The bits and bytes of computer networking week 3 quiz answers

The Transport Layer

1. What ordering of TCP flags make up the Three-Way Handshake?

  • SYN, SYN/ACK, ACK
  • SYN, ACK, FIN
  • FIN, FIN/ACK, ACK
  • SYN, ACK, SYN, ACK

 

2. Transport layer protocols, like TCP and UDP, introduce the concept of a port. How many bits are in a port field?

  • 32
  • 8
  • 4
  • 16

3. A device that blocks traffic that meets certain criteria is known as a ________.

  • Firewall
  • Hub
  • Router
  • Switch

 

4. Which TCP flag is used to make the listening program respond immediately?

  • URG
  • ACK
  • PSH
  • RST

 

5. _________are identified as ports 49152 through 65535.

  • Sockets
  • System ports
  • User ports
  • Ephemeral ports

 

6. Unlike our five-layer model, the OSI network model adds two more layers on top of the Application Layer. Select examples of these new layers below.

  • The presentation layer
  • The interconnection layer
  • The session layer
  • The compression layer

 

7. An example of something that operates at the application layer is:

  • UDP
  • TCP
  • A web browser
  • A router

 

8. What's the standard number for a TTL field?

  • 8
  • 16
  • 32
  • 64

9. Which part of the operating system does the application use to communicate the need to establish a TCP connection?

  • ARP message
  • Networking stack
  • The source port
  • The router

 

10. Which section of the TCP/IP Five-Layer Network Model contains the data the application wants to send?

  • The payload section of the Ethernet frame
  • The payload section of the IP Datagram
  • The payload of the TCP segment
  • The header of the Ethernet frame

 

11. The transport layer handles multiplexing and demultiplexing through what type of device?

  • Switches
  • Hubs
  • Routers
  • Ports

 

12. Which field in the TCP header provides the information for the receiving network device to understand where the actual data payload begins?

  • Checksum
  • Data offset
  • Acknowledgement number
  • Sequence number

 

13. A device involved in a Transmission Control Protocol (TCP) connection is ready to close the connection. The other device in the connection agrees. What has occurred?

  • Two-way handshake
  • Three-way handshake
  • Handshake
  • Four-way handshake

 

14. If a TCP socket is ready and listening for incoming connections, it's in the ______ state.

  • CLOSE_WAIT
  • ESTABLISHED
  • SYN_SENT
  • LISTEN

 

15. A communication sent through Transmission Control Protocol (TCP) arrives out of order. What allows the data to be put back together in the correct order?

  • Acknowledgement number
  • Sequence numbers
  • Checksum
  • Preamble

 

16. In the OSI network model, the ________ is responsible for facilitating the communication between actual applications and the transport layer.

  • session layer
  • application layer
  • physical layer
  • presentation layer

 

17. You are sending a very small amount of information that you need the listening program to respond to immediately. Which Transmission Control Protocol (TCP) flag will be used?

  • ACK
  • RST
  • PSH
  • URG

 

18. What layer of the TCP/IP Five-Layer Network Model allows applications to communicate in a way they understand?

  • Data layer
  • User layer
  • Application layer
  • Transport layer

 

19. What port does the File Transfer Protocol (FTP) typically listen on?

  • 21
  • 80
  • 443
  • 25

20. A 32-bit number that's used to keep track of where you are in a sequence of TCP segments is known as a(n) ______ number.

  • TCP
  • address
  • sequence
  • acknowledgement

 

21. The concept of taking traffic that’s all aimed at the same node and delivering it to the proper receiving service is known as _________.

  • encapsulation
  • multiplexing
  • routing
  • demultiplexing

22. Which field in a Transmission Control Protocol (TCP) header provides the next expected segment?

  • Checksum
  • Data offset
  • Sequence number
  • Acknowledgement number

23. A Transmission Control Protocol (TCP) connection is established and two devices ensure that they're speaking the same protocol. What has occurred?

  • Four-way handshake
  • Three-way handshake
  • Handwaving
  • Two-way handshake

24. In the OSI network model, the ________ is responsible for making sure that the unencapsulated application layer data is actually able to be understood by the application in question.

  • presentation layer
  • application layer
  • session layer
  • data layer

25. One side in a Transmission Control Protocol (TCP) connection has not been able to properly recover from a series of malformed segments. Which Transmission Control Protocol (TCP) flag will be used?

