Modules 8 - 10
"A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?
10 segments
Refer to the exhibit. A user PC has successfully transmitted packets to www.cisco.com. Which IP address does the user PC target in order to forward its data off the local network?
172.20.0.254
What three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.)
192.168.0.0/16 172.16.0.0/12 10.0.0.0/8
A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC?
3001
A client creates a packet to send to a server. The client is requesting HTTPS service. What number will be used as the destination port number in the sending packet?
443
Which scenario describes a function provided by the transport layer?
A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.
Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?
ACK
What do the client/server and peer-to-peer network models have in common?
Both models support devices in server and client roles.
What is true about the Server Message Block protocol?
Clients establish a long term connection to servers.
What happens when the transport input ssh command is entered on the switch vty lines?
Communication between the switch and remote users is encrypted.
Which three protocols operate at the application layer of the TCP/IP model? (Choose three.)
DHCP FTP POP3
Which protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication?
DNS
Which two characteristics are associated with UDP sessions? (Choose two.)
Destination devices receive traffic with minimal delay. Received data is unacknowledged.
A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?
Exit privileged EXEC mode and press Enter .
Which destination address is used in an ARP request frame?
FFFF.FFFF.FFFF
A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications?
FTP SMTP HTTP
Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.)
FastEthernet0/0 packets with destination of 172.17.6.15 FastEthernet0/1 packets with destination of 172.17.14.8 FastEthernet1/0 packets with destination of 172.17.12.10 FastEthernet1/1 packets with destination of 172.17.10.5 SerialO/O/O packets with destination of 172.17.8.20
When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?
Flow Label
What is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza?
Gnutella
Which application layer protocol uses message types such as GET, PUT, and POST?
HTTP
Which protocol is used by a client to communicate securely with a web server?
HTTPS
Which statement describes a feature of the IP protocol?
IP relies on upper layer services to handle situations of missing or out-of-order packets.
How are port numbers used in the TCP/IP encapsulation process?
If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.
Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address?
It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.
What does a client do when it has UDP datagrams to send?
It just sends the datagrams.
What are two potential network problems that can result from ARP operation?
On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.
Which applications or services allow hosts to act as client and server at the same time?
P2P applications
What IPv4 header field identifies the upper layer protocol carried in the packet?
Protocol
Match the command with the device mode at which the command is entered. (Not all options are used.) enable R1> login R1(config-line)# copy running-config startup-config R1(config)# ip address 192.168.4.4 255.255.255 R1# Service password-encryption R1(config-if)#
R1(config)# Service password-encryption R1> enable R1# copy running-config startup-config R1(config-line)# login R1(config-if)# ip address 192.168.4.4 255.255.255
What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with hosts in other networks.
The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command?
The switch can be remotely managed from a host on another network.
Refer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?
The switch will forward the frame to all ports except port 4.
What property of ARP causes the NICs receiving an ARP request to pass the data portion of the Ethernet frame to the ARP process?
The type field 0x806 appears in the header of the Ethernet frame.
How do hosts ensure that their packets are directed to the correct network destination?
They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.
Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?
Time-to-Live
What are two functions of NVRAM?
To retain contents when power is removed and to store the startup configuration file
Which three statements characterize UDP? (Choose three.)
UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms. UDP relies on application layer protocols for error detection. UDP provides basic connectionless transport layer functions.
What is a characteristic of UDP?
UDP reassembles the received datagrams in the order they were received.
Which OSI layer provides the interface between the applications used to communicate and the underlying network over which messages are transmitted?
application
Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?
application
A client application needs to terminate a TCP communication session with a server. Place the termination process steps in the order that they will occur. client sends ACK client sends FIN client sends SYN server sends ACK server sends FIN server sends SYN step 1 step 2 step 3 step 4
client sends ACK Step 4 client sends FIN Step 1 server sends ACK Step 2 server sends FIN Step 3
Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?
client/server
What is a basic characteristic of the IP protocol?
connectionless
Which field in the TCP header indicates the status of the three-way handshake process?
control bits
What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?
destination MAC address
What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device?
destination and source port numbers
Which term describes a field in the IPv4 packet header that contains an 8-bit binary value used to determine the priority of each packet?
differentiated services
What is one advantage that the IPv6 simplified header offers over IPv4?
efficient packet handling
Match the configuration mode with the command that is available in that mode. (Not all options are used.) enable R1(config-line)# copy running-config startup-config R1# login R1(config)# interface fastehternet 0/0 RR1>1>
enable R1> copy running-config startup-config R1# login R1(config-line)# interface fastehternet 0/0 R1(config)#
What are two services provided by the OSI network layer? (Choose two.)
encapsulating PDUs from the transport layer routing packets toward the destination
Which term describes a field in the IPv4 packet header used to detect corruption in the IPv4 header?
header checksum
What are three responsibilities of the transport layer? (Choose three.)
meeting the reliability requirements of applications, if any multiplexing multiple communication streams from many users or applications on the same network identifying the applications and services on the client and server that should handle transmitted data
Which two types of IPv6 messages are used in place of ARP for address resolution?
neighbor solicitation neighbor advertisement
Which two functions are primary functions of a router?
packet forwarding path selection
Which three commands are used to set up secure access to a router through a connection to the console interface?
password cisco line console 0 login
In what networking model would eDonkey, eMule, BitTorrent, Bitcoin, and LionShare be used?
peer-to-peer
Which term describes a field in the IPv4 packet header used to identify the next level protocol?
protocol
What kind of port must be requested from IANA in order to be used with a specific application?
