Module 14-15 Exam Flashcards

1
Q

Which transport layer feature is used
to guarantee session establishment?
* UDP ACK flag
* TCP 3-way handshake
* UDP sequence number
* TCP port number

A
  • TCP 3-way handshake
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which action is performed by a client
when establishing communication
with a server via the use of UDP at the
transport layer?
* The client sets the window size for
the session.
* The client sends an ISN to the
server to start the 3-way
handshake.
* The client randomly selects a
source port number.
* The client sends a synchronization
segment to begin the session.

A
  • The client randomly selects a
    source port number.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the complete range of TCP
and UDP well-known ports?
* 0 to 255
* 0 to 1023
* 256 – 1023
* 1024 – 49151

A
  • 0 to 1023
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a socket?
* the combination of the source and
destination IP address and source
and destination Ethernet address
* the combination of a source IP
address and port number or a
destination IP address and port
number
* the combination of the source and
destination sequence and
acknowledgment numbers
* the combination of the source and
destination sequence numbers
and port numbers

A
  • the combination of a source IP
    address and port number or a
    destination IP address and port
    number
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A PC is downloading a large file from a
server. The TCP window is 1000 bytes.
The server is sending the file using
100-byte segments. How many
segments will the server send before it
requires an acknowledgment from the
PC?
* 1 segment
* 10 segments
* 100 segments
* 1000 segments

A
  • 10 segments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which factor determines TCP window
size?
* the amount of data to be
transmitted
* the number of services included in
the TCP segment
* the amount of data the destination
can process at one time
* the amount of data the source is
capable of sending at one time

A
  • the amount of data the destination
    can process at one time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a client do when it has UDP
datagrams to send?
* It just sends the datagrams.
* It queries the server to see if it is
ready to receive data.
* It sends a simplified three-way
handshake to the server.
* It sends to the server a segment
with the SYN flag set to
synchronize the conversation.

A
  • It just sends the datagrams.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which three fields are used in a UDP
segment header? (Choose three.)
* Window Size
* Length
* Source Port
* Acknowledgment Number
* Checksum
* Sequence Number

A
  • Length
  • Source Port
  • Checksum
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two roles of the transport
layer in data communication on a
network? (Choose two.)
* identifying the proper application
for each communication stream
* tracking the individual
communication between
applications on the source and
destination hosts
* providing frame delimiting to
identify bits making up a frame
* performing a cyclic redundancy
check on the frame for errors
* providing the interface between
applications and the underlying
network over which messages are
transmitted

A
  • identifying the proper application
    for each communication stream
  • tracking the individual
    communication between
    applications on the source and
    destination hosts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What information is used by TCP to
reassemble and reorder received
segments?
* port numbers
* sequence numbers
* acknowledgment numbers
* fragment numbers

A
  • sequence numbers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What important information is added
to the TCP/IP transport layer header to
ensure communication and
connectivity with a remote network
device?
* timing and synchronization
* destination and source port
numbers
* destination and source physical
addresses
* destination and source logical
network addresses

A
  • destination and source port
    numbers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two characteristics are
associated with UDP sessions?
(Choose two.)
* Destination devices receive traffic
with minimal delay.
* Transmitted data segments are
tracked.
* Destination devices reassemble
messages and pass them to an
application.
* Received data is unacknowledged.
* Unacknowledged data packets are
retransmitted.

A
  • Destination devices receive traffic
    with minimal delay.
  • Received data is unacknowledged.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which flag in the TCP header is used
in response to a received FIN in order
to terminate connectivity between two
network devices?
* FIN
* ACK
* SYN
* RST

A
  • ACK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which protocol or service uses UDP
for a client-to-server communication
and TCP for server-to-server
communication?
* HTTP
* FTP
* DNS
* SMTP

A
  • DNS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a characteristic of UDP?
* UDP datagrams take the same
path and arrive in the correct order
at the destination.
* Applications that use UDP are
always considered unreliable.
* UDP reassembles the received
datagrams in the order they were
received.
* UDP only passes data to the
network when the destination is
ready to receive the data.

