Module 13 - 17 practice exams Flashcards
Which two types of ICMP messages are common to both ICMPv4 and ICMPv6? (Choose two.)
* Destination or Service Unreachable
* Hostname resolution
* IP configuration
* Source Unreachable
* Time exceeded
- Destination or Service Unreachable
- Time Exceeded
Which type of ICMPv6 message would a host send to acquire an IPv6 configuration when booting up?
* Neighbor Advertisement (NA) message
* Neighbor Solicitation (NS) message
* Router Advertisement (RA) message
* Router Solicitation (RS) message
Router Solicitation (RS) message
What is a function of the tracert command that differs from the ping command when they are used on a workstation?
* The tracert command reaches the destination faster.
* The tracert command shows the information of routers in the path.
* The tracert command sends one ICMP message to each hop in the path.
* The tracert command is used to test the connectivity between two devices.
The tracert command shows the information of routers in the path.
Which ICMP message is used by the traceroute utility during the process of finding the path between two end hosts?
* redirect
* ping
* time exceeded
* destination unreachable
time exceeded
Which two things can be determined by using the ping command? (Choose two.)
* the number of routers between the source and destination device
* the IP address of the router nearest the destination device
* the average time it takes a packet to reach the destination and for the response to return to the source
* the destination device is reachable through the network
* the average time it takes each router in the path between source and destination to respond
- the average time it takes a packet to reach the destination and for the response to return to the source
-the destination device is reachable through the network
Which statement describes a characteristic of the traceroute utility?
* It sends four Echo Request messages.
* It utilizes the ICMP Source Quench messages.
* It is primarily used to test connectivity between two hosts.
* It identifies the routers in the path from a source host to a destination host.
It identifies the routers in the path from a source host to a destination host.
\Which utility uses the Internet Control Messaging Protocol (ICMP)?
* RIP
* DNS
* ping
* NTP
ping
A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed?
* ipconfig
* netstat
* telnet
* traceroute
traceroute
Which protocol is used by IPv4 and IPv6 to provide error messaging?
* ICMP
* NDP
* ARP
* DHCP
ICMP
- What message is sent by a host to check the uniqueness of an IPv6 address before using that address?
* neighbor solicitation
* ARP request
* echo request
* router solicitation
neighbor solicitation
A technician is troubleshooting a network where it is suspected that a defective node in the network path is causing packets to be dropped. The technician only has the IP address of the end point device and does not have any details of the intermediate devices. What command can the technician use to identify the faulty node?
* tracert
* ping
* ipconfig /flushdns
* ipconfig /displaydns
tracert
A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?
* to obtain a dynamic IP address from the server
* to request that gateway forward the connection request to the file server
* to test that the host has the capability to reach hosts on other networks
* to resolve the domain name of the file server to its IP address
to test that the host has the capability to reach hosts on other networks
A user calls to report that a PC cannot access the internet. The network technician asks the user to issue the command ping 127.0.0.1 in a command prompt window. The user reports that the result is four positive replies. What conclusion can be drawn based on this connectivity test?
* The PC can access the network. The problem exists beyond the local network.
* The IP address obtained from the DHCP server is correct.
* The PC can access the Internet. However, the web browser may not work.
* The TCP/IP implementation is functional.
The TCP/IP implementation is functional.
Which command can be used to test connectivity between two devices using echo request and echo reply messages?
* netstat
* traceroute
* ICMP
* ping
ping
Which transport layer protocol statement is true?
* TCP has fewer fields than UDP.
* TCP is faster than UDP.
* UDP is a best-effort delivery protocol.
* UDP provides reliability.
UDP is a best-effort delivery protocol.
Which transport layer protocol would be used for VoIP applications?
* Session Information Protocol (SIP)
* Transmission Control Protocol (TCP)
* User Datagram Protocol (UDP)
* VoIP Transfer Protocol
User Datagram Protocol (UDP)
What field content is used by ICMPv6 to determine that a packet has expired?
* TTL field
* CRC field
* Hop Limit field
* Time Exceeded field
Hop Limit field
Which protocol provides feedback from the destination host to the source host about errors in packet delivery?
* ARP
* BOOTP
* DNS
* ICMP
ICMP
Which TCP header statement is true?
