Documente Academic
Documente Profesional
Documente Cultură
Chapter 3
1.) Which three Layers of the OSI model make up the Application layer of
the TCP/IP model? (choose three)- Session- Presentation- Application
2.) Which protocol is used to transfer web pages from server to client?-
HTTP
3.) Refer to the exhibit. Which term applied to a data transfer in the
direction indicated by the arrow?- Upload
4.) Which protocols use authentication and encryption to secure data
travelling between client and server? choose two- HTTPS- SSH
5.) refer to the exhibit. What is the top-level domain of the URL
shown?- .com
6.) Drag each DNS resource record type on the left and drop it onto the
resource it identifies on the right.- End device adress - A- Authoritative
name server - NS- Canonical or Fully Qualified Domain name for an alias -
CNAME- Maps a domain name to a list of mail exchange servers for that
domain - MX
7.) Drag the functions on the left and drop them into the appropriate email
component on the right.- MTA - Receives mail from client - Forwards
mail between servers using SMTP- MDA - Resolves final delivery issues
- Performs actual delivery to user's mailbox- MUA - Client used to access
and read mail - Retrieves mail using POP
8.) A network administrator is troubleshooting failed access to
www.cisco.com. Typing the IP address of the web server into the browser
successfully brings up the web page. What application layer protocol is
responsible for the failure?- DNS
Chapter 4
1.) Match the TCP Port numbers with the correct protocol by dragging the
options on the left to the targets on the right- HTTP - 80- Telnet - 23- FTP
- 20- SMTP - 25
2.) Categorize the options based on whether they describe TCP or UDP-
TCP (TRANSMISSION CONTROL PROTOCOL) - Re-sends anything not
received - Reliable - Reassembles messages at destination host -
Connection-oriented- UDP (USER DATAGRAM PROTOCOL) - No flow
control - Unreliable - Connectionless - Does not reassemble incoming
messages
3.) At the transport layer, which of the following controls is used to avoud a
transmitting host overflowing the buffers of a receiving host?- Flow Control
4.) End sysyems use port numbers to select the proper application. What
is the smallest port number that can be dynamically assigned by a host
system?- 1024
5.) During data transfer, what are the main responsibilities of the receiving
host? (choose 2)- Acknowledgment- Reassembly
6.) At which layer of the TCP/IP model does TCP Operate?- Transport
7.) What determines how much data a sending station running TCP/IP can
transmit before it must receive an acknowledgment?- Window Size
8.) What is the purpose of the sequence number in the TCP header?-
Reassemble the segments into data
9.) Which acknowledgement number should be sent by the receiver
shown in the graphic?- 7
10.) What is the purpose of TCP/UDP port numbers?- Track different
conversations crossing the network at the same time
Chapter 5
1.) Which protocol provides connectionless network layer services?- IP
2.) What protocol is connectionless?- UDP
3.) Which part of a network layer address does the router use during path
determination?- The network address
4.) Which network layer device can seperate a network into different
broadcast domains?- Router
5.) What network layer problem is avoided or reduced by using consistent
end-to-end addressing?- Reduces unnecessary broadcasts
6.) What commands can be used to view a hosts routing table? (choose
2)- netstat -r- route PRINT
7.) What are the three pieces of information about a route are contained in
a routing table?- Next-Hop- Metric- Destination Network Address
8.) What kinds of problems are cause by excessive broadcasts traffic on a
network segment? (choose three)- Consumes network bandwith-
Increases overhead on network- Interrupts other host functions
9.) What are the key factors to consider when groupig hosts into a
common network?(Choose 3)- Purpose- Geographical Location-
Ownership
Chapter 6
1.) What are the differences between binary and decimal numbers? (2)-
Binary numbers are based on powers of 2 and decimal numbers are
based on powers of 10- Computers use binary numbers and people
normally use decimal numbers
2.) Examine the graphic with current configurations. Host A in the Clerical
office failed and was replaced. Although a ping to 127.0.0.1 was
successful, the replacement computer cannot access the company
network. With proxy ARP disabled on the Fa0/0 interface of the New York
router, what is the likely cause of this problem?- Subnet mask incorrectly
entered
3.) Refer to the exhibit. A network administrator is testing the configuration
on a host computer. What type of address is 127.0.0.1?- Loopback
4.) What portion of the IP address does the prefix represent?- Network
5.) Which is true regarding IP network addresses?- All host bits are sert to
0
6.) Which address type has all host bits set to 1?- Broadcast
7.) How many binary digits are in an IPv6 address?- 128 bits
8.) What is the primary reason for development of IPv6?- Expanded
addressing capabilities
9.) Refer to the exhibit. The numbers in the exhibit are part of a single
subnet. Which statements are true regarding these numbers? (Choose 3)-
They have 27 high-order bits in common.- 255.255.255.224 is an
appropriate mask for their range- 192.168.223.127 is the broadcast
address for their range
10.) Drop the options on the left to the correct target on the right-
192.168.16.192/30 - Two usable hosts per subnet- 172.27.64.98/23 - 512
Addresses per subnet- 192.168.87.21/24 - A classful network-
172.18.125.6/20 - Four bits borrowed from classful network subnets-
172.31.16.128/19 - Eight subnets from classful network.