A
  • UDP reassembles the received
    datagrams in the order they were
    received.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

.What kind of port must be requested
from IANA in order to be used with a
specific application?
* registered port
* private port
* dynamic port
* source port

A
  • registered port
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which three application layer
protocols use TCP? (Choose three.)
* SMTP
* FTP
* SNMP
* HTTP
* TFTP
* DHCP

A
  • SMTP
  • FTP
  • HTTP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which three statements characterize
UDP? (Choose three.)
* UDP provides basic
connectionless transport layer
functions.
* UDP provides connectionoriented, fast transport of data at
Layer 3.
* UDP relies on application layer
protocols for error detection.
* UDP is a low overhead protocol
that does not provide sequencing
or flow control mechanisms.
* UDP relies on IP for error detection
and recovery.
* UDP provides sophisticated flow
control mechanisms.

A
  • UDP provides basic
    connectionless transport layer
    functions.
  • UDP relies on application layer
    protocols for error detection.
  • UDP is a low overhead protocol
    that does not provide sequencing
    or flow control mechanisms.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which two fields are included in the
TCP header but not in the UDP
header? (Choose two.)
* window
* checksum
* source port
* destination port
* sequence number

A
  • window
  • sequence number
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which field in the TCP header
indicates the status of the three-way
handshake process?
* window
* reserved
* checksum
* control bits

A
  • control bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why does HTTP use TCP as the
transport layer protocol?
* to ensure the fastest possible
download speed
* because HTTP is a best-effort
protocol
* because transmission errors can
be tolerated easily
* because HTTP requires reliable
delivery

A
  • because HTTP requires reliable
    delivery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which two types of applications are
best suited for UDP? (Choose two.)
* applications that need data flow
control
* applications that require reliable
delivery
* applications that handle reliability
themselves
* applications that need the
reordering of segments
* applications that can tolerate
some data loss, but require little or
no delay

A
  • applications that handle reliability
    themselves
  • applications that can tolerate
    some data loss, but require little or
    no delay
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How are port numbers used in the
TCP/IP encapsulation process?
* Source port numbers and
destination port numbers are not
necessary when UDP is the
transport layer protocol being used
for the communication.
* Source port and destination port
numbers are randomly generated.
* If multiple conversations occur
that are using the same service,
the source port number is used to
track the separate conversations.
* Destination port numbers are
assigned automatically and
cannot be changed.

A
  • If multiple conversations occur
    that are using the same service,
    the source port number is used to
    track the separate conversations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

. In what two situations would UDP be
better than TCP as the preferred
transport protocol? (Choose two.)
* when applications need to
guarantee that a packet arrives
intact, in sequence, and
unduplicated
* when a faster delivery mechanism
is needed
* when delivery overhead is not an
issue
* when applications do not need to
guarantee delivery of the data
* when destination port numbers
are dynamic

A
  • when a faster delivery mechanism
    is needed
  • when applications do not need to
    guarantee delivery of the data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are three responsibilities of the
transport layer? (Choose three.)
* meeting the reliability
requirements of applications, if
any
* multiplexing multiple
communication streams from
many users or applications on the
same network
* identifying the applications and
services on the client and server
that should handle transmitted
data
* directing packets towards the
destination network
* formatting data into a compatible
form for receipt by the destination
devices
* conducting error detection of the
contents in frames

A
  • meeting the reliability
    requirements of applications, if
    any
  • multiplexing multiple
    communication streams from
    many users or applications on the
    same network
  • identifying the applications and
    services on the client and server
    that should handle transmitted
    data
26
Q

6.Which three statements describe a
DHCP Discover message? (Choose
three.)
* The source MAC address is 48
ones (FF-FF-FF-FF-FF-FF).
* The destination IP address is
255.255.255.255.
* The message comes from a server
offering an IP address.
* The message comes from a client
seeking an IP address.
* All hosts receive the message, but
only a DHCP server replies.
* Only the DHCP server receives the
message.

A
  • The destination IP address is
    255.255.255.255
  • The message comes from a client
    seeking an IP address.
  • All hosts receive the message, but
    only a DHCP server replies.
27
Q

.Which two protocols may devices use
in the application process that sends
email? (Choose two.)
* HTTP
* SMTP
* POP
* IMAP
* DNS
* POP3

A
  • SMTP
  • DNS
28
Q

What is true about the Server Message
Block protocol?
* Different SMB message types have
a different format.
* Clients establish a long term
connection to servers.
* SMB messages cannot
authenticate a session.
* SMB uses the FTP protocol for
communication.