  • RST
  • SYN
  • FIN
  • PSH

26. HTTP is an example of a(n) ______ layer protocol.

  • application
  • network
  • transport
  • data-link

27. A user requests an unencrypted webpage from a web server running on a computer, listening on the Internet Protocol address 10.1.1.150. What will be the socket address?

  • 10.1.1.150.80
  • 10.1.1.150.21
  • 10.1.1.150:21
  • 10.1.1.150:80

28. A communication between two devices is over the maximum limit of an ethernet frame size. The Transmission Control Protocol (TCP) splits up the data into segments. Which field in the header helps keep track of the many segments?

  • Sequence number
  • Acknowledgement number
  • Checksum
  • Urgent pointer

29. The OSI network model has _____ layers.

  • seven
  • five
  • six
  • eight

30. Ports that are generally used to establish outbound connections are known as ______ ports.

  • reserved
  • ephemeral
  • registered
  • system

31. In what order will the Transmission Control Protocol (TCP) generally send all segments?

  • Random
  • Prioritized
  • Largest to smallest
  • Sequential

32. Nodes on a network have the ability to direct traffic toward many different receiving services. What provides this ability in the transport layer?

  • Socket address
  • Demultiplexing
  • Multiplexing
  • File Transfer

33. Which field in a Transmission Control Protocol (TCP) header is chosen from ephemeral ports?

  • Acknowledgement number
  • Source port
  • Sequence number
  • Destination port

34. A Transmission Control Protocol (TCP) connection is in working order and both sides can send each other data. What is the TCP socket state?

  • SYN_RECEIVED
  • LISTEN
  • SYN_SENT
  • ESTABLISHED

35. If the checksum doesn't compute for a packet sent at the Internet Protocol (IP) level, what will happen to the data?

  • The data will be discarded
  • The data will be sent back to the sending node with an error.
  • The data will be resent
  • It will be sent, but may be out of order.

36. Which Transmission Control Protocol (TCP) flag is used to make sure the receiving end knows to examine the sequence number field?

  • FIN
  • RST
  • SYN
  • PSH

37. Application layer data lives in the _____ section of the transport layer protocol.

  • payload
  • footer
  • header
  • flags

38. A connection has been terminated and no communication is possible. What is the Transmission Control Protocol (TCP) socket state?

  • FINISHED
  • CLOSE_WAIT
  • FIN_WAIT
  • CLOSED

39. Connection-oriented protocols protect against dropped data by forming connections and using a constant stream of what?

  • Acknowledgements
  • Approvals
  • Recognition
  • Verifiers

40. The sequence of SYN, SYN/ACK, and ACK packets is known as the _________.

  • high five
  • two-way handshake
  • three-way handshake
  • four-way handshake

41. What port does the File Transfer Protocol (FTP) typically listen on?

  • 80
  • 21
  • 25
  • 443

The Five-Layer Network Model

Use the following scenario to answer the 10 questions below:

You have 3 networks (A, B, and C) and 2 routers (Y and Z).

Network A has an address space of 10.1.1.0/24 and is connected to router Y, using the interface 10.1.1.1.

Network B has an address space of 192.168.1.0/24 and is connected to Router Y, using the interface 192.168.1.254. Network B is also connected with router Z, using the interface of 192.168.1.1.

Network C has an address space of 172.16.1.0/24 and is connected to router Z, using the interface 172.16.1.1. The diagram below represents these connections and interfaces.

42. Computer 1 on network B, with IP address of 192.168.1.233, wants to send a packet to Computer 2, with IP address of 10.1.1.205. On which network is computer 2?

  • Not present
  • Network C
  • Network A
  • Network B

43. For what purpose would computer 1 send a FF:FF:FF:FF:FF broadcast ARP message to all nodes on network A?

  • To obtain Router Y’s MAC address
  • To verify the internet connection
  • To obtain Computer 2 MAC address
  • To calculate the TTL

 

44. Which layer constructs the IP datagram?

  • Physical Layer
  • Application layer
  • Network layer
  • Data layer

 

45. What information is in the data payload of the Ethernet frame?

  • IP datagram
  • network interface
  • ART message
  • Handshake

46. When constructing the Ethernet datagram to send the packet from Router Y to Router Z, what information needs to be in the destination MAC address?

