Mark false statement regarding the comparison of packet switching and circuit switching method. |
What characteristics in terms of transmission parameters do the
following types of applications or protocols have? |
Which of the following terms does not
belong among transmission parameters of a computer network? |
Which of the following statements regarding WAN is true? |
Which of the following statement regarding LAN is true? |
What are the main properties of Diffie-Hellman algorithm? |
What are the main properties of Dijkstra algorithm? |
On what principle does electronic mail encryption work? |
On what principle does electronic signature work? |
Which statement about symmetric and asymmetric encryption algorithms is true? |
What properties are required for hash algorithms used in cryptography? |
What statement about keys and certificates is true? |
Which statement about SSL and/or TLS is true? |
Mark untrue statement regarding layered network architecture. |
How does the vertical cooperation between layers work? |
What does not belong among protocol functions? |
Mark untrue definition of terms segmentation, fragmentation, multiplexing and encapsulation. |
How will the source and destination IP and MAC addresses of a
packet sent from a notebook to a server look like on the route between routers A and B? |
How will the source and destination IP and MAC addresses of a
response from the server to a request from a notebook look like travelling on subnet marked III? |
Mark true statement regarding P2P and/or the client-server application models. |
Which statement regarding URI is correct? |
Which of the following statements about domain names is correct? |
Which step follows after the web server prepares text of a page,
divides it into pieces and forms TCP segments? |
Which step follows after the web client finds out the
destination server address and prepares the packet in IP protocol to be sent? |
Which step follows after the computer running www server reads
the Ethernet frame from the network interface card? |
What does belong among the tasks performed by the application layer in TCP/IP model? |
Highlight a task that is not subject to the operation of any transport layer protocol. |
What doesn't belong among the tasks performed by the network layer in TCP/IP model? |
What is the correct sequence of layers in OSI model from top-to-bottom? |
Choose correct statement about the purpose and principle of the ping program. |
If we call the ping program to the address 127.0.0.1, what can
we gather from the result: 4 packets transmitted, 0 packets received, 100.0% packet loss |
User is not able to display a web page. When using IP address in
URL, the page is displayed correctly. Which protocol is responsible for the error? |
User moved a host to another subnet within the network without
VLSM (Variable Length Subnet Mask) and Proxy ARP. Which of the following will certainly have to be changed? |
In what manner is text line representation handled in TCP/IP application protocols? |
In what manner is binary representation of integers handled in
TCP/IP application protocols? |
Which of the following protocols is used in TCP/IP on the transport layer? |
Which of the following protocols is not a protocol of the TCP/IP application layer? |
Which of the following protocols is used in TCP/IP on the application layer? |
What does the acronym STP stand for? |
Which of the following statements correctly describes the
function of particular application protocol? |
Which application protocol is used for file transmission? |
Which application protocol (set) is used for VoIP? |
Which application protocol is used for electronic mail? |
Which application protocol is used for file system sharing? |
Which application protocol is used for finding IP addresses corresponding to host names? |
Which of the following statements about RFC is true? |
Which of the following statements about the nature of DNS protocol is correct? |
Which statement correctly describes common implementation of
operation system service "find out the IP address for a given domain name"? |
Which statement about the security aspects of the DNS protocol is correct? |
Mark true statement regarding nameservers. |
What TLD (Top Level Domain) can we find in the following URI? ftp://sunsite.mff.cuni.cz/Network/RFCs/rfc-index.txt |
Which of the following statements about the use of mail transfer protocols is correct? |
Which of the following statements about roles of particular
components in electronic mail transmission is true? |
Which of the following statements about SMTP protocol is correct? |
Which statement about SMTP extensions for file transmission and diacritics is correct? |
Mark header that does not occur in messages according to RFC 822. |
Which command is not an SMTP protocol command according to RFC 821? |
Which statement about security aspects of email protocols is correct? |
Which statement about authenticity of the message origin is correct? |
How do we call the protocol used to transmit web pages? |
What does the acronym HTML signify? |
Which statement about the nature of HTTP protocol is correct? |
Which statement regarding cookies is correct? |
Which way do clients usually use to submit data filled out by
users into dialogue/form widgets (controls) to servers? |
Which of the following methods ("commands") exists in HTTP protocol? |
Which statement about possibilities of the author to affect the
dynamic nature of pages is not correct? |
Choose correct statement about dynamic web pages. |
Which statement correctly describes the issues of remote login
by means of telnet and SSH protocols? |
Which statement about security of SSH access is correct? |
What does the VoIP (Voice over IP) term denote? |
What does the SIP (Session Initiation Protocol) term denote? |
How does DHCP protocol work? |
What way is clock synchronization of computers in a network performed? |
Why do clocks in computers in a network synchronize? |
Which statement about the nature of the FTP protocol is correct? |
Which of the following statements about FTP security issues is correct? |
What TCP description is not correct? |
What procedures does TCP use to ensure data transfer reliability? |
Which data transfer parameter determines what data range a
station may send without waiting for confirmation of the counterparty? |
