Cisco Module 14-15 Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC? a) 3001 b) 3000 c) 6001 d) 4500

a) 3001

A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.) a) FTP b) SMTP c) DHCP d) SNMP e) DNS f) HTTP

a) FTP b) SMTP f) HTTP

What are two characteristics of peer-to-peer networks? (Choose two.) a) resource sharing without a dedicated server b) centralized user accounts c) one way data flow d) scalability e) decentralized resources

a) resource sharing without a dedicated server e) decentralized resources

Which two protocols may devices use in the application process that sends email? (Choose two.) a) IMAP b) DNS c) SMTP d) POP e) POP3 f) HTTP

b) DNS c) SMTP

What does a client do when it has UDP datagrams to send? a) It queries the server to see if it is ready to receive data. b) It just sends the datagrams. c) It sends to the server a segment with the SYN flag set to synchronize the conversation. d) It sends a simplified three-way handshake to the server.

b) It just sends the datagrams.

Which protocol is used by a client to communicate securely with a web server? a) SMTP b) IMAP c) HTTPS d) SMB

c) HTTPS

What is true about the Server Message Block protocol? a) SMB uses the FTP protocol for communication. b) Different SMB message types have a different format. c) SMB messages cannot authenticate a session. d) Clients establish a long term connection to servers.

d) Clients establish a long term connection to servers.

What is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza? a) SMTP b) Ethernet c) POP d) Gnutella

d) Gnutella

Which three statements describe a DHCP Discover message? (Choose three.) a) The message comes from a client seeking an IP address. b) Only the DHCP server receives the message. c) The message comes from a server offering an IP address. d) The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF). e) The destination IP address is 255.255.255.255. f) All hosts receive the message, but only a DHCP server replies

a) The message comes from a client seeking an IP address. e) The destination IP address is 255.255.255.255. f) All hosts receive the message, but only a DHCP server replies.

Which three statements characterize UDP? (Choose three.) a) UDP relies on application layer protocols for error detection. b) UDP relies on IP for error detection and recovery. c) UDP provides sophisticated flow control mechanisms. d) UDP provides connection-oriented, fast transport of data at Layer 3. e) UDP provides basic connectionless transport layer functions. f) UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.

a) UDP relies on application layer protocols for error detection. e) UDP provides basic connectionless transport layer functions. f) UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.

What are three responsibilities of the transport layer? (Choose three.) a) multiplexing multiple communication streams from many users or applications on the same network b) formatting data into a compatible form for receipt by the destination devices c) directing packets towards the destination network d) meeting the reliability requirements of applications, if any e) identifying the applications and services on the client and server that should handle transmitted data f) conducting error detection of the contents in frames

a) multiplexing multiple communication streams from many users or applications on the same network d) meeting the reliability requirements of applications, if any e) identifying the applications and services on the client and server that should handle transmitted data

In what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.) a) when a faster delivery mechanism is needed b) when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated c) when delivery overhead is not an issue d) when destination port numbers are dynamic e) when applications do not need to guarantee delivery of the data

a) when a faster delivery mechanism is needed e) when applications do not need to guarantee delivery of the data

A client creates a packet to send to a server. The client is requesting SMTP service. What number will be used as the destination port number in the sending packet? a) 110 b) 25 c) 443 d) 161

b) 25

What do the client/server and peer-to-peer network models have in common? a) Both models are used only in the wired network environment. b) Both models support devices in server and client roles. c) Both models require the use of TCP/IP-based protocols. d) Both models have dedicated servers

b) Both models support devices in server and client roles.

Which three fields are used in a UDP segment header? (Choose three.) a) Acknowledgment Number b) Source Port c) Sequence Number d) Length e) Window Size f) Checksum

b) Source Port d) Length f) Checksum

Which networking model is being used when an author uploads one chapter document to a file server of a book publisher? a) point-to-point b) client/server c) peer-to-peer d) master-slave

b) client/server

The application layer of the TCP/IP model performs the functions of what three layers of the OSI model? (Choose three.) a) network b) presentation c) application d) physical e) transport f) session g) data link

b) presentation c) application f) session

Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.) a) transport layer b) session layer c) data link layer d) application layer e) physical layer f) presentation layer

b) session layer d) application layer f) presentation layer

Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices? a) SYN b) FIN c) ACK d) RST

c) ACK

Which protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication? a) HTTP b) SMTP c) DNS d) FTP

c) DNS

Which OSI layer provides the interface between the applications used to communicate and the underlying network over which messages are transmitted? a) session b) transport c) application d) presentation

c) application

Which two types of applications are best suited for UDP? (Choose two.) a) applications that need the reordering of segments b) applications that need data flow control c) applications that can tolerate some data loss, but require little or no delay d) applications that handle reliability themselves e) applications that require reliable delivery

c) applications that can tolerate some data loss, but require little or no delay d) applications that handle reliability themselves

What are two roles of the transport layer in data communication on a network? (Choose two.) a) providing frame delimiting to identify bits making up a frame b) providing the interface between applications and the underlying network over which messages are transmitted c) tracking the individual communication between applications on the source and destination hosts d) performing a cyclic redundancy check on the frame for errors e) identifying the proper application for each communication stream

c) tracking the individual communication between applications on the source and destination hosts e) identifying the proper application for each communication stream

Which two characteristics are associated with UDP sessions? (Choose two.) a) Transmitted data segments are tracked. b) Unacknowledged data packets are retransmitted. c) Received data is unacknowledged. d) Destination devices receive traffic with minimal delay. e) Destination devices reassemble messages and pass them to an application.

c)Received data is unacknowledged. d) Destination devices receive traffic with minimal delay.

Which scenario describes a function provided by the transport layer? a) A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site. b) A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header. c) A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network. d) A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

d) A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

Which application layer protocol uses message types such as GET, PUT, and POST? a) SMTP b) POP3 c) DNS d) HTTP e) DHCP

d) HTTP

How are port numbers used in the TCP/IP encapsulation process? a) Source port and destination port numbers are randomly generated. b) Destination port numbers are assigned automatically and cannot be changed. c) Source port numbers and destination port numbers are not necessary when UDP is the transport layer protocol being used for the communication. d) If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.

d) If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.

Which applications or services allow hosts to act as client and server at the same time? a) authentication services b) client/server applications c) email applications d) P2P applications

d) P2P applications

What is an advantage of SMB over FTP?​ a) SMB is more reliable than FTP because SMB uses TCP and FTP uses UDP.​ b) Only SMB establishes two simultaneous connections with the client, making the data transfer faster.​ c) Only with SMB can data transfers occur in both directions. d) SMB clients can establish a long-term connection to the server.

d) SMB clients can establish a long-term connection to the server.​

What is a characteristic of UDP? a) UDP datagrams take the same path and arrive in the correct order at the destination.​ b) UDP only passes data to the network when the destination is ready to receive the data. c) Applications that use UDP are always considered unreliable.​ d) UDP reassembles the received datagrams in the order they were received.

d) UDP reassembles the received datagrams in the order they were received.

Why does HTTP use TCP as the transport layer protocol? a) to ensure the fastest possible download speed b) because HTTP is a best-effort protocol c) because transmission errors can be tolerated easily d) because HTTP requires reliable delivery

d) because HTTP requires reliable delivery

Which factor determines TCP window size? a) the amount of data to be transmitted b) the amount of data the source is capable of sending at one time c) the number of services included in the TCP segment d) the amount of data the destination can process at one time

d) the amount of data the destination can process at one time


Set pelajaran terkait

Do I Know This Already Chapter 1

View Set

Cobit 5 - Foundation Practice Questions

View Set