Networking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What three protocols operate at the Application layer of the OSI model? (Choose three.)

DNS, SMTP, POP

Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately?

transport

After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server?

80

What is the automated service that matches resource names with the required IP address?

DNS

What application layer protocol is commonly used to support for file transfers between a client and a server?

FTP

Which email components are used to forward mail between servers? (Choose two.)

MTA, SMTP

What application layer protocol describes the services that are used for file sharing in Microsoft networks?

SMB

What is a PDU?

a layer specific encapsulation

What are two features of the User Datagram Protocol (UDP)? (Choose two.)

low overhead, connectionless

Which layer encapsulates the segment into packets?

network

What is a primary function of the trailer information added by the data link layer encapsulation?

supports error detection

With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications?

0 to 1023

Which three statements best describe a Local Area Network (LAN)? (Choose three.)

A LAN is usually in a single geographical area, The network is administered by a single organization, A LAN provides network services and access to applications for users within a common organization.

What statement describes the purpose of a default route?

A host uses a default route to transfer data to a host outside the local network when no other route to the destination exists.

Which application layer protocols correctly match a corresponding function? (Choose two.)

HTTP transfers data from a web server to a client, Telnet provides a virtual connection for remote access

Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)

HTTP, HTTPS

Which three statements are true about routes and their use? (Choose three.)

If the destination network is directly connected, the router forwards the packet to the destination host. If no route exists for the destination network and a default route is present, the packet is forwarded to the next-hop router. If the originating host has a default gateway configured, the packet for a remote network can be forwarded using that route.

Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.)

Physical, Data Link

A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type? (Choose two.)

Security is difficult to enforce., A computer that responds to a file sharing request is functioning as a server.

Which event occurs during the transport layer three-way handshake?

TCP initializes the sequence numbers for the sessions.

In a connectionless system, which of the following is correct?

The destination is not contacted before a packet is sent.

If the default gateway is configured incorrectly on the host, what is the impact on communications? The host is unable to communicate on the local network.

The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.

During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message?

The packets will be delivered and reassembled at the destination.

During the encapsulation process, what occurs at the data link layer?

The physical address is added.

. When the destination network is not listed in the routing table of a Cisco router, what are two possible actions that the router might take? (Choose two.)

The router discards the packet, The router forwards the packet out the interface indicated by the default route entry.

Which transport layer protocol provides low overhead and would be used for applications which do not require reliable data delivery?

UDP

What are two characteristics of clients in data networks? (Choose two.)

initiate data exchanges, may upload data to servers

What are three properties of peer-to-peer applications? (Choose three.)

acts as both a client and server within the same communication, hybrid mode includes a centralized directory of files, can be used in client-server networks.

Refer to the exhibit. "Cell A" at IP address 10.0.0.34 has established an IP session with "IP Phone 1″ at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function of wireless device "Cell A?"

an end device

What is the proper order of the layers of the OSI model from the highest layer to the lowest layer?

application, presentation, session, transport, network, data link, physical

What are two forms of application layer software? (Choose two.)

applications, services

A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.)

centralized administration, security is easier to enforce

What are two characteristics of peer-to-peer networks? (Choose two.)

decentralized resources, resource sharing without a dedicated server

Select the statements that are correct concerning network protocols. (Choose three.)

define the structure of layer specific PDU's, outline the functions necessary for communications between layers, require layer dependent encapsulations

In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?

destination network address

Which statements correctly identify the role of intermediary devices in the network?

determine pathways for data, retime and retransmit data signals, manage data flows

As compared to SSH, what is the primary disadvantage of telnet?

does not support encryption

Which three features allow TCP to reliably and accurately track the transmission of data from source to destination?

flow control, session establishment, numbering and sequencing

What are two functions of encapsulation?

identifies pieces of data as part of the same communication, ensures that data pieces can be directed to the correct receiving end device

Which two options represent Layer 4 addressing? (Choose two.)

identifies the communicating applications, identifies multiple conversations between the hosts

What is the purpose of a default gateway?

identifies the device that allows local network computers to communicate with devices on other networks

Which is an important characteristic of UDP?

minimal delays in data delivery

What is the purpose of the TCP/IP Network Access layer?

network media control

Which portion of the network layer address does a router use to forward packets?

network portion

Which characteristic correctly refers to end devices in a network?

originate data flow

What are three common problems with a large network? (Choose three.)

performance degradation, security issues, host identification

What two characteristics are commonly associated with dynamic routing protocols? (Choose two.)

provide routers with up-to-date routing tables, consume bandwidth to exchange route information

What is the role of the OSI application layer?

provides the interface between the applications on either end of the network

What are the key factors to consider when grouping hosts into a common network? (Choose three.)

purpose, geographic location, ownership

Which statements are correct concerning the role of the MTA in handling email? (Choose three.)

receives email from the client's MUA, passes email to the MDA for final delivery, uses SMTP to route email between servers

Which intermediary devices could be used to implement security between networks? (Choose two.)

router, firewall

Which information is found in both the TCP and UDP header information?

source and destination

What is dynamically selected by the source host when forwarding data?

source port

What type of routing uses information that is manually entered into the routing table?

static

What device is considered an intermediary device?

switch

What can be identified by examining the network layer header?

the destination host address

What is a component of a routing table entry?

the next-hop address

hich IP packet field will prevent endless loops?

time-to-live

Why are port numbers included in the TCP header of a segment?

to enable a receiving host to forward the data to the appropriate application

What is the primary purpose of Layer 4 port assignment?

to identify the processes or services that are communicating within the end devices

Why is flow control used for TCP data transfer?

to prevent the receiver from being overwhelmed by incoming data

What is the purpose of resource records in DNS? temporarily holds resolved entries What is the purpose of resource records in DNS? temporarily holds resolved entries

used by the server to resolve names

How does the application layer on a server usually process multiple client request for services?

uses support from lower layer functions to distinguish between connections to the service

What mechanism is used by TCP to provide flow control as segments travel from source to destination? sequence numbers

window size


Set pelajaran terkait

S-190 Module 3 (Monitoring Fire Behavior)

View Set

SuiteFoundation - Standard NS Processes and Flows

View Set

Vascular Evolve (Online Ed 1-3 and Book )

View Set