Which statement correctly describes data transmission at the transport layer

What characteristics in terms of transmission parameters do the following types of applications or protocols have?

Which of the following terms does not belong among transmission parameters of a computer network?

Which of the following statements regarding WAN is true?

Which of the following statement regarding LAN is true?

What are the main properties of Diffie-Hellman algorithm?

What are the main properties of Dijkstra algorithm?

On what principle does electronic mail encryption work?

On what principle does electronic signature work?

Which statement about symmetric and asymmetric encryption algorithms is true?

What properties are required for hash algorithms used in cryptography?

What statement about keys and certificates is true?

Which statement about SSL and/or TLS is true?

Mark untrue statement regarding layered network architecture.

How does the vertical cooperation between layers work?

What does not belong among protocol functions?

Mark untrue definition of terms segmentation, fragmentation, multiplexing and encapsulation.

How will the source and destination IP and MAC addresses of a packet sent from a notebook to a server look like on the route between routers A and B?

How will the source and destination IP and MAC addresses of a response from the server to a request from a notebook look like travelling on subnet marked III?

Mark true statement regarding P2P and/or the client-server application models.

Which statement regarding URI is correct?

Which of the following statements about domain names is correct?

Which step follows after the web server prepares text of a page, divides it into pieces and forms TCP segments?

Which step follows after the web client finds out the destination server address and prepares the packet in IP protocol to be sent?

Which step follows after the computer running www server reads the Ethernet frame from the network interface card?

What does belong among the tasks performed by the application layer in TCP/IP model?

Highlight a task that is not subject to the operation of any transport layer protocol.

What doesn't belong among the tasks performed by the network layer in TCP/IP model?

What is the correct sequence of layers in OSI model from top-to-bottom?

Choose correct statement about the purpose and principle of the ping program.

If we call the ping program to the address 127.0.0.1, what can we gather from the result: 4 packets transmitted, 0 packets received, 100.0% packet loss

User is not able to display a web page. When using IP address in URL, the page is displayed correctly. Which protocol is responsible for the error?

User moved a host to another subnet within the network without VLSM (Variable Length Subnet Mask) and Proxy ARP. Which of the following will certainly have to be changed?

In what manner is text line representation handled in TCP/IP application protocols?

In what manner is binary representation of integers handled in TCP/IP application protocols?

Which of the following protocols is used in TCP/IP on the transport layer?

Which of the following protocols is not a protocol of the TCP/IP application layer?

Which of the following protocols is used in TCP/IP on the application layer?

What does the acronym STP stand for?

Which of the following statements correctly describes the function of particular application protocol?

Which application protocol is used for file transmission?

Which application protocol (set) is used for VoIP?

Which application protocol is used for electronic mail?

Which application protocol is used for file system sharing?

Which application protocol is used for finding IP addresses corresponding to host names?

Which of the following statements about RFC is true?

Which of the following statements about the nature of DNS protocol is correct?

Which statement correctly describes common implementation of operation system service "find out the IP address for a given domain name"?

Which statement about the security aspects of the DNS protocol is correct?

Mark true statement regarding nameservers.

What TLD (Top Level Domain) can we find in the following URI? ftp://sunsite.mff.cuni.cz/Network/RFCs/rfc-index.txt

Which of the following statements about the use of mail transfer protocols is correct?

Which of the following statements about roles of particular components in electronic mail transmission is true?

Which of the following statements about SMTP protocol is correct?

Which statement about SMTP extensions for file transmission and diacritics is correct?

Mark header that does not occur in messages according to RFC 822.

Which command is not an SMTP protocol command according to RFC 821?

Which statement about security aspects of email protocols is correct?

Which statement about authenticity of the message origin is correct?

How do we call the protocol used to transmit web pages?

What does the acronym HTML signify?

Which statement about the nature of HTTP protocol is correct?

Which statement regarding cookies is correct?

Which way do clients usually use to submit data filled out by users into dialogue/form widgets (controls) to servers?

Which of the following methods ("commands") exists in HTTP protocol?

Which statement about possibilities of the author to affect the dynamic nature of pages is not correct?

Choose correct statement about dynamic web pages.

Which statement correctly describes the issues of remote login by means of telnet and SSH protocols?

Which statement about security of SSH access is correct?

What does the VoIP (Voice over IP) term denote?

What does the SIP (Session Initiation Protocol) term denote?

How does DHCP protocol work?

What way is clock synchronization of computers in a network performed?

Why do clocks in computers in a network synchronize?

Which statement about the nature of the FTP protocol is correct?

Which of the following statements about FTP security issues is correct?

What TCP description is not correct?

What procedures does TCP use to ensure data transfer reliability?

Which data transfer parameter determines what data range a station may send without waiting for confirmation of the counterparty?

What can we deduce from following packet description in tcpdump program?

What can we deduce from (a complete) output of the netstat -an program run?

What information is usually dynamically chosen by a client connecting to a server?

