Ответы на CCNA1 (1130615), страница 5
Текст из файла (страница 5)
What does this mean?TCP uses only LAN connections.TCP requires devices to be directly connected.TCP negotiates a session for data transfer between hosts.TCP reassembles the data steams in the order that it is received.3 FTP provides a reliable, connection-oriented service for transferring of files. Whichtransport layer protocol is used for data transfer when this service is being used?TFTPTCPDNSIPUDP4 An application is using a protocol that exchanges data without using windowing orflow control and must rely on higher layer protocols to transmit data.
Which protocoland transfer method are being used?UDP, connection-orientedUDP, connectionlessTCP, connection-orientedTCP, connectionless5 Which Application layer protocol is widely used to support resolving host names toIP addresses?FTPSMTPSNMPDNSHTTPWWW6 What does the http portion of the URL http://www.cisco.com/edu/ communicate toa web browser?The web browser needs to locate the www server.The address is located on a site whose name is http.The web browser is notified as to which protocol to use.The http portion represents the type of web browser that needs to be used.7 What is the purpose of TCP/UDP port numbers?indicate the beginning of a three-way handshakereassemble the segments into the correct orderidentify the number of data packets that may be sent without acknowledgmenttrack different conversations crossing the network at the same time8 What are the features of the User Datagram Protocol (UDP).
(Choose three.)no guaranteed delivery of datagramsconnection-orientedprovides reliable full-duplex data transmissionreliability provided by the application layerconnectionlessutilizes sliding windowing techniques9 Which protocol is used by e-mail servers to communicate with each other?FTPHTTPTFTPSMTPPOPSNMP10 Which application layer protocol allows network devices to exchange managementinformation?SMTPSNMPFTPTFTPEIGRP11 Which protocol is used to transfer files from computer to computer but isconsidered connectionless?FTPTFTPSNMPTCPDHCP12 Which layer of the OSI model can provide a connection-oriented, reliable datatransfer between two hosts?ApplicationPresentationSessionTransport13 Which of the following are primary duties of the OSI transport layer? (Choosetwo.)path determinationend-to-end connectivityflow controlsecurity controldata representationencryption of data14 When the receiving workstation detects an error in the data it has received, itdoes not acknowledge receipt of the data.
The source workstation retransmits theunacknowledged data. Which layer of the OSI model supports this process ofretransmission?networkapplicationsessiontransport15 Which port numbers are commonly assigned for FTP use? (Choose two.)19202122--Final Practise 100%1Which of the following are considered the best electrical conductors for use in datanetwork communications?(Choose three.)glass fiberscoppergoldplasticsiliconsilver2Select the necessary information that is required to compute the estimated time itwould take to transfer datarom one location to another.
(Choose two.)file sizedata formatnetwork in usetype of mediumbandwidth of the link3During cable testing, which of the following are used to calculate the informationcarrying capacity of a datacable? (Choose two.)bit speedattenuationwire mapsaturation limitanalog bandwidth4In a new network installation, the network administrator has decided to use amedium that is not affected byelectrical noise.
Which cable type will best meet this standard?coaxialscreened twisted pairshielded twisted pairunshielded twisted pairfiber optic5Which part of the URL http://www.awsb.ca/teacher gives the name of the domain?wwwhttp:///teacherawsb.ca6To make sure timing limitations are not violated when implementing a 10 MbpsEthernet network involving hubsor repeaters, a technician should adhere to which rule?the 4-5-3 rulethe 6-4-2 rulethe 3-4-5 rulethe 5-4-3 rule7Which protocol functions at the internet layer of the TCP/IP protocol suite?File Transfer Protocol (FTP)Trivial File Transfer Protocol (TFTP)Transmission Control Protocol (TCP)Internet Protocol (IP)User Datagram Protocol (UDP)Simple Mail Transport Protocol (SMTP)8John has been hired as the network administrator of a local company and hasdecided to add more hubs to thecompany's existing network.
