Take the quiz (either here or use the PTP software) if you want to use the score to help you decide how much time to spend on this chapter. Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes,” found at the end of the book, includes both the answers and explanations. You can also find answers in the PTP testing software.
Table 15-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping Caution
The goal of self-assessment is to gauge your mastery of the topics in this chapter. If you do not know the answer to a question or are only partially sure of the answer, you should mark that question as wrong for purposes of the self-assessment.
Giving yourself credit for an answer you incorrectly guess skews your self-assessment results and might provide you with a false sense of security.
1. What are the two primary ways protocols encode data? (Choose two.)
a. Type-length value encoding
b. Compressed bit encoding
c. Fixed-length encoding
d. Binary
2. What two context items does a protocol provide for interpreting bits on a wire? (Choose two.)
a. Bit pattern
b. Grammar
c. Dictionary
d. Command codes
3. What is the difference between a type-value and a type- length value?
a. Type-value encoding assumes the length of the value is fixed.
b. Type-length value encoding assumes the length of the value is fixed.
c. Type-length value encoding indicates the length and type of information carried.
d. Type-length encoding assumes the kind of information is fixed.
4. Why can fixed-length encoding be considered more efficient than TLVs?
a. Fixed-length fields can be encrypted more easily.
b. The type and length fields must be carried along with the data itself.
c. Fixed-length fields will always be carried, regardless of whether they are needed.
d. Fixed-length fields can be compressed more easily.
5. Why can TLVs be considered more efficient than fixed-length encoding?
a. More TLVs will fit into a packet than fixed-length fields.
b. TLVs can be encrypted more easily.
c. Fixed-length fields will always be carried, regardless of whether they are needed.
d. If the TLV is properly defined, you need only one per packet to carry every kind of information.
6. Secure Shell (SSH) is used for
a. Transporting HTML files from a server to a client.
b. Accessing the command line of a remote system through a terminal.
c. Transporting large media files from a server to a client.
d. Securely observing the screen of another computer.
7. Why should you set up an SSH key rather than using a username and password?
a. You never need to enter a password again if you use an SSH key.
b. SSH connections are not encrypted unless you use an SSH key.
c. You can use the same SSH key on multiple servers.
d. The username and password are only used to create a key in SSH.
8. What kinds of information can the Hypertext Transfer Protocol (HTTP) carry?
a. Hypertext
b. Video, images, hypertext, and many others
c. Video, images, and hypertext
d. Hypertext and images
9. How many TCP sessions does an FTP session require?
a. One
b. Two
c. Three
d. Four