Exam: Protocols for Specific Tasks Flashcards

1
Q

What type of applications are best suited for using UDP?

A

applications that are sensitive to delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A PC user issues the netstat command without any options. What is displayed as the result of this command?

A

a list of all established active TCP connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Refer to the exhibit. A TCP segment was sent by PC1 to the web server via port 80. Because of an unexpected network failure, the data was forwarded by R1 but was not received by R2. Which statement is correct about this scenario?

A

The web server will not acknowledge this segment. The PC1 timer will expire and PC1 will resend the segment.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A client device has initiated a secure HTTP request to a web browser. Which well-known port address number is associated with the destination address?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A destination PC receives an email message with the sequence numbers on packets out of order. Which layer of the TCP/IP model is responsible for reassembling the packets of the message in the correct order?

A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What information is used by TCP to reassemble and reorder received segments?

A

sequence numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

A

The client randomly selects a source port number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

“Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
What message is displayed on the webpage?”

A

A secure web server is the way to go!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

“Open the PT Activity. Perform the tasks in the activity instructions and then answer the question or complete the task.

Capture traffic in simulation mode. What application layer service is PC-A requesting from the web server?”

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which number or set of numbers represents a socket?

A

192.168.1.1:80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A new employee is attempting to configure a cell phone to connect to the email server of the company. Which port number should be selected when using the IMAP4 protocol to access email messages stored on the local server?

A

143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

“Open the PT activity. Perform the tasks in the activity instructions and then answer the question.

What is the application layer service being requested from Server0 by PC0?”

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

While a network security product is being deployed, a customizable list of allowable protocols is shown. Which three protocols should be allowed to provide for the use of email on a network? (Choose three.)

A

POP3, IMAP, & SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A computer has been assigned an IP address of 169.254.33.16. What command initiates the process of requesting a new IP address?

A

ipconfig /release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a function of the tracert command that differs from the ping command when they are used on a workstation?

A

The tracert command shows the information of routers in the path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which statement describes the use of the ping command?

A

The ping command tests end-to-end connectivity between two devices.

17
Q

A technician is troubleshooting a network where it is suspected that a defective node in the network path is causing packets to be dropped. The technician only has the IP address of the end point device and does not have any details of the intermediate devices. What command can the technician use to identify the faulty node?

A

tracert

18
Q

Which command line utility is used to test connectivity to other IP hosts?

A

ping

19
Q

A user is able to ping www.cisco.com by its IP address but cannot browse to www.cisco.com in a browser. What is the possible cause?

A

The DNS server is not working.

20
Q

A user needs to find the MAC address on the host PC. Which command line utility can be used to display this information?

A

ipconfig /all

21
Q

Which command line utility is used to display active network connections on a PC?

A

netstat

22
Q

Which command is used to test network connectivity and provide a response to each packet received by the remote host?

A

Ping

23
Q

ipconfig

A

Displays IP configuration information

24
Q

ping

A

Tests connections to other IP hosts

25
Q

netstat

A

Displays network connections

26
Q

tracert

A

Displays the route taken to the destination

27
Q

nslookup

A

Directly queries the name server for information on a destination domain

28
Q

ipconfig /all

A

displays additional information including the MAC address, IP addresses of the default gateway, and the DNS servers.

29
Q

ipconfig /release

A

release the current DHCP bindings

30
Q

ipconfig /renew

A

will request fresh configuration information from the DHCP server

31
Q

What two characteristics describe an FTP connection? (Choose two.)

A

Files can be downloaded from or uploaded to the server & The first connection established is for traffic control and the second connection is created to transfer a file

32
Q

Which two applications provide virtual terminal access to remote servers?

A

SSH & Telnet

33
Q

Which layer of the TCP/IP model is responsible for ensuring packets are sent reliably and any missing packets are resent?

A

transport layer

34
Q

Which Windows command would display the protocols in use, the local address and port numbers, the foreign address and port numbers, and the connection state?

A

netstat

35
Q

Which protocol operates at the application layer of the TCP/IP model?

A

HTTP

36
Q

A student is sending files from a phone to a computer across a network. Which layer of the TCP/IP model is responsible for reassembling these messages as they are received on the computer?

A

transport

37
Q

What is the purpose of using a source port number in a TCP communication?

A

to keep track of multiple conversations between devices