What information can we find in both TCP and UDP header?

Which statement correctly describes TCP or UDP?

What will happen if TCP packets arrive in incorrect order?

What will happen if UDP packets arrive out of order?

If a web browser sends a request to a web server on standard port, which of the following ports may contain response as source port?

If an FTP client sends a request to an FTP server on standard port, which of the following ports may contain response as source port?

What takes place during the three-way handshake?

What happens when one of the partners sends a TCP packet with FIN tag?

With what TCP/IP layer the term port is related?

What are ports in OSI 4 used for?

Mark the term, which is not a network layer function.

What information si added to a packet in course of encapsulation on the network layer?

Which protocol provides reliable data transfer service on the network layer?

Which protocol provides unreliable data transfer service on the network layer?

Mark untrue statement about IP address assignment.

Mark untrue alternative, how a host can learn the IP address it is allowed to use.

Mark true statement about autonomous systems (AS)?

How many bits are there in IPv6 address?

Which of the following protocols does not work with IP addresses?

Which OSI layer works with IP addresses?

How does message sender find out which part of the destination IP address pertains to the network and which to the host?

Which IPv4 address has all ones in the host part?

Which statement about IP address types is true?

Mark the incorrectly classified IP.address (on condition that default network masks have been used).

How many and how large subnets are required to cover a network with the following needs for number of connected hosts when using VLSM (Variable Length Subnet Mask)?

Which of following combinations represents minimum network covering these unicast addresses: 10.1.1.106, 10.1.1.111, 10.1.1.119?

Which of the following addresses represents correct computer address?

Default router for a network has address 172.31.219.33/27. Which of the following settings may be correct computer address in this network?

Which entry might be a valid row in the routing table of router B from the following figure?

Which entry might be a valid row in the routing table of router A from the following figure?

Which statement about routing si true?

Choose correct statement about the principle of a routing algorithm.

What steps does the client have to do for correct sending out a packet in case the destination server is not in the same network?

Choose correct statement about router functions.

Which statemen about routing table management is true?

Mark true statement about distance-vector routing protocols.

Mark true statement about link-state routing protocols.

What information from the packet does every router use to determine the path?

Which field in the IP header does the router change under normal circumstances?

Mark an existing field (column) of a routing table.

By means of which command can we dump the contents of a routing table?

Which field in the IP header prevents from endless loops occurence during mail delivery?

Choose correct statement about the purpose or usage of IP header field TTL (Time To Live).

If a host has a wrong default router setting, what will it not be able to do?

What is the purpose of a default gateway?

What happens if the destination is not found in the routing table?

Which of the IP filtering characteristics is correct?

Which of the network address translation (NAT) characteristics is correct?

Which of the proxy server characteristics is correct?

Which device implements security policy of local network for using the Internet?

Which statement about ARP is true?

The notebook in the picture sent out an HTTP request, which reached the server. Which statement about ARP cache contents on a notebook, switch, router and server is true?

What are the functions of ICMP (Internet Control Message Protocol)?

Mark true statement about the relation of data link and physical layers in OSI and TCP/IP.

What does the term LLC (Logical Link Control) describe?

What does the term MAC (Media Access Control) describe?

Which statement about deterministic and non-deterministic access to a medium is true?

Which statement about network topology si true?

Which statement about the Ethernet is correct?

Which statement about WiFi is correct?

What is the primary function of CSMA/CD?

What's a proper description of repeater, hub, bridge and switch?

What addresses does a hub, switch, or router work with?

How can Spanning Tree Protocol or Spanning Tree Algorithm be described?

Which statement about VLAN is true?

What does CRC stand for?

What is the primary purpose of the trailer in a data link frame?

How many times does a CRC calculation (for Frame Check Sequence) run during transmission of a message between end devices in the figure?

How many times does a CRC calculation (for Frame Check Sequence) run during transmission of a message between end devices in the figure?

Nodes A, B, C and D are connected to a switch. Node A is transmitting a frame to node D, when node B needs to transmit data to node C. What does node B need to do?

Which statement correctly describes data transmission at the transport?

Which statement correctly describes data transmission at the transport layer? Retransmission of lost packets is provided by both TCP and UDP. Segmentation is provided by the window size field when the TCP protocol is used. A single datagram can include both a TCP and a UDP header.

What type of data passes through the transport layer?

Byte orientation Some applications prefer to receive byte streams instead of packets; the transport layer allows for the transmission of byte-oriented data streams if required.

Which transport layer protocol ensures that data is transmitted reliably to it's destination?

TCP is used for organizing data in a way that ensures the secure transmission between the server and client. It guarantees the integrity of data sent over the network, regardless of the amount. For this reason, it is used to transmit data from other higher-level protocols that require all transmitted data to arrive.

Which of the following statements is are true if the transport layer is removed from the TCP IP protocol stack?

ANSWER: Byte stream won't be transferred to another machine.