Name: 
 

CEN2503 Network Protocols



True/False
Indicate whether the statement is true or false.
 

 1. 

UDP (User Datagram Protocol) belongs to the Transport layer of the OSI Model.
 

 2. 

Routers use DHCP to determine which nodes belong to a certain multicast group and to transmit data to all nodes in that group.
 

 3. 

MAC addresses are assigned to a device’s NIC at the factory by its manufacturer.
 

 4. 

An IP whose first octet is in the range of 128–191 belongs to a Class C network.
 

 5. 

Static IP addressing can easily result in the duplication of address assignments.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 6. 

____ define the standards for communication between network devices.
a.
Dynamic Ports
c.
Name servers
b.
Protocols
d.
Fully qualified host names
 

 7. 

____ operates at the Transport layer of the OSI Model and provides reliable data delivery services.
a.
TCP
c.
NTP
b.
NetBIOS
d.
SPX
 

 8. 

____ provides information about how and where data should be delivered, including the data’s source and destination addresses.
a.
TCP
c.
NTP
b.
SPX
d.
IP
 

 9. 

____ is a Network layer protocol that reports on the success or failure of data delivery.
a.
TCP
c.
ICMP
b.
IGMP
d.
FTP
 

 10. 

____ is a transmission method that allows one node to send data to a defined group of nodes.
a.
IGMP
c.
Multicasting
b.
Subnetting
d.
DHCP
 

 11. 

____ is a Network layer protocol that obtains the MAC (physical) address of a host, or node, and then creates a database that maps the MAC address to the host’s IP (logical) address.
a.
ICMP
c.
FTP
b.
ARP
d.
TCP
 

 12. 

____ are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table.
a.
Static ARP tables
c.
Dynamic Ports
b.
Anycast addresses
d.
Dynamic ARP table entries
 

 13. 

The IP address 127.0.0.1 is called a(n) ____.
a.
loopback address
c.
host name
b.
dynamic address
d.
static address
 

 14. 

____ is an automated means of assigning a unique IP address to every device on a network.
a.
ICMP
c.
IGMP
b.
DHCP
d.
FTP
 

 15. 

____ assigns the computer’s network adapter an IP address from a predefined pool of addresses, 169.254.0.0 through 169.254.255.255, that IANA (Internet Assigned Numbers Authority) has reserved for this purpose.
a.
IEEE
c.
APIPA
b.
AppleTalk
d.
ARP
 

 16. 

____ Ports are in the range of 0 to 1023 and are assigned to processes that only the operating system or an administrator of the system can access.
a.
Dynamic
c.
Private
b.
Well known
d.
Registered
 

 17. 

____ Ports are in the range of 1024 to 49151.
a.
Registered
c.
Well known
b.
Dynamic
d.
Private
 

 18. 

____ are hosts on the Internet that need to look up domain name information.
a.
Resolvers
c.
Sockets
b.
Name servers
d.
Net masks
 

 19. 

____ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite.
a.
PING
c.
Telnet
b.
FTP
d.
NNTP
 

 20. 

____ is an Application layer protocol used to send and receive files via TCP/IP.
a.
PING
c.
NNTP
b.
Telnet
d.
FTP
 

 21. 

____ facilitates the exchange of newsgroup messages between multiple servers and users.
a.
FTP
c.
Telnet
b.
NNTP
d.
PING
 

 22. 

____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network.
a.
RARP
c.
PING
b.
UDP
d.
FTP
 

 23. 

____ is a protocol originally designed for IBM to provide Transport and Session layer services for applications running on small, homogenous networks.
a.
UDP
c.
NetBEUI
b.
NetBIOS
d.
WINS
 

 24. 

____ is the protocol suite originally designed to interconnect Macintosh computers.
a.
NetBIOS
c.
WINS
b.
IGMP
d.
AppleTalk
 

 25. 

____ is the process of assigning one network component to work with another.
a.
Multicasting
c.
IP addressing
b.
Subnetting
d.
Binding
 

 26. 

In the context of TCP/IP, a packet is also known as a(n) ____.
a.
cache
c.
host file
b.
IP datagram
d.
label
 

Completion
Complete each statement.
 

 27. 

Networks running more than one protocol are called _________________________.
 

 

 28. 

To make ARP more efficient, computers save recognized MAC-to-IP address mappings on their hard disks in a database known as a(n) ____________________.
 

 

 29. 

An IP address that is assigned to a device upon request and is changeable is known as a(n) ____________________.
 

 

 30. 

A process’s port number plus its host machine’s IP address equals the process’s ____________________.
 

 

 31. 

____________________ are servers that contain databases of associated names and IP addresses and provide this information to resolvers on request.
 

 

Matching
 
 
Match each term with the correct statement below.
a.
Routable
f.
Domain
b.
Internetwork
g.
Name space
c.
Dotted decimal notation
h.
Zeroconf
d.
Subnetting
i.
Network Time Protocol
e.
Unicast address
 

 32. 

To traverse more than one LAN segment and more than one type of network through a router.
 

 33. 

Process of subdividing a single class of networks into multiple, smaller logical networks, or segments.
 

 34. 

An address that represents a single interface on a device.
 

 35. 

The most common way of expressing IP addresses.
 

 36. 

The database of Internet IP addresses and their associated names.
 

 37. 

Used to synchronize the clocks of computers on a network.
 

 38. 

A collection of protocols designed by the IETF to simplify the setup of nodes on a TCP/IP network.
 

 39. 

Group of computers that belongs to the same organization and has part of their IP addresses in common.
 

 40. 

Protocols that can span more than one LAN.
 

Short Answer
 

 41. 

What is the purpose of the following fields on a TCP segment: Source port, Destination port, Sequence number, and Acknowledgement number?
 

 42. 

What is the purpose of the following fields on an IP datagram: Differentiated Services (DiffServ) Field, Total length, Flags, and Time to Live (TTL)?
 

 43. 

What is the difference between BOOTP and RARP?
 

 44. 

List four reasons why you would implement the Dynamic Host Configuration Protocol (DHCP).
 

 45. 

Once the DHCP server is running, what steps are taken by the client and server to negotiate the client’s first lease?
 

 46. 

What are the advantages of IPv6?
 

 47. 

What are some of the most notable differences between IP addresses in IPv4 and IPv6?
 

 48. 

What are some of the differences between Trivial File Transfer Protocol (TFTP) and the File Transfer Protocol (FTP)?
 

 49. 

Provide a brief description of the Internetwork Packet Exchange (IPX) and Sequenced Packet Exchange protocols.
 

 50. 

Under what circumstances is a DHCP lease terminated?
 



 
Check Your Work     Start Over