NetAcad Ch 14-15 Assessment

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A client creates a packet to send to a server. The client is requesting POP3 service. What number will be used as the destination port number in the sending packet?

110

A client creates a packet to send to a server. The client is requesting SNMP service. What number will be used as the destination port number in the sending packet?

161

A client creates a packet to send to a server. The client is requesting FTP service. What number will be used as the destination port number in the sending packet?

21

A client creates a packet to send to a server. The client is requesting SSH service. What number will be used as the destination port number in the sending packet?

22

A client creates a packet to send to a server. The client is requesting telnet service. What number will be used as the destination port number in the sending packet?

23

A client creates a packet to send to a server. The client is requesting SMTP service. What number will be used as the destination port number in the sending packet?

25

A client creates a packet to send to a server. The client is requesting HTTPS service. What number will be used as the destination port number in the sending packet?

443

A client creates a packet to send to a server. The client is requesting TFTP service. What number will be used as the destination port number in the sending packet?

69

A client creates a packet to send to a server. The client is requesting HTTP service. What number will be used as the destination port number in the sending packet?

80

Which three protocols operate at the application layer of the TCP/IP model? (Choose three.) A. POP3 B. DHCP C. UDP D. ARP F. TCP G. FTP

A. POP3 B. DHCP G. FTP

A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC? A. 3001 B. 6001 C. 3000 D. 6000

A. 3001

Which protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication? A. DNS B. FTP C. SMTP D. HTTP

A. DNS

What kind of port must be requested from IANA in order to be used with a specific application? A. Registered port B. Source port C. Private port D. Dynamic port

A. Registered port

A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.) A. SMTP B. DNS C. DHCP D. HTTP E. SNMP F. FTP

A. SMTP D. HTTP F. FTP

Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?

ACK

What are two roles of the transport layer in data communication on a network? (Choose two.) A. Performing a cyclic redundancy check on the frame for errors B. Tracking the individual communication between applications on the source and destination hosts C. Providing frame delimiting to identify bits making up a frame D. Providing the interface between applications and the underlying network over which messages are transmitted E. Identifying the proper application for each communication stream

B. Tracking the individual communication between applications on the source and destination hosts E. Identifying the proper application for each communication stream

Which two fields are included in the TCP header but not in the UDP header? (Choose two.) A. Checksum B. Window C. Source port D. Destination port E. Sequence number

B. Window E. Sequence number

Which three statements describe a DHCP Discover message? (Choose three.) A. The message comes from a server offering an IP address. B. The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF). C. The destination IP address is 255.255.255.255. D. The message comes from a client seeking an IP address. E. Only the DHCP server receives the message. F. All hosts receive the message, but only a DHCP server replies.

C. The destination IP address is 255.255.255.255. D. The message comes from a client seeking an IP address. F. All hosts receive the message, but only a DHCP server replies.

What is a characteristic of UDP? A. UDP datagrams take the same path and arrive in the correct order at the destination.​ B. Applications that use UDP are always considered unreliable.​ C. UDP reassembles the received datagrams in the order they were received. D. UDP only passes data to the network when the destination is ready to receive the data.

C. UDP reassembles the received datagrams in the order they were received.

Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data? session A. Session B. Presentation C. Internetwork D. Network access E. Application

E. Application

Which application layer protocol uses message types such as GET, PUT, and POST? A. SMTP B. POP3 C. DNS D. DHCP E. HTTP

E. HTTP

Which protocol is used by a client to communicate securely with a web server?

HTTPS

What information is used by TCP to reassemble and reorder received segments?