What can we deduce from following packet description in tcpdump program? |
What can we deduce from (a complete) output of the netstat -an program run? |
What information is usually dynamically chosen by a client connecting to a server? |
What information can we find in both TCP and UDP header? |
Which statement correctly describes TCP or UDP? |
What will happen if TCP packets arrive in incorrect order? |
What will happen if UDP packets arrive out of order? |
If a web browser sends a request to a web server on standard
port, which of the following ports may contain response as source port? |
If an FTP client sends a request to an FTP server on standard
port, which of the following ports may contain response as source port? |
What takes place during the three-way handshake? |
What happens when one of the partners sends a TCP packet with FIN tag? |
With what TCP/IP layer the term port is related? |
What are ports in OSI 4 used for? |
Mark the term, which is not a network layer function. |
What information si added to a packet in course of encapsulation on the network layer? |
Which protocol provides reliable data transfer service on the network layer? |
Which protocol provides unreliable data transfer service on the network layer? |
Mark untrue statement about IP address assignment. |
Mark untrue alternative, how a host can learn the IP address it is allowed to use. |
Mark true statement about autonomous systems (AS)? |
How many bits are there in IPv6 address? |
Which of the following protocols does not work with IP addresses? |
Which OSI layer works with IP addresses? |
How does message sender find out which part of the destination
IP address pertains to the network and which to the host? |
Which IPv4 address has all ones in the host part? |
Which statement about IP address types is true? |
Mark the incorrectly classified IP.address (on condition that default network masks
have been used). |
How many and how large subnets are required to cover a network
with the following needs for number of connected hosts when using VLSM (Variable Length Subnet Mask)? |
Which of following combinations represents minimum network covering
these unicast addresses: 10.1.1.106, 10.1.1.111, 10.1.1.119? |
Which of the following addresses represents correct computer address? |
Default router for a network has address 172.31.219.33/27. Which of the following settings may be correct computer address in this network? |
Which entry might be a valid row in the routing table of router B from the following figure? |
Which entry might be a valid row in the routing table of router A from the following figure? |
Which statement about routing si true? |
Choose correct statement about the principle of a routing algorithm. |
What steps does the client have to do for correct sending out a
packet in case the destination server is not in the same network? |
Choose correct statement about router functions. |
Which statemen about routing table management is true? |
Mark true statement about distance-vector routing protocols. |
Mark true statement about link-state routing protocols. |
What information from the packet does every router use to determine the path? |
Which field in the IP header does the router change under normal circumstances? |
Mark an existing field (column) of a routing table. |
By means of which command can we dump the contents of a routing table? |
Which field in the IP header prevents from endless loops occurence during mail delivery? |
Choose correct statement about the purpose or usage of IP header field TTL (Time To Live). |
If a host has a wrong default router setting, what will it not be able to do? |
What is the purpose of a default gateway? |
What happens if the destination is not found in the routing table? |
Which of the IP filtering characteristics is correct? |
Which of the network address translation (NAT) characteristics is correct? |
Which of the proxy server characteristics is correct? |
Which device implements security policy of local network for using the Internet? |
Which statement about ARP is true? |
The notebook in the picture sent out an HTTP request, which
reached the server. Which statement about ARP cache contents on a notebook, switch, router and server is true? |
What are the functions of ICMP (Internet Control Message Protocol)? |
Mark true statement about the relation of data link and physical layers in OSI and TCP/IP. |
What does the term LLC (Logical Link Control) describe? |
What does the term MAC (Media Access Control) describe? |
Which statement about deterministic and non-deterministic access to a medium is true? |
Which statement about network topology si true? |
Which statement about the Ethernet is correct? |
Which statement about WiFi is correct? |
What is the primary function of CSMA/CD? |
What's a proper description of repeater, hub, bridge and switch? |
What addresses does a hub, switch, or router work with? |
How can Spanning Tree Protocol or Spanning Tree Algorithm be described? |
Which statement about VLAN is true? |
What does CRC stand for? |
What is the primary purpose of the trailer in a data link frame? |
How many times does a CRC calculation (for Frame Check Sequence)
run during transmission of a message between end devices in the figure? |
How many times does a CRC calculation (for Frame Check Sequence)
run during transmission of a message between end devices in the figure? |
Nodes A, B, C and D are connected to a hub. Node A is transmitting a frame to node D, when node B needs to transmit data to node C. What does node B need to do? |
Nodes A, B, C and D are connected to a switch. Node A is transmitting a frame to node D, when node B needs to transmit data to node C. What does node B need to do? |
Which statement about the media used in computer networking is correct? |
How many conductors are in a cable denoted as unshielded twisted pair (UTP)? |
Which statement about cabels for interconnection of two nodes of Ethernet network is true? |
What is the difference between single-mode (SM) and multi-mode (MM) optical fibre? |
What type of addresses is used on data link layer? |
What type of addresses is used on physical layer? |
Mark true stament regarding MAC addresses (in a functional network). |
In what case destination host addressing is not necessary? |
With what OSI layer the term Ethernet is related? |