Chapter 9 Cisco Exam Answers
In a network that uses IPv4, what prefix would best fit a subnet containing 100 hosts? /23 /24 /25 /26
/25
Which two notations are useable nibble boundaries when subnetting in IPv6? (Choose two.) /62 /64 /66 /68 /70
/68
When subnetting a /64 IPv6 network prefix, which is the preferred new prefix length? /66 /70 /72 /74
/72
What is the complete range of TCP and UDP well-known ports? 0 to 255 0 to 1023 256 - 1023 1024 - 49151
0 to 1023 WHY? There are three ranges of TCP and UDP ports. The well-know range of port numbers is from 0 - 1023.
What is the subnet address for the address 2001:DB8:BC15:A:12AB::1/64? 2001:DB8:BC15::0 2001:DB8:BC15:A::0 2001:DB8:BC15:A:1::1 2001:DB8:BC15:A:12::0
2001:DB8:BC15:A::0
In dotted decimal notation, the subnet mask _________________ will accommodate 500 hosts per subnet. Consider the following range of addresses: 2001:0DB8:BC15:00A0:0000:: 2001:0DB8:BC15:00A1:0000:: 2001:0DB8:BC15:00A2:0000:: ... 2001:0DB8:BC15:00AF:0000:: The prefix-length for the range of addresses is /_______
255.255.254.0 60
How many usable host addresses are there in the subnet 192.168.1.32/27? 32 30 64 16 62
30
A nibble consists of ___ bits.
4
A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.248. How many host addresses will this subnet provide? 4 6 8 10 12
6
What happens if the first packet of a TFTP transfer is lost? The client will wait indefinitely for the reply. The TFTP application will retry the request if a reply is not received. The next-hop router or the default gateway will provide a reply with an error code. The transport layer will retry the query if a reply is not received.
The TFTP application will retry the request if a reply is not received. WHY? The TFTP protocol uses UDP for queries, so the TFTP application must implement the reliability, if needed.
A host device is receiving live streaming video. How does the device account for video data that is lost during transmission? The device will immediately request a retransmission of the missing data. The device will use sequence numbers to pause the video stream until the correct data arrives. The device will delay the streaming video until the entire video stream is received. The device will continue receiving the streaming video, but there may be a momentary disruption.
The device will continue receiving the streaming video, but there may be a momentary disruption. WHY? When TCP is used as the transport protocol, data must be received in a specific sequence or all data must be fully received in order for it to be used. TCP will use sequence numbers, acknowledgments and retransmission to accomplish this. However, when UDP is used as the transport protocol, data that arrives out of order or with missing segments may cause a momentary disruption, but the destination device may still be able to use the data that it has received. This technology results in the least amount of network delay by providing minimal reliability. Since live streaming video applications use UDP as the transport protocol, the receiver will continue showing the video although there may be a slight delay or reduction in quality.
What happens if part of an FTP message is not delivered to the destination? The message is lost because FTP does not use a reliable delivery method. The FTP source host sends a query to the destination host. The part of the FTP message that was lost is re-sent. The entire FTP message is re-sent.
The part of the FTP message that was lost is re-sent. WHY? Because FTP uses TCP as its transport layer protocol, sequence and acknowledgment numbers will identify the missing segments, which will be re-sent to complete the message.
A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC? 1 segment 10 segments 100 segments 1000 segments
10 segments WHY? With a window of 1000 bytes, the destination host accepts segments until all 1000 bytes of data have been received. Then the destination host sends an acknowledgment.
How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0? 510 512 1022 1024 2046 2048
1022 WHY? A mask of 255.255.252.0 is equal to a prefix of /22. A /22 prefix provides 22 bits for the network portion and leaves 10 bits for the host portion. The 10 bits in the host portion will provide 1022 usable IP addresses (210 - 2 = 1022).
In dotted decimal notation, the IP address _______________ is the last host address for the network 172.25.0.64/26.
172.25.0.126
A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.) 192.168.1.16/28 192.168.1.64/27 192.168.1.128/27 192.168.1.96/28 192.168.1.192/28
192.168.1.64/27 192.168.1.96/28 WHY? Subnet 192.168.1.64 /27 has 5 bits that are allocated for host addresses and therefore will be able to support 32 addresses, but only 30 valid host IP addresses. Subnet 192.168.1.96/28 has 4 bits for host addresses and will be able to support 16 addresses, but only 14 valid host IP addresses
Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices? FIN ACK SYN RST
ACK WHY? In a TCP session, when a device has no more data to send, it will send a segment with the FIN flag set. The connected device that receives the segment will respond with an ACK to acknowledge that segment. The device that sent the ACK will then send a FIN message to close the connection it has with the other device. The sending of the FIN should be followed with the receipt of an ACK from the other device.
Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.) ACK FIN PSH RST SYN URG
ACK SYN WHY? TCP uses the SYN and ACK flags in order to establish connectivity between two network devices.
Which two characteristics are associated with UDP sessions? (Choose two.) Destination devices receive traffic with minimal delay. Transmitted data segments are tracked. Destination devices reassemble messages and pass them to an application. Received data is unacknowledged. Unacknowledged data packets are retransmitted.
Destination devices receive traffic with minimal delay. Received data is unacknowledged. WHY? TCP: · Provides tracking of transmitted data segments · Destination devices will acknowledge received data. · Source devices will retransmit unacknowledged data. UDP · Destination devices will not acknowledge received data · Headers use very little overhead and cause minimal delay.
Which two reasons generally make DHCP the preferred method of assigning IP addresses to hosts on large networks? (Choose two.) It eliminates most address configuration errors. It ensures that addresses are only applied to devices that require a permanent address. It guarantees that every device that needs an address will get one. It provides an address only to devices that are authorized to be connected to the network. It reduces the burden on network support staff.
It eliminates most address configuration errors. It reduces the burden on network support staff.
What does a client do when it has UDP datagrams to send? It just sends the datagrams. It queries the server to see if it is ready to receive data. It sends a simplified three-way handshake to the server. It sends to the server a segment with the SYN flag set to synchronize the conversation.
It just sends the datagrams. WHY? When a client has UDP datagrams to send, it just sends the datagrams.
Which three application layer protocols use TCP? (Choose three.) SMTP FTP SNMP HTTP TFTP DHCP
SMTP FTP HTTP WHY? Some protocols require the reliable data transport that is provided by TCP. In addition, these protocols do not have real time communication requirements and can tolerate some data loss while minimizing protocol overhead. Examples of these protocols are SMTP, FTP, and HTTP.
What does TCP do if the sending source detects network congestion on the path to the destination? The source host will send a request for more frequent acknowledgments to the destination. The source will decrease the amount of data that it sends before it must receive acknowledgements from the destination. The destination will request retransmission of the entire message. The source will acknowledge the last segment that is sent and include a request for a smaller window size in the message.
The source will decrease the amount of data that it sends before it must receive acknowledgements from the destination. WHY? If the source determines that TCP segments are either not being acknowledged or not acknowledged in a timely manner, then it can reduce the number of bytes it sends before receiving an acknowledgment. Notice that it is the source that is reducing the number of unacknowledged bytes it sends. This does not involve changing the window size in the segment header.
What is a characteristic of a TCP server process? Every application process running on the server has to be configured to use a dynamic port number. There can be many ports open simultaneously on a server, one for each active server application. An individual server can have two services assigned to the same port number within the same transport layer services. A host running two different applications can have both configured to use the same server port.
There can be many ports open simultaneously on a server, one for each active server application. WHY? Each application process running on the server is configured to use a port number, either by default or manually, by a system administrator. An individual server cannot have two services assigned to the same port number within the same transport layer services. A host running a web server application and a file transfer application cannot have both configured to use the same server port. There can be many ports open simultaneously on a server, one for each active server application.
What is a characteristic of UDP? UDP datagrams take the same path and arrive in the correct order at the destination. Applications that use UDP are always considered unreliable. UDP reassembles the received datagrams in the order they were received. UDP only passes data to the network when the destination is ready to receive the data.
UDP reassembles the received datagrams in the order they were received. WHY? UDP has no way to reorder the datagrams into their transmission order, so UDP simply reassembles the data in the order it was received and forwards it to the application.
Why does HTTP use TCP as the transport layer protocol? to ensure the fastest possible download speed because HTTP is a best-effort protocol because transmission errors can be tolerated easily because HTTP requires reliable delivery
because HTTP requires reliable delivery WHY? When a host requests a web page, transmission reliability and completeness must be guaranteed. Therefore, HTTP uses TCP as its transport layer protocol.
