No student devices needed. Know more
31 questions
Which of the following statements are true about routers and routing on the Internet? Choose two answers.
Protocols ensure that a single path between two computers is established before sending packets over it.
Routers are hierarchical and the "root" router is responsible for communicating to sub-routers the best paths for them to route internet traffic.
A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or "dropped".
Routers act independently and route packets as they see fit.
The various protocols in use on the internet are said to operate in layers in which the protocol(s) at each layer solve one problem related to networked communication, and higher layers are built on top of, and rely on, the lower layers to do their jobs.
From the list provided choose the two (2) answers that correctly describe which internet protocol relies on the other. For example: if protocol A relies on protocol B, it means that A is a higher level protocol than B, and thus protocol B must exist and work properly in order for protocol A to do its job.
Select two answers.
TCP/IP relies on HTTP
HTTP relies on TCP/IP
DNS relies on TCP/IP
TCP/IP relies on DNS
A school starts tracking which websites each computer in the school is visiting by monitoring the packets leaving the school. A sample of the information they have collected appears above. Which of the following is MOST likely to be answerable using all the data collected by this monitoring?
Which students are visiting social media sites from school
Which classes are assigning the most homework using the computers
Which programs students are running on the lab computers
Which websites are most frequently visited before and after school hours from a school computer
Which of the following BEST describes how protocols on the Internet (e.g. IP, TCP, HTTP) make use of abstraction to accomplish their respective purposes?
High level protocols take into account specific implementation details of lower level protocols to ensure they are compatible.
Low level protocols can provide functionality to high level protocols without revealing the details of how this is accomplished.
Low level protocols are written in binary while high level protocols are written in hexadecimal.
High level protocols can take on the role of a low level protocol in the event of failure in the system.
Which of the following is NOT true about TCP/IP packets?
Packets are numbered so if they arrive out of order the message can be reassembled.
TCP guarantees that no packets are ever dropped
Packets can be routed on different paths from sender to receiver.
Messages are broken into packets to improve reliability of the internet
The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IETF are:
An International coalition of government agencies who oversee the Internet in their countries.
A collection of the leaders of the Tier 1 Internet service providers.
A loosely organized collection of citizens and engineers.
Political leaders and heads of state.
There are no members. IETF is an "organization" in name only.
How does a computer resolve (match) a domain name into an IP address?
It asks a DNS server for the corresponding IP address
It scans addresses until it finds the one it's looking for
It uses a Border Gateway Protocol to get the address from a nearby computer.
It creates an IP address for the domain, and shares it with the closest DNS.
The world is currently in a transition to using IPv6, a newer version of the IP protocol that uses 128-bit addresses instead of 32-bit addresses used by IPv4. What is the main problem that IPv6 was created to solve?
32-bit addresses could not accommodate the increased size and amount of data traveling on the Internet as it has grown in popularity
IPv6 will allow problems with IPv4's address hierarchy to be resolved
IPv4 proved unreliable in some cases where network redundancy could not be ensured
32-bit addresses could not ensure that every internet-connected device can receive a unique IP address
A _____ HTTP request is used when the user enters information (ex. user name/password) into the webpage.
Get
Post
Login
Send
HTTP
Protocol used to check if all packets of data have been received
Protocol for relaying packets across an interconnected network (Internet)
Protocol used by web browsers to communicate with the web server and fetch the webpages that you see
A cryptographic protocol used to securely transmit data over an unsecured network
How many bits are in an IPV4 address?
32
64
128
256
If the post office delivered mail exactly like routers deliver messages on the internet, which 2 of the following statements would be true?
One mailman would be responsible for delivering a letter from sender to receiver.
The mailman would sometimes take a different path to deliver each letter to your home.
Letters would be written on the outside of envelopes for all to read instead of letters put inside envelopes.
Your mail could not be delivered if a road your mailman was planning to take were under construction.
During the activity where you were on the simulator learning about packets and protocols for making a reliable internet, what were some obstacles you needed to overcome? Select all answers that apply.
Packets have a maximum size. If the information being sent was more than the required size, then the data got cut off.
Some percentage of packets were dropped no matter what, which meant that it could never be assumed that the receiver got some or all of the message.
Because bits are sent via physical infrastructure such as copper wires or fiber optic cable, physical disruption (earthquake, wire being cut, etc.) can interfere with transmission.
If a router doesn't have enough memory to hold all the packets it is processing, it can drop packets.
Because the Internet has a maximum packet size, devices must respect in order to have the packet be properly routed.
Pick Two: Pick the two statements about packets and routing on the Internet which are true.
Packets travelling across the Internet take a standardized amount of time and so can be counted on to arrive in the order they were sent.
TCP ensures messages can be reliably transmitted across the Internet.
TCP depends on the infrastructure of the Internet to be reliable enough to ensure no packets are lost in transmission.
TCP must account for the fact that packets may not arrive at a destination computer in the intended order.
A single central register of IP addresses and names (a DNS style system) is an efficient means of translating human readable names to IP addresses. Which of the following is NOT solved by DNS?
It is inefficient to have everyone on the Internet maintain their own list of IP addresses.
There are too few IP addresses to meet the current demand.
When someone new joins the Internet they must inform everyone else of the new IP address.
When an IP address changes, it is impossible to locate a computer until the owner announces the change.
True or False: Computers need to periodically check the DNS (Domain Name System) for websites you have already visited because they are not static and can change.
True
False
True or False: When we type in a web page address (URL) and click [enter], the browser contacts the DNS server to look up the IP address. It does this every time we browse to a page, so we don't need to know /memorize the IP addresses for our favorite web sites.
True
False
What feature of DNS and IP allow the internet to scale?
Redundancy
Hierarchy
Multiple servers
Government control
HTTP is considered to be a high level protocol because...
HTTP requests are given higher priority for fast delivery when being routed on the Internet.
HTTP requests are encoded using higher frequency radio waves.
HTTP messages can be either requests or responses.
HTTP requests make use of abstractions provided by lower level protocols.
Identify the two true statements about HTTP.
An HTTP request is sent from a client to request access to data stored on a server.
HTTP requests and responses have identical formats.
Displaying a web page will often require multiple HTTP requests in order to acquire all the necessary data.
An HTTP response code is only used when a server could not fulfill a request.
When computers communicate with each other using servers, they talk back and forth using HTTP.
True or False: Computers use a GET request to request/ask for a specified web page or other data /information, where as a POST submits some data for the server to accept or process.
True
False
Explore all questions with a free account