A
  • Clients establish a long term
    connection to servers.
29
Q

What is the function of the HTTP GET
message?
* to request an HTML page from a
web server
* to send error information from a
web server to a web client
* to upload content to a web server
from a web client
* to retrieve client email from an
email server using TCP port 110

A
  • to request an HTML page from a
    web server
30
Q

.Which OSI layer provides the interface
between the applications used to
communicate and the underlying
network over which messages are
transmitted?
* application
* presentation
* session
* transport

A
  • application
31
Q

Which networking model is being used
when an author uploads one chapter
document to a file server of a book
publisher?
* peer-to-peer
* master-slave
* client/server
* point-to-point

A
  • client/server
32
Q

What do the client/server and peer-topeer network models have in
common?
* Both models have dedicated
servers.
* Both models support devices in
server and client roles.
* Both models require the use of
TCP/IP-based protocols.
* Both models are used only in the
wired network environment.

A
  • Both models support devices in
    server and client roles.
33
Q

In what networking model would
eDonkey, eMule, BitTorrent, Bitcoin,
and LionShare be used?
* peer-to-peer
* client-based
* master-slave
* point-to-point

A
  • peer-to-peer
34
Q

What is a common protocol that is
used with peer-to-peer applications
such as WireShare, Bearshare, and
Shareaza?
* Ethernet
* Gnutella
* POP
* SMTP

A
  • Gnutella
35
Q

What is a key characteristic of the
peer-to-peer networking model?
* wireless networking
* social networking without the
Internet
* network printing using a print
server
* resource sharing without a
dedicated server

A
  • resource sharing without a
    dedicated server
36
Q

The application layer of the TCP/IP
model performs the functions of what
three layers of the OSI model?
(Choose three.)
* physical
* session
* network
* presentation
* data link
* transport
* application

A
  • session
  • presentation
  • application
37
Q

What is an example of network
communication that uses the clientserver model?
* A user uses eMule to download a
file that is shared by a friend after
the file location is determined.
* A workstation initiates an ARP to
find the MAC address of a receiving
host.
* A user prints a document by using
a printer that is attached to a
workstation of a coworker.
* A workstation initiates a DNS
request when the user types
www.cisco.com in the address bar
of a web browser.

A
  • A workstation initiates a DNS
    request when the user types
    www.cisco.com in the address bar
    of a web browser.
38
Q

Which layer in the TCP/IP model is
used for formatting, compressing, and
encrypting data?
* internetwork
* session
* presentation
* application
* network access

A
  • application
39
Q

.What is an advantage of SMB over
FTP?
* Only with SMB can data transfers
occur in both directions.
* Only SMB establishes two
simultaneous connections with
the client, making the data transfer
faster.
* SMB is more reliable than FTP
because SMB uses TCP and FTP
uses UDP.
* SMB clients can establish a longterm connection to the server.

A
  • SMB clients can establish a longterm connection to the server.
40
Q

. A manufacturing company subscribes
to certain hosted services from its ISP.
The services that are required include
hosted world wide web, file transfer,
and e-mail. Which protocols represent
these three key applications? (Choose
three.)
* FTP
* HTTP
* DNS
* SNMP
* DHCP
* SMTP

A
  • FTP
  • HTTP
  • SMTP
41
Q

Which application layer protocol uses
message types such as GET, PUT, and
POST?
* DNS
* DHCP
* SMTP
* HTTP
* POP3

A
  • HTTP
42
Q

.What type of information is contained
in a DNS MX record?
* the FQDN of the alias used to
identify a service
* the IP address for an FQDN entry
* the domain name mapped to mail
exchange servers
* the IP address of an authoritative
name server

A
  • the domain name mapped to mail
    exchange servers
43
Q

Which three protocols operate at the
application layer of the TCP/IP model?
(Choose three.)
* ARP
* TCP
* UDP
* FTP
* POP3
* DHCP