* It consists of 4 fields in an 8-byte header.
* It consists of 8 fields in a 10-byte header.
* It consists of 10 fields in a 20-byte header.
* It consists of 20 fields in a 40-byte header.
It consists of 10 fields in a 20-byte header.
Which two applications would use the TCP transport layer protocol? (Choose two.)
* FTP
* HTTP
* ICMP
* TFTP
* VoIP
- FTP
- HTTP
Which of the following is a stateless best-effort delivery transport layer protocol?
* ICMP
* IP
* TCP
* UDP
UDP
Which UDP header statement is true?
* It consists of 4 fields in an 8-byte header.
* It consists of 8 fields in a 10-byte header.
* It consists of 10 fields in a 20-byte header.
* It consists of 20 fields in a 40-byte header
It consists of 4 fields in an 8-byte header.
- Which two applications would use the UDP transport layer protocol? (Choose two.)
* FTP
* HTTP
* ICMP
* TFTP
* VoIP
- TFTP
- VoIP
How many exchanges are needed to end both sessions between two hosts?
* one exchange
* two exchanges
* three exchanges
* four exchanges
* five exchanges
four exchanges
Which control bit flags are used during the three-way handshake?
* ACK and FIN
* FIN and RESET
* RESET and SYN
* SYN and ACK
SYN and ACK
Assume a host with IP address 10.1.1.10 wants to request web services from a server at 10.1.1.254. Which of the following would display the correct socket pair?
* 1099:10.1.1.10, 80:10.1.1.254
* 10.1.1.10:80, 10.1.1.254:1099
* 10.1.1.10:1099, 10.1.1.254:80
* 80:10.1.1.10, 1099:10.1.1.254
10.1.1.10:1099, 10.1.1.254:80
Which port group includes port numbers for FTP, HTTP, and TFTP applications?
* dynamic ports
* private ports
* registered ports
* well-known ports
well-known ports
Which Windows command would display the protocols in use, the local address and port numbers, the foreign address and port numbers, and the connection state?
* ipconfig /all
* ping
* netstat
* traceroute
netstat
Which two fields are the same in a TCP and UDP header? (Choose two.)
* Control bits
* Destination port number
* Sequence number
* Source port number
* Well-known port number
- Destination port number
- Source port number
Which of the following would be valid source and destination ports for a host connecting to an email server?
* Source: 25, Destination: 49152
* Source: 80, Destination: 49152
* Source: 49152, Destination: 25
* Source: 49152, Destination: 80
Source: 49152, Destination: 25
What field is used by the destination host to reassemble segments into the original order?
* Control Bits
* Destination Port
* Sequence Number
* Source Port
* Window Size
Sequence Number
What field is used to provide flow control?
* Control Bits
* Destination Port
* Sequence Number
* Source Port
* Window Size
Window Size
What happens when a sending host senses there is congestion?
* The receiving host increases the number of bytes it sends before receiving an acknowledgment from the sending host.
* The receiving host reduces the number of bytes it sends before receiving an acknowledgment from the sending host.
* The sending host increases the number of bytes it sends before receiving an acknowledgment from the destination host.
* The sending host reduces the number of bytes it sends before receiving an acknowledgment from the destination host.
The sending host reduces the number of bytes it sends before receiving an acknowledgment from the destination host.
Why is UDP desirable for protocols that make a simple request and reply transactions?
* Flow Control
* Low overhead
* Reliability
* Same-order delivery
Low overhead
Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?
* The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.
* The source decreases the window size to decrease the rate of transmission from the destination.
* The destination decreases the window size.
* The destination sends fewer acknowledgement messages in order to conserve bandwidth
The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.
Which UDP datagram reassembly statement is true?
* UDP does not reassemble the data.
* UDP reassembles the data in the order that it was received.
* UDP reassembles the data using control bits.
* UDP reassembles the data using sequence numbers.
UDP reassembles the data in the order that it was received.
Which of the following would be valid source and destination ports for a host connecting to a DNS server?
* Source: 53, Destination: 49152
* Source: 1812, Destination: 49152
* Source: 49152, Destination: 53
* Source: 49152, Destination: 1812
Source: 49152, Destination: 53
Which two operations are provided by TCP but not by UDP? (Choose two.)
