内容发布更新时间 : 2025/1/24 13:45:50星期一 下面是文章的全部内容请认真阅读。
1. What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
encapsulation ? flow control ? access method ? response timeout
?
2. What type of communication will send a message to all devices on a local area network?
broadcast ? multicast ? unicast ? allcast
?
3. What process is used to place one message inside another message for transfer from the source to the destination?
access control ? decoding ? encapsulation ? flow control
?
4. A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, IP, TCP, Ethernet ? HTTP, TCP, IP, Ethernet ? Ethernet, TCP, IP, HTTP ? Ethernet, IP, TCP, HTTP
?
5. Which statement is correct about network protocols?
Network protocols define the type of hardware that is used and how it is mounted in racks.
? They define how messages are exchanged between the source and the
destination.
? They all function in the network access layer of TCP/IP.
? They are only required for exchange of messages between devices on
remote networks.
?
6. Which statement is true about the TCP/IP and OSI models?
The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.
? The TCP/IP network access layer has similar functions to the OSI network
layer.
? The OSI Layer 7 and the TCP/IP application layer provide identical
functions.
? The first three OSI layers describe general services that are also provided
by the TCP/IP internet layer.
?
7. What is an advantage of using standards to develop and implement protocols?
A particular protocol can only be implemented by one manufacturer. ? Products from different manufacturers can interoperate successfully.
? Different manufacturers are free to apply different requirements when
implementing a protocol.
? Standards provide flexibility for manufacturers to create devices that
comply with unique requirements.
?
8. What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
? ? ? ? ? ?
ARP DHCP DNS FTP NAT PPP
9. What are proprietary protocols?
protocols developed by private organizations to operate on any vendor hardware
? protocols that can be freely used by any organization or vendor
? protocols developed by organizations who have control over their definition
and operation
? a collection of protocols known as the TCP/IP protocol suite
?
10. What is an advantage of network devices using open standard protocols?
Network communications is confined to data transfers between devices from the same vendor.
? A client host and a server running different operating systems can
successfully exchange data.
? Internet access can be controlled by a single ISP in each market. ? Competition and innovation are limited to specific types of products.
?
11. Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?
ITN Chapter 3 Exam Answers 001
only application and Internet layers ? only Internet and network access layers
?