Академический Документы
Профессиональный Документы
Культура Документы
TRUE OR FALSE
6. EOIP encourages the development of IP applications for all major types of business data
as well as IP-based, or IP-compliant, telecommunications transport.
8. Standards can be developed simultaneously for protocols at each layer of the architecture.
9. Wireless networks cannot be deployed without the aid of the network administrators.
12. There are many protocols and technologies to select from when building an entire
communication system.
13. OSI is another standardized architecture that is often used to describe communications
functions but is now rarely implemented.
14. When two or more computers are interconnected via a communication network, the set of
computer stations is referred to as a “computer connection”.
15. The network access layer contains the logic needed to support the various user
applications.
MULTIPLE CHOICE
6. A device that connects networks with differing addressing schemes, packet sizes and
interfaces is called a ___________.
A. hub B. router C. switch D. repeater
7. The current IP specification uses addresses to identify hosts that consist of:
A. 16 bits B. 64 bits C. 32 bits D. 128 bits
8. The newer IPv6 specification uses addresses to identify hosts that consist of:
A. 128 bits B. 64 bits C. 32 bits D. 16 bits
9. The ________ layer is concerned with the exchange of data between a computer and the
network to which it is attached.
A. transport B. application C. network access D. physical
10. The ________ layer contains the logic needed to support the various user applications.
A. network access B. physical C. application D. transport
12. The ________ layer covers the physical interface between a data transmission device and
a transmission medium or network.
A. physical B. transport C. application D. network
14. The ________ supports a basic electronic mail facility by providing a mechanism for
transferring messages among separate hosts.
A. SNMP B. SSH C. HTTP D. SMTP
15. The _________ is used to send files from one system to another under user command.
A. UDP B. SMTP C. FTP D. SSH
SHORT ANSWER
1. __________ networking brings with it the advantages of connectivity without being
tethered, faster/lower cost deployment and the connection of geographically remote
sites.
4. The network access protocol appends a network access header to the data it receives
from the transport layer, creating a network access PDU, typically called a
__________.
6. Two protocol architectures have served as the basis for the development of
interoperable protocol standards: the OSI reference model and the ________.
7. A _________ is a device that connects two networks and whose primary function is to
relay data from one network to the other on a route from the source to the destination
end system.
8. For most applications running as part of the TCP/IP architecture, the transport layer
protocol is _________.
10. In 1995 the Internet Engineering Task Force issued a specification for a next-
generation IP; this specification was turned into a standard in 1996 known as
_________.
11. Features of ________ include mailing lists, return receipts, and forwarding.
12. ________ provides a secure remote logon capability, which enables a user at a
terminal or personal computer to logon to a remote computer and function as if
directly connected to that computer.
13. _________ connects client systems to Web servers on the Internet and its primary
function is to establish a connection with the server and send HTML pages back to the
user’s browser.
15. A _________ is a facility that provides a data transfer service among devices attached
to the network.
TRUE OR FALSE
9. A server-based processing model uses a “fat server” rather than a “fat client”.
10. Implementing an extranet removes the need for a company to maintain a public web site.
11. Typically cloud computing services will be rented from an external company that hosts
and manages them.
14. A cloud broker evaluates the services provided by a cloud provider in terms of security
controls, privacy impact, performance, and so on.
15. NIST defines three service models that can be viewed as nested service alternatives:
SaaS, PaaS, and IaaS.
MULTIPLE CHOICE
1. ________ is a set of function and call programs that allow clients and servers to
intercommunicate.
A. IaaS B. SQL C. API D. Middleware
8. ________ machines are typically single-user PCs or workstations that provide a highly
user-friendly interface to the end user.
A. Client B. Host C. Server D. Networked
15. A person or organization that maintains a business relationship with, and uses service
from, cloud providers is a __________.
A. cloud carrier B. cloud broker C. cloud consumer D. cloud auditor
SHORT ANSWER
1. A(n) _________ uses Internet technology and applications to provide in-house support
for distributed applications.
2. ________ is a set of function and call programs that allow clients and servers to
intercommunicate.
4. ________ is a set of drivers, APIs, or other software that improves connectivity between a
client application and a server.
8. The traditional client/server architecture involves two levels, or tiers: a client tier and a
_________ tier.
11. __________ binding means that a logical connection is established between the two
processes at the time of the RPC and that as soon as the values are returned, the
connection is dismantled.
12. With __________ binding, a connection that is set up for an RPC is sustained after the
procedure return.
13. _________ is a term used to refer to the implementation of Internet technologies within a
corporate organization rather than for external connection to the global Internet.
15. The _________ is a networking facility that provides connectivity and transport of cloud
services between cloud consumers and cloud providers.