Sequence numbers

Which two types of applications are best suited for UDP? (Choose two.) A. Applications that handle reliability themselves B. Applications that need data flow control C. Applications that need the reordering of segments D. Applications that can tolerate some data loss, but require little or no delay E. Applications that require reliable delivery

A. Applications that handle reliability themselves D. Applications that can tolerate some data loss, but require little or no delay

What are two characteristics of peer-to-peer networks? (Choose two.) A. Decentralized resources B. One way data flow C. Centralized user accounts D. Resource sharing without a dedicated server E. scalability

A. Decentralized resources D. Resource sharing without a dedicated server

Which three fields are used in a UDP segment header? (Choose three.) A. Length B. Sequence Number C. Window Size D. Checksum E. Acknowledgment Number F. Source Port

A. Length D. Checksum F. Source Port

Which applications or services allow hosts to act as client and server at the same time? E. Email applications B. Client/server applications C. P2P applications D. Authentication services

C. P2P applications

In what networking model would eDonkey, eMule, BitTorrent, Bitcoin, and LionShare be used? A. Master-slave B. Point-to-Point C. Peer-to-Peer D. Client-based

C. Peer-to-Peer

Which two characteristics are associated with UDP sessions? (Choose two.) A. Destination devices receive traffic with minimal delay. B. Destination devices reassemble messages and pass them to an application. C. Transmitted data segments are tracked. D. Unacknowledged data packets are retransmitted. E. Received data is unacknowledged.

A. Destination devices receive traffic with minimal delay. E. Received data is unacknowledged.

What are three responsibilities of the transport layer? (Choose three.) A. Identifying the applications and services on the client and server that should handle transmitted data B. Conducting error detection of the contents in frames C. Directing packets towards the destination network D. Multiplexing multiple communication streams from many users or applications on the same network E. Meeting the reliability requirements of applications, if any F. Formatting data into a compatible form for receipt by the destination devices

A. Identifying the applications and services on the client and server that should handle transmitted data D. Multiplexing multiple communication streams from many users or applications on the same network E. Meeting the reliability requirements of applications, if any

Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.) A. Session layer B. Physical layer C. Transport layer D. Application layer E. Data link layer F. Presentation layer

A. Session layer D. Application layer F. Presentation layer

What type of information is contained in a DNS MX record? A. The domain name mapped to mail exchange servers B. The IP address for an FQDN entry C. The FQDN of the alias used to identify a service D. The IP address of an authoritative name server

A. The domain name mapped to mail exchange servers

Which three statements characterize UDP? (Choose three.) A. UDP provides basic connectionless transport layer functions. B. UDP relies on IP for error detection and recovery. C. UDP provides connection-oriented, fast transport of data at Layer 3. D. UDP relies on application layer protocols for error detection. E. UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms. F. UDP provides sophisticated flow control mechanisms.

A. UDP provides basic connectionless transport layer functions. D. UDP relies on application layer protocols for error detection. E. UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.

What is the complete range of TCP and UDP well-known ports? A. 0 to 255 B. 0 to 1023 C. 256 to 1023 D. 1024 to 49151

B. 0 to 1023

Why does HTTP use TCP as the transport layer protocol? A. Because transmission errors can be tolerated easily B. Because HTTP requires reliable delivery C. Because HTTP is a best-effort protocol D. To ensure the fastest possible download speed

B. Because HTTP requires reliable delivery

Which two protocols may devices use in the application process that sends email? (Choose two.) A. IMAP B. DNS C. HTTP D. POP E. POP3 F. SMTP

B. DNS F. SMTP

What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device? A. Destination and source logical network addresses B. Destination and source port numbers C. Destination and source physical addresses D. Timing and synchronization

B. Destination and source port numbers

Which three application layer protocols use TCP? (Choose three.) A. DHCP B. HTTP C. FTP D. SNMP E. TFTP F. SMTP

B. HTTP C. FTP F. SMTP

What does a client do when it has UDP datagrams to send? A. It queries the server to see if it is ready to receive data. B. It just sends the datagrams. C. It sends a simplified three-way handshake to the server. D. It sends to the server a segment with the SYN flag set to synchronize the conversation.