Which of the following has been caused by John'sinexperience?collision domain extendedan increased number of collision domainsincreased network performanceincreased bandwidthextended bandwidth9What is established during a connection-oriented file transfer between computers?(Choose two.)a temporary connection to establish authentication of hostsa connection used for ASCII or binary mode data transfera connection used to provide the tunnel through which file headers are transporteda command connection which allows the transfer of multiple commands directly tothe remote server systema control connection between the client and server10The accumulation of traffic from which of the following can cause a network conditioncalled broadcast radiation?(Choose three.)anonymous FTP serverstelnet sessionsvideo over IP applicationsNAS servicesARP requestsRIP updates11Which layer of the OSI model covers physical media?Layer 1Layer 2Layer 3Layer 4Layer 5Layer 612Which combinations of charges will be repelled by electric force? (Choose two.)neutral and neutralneutral and positiveneutral and negativepositive and positivepositive and negativenegative and negative13What is the maximum distance that 10BASE-T will transmit data before signalattenuation affects the data delivery?100 meters185 meters300 meters500 meters14Which of these workstation installation and setup tasks are concerned with networkaccess layer functions? (Choose two.)configuring the e-mail clientinstalling NIC driversconfiguring IP network settingsconnecting the network cableusing FTP to download application software updates15For which of the following is Ethernet considered the standard? (Choose three.)inter-building connectionmid-length voicevideo conferencingvertical wiringhorizontal wiringdiagonal wiring16What is the recommended maximum number of workstations configured on a peerto-peer network?2515105217The highest capacity Ethernet technologies should be implemented in which areas ofa network? (Choose three.)between workstation and backbone switchbetween individual workstationsbetween backbone switchesbetween enterprise server and switchon aggregate access links18When a network administrator applies the subnet mask 255.255.255.248 to a ClassA address, for any givensubnet, how many IP addresses are available to be assigned to devices?102251025412630619Which of the following will test the internal loopback of a node?ping 10.10.10.1ping 192.168.1.1ping 127.0.0.1ping 223.223.223.223ping 255.255.255.25520Which of the following is a term associated with replacing hubs with switches toincrease the number of collision domains?encapsulationlatencysegmentationlayered modelbroadcast domainextended21Which part of an IP address identifies a specific device on a network?first two octetsthird and fourth octetsnetwork portionhost portiononly the fourth octet22Which of the following protocols are used for e-mail transfer between clients andservers? (Choose three.)TFTPSNMPPOP3SMTPIMAP4postoffice23Which of the following is the Layer 4 PDU?bitframepacketsegment24Using the data transfer calculation T=S/BW, how long would it take a 4MB file to besent over a 1.5Mbps connection?52.2 seconds21.3 seconds6.4 seconds2 seconds0.075 seconds0.0375 seconds25If a network administrator needed to download files from a remote server, whichprotocols could the administrator use to remotely access those files? (Choose two.)ASCIITFTPIMAPFTPUDP26What is important to remember about the data link layer of the OSI model whenconsidering Peer to Peercommunication? (Choose three.)It links data to the transport layer.It encapsulates frames into packets.It provides a service to the network layer.It encapsulates the network layer information into a frame.Its header contains a physical address which is required to complete thedata link functions.It encodes the data link frame into a pattern of 1s and 0s (bits) for transmission onthe medium.27Which OSI layer defines the functions of a router?physicaldata linknetworktransportsession28How is a MAC address represented?four groups of eight binary digits separated by a decimal pointfour Base10 digits separated by a decimal pointsix hexadecimal digitstwelve hexadecimal digitstwenty-four Base10 digits29Which of the following are useable Class A IP addresses with a default subnet mask?(Choose three.)127.0.39.1111.9.28.30123.1.2.132128.50.38.2105.1.34.10.23.92.330Which of the following are features of the Internet Protocol (IP)? (Choose two.)It is the most widely implemented global addressing scheme.It allows two hosts to share a single address on a local area network.It is a hierarchical addressing scheme allowing addresses to be grouped.It is only locally significant, used primarily on local area networks.31Which term describes an ARP response by a router on behalf of a requesting host?ARPRARPProxy ARPProxy RARP32A small company has a class C network license and needs to create five usablesubnets, each subnet capableof accommodating at least 20 hosts.
Which of the following is the appropriate subnetmask?255.255.255.0255.255.255.192255.255.255.224255.255.255.24033Which OSI layer encapsulates data into packets?sessiontransportnetworkdata link34Which of the following services is used to translate a web address into an IP address?DNSWINSDHCPTelnet35What type of network cable is used between a terminal and a console port?cross-overstraight-throughrolloverpatch cable36Which of the following items are common to all 100BASE technologies? (Choosethree.)frame formatmediaconnectorstimingmulti-part encoding37"CompA" is trying to locate a new computer named "CompB" on the network.