* identifying the applications
* acknowledging received data
* tracking individual conversations
* retransmitting any unacknowledged data
- acknowledging received data
- retransmitting any unacknowledged data
What is the TCP mechanism used in congestion avoidance?
* three-way handshake
* socket pair
* two-way handshake
* sliding window
sliding window
What is a responsibility of transport layer protocols?
* providing network access
* tracking individual conversations
* determining the best path to forward a packet
* translating private IP addresses to public IP addresses
tracking individual conversations
How does a networked server manage requests from multiple clients for different services?
* The server sends all requests through a default gateway.
* Each request is assigned source and destination port numbers.
* The server uses IP addresses to identify different services.
* Each request is tracked through the physical address of the client.
Each request is assigned source and destination port numbers.
Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)
* FTP
* DNS
* HTTP
* POP3
* VoIP
- DNS
- VoIP
What is the purpose of using a source port number in a TCP communication?
* to notify the remote device that the conversation is over
* to assemble the segments that arrived out of order
* to keep track of multiple conversations between devices
* to inquire for a nonreceived segment
to keep track of multiple conversations between devices
Which number or set of numbers represents a socket?
* 01-23-45-67-89-AB
* 21
* 192.168.1.1:80
* 10.1.1.15
192.168.1.1:80
Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)
* ACK
* FIN
* PSH
* RST
* SYN
* URG
- ACK
- SYN
What happens if part of an FTP message is not delivered to the destination?
* The message is lost because FTP does not use a reliable delivery method.
* The FTP source host sends a query to the destination host.
* The part of the FTP message that was lost is re-sent.
* The entire FTP message is re-sent.
The part of the FTP message that was lost is re-sent.
What type of applications are best suited for using UDP?
* applications that are sensitive to delay
* applications that need reliable delivery
* applications that require retransmission of lost segments
* applications that are sensitive to packet loss
applications that are sensitive to delay
Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?
* The client sets the window size for the session.
* The client sends an ISN to the server to start the 3-way handshake.
* The client randomly selects a source port number.
* The client sends a synchronization segment to begin the session.
The client randomly selects a source port number.
Which transport layer feature is used to guarantee session establishment?
* UDP ACK flag
* TCP 3-way handshake
* UDP sequence number
* TCP port number
TCP 3-way handshake
What is the complete range of TCP and UDP well-known ports?
* 0 to 255
* 0 to 1023
* 256 – 1023
* 1024 – 49151
0 to 1023
What is a socket?
* the combination of the source and destination IP address and source and destination Ethernet address
* the combination of a source IP address and port number or a destination IP address and port number
* the combination of the source and destination sequence and acknowledgment numbers
* the combination of the source and destination sequence numbers and port numbers
the combination of a source IP address and port number or a destination IP address and port number
This layer of the OSI model is concerned with the protocols that exchange data between programs running on hosts.
* application
* transport
* network
* physical
application
MKV, GIF, and JPG standards are associated with which OSI layer?
* application
* presentation
* session
* transport
presentation
These three OSI layers define the same functions as the TCP/IP model application layer.
* application
* presentation
* session
* transport
* network
* data link
- application
- presentation
- session
Which two are protocols that belong in the OSI application layer?
* PNG
* DNS
* SMTP
* QuickTime
- DNS
- SMTP
This is a function of the OSI session layer.
* compress and decompress data
* provide an interface between applications
* format data for the application layer
* exchange of information to initiate dialog between peers
exchange of information to initiate dialog between peers
True or false? The peer-to-peer networking model requires the implementation of a dedicated server for data access.
* True
* False
False
Which peer-to-peer application allows users to share pieces of many files with each other at the same time?
* Hybrid
* Gnutella
* BitTorrent
BitTorrent
True or false? In a peer-to-peer network environment every peer can function as both a client and a server.
* True
* False
True
Which of the following is a feature of the Gnutella protocol?
* Users can share whole files with other users.
* Users can share pieces of files with other users.
* Users can access an index server to get the location of resources shared by other users.
Users can share whole files with other users.
(Users can access an index server to get the location of resources shared by other users.) - canvas answer