B. It just sends the datagrams.

What is an advantage of SMB over FTP?​ A. Only with SMB can data transfers occur in both directions. B. SMB clients can establish a long-term connection to the server.​ C. Only SMB establishes two simultaneous connections with the client, making the data transfer faster.​ D. SMB is more reliable than FTP because SMB uses TCP and FTP uses UDP.​

B. SMB clients can establish a long-term connection to the server.​

Which transport layer feature is used to guarantee session establishment? A. UDP ACK flag B. TCP 3-way handshake C. UDP sequence number D. TCP port number

B. TCP 3-way handshake

What is the function of the HTTP GET message? A. To upload content to a web server from a web client B. To request an HTML page from a web server C. To send error information from a web server to a web client D. To retrieve client email from an email server using TCP port 110

B. To request an HTML page from a web server

A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC? A. 1000 segments B. 100 segments C. 10 segments D. 1 segment

C. 10 segments

Which OSI layer provides the interface between the applications used to communicate and the underlying network over which messages are transmitted? A. Presentation B. Session C. Application D. Transport

C. Application

What do the client/server and peer-to-peer network models have in common? A. Both models are used only in the wired network environment. B. Both models have dedicated servers. C. Both models support devices in server and client roles. D. Both models require the use of TCP/IP-based protocols.

C. Both models support devices in server and client roles.

What is true about the Server Message Block protocol? A. SMB uses the FTP protocol for communication. B. SMB messages cannot authenticate a session. C. Clients establish a long term connection to servers. D. Different SMB message types have a different format.

C. Clients establish a long term connection to servers.

Which field in the TCP header indicates the status of the three-way handshake process? A. Checksum B. Reserved C. Control bits D. Window

C. Control bits

What is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza? A. SMTP B. POP C. Gnutella D. Ethernet

C. Gnutella

How are port numbers used in the TCP/IP encapsulation process? A. Source port and destination port numbers are randomly generated. B. Destination port numbers are assigned automatically and cannot be changed. C. If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations. D. Source port numbers and destination port numbers are not necessary when UDP is the transport layer protocol being used for the communication.

C. If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.

Which factor determines TCP window size? A. The amount of data the source is capable of sending at one time B. The amount of data to be transmitted C. The amount of data the destination can process at one time D. The number of services included in the TCP segment

C. The amount of data the destination can process at one time

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer? A. The client sets the window size for the session. B. The client sends an ISN to the server to start the 3-way handshake. C. The client randomly selects a source port number. D. The client sends a synchronization segment to begin the session.

C. The client randomly selects a source port number.

In what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.) A. When destination port numbers are dynamic B. When applications need to guarantee that a packet arrives intact, in sequence, and unduplicated C. When a faster delivery mechanism is needed D. When delivery overhead is not an issue E. When applications do not need to guarantee delivery of the data

C. When a faster delivery mechanism is needed E. When applications do not need to guarantee delivery of the data

Which scenario describes a function provided by the transport layer? A. A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site. B. A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header. C. A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network. D. A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

D. A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

What is an example of network communication that uses the client-server model? A. A user prints a document by using a printer that is attached to a workstation of a coworker. B. A workstation initiates an ARP to find the MAC address of a receiving host. C. A user uses eMule to download a file that is shared by a friend after the file location is determined. D. A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.

D. A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.

Which networking model is being used when an author uploads one chapter document to a file server of a book publisher? A. Master-slave B. Peer-to-peer C. Point-to-point D. Client/server

D. Client/server

What is a key characteristic of the peer-to-peer networking model? A. Social networking without the Internet B. Wireless networking C. Network printing using a print server D. Resource sharing without a dedicated server

D. Resource sharing without a dedicated server


Set pelajaran terkait

Social and Behavioral Research - Belmont Report and It's Principles

View Set

Principles of Financial Accounting Chpt 8

View Set

UNIT 5 CH 23-3 AND 23-4 question from text book

View Set

Chapter 24: Alterations in Genitourinary Function

View Set

Administering IV Medications by Piggyback

View Set

M&B Chapter 11 - Banking Industry: Structure and Competition, CH 11 Banking Industry: Structure and Competition, Chapter 14 Money Supply Process, Practice Problems: M&B, Central Banks and the Federal Reserve System, Chapter 13: Central Banks and the...

View Set