What type of information is included in the transport header? destination and source logical addresses destination and source physical addresses destination and source port numbers encoded application data
destination and source port numbers WHY? In a segment, the transport layer header will include the source and destination process, or port numbers. Destination and source physical addressing is included in the frame header. Destination and source logical addressing is included in the network header. Application data is encoded in the upper layers of the protocol stack.
Which three features can be configured in the BIOS settings to secure a computer? (Choose three.) MAC filtering drive encryption TPM file encryption TKIP key passwords
drive encryption TPM passwords WHY? Passwords, drive encryption, and TPM are BIOS configurable security features. File encryption, TKIP key, and MAC filtering are security features not configured within BIOS.
When developing an IP addressing scheme for an enterprise network, which devices are recommended to be grouped into their own subnet or logical addressing group? end-user clients workstation clients mobile and laptop hosts hosts accessible from the Internet
hosts accessible from the Internet
How many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks? two three four five
three WHY? Each network that is directly connected to an interface on a router requires its own subnet. The formula 2n, where n is the number of bits borrowed, is used to calculate the available number of subnets when borrowing a specific number of bits.
A host device needs to send a large video file across the network while providing data communication to other users. Which feature will allow different communication streams to occur at the same time, without having a single data stream using all available bandwidth? window size multiplexing port numbers acknowledgments
multiplexing WHY? Multiplexing is useful for interleaving multiple communication streams. Window size is used to slow down the rate of data communication. Port numbers are used to pass data streams to their proper applications. Acknowledgments are used to notify a sending device that a stream of data packets has or has not been received.
A network administrator needs to monitor network traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices? random static addresses to improve security addresses from different subnets for redundancy predictable static IP addresses for easier identification dynamic addresses to reduce the probability of duplicate addresses
predictable static IP addresses for easier identification WHY? When monitoring servers, a network administrator needs to be able to quickly identify them. Using a predictable static addressing scheme for these devices makes them easier to identify. Server security, redundancy, and duplication of addresses are not features of an IP addressing scheme.
What kind of port must be requested from IANA in order to be used with a specific application? registered port private port dynamic port source port
registered port WHY? Registered ports (numbers 1024 to 49151) are assigned by IANA to a requesting entity to use with specific processes or applications. These processes are primarily individual applications that a user has chosen to install, rather than common applications that would receive a well-known port number. For example, Cisco has registered port 1985 for its Hot Standby Routing Protocol (HSRP) process.
What information is used by TCP to reassemble and reorder received segments? sequence numbers acknowledgment numbers fragment numbers port numbers
sequence numbers
What information is used by TCP to reassemble and reorder received segments? port numbers sequence numbers acknowledgment numbers fragment numbers
sequence numbers WHY? At the transport layer, TCP uses the sequence numbers in the header of each TCP segment to reassemble the segments into the correct order.
Which factor determines TCP window size? the amount of data to be transmitted the number of services included in the TCP segment the amount of data the destination can process at one time the amount of data the source is capable of sending at one time
the amount of data the destination can process at one time WHY? Window is the number of bytes that the sender will send prior to expecting an acknowledgement from the destination device. The initial window is agreed upon during the session startup via the three-way handshake between source and destination. It is determined by how much data the destination device of a TCP session is able to accept and process at one time.
What is a socket? the combination of the source and destination IP address and source and destination Ethernet address the combination of a source IP address and port number or a destination IP address and port number the combination of the source and destination sequence and acknowledgment numbers the combination of the source and destination sequence numbers and port numbers
the combination of a source IP address and port number or a destination IP address and port number WHY? A socket is a combination of the source IP address and source port or the destination IP address and the destination port number.
During a TCP session, a destination device sends an acknowledgment number to the source device. What does the acknowledgment number represent? the total number of bytes that have been received one number more than the sequence number the next byte that the destination expects to receive the last sequence number that was sent by the source
the next byte that the destination expects to receive WHY? The window size determines the number of bytes that will be sent before expecting an acknowledgement. The acknowledgement number is the number of the next expected byte. For example, if a host has received 3140 bytes, the host would respond with an acknowledgement number of 3141.
When is UDP preferred to TCP? when a client sends a segment to a server when all the data must be fully received before any part of it is considered useful when an application can tolerate some loss of data during transmission when segments must arrive in a very specific sequence to be processed successfully
when an application can tolerate some loss of data during transmission WHY? UDP can be used when an application can tolerate some data loss. UDP is the preferred protocol for applications that provide voice or video that cannot tolerate delay.