A
  • FTP
  • POP3
  • DHCP
44
Q

Which protocol is used by a client to
communicate securely with a web
server?
* SMTP
* SMB
* IMAP
* HTTPS

A
  • HTTPS
45
Q

Which applications or services allow
hosts to act as client and server at the
same time?
* client/server applications
* email applications
* P2P applications
* authentication services

A
  • P2P applications
46
Q

What are two characteristics of peerto-peer networks? (Choose two.)
* scalability
* one way data flow
* decentralized resources
* centralized user accounts
* resource sharing without a
dedicated server

A
  • decentralized resources
  • resource sharing without a
    dedicated server
47
Q

Which scenario describes a function
provided by the transport layer?
* A student is using a classroom
VoIP phone to call home. The
unique identifier burned into the
phone is a transport layer address
used to contact another network
device on the same network.
* A student is playing a short webbased movie with sound. The
movie and sound are encoded
within the transport layer header.
* A student has two web browser
windows open in order to access
two web sites. The transport layer
ensures the correct web page is
delivered to the correct browser
window.
* A corporate worker is accessing a
web server located on a corporate
network. The transport layer
formats the screen so the web
page appears properly no matter
what device is being used to view
the web site.

A
  • A student has two web browser
    windows open in order to access
    two web sites. The transport layer
    ensures the correct web page is
    delivered to the correct browser
    window.
48
Q

Which three layers of the OSI model
provide similar network services to
those provided by the application
layer of the TCP/IP model? (Choose
three.)
* physical layer
* session layer
* transport layer
* application layer
* presentation layer
* data link layer

A
  • session layer
  • application layer
  • presentation layer
49
Q

A PC that is communicating with a
web server has a TCP window size of
6,000 bytes when sending data and a
packet size of 1,500 bytes. Which byte
of information will the web server
acknowledge after it has received two
packets of data from the PC?
* 3001
* 6001
* 4500
* 6000

A
  • 3001
50
Q

A PC that is communicating with a
web server has a TCP window size of
6,000 bytes when sending data and a
packet size of 1,500 bytes. Which byte
of information will the web server
acknowledge after it has received
three packets of data from the PC?
* 4501
* 6001
* 6000
* 4500

A
  • 4501
51
Q

A PC that is communicating with a
web server has a TCP window size of
6,000 bytes when sending data and a
packet size of 1,500 bytes. Which byte
of information will the web server
acknowledge after it has received four
packets of data from the PC?
* 6001
* 3001
* 1501
* 1500

A
  • 6001
52
Q

. A client creates a packet to send to a
server. The client is requesting TFTP
service. What number will be used as
the destination port number in the
sending packet?
* 69
* 67
* 53
* 80

A
  • 69
53
Q

A client creates a packet to send to a
server. The client is requesting FTP
service. What number will be used as
the destination port number in the
sending packet?
* 21
* 69
* 67
* 80

A
  • 21
54
Q

A client creates a packet to send to a
server. The client is requesting SSH
service. What number will be used as
the destination port number in the
sending packet?
* 22
* 69
* 67
* 80

A
  • 22
55
Q

A client creates a packet to send to a
server. The client is requesting HTTP
service. What number will be used as
the destination port number in the
sending packet?
* 80
* 67
* 53
* 69

A
  • 80
56
Q

A client creates a packet to send to a
server. The client is requesting POP3
service. What number will be used as
the destination port number in the
sending packet?
* 110
* 67
* 53
* 69
* 443
* 161
* 80

A
  • 110
57
Q

A client creates a packet to send to a
server. The client is requesting telnet
service. What number will be used as
the destination port number in the
sending packet?
* 23
* 443
* 161
* 110

A
  • 23
58
Q

A client creates a packet to send to a
server. The client is requesting SNMP
service. What number will be used as
the destination port number in the
sending packet?
* 161
* 443
* 110
* 80

A
  • 161
59
Q

A client creates a packet to send to a
server. The client is requesting HTTPS
service. What number will be used as
the destination port number in the
sending packet?
* 443
* 161
* 110
* 80

A
  • 443
60
Q

A client creates a packet to send to a
server. The client is requesting SMTP
service. What number will be used as
the destination port number in the
sending packet?
* 25
* 443
* 161
* 110

A
  • 25