cabling and connectors?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7

problem9) Which OSI layer defines standards for data formats and encryption?

a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5
f. Layer 6
g. Layer 7

problem10) Which of the following terms are not valid terms for the names of the seven OSI layers?

a. Application
b. Data link
c. Transmission
d. Presentation
e. Internet
f. Session

Fill In The Blanks:

1. Number of links to connect n nodes in a mesh topology is = _______.

2. Mesh Topology is _______ flexible and has a ________ expandability

3. In BUS topology, at each end of the bus is a ____________, which absorbs any signal, removing it from the bus. 

4. In BUS topology, One could easily add any new node or delete any node with-out affecting other nodes; this makes this topology easily _____________. 

5. _________ and ______________ would force a maximum length of shared medium which could be used in BUS topology. 

6. The two alternatives for the operation of the central node in STAR topology are: __________ and ___________. 

7. In Ring Topology, the links are _____________; that is, data are transmitted in __________ direction only and all are oriented in a same way

8. In Ring Topology, Repeater works in 3 modes: ____________, _____________ and ______________.

9. ___________ topology could be considered as an extension to BUS topology.

10. ______________ is appropriate for use in star and ring topologies

11. Coaxial cable is appropriate for use in __________ topology.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93001
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question? 


Related Questions in Computer Network & Security

Case study cyber security in business Case Study: Cyber Security in Business

Case Study: Cyber Security in Business Organizations Protecting organizational assets and information within the company has become a top priority for many organizational leaders. Review the article titled "Missed Alarms ...

Data information decision please respond to the

"Data Information Decision" Please respond to the following: · With the obvious pace of current technology development, data continues to grow daily. Imagine that you are a Database Administrator for a large organization ...

Case projectnbsp law firm companynbsp law firm lincoln

CASE PROJECT:  LAW FIRM Company:  Law Firm: Lincoln Partners, Esq. A law firm has hired you as a Network Security Consultant to help its operations by providing a secure network to support its growth.  The Law firm curre ...

Threat management and disaster recovery final paper this is

Threat Management and Disaster Recovery Final Paper This is a two part assignment that will be submitted as one final paper Part 1 I would like you to complete a limited Risk Assessment for a fictional enterprise. This a ...

Networking and server landscape of rays foodusing the

Networking and server landscape of Ray's Food. Using the Configuration Scenario Instructions, create a 1-page Systems Diagram in Microsoft Visio, or another diagramming tool, that shows the technical networking and serve ...

Assignment network consultation for designitthis assignment

Assignment: Network Consultation for DesignIT This assignment contains two Sections: Network Consultation Proposal and Network Consultation Presentation. You must submit both sections as separate files in order to comple ...

Network security- as a corporate network administrator the

"Network Security" - As a corporate network administrator the industry standard suggests your job is to maintain the confidentiality, availability, and integrity of all network resources. Choose an attack that affects on ...

Securritypost for elprofessoripart 1based on your teams

Securrity Post for elprofessori Part 1 Based on your team's Week Five Learning Team Collaborative discussion, write the Network Security Policy section of the Information Security Policy. Include the following: • Network ...

Assignmentyou have been tasked with reconfiguring the

Assignment You have been tasked with reconfiguring the network for your company, which has grown considerably over the past year. You have used only static routing in the past, but you do not wish to spend the administra ...

There are a number of cellular phone companies each serving

There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technolo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen