CCNA Extended Version

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which two applications would use the TCP transport layer protocol? (Choose two.) 1. FTP 2. HTTP 3. ICMP 4. TFTP 5. VoIP

1. FTP 2. HTTP

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds? 1. RouterA(config)#login block-for 30 attempts 2 within 10 2. RouterA(config)#login block-for 30 attempts 10 within 2 3. RouterA(config)#login block-for 2 attempts 30 within 10 4. RouterA(config)#login block-for 10 attempts 2 within 30

1. RouterA(config)#login block-for 30 attempts 2 within 10

A user calls to report that a PC cannot access the internet. The network technician asks the user to issue the command ping 127.0.0.1 in a command prompt window. The user reports that the result is four positive replies. What conclusion can be drawn based on this connectivity test? 1. The TCP/IP implementation is functional 2. The PC can access the Internet. However, the web browser may not work. 3. The IP address obtained form the DHCP server is correct. 4. The PC can access the network. The problem exists beyond the local network.

1. The TCP/IP implementation is functional The ping 127.0.0.1 command is used to verify that the TCP/IP stack is functional. It verifies the proper operation of the protocol stack from the network layer to physical layer, without sending a signal on the media. That is, this test does not go beyond the PC itself. For example, it does not detect whether a cable is connected to the PC or not.

These three OSI layers define the same functions as the TCP/IP model application layer. 1. application 2. presentation 3. session 4. transport 5. network 6. data link

1. application 2. presentation 3. session

Which three are transport layer responsibilities? (Choose three.) 1. conversation multiplexing 2. identifying frames 3. identifying routing information 4. segmenting data and reassembling segments. 5. tracking individual conversations

1. conversation multiplexing 4. segmenting data and reassembling segments. 5. tracking individual conversations

Which of the following is displayed by the nslookup utility? 1. the configured default DNS server 2. the IP address of the end device 3. all cached DNS entries

1. the configured default DNS server

How many connections are required by FTP between client and server? 1. 1 2. 2 3. 3 4. 4

2. 2

What message type is used by an HTTP client to request data from a web server? 1. PUT 2. GET 3. POST 4. ACK

2. GET

This message type is used when uploading data files to a web server. 1. GET 2. POST 3. PUT

2. POST

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer? 1. The client sends an ISN to the server to start the 3 way handshake 2. The client randomly selects a source port number 3. The client sends a synchronization segment to begin the session. 4. The client sets the window size for the session

2. The client randomly selects a source port number

Which UDP datagram reassembly statement is true? 1. UDP does not reassemble the data 2. UDP reassembles the data in the order that it was received 3. UDP reassembles the data using control bits. 4. UDP reassembles the data using sequence numbers

2. UDP reassembles the data in the order that it was received

What three configuration steps must be performed to implement SSH access to a router? (Choose three.) 1. a password on the console line 2. a unique hostname 3. an enable mode password 4. a user account 5. an IP domain name 6. an encrypted password

2. a unique hostname 4. a user account 5. an IP domain name

Which two operations are provided by TCP but not by UDP? (Choose two.) 1. reconstructing data in the order received 2. acknowledging received data 3. identifying individual conversations 4. identifying the applications 5. retransmitting any unacknowledged data

2. acknowledging received data 5. retransmitting any unacknowledged data

Which three services are provided by the AAA framework? (Choose three.) 1. autoconfiguration 2. authentication 3. automation 4. auto balancing 5. authorization 6. accounting

2. authentication 5. authorization 6. accounting

This protocol is used by a client to send email to a mail server. 1. pop 2. smtp 3. imap 4. http

2. smtp

Which TCP header statement is true? 1. it consists of 4 fields in an 8 byte header 2. it consists of 8 fields in a 10 byte header 3. it consists of 10 fields in a 20 byte header 4. It consists of 20 fields ion a 40 byte header

3. it consists of 10 fields in a 20 byte header

What message is sent by a host to check the uniqueness of an IPv6 address before using that address? 1. echo request 2. ARP request 3. neighbor solicitation 4. router solicitation

3. neighbor solicitation In IPv6, Duplicate Address Detection (DAD) is used in place of ARP. An IPv6 host performs DAD by sending a neighbor solicitation (NS) message to its own IPv6 address to ensure the uniqueness of the address prior to using it.

A technician is using the debug ip icmp privileged EXEC command to capture live router output. Which commands would stop this debug command on a Cisco router? (Choose two.) 1. debug ip icmp off 2. no debug debug ip icmp 3. no debug ip icmp 4. undebug all 5. undebug debug ip icmp

3. no debug ip icmp 4. undebug all

A technician has established a remote connection to router R1 to observe debug output. The technician enters the debug ip icmp command then pings a remote destination. However, no output is displayed. Which command would the technician have to enter to display log messages on a remote connection? 1. monitor debug output 2. monitor terminal 3. terminal monitor 4. terminal monitor debug

3. terminal monitor

When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business? 1. HTTPS 2. POP 3. SMTP 4. IMAP

4. IMAP

Which application layer protocol is used to provide file-sharing and print services to Microsoft applications? 1. SMTP 2. HTTP 3. DHCP 4. SMB

4. SMB

Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this? 1. The destination decreases the window size 2. The destination sends fewer acknowledgement messages in order to conserve bandwidth 3. The source decreases the window size to decrease the rate of transmission from the destination 4. The source decreases the amount of data that it transmits before it receives an acknowledgement form the destination.

4. The source decreases the amount of data that it transmits before it receives an acknowledgement form the destination.

This is a function of the OSI session layer. 1. compress and decompress data 2. provide an interface between applications 3. format data for the application layer 4. exchange of information to initiate dialog between peers.

4. exchange of information to initiate dialog between peers.

What is one of the most effective security tools available for protecting users from external threats? 1. router that run AAA. services 2. password encryption techniques 3. patch servers 4. firewalls

4. firewalls

What is a responsibility of transport layer protocols? 1. determining the best path to forward a packet 2. providing network access 3. translating private IP addresses to public IP addresses 4. tracking individual conversations

4. tracking individual conversations

A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection? 1. remote access to the switch through the use of a telephone dialup connection 2. direct access to the switch through the use of a terminal emulation program 3. on site access to a switch through the us of a directly connected PC and a console cable 4. out of band access to a switch through the use of a virtual terminal with password authentication 5. remote access to a switch where data is encrypted during the session

5. remote access to a switch where data is encrypted during the session

Which layer is responsible for establishing a temporary communication session between the source and destination host applications? 1. application layer 2. data link layer 3. network layer 4. physical layer 5. transport layer

5. transport layer

This layer of the OSI model is concerned with the protocols that exchange data between programs running on hosts. 1. application 2. transport 3. network 4. physical

This layer of the OSI model is concerned with the protocols that exchange data between programs running on hosts.


Ensembles d'études connexes

Colby College PS111 Final Exam study guide

View Set

12th Grade Government Midterm Review

View Set

Week 7 | PrepU | Chapter 09 - ML 4 | Teaching and Counseling

View Set

8.1: Electric potential energy and voltage

View Set

6.14) Types of Heuristics: Availability, Representativeness & Base-Rate

View Set

FIN 201: Ch.3 Reading Assignment

View Set