没有合适的资源?快使用搜索试试~ 我知道了~
首页SSD8Multiple-Choice选择题答案
资源详情
资源评论
资源推荐

1. Which of the following parameters can be specified in the header of a request in the Hypertext
Transfer Protocol (HTTP)?
The types of image formats that a browser understands
The type of browser (e.g., Netscape, Internet Explorer) making the request
The method by which the request is to be satisfied—for example, whether the request is a GET of
a form submission
(a) III only
(b) I, II, and III
(c) II and III only
(d) I and II only
Correct answer is (b)
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
2. Which of the following distinguish stream sockets (e.g., TCP) from datagram sockets (e.g.,
UDP)?
Stream sockets guarantee delivery of the data sent through them.
Stream sockets can be used to send application data to a remote host, whereas datagram sockets
can only send control commands.
Stream sockets have greater overhead.
(a) I and III only
(b) I and II only
(c) II and III only
(d) I only
Correct answer is (a)
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
3. A computer sends 100 Kbytes of aggregate data to another computer through the network. If
this transmission time takes 10 seconds and setup time is negligible, the throughput of this
network is
(a) not able to be determined with the information given
(b) exactly 10 Kbps
(c) in the range from 60 to 120 Kbps (kilobits per second)
(d) in the range from 6 to 12 Kbps (kilobits per second)
Correct answer is (c)
Feedback:
See section 1.1.4 of the course notes.
--------------------------------------------------------------------------------
4. An application on a computer sends data through a socket to another computer. Which of the
following are specified by the communication protocol?
The contents of the message body
The speed of transmission

The header format, which specifies the header field sizes and meanings
(a) II and III only
(b) III only
(c) I only
(d) I and III only
Correct answer is (b)
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
5. An advantage of defining network protocols through agreement among many companies and
individuals is that
(a) different implementations can then communicate with each other
(b) otherwise source code would need to be shipped with all networking applications
(c) only one implementation need then be created
(d) a protocol designed by committee always has better performance than that designed by a
single company or research project
Correct answer is (a)
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
6. We send a packet from host A to host B, which immediately acknowledges it. We measure the
interval between the time the packet is sent by A and its acknowledgement is received. This
interval is found to be 180 milliseconds. What can be said about the latency of the link from A to
B?
(a) It is smaller than 180 ms.
(b) It is greater than 180 ms.
(c) It is exactly 180 ms.
(d) It is exactly 90 ms.
Correct answer is (a)
Feedback:
See section 1.1.4 of the course notes.
(d) This would be so only if the latency in the direction A->B was identical to the latency in the
direction B->A
--------------------------------------------------------------------------------
7. What can be said about the protocol used by the implementation of the transport layer of an
Internet host?
It guarantees delivery.
It is the Transmission Control Protocol (TCP).
It uses services provided by the session layer.
(a) none
(b) I only
(c) I and II only
(d) I and III only
Correct answer is (a)

Feedback:
See section 1.1.5 of the course notes.
--------------------------------------------------------------------------------
8. Which of the following methods are invoked by a client implemented with sockets?
I. connect ( )
II.listen ( )
III. read ( )
(a) I, II, and III
(b) III only
(c) I only
(d) I and III only
Correct answer is (d)
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
9. When you connect your computer to the Internet, the protocol(s) your computer uses is (are)
selected according to
(a) the application client and server you use at each moment
(b) which HTTP (Web) server you connect to
(c) which operating system is running on your computer
(d) what vendor your Internet service provider purchased equipment from
Correct answer is (a)
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
10. Which of the following activities use an inter-network?
A phone call from Pittsburgh in the United States to Chennai in India
A phone call from a wired phone to a mobile ("cell") phone
A chat session between two computers connected to an office Ethernet
(a) I, II, and III
(b) I only
(c) I and II only
(d) III only
Correct answer is (c)
Feedback:
See section 1.1.6 of the course notes.
--------------------------------------------------------------------------------
2. Packet collisions occur in an Ethernet network because
(a) the Ethernet switching mechanism may occasionally send two packets through the same route
(b) two different Ethernet networks may be spliced together
(c) two Ethernet nodes can send packets at the same time
(d) the Ethernet uses a ring topology
Correct answer is (c)

Feedback:
See section 1.1.2 of the course notes.
--------------------------------------------------------------------------------
3. The Maximum Transfer Unit (MTU) is a parameter of
(a) the technology of the physical network
(b) the application protocol
(c) the size of data sent by the application
(d) the operating system
Correct answer is (a)
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
4. Two packets A and B are sent in that order through a connectionless communication network.
They will arrive at the destination
(a) in the order A-B, after possibly having traversed different routes
(b) in the order A-B, after having traversed the same route
(c) in any order, after having traversed the same route
(d) in any order, after possibly having traversed different routes
Correct answer is (d)
Feedback:
See section 1.1.2 of the course notes.
--------------------------------------------------------------------------------
5. Ethernet (IEEE 802.3) is an example of
(a) a successful example of the Internet's strategy of developing standards through "rough
consensus and running code"
(b) an a priori standard
(c) a de facto standard later developed into a de jure standard
(d) a standard developed by the International Telecommunications Union
Correct answer is (c)
Feedback:
See section 1.1.6 of the course notes.
--------------------------------------------------------------------------------
6. In a broadcast network
(a) only the destination computer sees a packet
(b) only the computers that are tuned to a channel see and process the packets in that channel
(c) all computers see and process the application data within all packets
(d) all computers see all packets, but the application data in each packet is only processed by the
destination computer
Correct answer is (d)
Feedback:
See section 1.1.1 of the course notes.
(b) A network with channels would be, in effect, multiple broadcast networks.
--------------------------------------------------------------------------------
7. The transmission of high-quality, interactive voice and video over the current Internet is

difficult because today's Internet
(a) gives higher priority to bulk data transfers
(b) is unable to guarantee minimum throughput or maximum latency for a given connection
(c) does not really have sufficient throughput
(d) uses connectionless protocols
Correct answer is (b)
Feedback:
See section 1.1.4 of the course notes.
--------------------------------------------------------------------------------
8.
What can be said concerning the protocol that is used by the implementation of the network layer
of an Internet host?
It guarantees delivery.
It is the Internet Protocol (IP).
It uses services provided by the session layer.
(a) none
(b) I and II only
(c) I only
(d) II only
Correct answer is (d)
Feedback:
See section 1.1.5 of the course notes.
--------------------------------------------------------------------------------
10. Why do network applications send "messages," but the network transmits information in
"packets?"
Buffer allocation and error handling is easier when done for smaller chunks of data.
Multiple messages can be sent in a single large packet to decrease overhead.
Network engineers and application programmers just use different terminology for the same unit
of application data.
A message needs to be packaged with the instructions to process it at the destination.
(a) II and IV only
(b) II and III only
(c) I and II only
(d) I, II, III, and IV
Correct answer is (c)
Feedback:
See section 1.1.1 of the course notes.
--------------------------------------------------------------------------------
2. The Protocol Data Unit (PDU) that is sent by a protocol layer to its peer on the destination
system typically includes
A payload
A protocol header
A router vendor ID
(a) II only
剩余62页未读,继续阅读











安全验证
文档复制为VIP权益,开通VIP直接复制

评论1