registered port
A network administrator requires access to manage routers and switches locally and remotely. Match the description to the access method. SSH console Telnet FTP AUX remote access via a dialup connection preferred out-of-band access method remote access method that uses encryption unsecure remote access
remote access via a dialup connection AUX preferred out-of-band access method console remote access method that uses encryption SSH unsecure remote access Telnet
What routing table entry has a next hop address associated with a destination network?
remote routes
What is a key characteristic of the peer-to-peer networking model?
resource sharing without a dedicated server
Which term describes a field in the IPv4 packet header that contains a 32-bit binary value associated with an interface on the sending device?
source IPv4 address
What is the aim of an ARP spoofing attack?
to associate IP addresses to the wrong MAC address
Which two fields are included in the TCP header but not in the UDP header?
window sequence number
Refer to the exhibit. A network administrator is connecting a new host to the Registrar LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host? RTR1(config)# interface gi0/1 RTR1(config-if)# description Connects to the Marketing LAN RTR1(config-if)# ip address 10.27.15.17 255.255.255.0 RTR1(config-if)# no shutdown RTR1(config-if)# interface gi0/0 RTR1(config-if)# description Connects to the Payroll LAN RTR1(config-if)# ip address 10.27.14.148 255.255.255.0 RTR1(config-if)# no shutdown RTR1(config-if)# interface s0/0/0 RTR1(config-if)# description Connects to the ISP RTR1(config-if)# ip address 10.14.15.254 255.255.255.0 RTR1(config-if)# no shutdown RTR1(config-if)# interface s0/0/1 RTR1(config-if)# description Connects to the Head Office WAN RTR1(config-if)# ip address 203.0.113.39 255.255.255.0 RTR1(config-if)# no shutdown RTR1(config-if)# end
10.27.14.148
A client creates a packet to send to a server. The client is requesting SNMP service. What number will be used as the destination port number in the sending packet?
161
A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received three packets of data from the PC?
4501
Which three addresses are valid public addresses?
64.104.78.227 128.107.12.117 198.133.219.17
What property of ARP allows MAC addresses of frequently used servers to be fixed in the ARP table?
A static IP-to-MAC address entry can be entered manually into an ARP table.
What is an example of network communication that uses the client-server model?
A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.
Where are IPv4 address to Layer 2 Ethernet address mappings maintained on a host computer?
ARP cache
What statement describes the function of the Address Resolution Protocol?
ARP is used to discover the MAC address of any host on the local network.
Which three statements describe a DHCP Discover message?
All hosts receive the message, but only a DHCP server replies. The message comes from a server offering an IP address. The destination IP address is 255.255.255.255.
Why is NAT not needed in IPv6?
Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.
Which two types of applications are best suited for UDP?
Applications that can tolerate some data loss, but require little or no delay Applications that handle reliability themselves
Match the phases to the functions during the boot up process of a Cisco router. (Not all options are used.) Phase 1 Enter setup mode Phase 2 locate and load the cisco software Phase 3 perform the POST and load the bootstrap program
Enter setup mode Phase 2 locate and load the cisco software Phase 1 Perform the POST and load the bootstrap program Phase 3
What are two characteristics of peer-to-peer networks? (Choose two.)
Resource sharing without a dedicated server Decentralized resources
Match the commands to the correct actions. (Not all options are used.) Router(config)# hostname CLI Router(config)# enable password Cisco Router(config-line)# password class Router(config)# password Cisco Router(config)# banner motd # Provides security on the console Displays a message when the router is accessed Configures a name on the router
Router(config)# hostname CLI Configures a name on the router Router(config-line)# password class Provides security on the console Router(config)# banner motd # Displays a message when the router is accessed
What is an advantage of SMB over FTP?
SMB clients can establish a long-term connection to the server.
Which two protocols may devices use in the application process that sends email?
SMTP DNS
Which three application layer protocols use TCP?
SMTP HTTP FTP
The application layer of the TCP/IP model performs the functions of what three layers of the OSI model?
Session application Presentation
Which three fields are used in a UDP segment header? (Choose three.)
Source Port Checksum Length
A network technician issues the arp -d * command on a PC after the router that is connected to the LAN is reconfigured. What is the result after this command is issued?
The ARP cache is cleared.
Refer to the exhibit. PC1 attempts to connect to File_server1 and sends an ARP request to obtain a destination MAC address. Which MAC address will PC1 receive in the ARP reply?
The MAC address of the G0/0 interface on R1
What information does the loopback test provide?
The TCP/IP stack on the device is working correctly.
A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem?
The computer has an invalid default gateway address.
A router boots and enters setup mode. What is the reason for this?
The configuration file is missing from NVRAM.
What is the effect of using the Router# copy running-config startup-config command on a router?
The contents of NVRAM will change.
Within a production network, what is the purpose of configuring a switch with a default gateway address?
The default gateway address is used to forward packets originating from the switch to remote networks.
What property of ARP causes the request to be flooded out all ports of a switch except for the port receiving the ARP request?
The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame.
What property of ARP forces all Ethernet NICs to process an ARP request?
The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame.
Under which two circumstances will a switch flood a frame out of every port except the port that the frame was received on? (Choose two.)
The destination address is unknown to the switch. The frame has the broadcast address as the destination address.
Which statement describes the treatment of ARP requests on the local link?
They are received and processed by every device on the local network.
Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)
session layer application layer presentation layer
Refer to the exhibit. PC1 attempts to connect to File_server1 and sends an ARP request to obtain a destination MAC address. Which MAC address will PC1 receive in the ARP reply?
the MAC address of the G0/0 interface on R1
Which factor determines TCP window size?
the amount of data the destination can process at one time
What type of information is contained in a DNS MX record?
the domain name mapped to mail exchange servers
Which parameter does the router use to choose the path to the destination when there are multiple routes available?
the lower metric value that is associated with the destination network