  • Computer 2’s MAC address
  • Router Y’s MAC address
  • Computer 1’s MAC address
  • Router Z’s MAC address

47. Computer 1 on Network A sends a packet to Computer 2 on Network C. What's the second step that Router Z does after receiving the Ethernet frame?

  • Sends an ARP broadcast message
  • Sends back the packages to router Y for confirmation
  • Calculates a checksum and compares this checksum with the one in the Ethernet frame header
  • Strips away the Ethernet frame, leaving the IP datagram. Performs a checksum calculation against the entire datagram

48. Computer 1 on network A, with IP address of 10.1.1.10, wants to send a packet to Computer 2, with IP address of 192.168.1.14. If the TTL value was set to 64 at the beginning, what is the value of the TTL once it reaches its destination?

  • 0
  • 61
  • 65
  • 63

49. Computer 1 on network B, with IP address of 192.168.1.121, wants to send a packet to Computer 2, with IP address of 10.1.1.8. Taking in consideration that computer 1 is sending a request to a web server on computer 2, listening on port 80, and the source port on computer 1 is 5000, which of the following contains the correct information for the first TCP segment of data?

  • Source Port: 80

    Destination Port: 5000

    Sequence Number: 1

    Acknowledgment Number: 2

  • Source Port: 5000

    Destination Port: 80

    Sequence Number: 1

    Acknowledgment Number: 2

  • Source Port: 8081

    Destination Port: 50

    Sequence Number: 4

    Acknowledgment Number: 1

  • Source Port: 80

    Destination Port: 5000

    Sequence Number: 1

    Acknowledgment Number: 1

50. Computer 1 on network A, with IP address of 10.1.1.10, wants to send a packet to Computer 2, with IP address of 172.16.1.64. Which of the following has the correct IP datagram information for the fields: Version, minimum Header Length, Source IP, and Destination IP?

  • Version: 5

    Header Length: 16

    Source IP Address: 171.1.1.1.

    Destination IP address: 172.16.1.0/24.

  • Version: 6

    Header Length: 20

    Source IP Address: 8a:1a:2b:3c:4d:5f

    Destination IP address: 2a:2b:3c:4d:8f

  • Version: 4

    Header Length: 20

    Source IP Address: 10.1.1.10

    Destination IP address: 172.16.1.64

  • Version: 4

    Header Length: 32

    Source IP Address: 10.1.1.1

    Destination IP address: 172.16.1.1

 

51. When referring to RJ45, we are referring to ________.

  • network identification
  • ethernet port
  • router velocity
  • cable plug

 

52. Computer 1 on network A, with the IP address of 10.1.1.8, wants to send a packet to Computer 2, with the IP address of 10.1.1.10. On which network is computer 2?

  • Network C
  • Network B
  • Not present
  • Network A

53. Computer 1 wants to send a packet to Computer 2. Since computer 2 is not on the local network, Computer 1 checks the ARP table for the corresponding ______ that matches the gateway IP.

  • Port number
  • MAC address
  • TTL value
  • Destination MAC address

54. Which layer constructs the Ethernet frame?

  • Data link layer
  • Application layer
  • Physical Layer
  • Transport layer

55. Computer 1 on network C, with IP address of 172.16.1.57, wants to send a packet to Computer 2, with IP address of 172.16.1.133. If the TTL value was set to 64 at the beginning, what is the value of the TTL once it reaches its destination?

  • 64
  • 61 
  • 65

56. Computer 1 on network B, with IP address of 192.168.1.233, wants to send a packet to Computer 2, with IP address of 172.16.1.133. Which of the following has the correct IP datagram information for the fields: Version, minimum Header Length, Source IP, and Destination IP?

  • Version: 4

    Header Length: 20

    Source IP Address: 192.168.233

    Destination IP address: 172.16.1.133

  • Version: 5

    Header Length: 16

    Source IP Address: 10.1.1.0/24.

    Destination IP address: 172.16.1.0/24.

  • Version: 4

    Header Length: 32

    Source IP Address: 10.1.1.1

    Destination IP address:172.16.1.1

  • Version: 6

    Header Length: 20

    Source IP Address: 8a:1a:2b:3c:4d:5f

    Destination IP address: 2a:2b:3c:4d:8f

57. The Cat6 cable is part of the ______ layer.

  • Transport
  • Application
  • Physical
  • Network

58. What information is computer 1 looking at in the ARP table on Router Y?

  • Destination MAC address
  • Port number
  • TTL value
  • MAC address

59. Computer 1 on network C, with IP address of 172.16.1.57, wants to send a packet to Computer 2, with IP address of 192.168.1.14. Taking in consideration that computer 1 is sending a request to a web server on computer 2, listening on port 80, and the source port on computer 1 is 5000, which of the following contains the correct information for the fourth TCP segment of data?

  • Source Port: 5000

    Destination Port: 80

    Sequence Number: 1

    Acknowledgment Number: 2

  • Source Port: 8081

    Destination Port: 50

    Sequence Number: 4

    Acknowledgment Number: 1

  • Source Port: 5000

    Destination Port: 80

    Sequence Number: 4

    Acknowledgment Number: 5

  • Source Port: 80

    Destination Port: 5000

    Sequence Number: 1

    Acknowledgment Number: 1

60. When constructing the Ethernet datagram to send the packet from Router Z to Computer 2 which is on Network C, what information needs to be in the destination MAC address?

  • Computer 2’s MAC address
  • Router Y’s MAC address
  • Computer 1’s MAC address
  • No MAC address is needed

61. Computer 1 on Network A sends a packet to Computer 2 on Network C. What's the last step that Router Z does after receiving the Ethernet frame?

  • Sends back the packages to router Y for confirmation
  • Decrements the TTL by 1, calculates a new checksum, and makes a new IP datagram. This new IP datagram is again encapsulated on a new Ethernet frame.
  • Strips away the Ethernet frame, leaving the IP datagram. Performs a checksum calculation against the entire datagram
  • Calculates a checksum and compares this checksum with the one in the Ethernet frame header

62. Computer 1 on network A, with IP address of 10.1.1.8, wants to send a packet to Computer 2, with IP address of 172.16.1.64. If the TTL value was set to 64 at the beginning, what is the value of the TTL once it reaches its destination?

  • 65
  • 60
  • 0
  • 62

63. The ________ layer is responsible for sending ones and zeros through a process called modulation from Computer 1 to Computer 2.

  • Transport
  • Physical
  • Network
  • Application

64. If it’s a TCP connection, which is the first segment that computer 1 needs to build?

  • IP datagram
  • handshake
  • TCP segment
  • Ethernet frame

65. What information is in the payload section of the TCP segments?

  • The application layer data
  • ART Table
  • The MAC address of Computer 1
  • Handshake

Use the following scenario to answer the 10 questions below:

You have 3 networks (A, B, and C) and 2 routers (Y and Z).

Network A has an address space of 10.1.1.0/24 and is connected to router Y, using the interface 10.1.1.1.

Network B has an address space of 192.168.1.0/24 and is connected to Router Y, using the interface 192.168.1.254. Network B is also connected with router Z, using the interface of 192.168.1.1.

Network C has an address space of 172.16.1.0/24 and is connected to router Z, using the interface 172.16.1.1. The diagram below represents these connections and interfaces.

66. Computer 1 on network A, with IP address of 10.1.1.205, wants to send a packet to Computer 2, with IP address of 172.16.1.57. On which network is computer 2?

  • Network A
  • Network B
  • Local network
  • Network C

67. When constructing the Ethernet datagram to send the packet from computer 1 to its gateway (Router Y), what information needs to be in the destination MAC address?

  • Router Y’s MAC address
  • Computer 2’s MAC address
  • Computer 1’s MAC address
  • Router Z’s MAC address

68. Computer 1 on network B, with IP address of 192.168.1.121, wants to send a packet to Computer 2, with IP address of 172.16.1.57. Which of the following has the correct IP datagram information for the fields: Version, minimum Header Length, Source IP, and Destination IP?

  • Version: 6

    Header Length: 20

    Source IP Address: 8a:1a:2b:3c:4d:5f

    Destination IP address: 2a:2b:3c:4d:8f

  • Version: 4

    Header Length: 20

    Source IP Address: 192.168.1.121

    Destination IP address: 172.16.1.57

  • Version: 5

    Header Length: 16

    Source IP Address: 10.1.1.0/24.

    Destination IP address: 10.1.1.0/23.

  • Version: 4

    Header Length: 32

    Source IP Address: 10.1.1.1

    Destination IP address: 172.16.1.1

Leave a Reply