CCNA_1_UPD (1130964), страница 7
Текст из файла (страница 7)
19 из 2701.04.2009 0:39CISCO CCNA Certifications: CCNA 1 UPDATEDhttp://cisco-ccna-certifications.blogspot.com/search/label/CCNA%20...Options With Highlight Colours are Correct Answer1. Based on the transport layer header shown in the diagram, which of thefollowing statements describe the established session? (Choose two.)This is a UDP header.This contains a Telnet request.This contains a TFTP data transfer.The return packet from this remote host will have an Acknowledgement Number of43693.This is a TCP header.2.
With TCP/IP data encapsulation, which range of port numbers identifiesall well-known applications?0 to 255256 to 10220 to 10231024 to 204749153 to 655353. Why are port numbers included in the TCP header of a segment?to indicate the correct router interface that should be used to forward a segmentto identify which switch ports should receive or forward the segmentto determine which Layer 3 protocol should be used to encapsulate the datato enable a receiving host to forward the data to the appropriate applicationto allow the receiving host to assemble the packet in the proper order4.
Which OSI model layer is responsible for regulating the flow ofinformation from source to destination, reliably and accurately?applicationpresentationsessiontransportnetwork5. Refer to the exhibit. Host A is using FTP to download a large file fromServer 1. During the download process, Server 1 does not receive anacknowledgment from Host A for several bytes of transferred data. Whataction will Server 1 take as a result?create a Layer 1 jam signalreach a timeout and resend the data that needs to be acknowledgedsend a RESET bit to the hostchange the window size in the Layer 4 header6.
Why is flow control used for TCP data transfer?to synchronize equipment speed for sent datato synchronize and order sequence numbers so data is sent in complete numericalorderto prevent the receiver from being overwhelmed by incoming datato synchronize window size on the serverto simplify data transfer to multiple hosts7.
Which two options represent Layer 4 addressing? (Choose two.)identifies the destination networkidentifies source and destination hostsidentifies the communicating applicationsidentifies multiple conversations between the hostsidentifies the devices communicating over the local media8. Refer to the exhibit. In line 7 of this Wireshark capture, what TCPoperation is being performed?session establishmentsegment retransmitdata transfersession disconnectBottom of Form9. Refer to the exhibit. What two pieces of information can be determinedfrom the output that is shown? (Choose two.)The local host is using well-known port numbers to identify the source ports.A termination request has been sent to 192.135.250.10.Communication with 64.100.173.42 is using HTTP Secure.The local computer is accepting HTTP requests.192.168.1.101:1042isperformingthethree-wayhandshakewith128.107.229.50:80.10.
What is dynamically selected by the source host when forwarding data?destination logical addresssource physical addressdefault gateway addresssource port11. What are two features of the User Datagram Protocol (UDP)? (Choosetwo.)flow controllow overheadconnectionlessconnection-orientedsequence and acknowledgements12. What mechanism is used by TCP to provide flow control as segmentsСтр. 20 из 2701.04.2009 0:39CISCO CCNA Certifications: CCNA 1 UPDATEDhttp://cisco-ccna-certifications.blogspot.com/search/label/CCNA%20...travel from source to destination?sequence numberssession establishmentwindow sizeacknowledgments13.
Which transport layer protocol provides low overhead and would beused for applications which do not require reliable data delivery?TCPIPUDPHTTPDNS14. Which information is found in both the TCP and UDP headerinformation?sequencingflow controlacknowledgmentssource and destination15.
Which three features allow TCP to reliably and accurately track thetransmission of data from source to destination?encapsulationflow controlconnectionless servicessession establishmentnumbering and sequencingbest effort delivery16. During a TCP communication session, if the packets arrive to thedestination out of order, what will happen to the original message?The packets will not be delivered.The packets will be retransmitted from the source.The packets will be delivered and reassembled at the destination.The packets will be delivered and not reassembled at the destination.17.
Which is an important characteristic of UDP?acknowledgement of data deliveryminimal delays in data deliveryhigh reliability of data deliverysame order data delivery18. After a web browser makes a request to a web server that is listening tothe standard port, what will be the source port number in the TCP header ofthe response from the server?1353801024172819. Which event occurs during the transport layer three-way handshake?The two applications exchange data.TCP initializes the sequence numbers for the sessions.UDP establishes the maximum number of bytes to be sent.The server acknowledges the bytes of data received from the client.comments (0)TOP04:06CCNA 1:Module 3POSTED BY ADMINOptions With Highlight Colours are Correct Answer1. What application layer protocol is commonly used to support for filetransfers between a client and a server?HTMLHTTPFTPTelnet2.
What are two forms of application layer software? (Choose two.)applicationsdialogsrequestsservicessyntax3. A network administrator is designing a network for a new branch office oftwenty-five users. What are the advantages of using a client-server model?(Choose two.)centralized administrationdoes not require specialized softwaresecurity is easier to enforcelower cost implementationprovides a single point of failureСтр. 21 из 2701.04.2009 0:39CISCO CCNA Certifications: CCNA 1 UPDATEDhttp://cisco-ccna-certifications.blogspot.com/search/label/CCNA%20...4. What is the purpose of resource records in DNS?temporarily holds resolved entriesused by the server to resolve namessent by the client to during a querypasses authentication information between the server and client5. What is the automated service that matches resource names with therequired IP address?HTTPSSHFQDNDNSTelnetSMTP6.
What three protocols operate at the Application layer of the OSI model?(Choose three.)ARPDNSPPPSMTPPOPICMP7. What are three properties of peer-to-peer applications? (Choose three.)acts as both a client and server within the same communication.requires centralized account administration.hybrid mode includes a centralized directory of files.can be used in client-server networks.requires a direct physical connection between devices.centralized authentication is required.8. Which application layer protocols correctly match a correspondingfunction? (Choose two.)DNS dynamically allocates IP addresses to hostsHTTP transfers data from a web server to a clientPOP delivers email from the client to the server email serverSMTP supports file sharingTelnet provides a virtual connection for remote access9. Which email components are used to forward mail between servers?(Choose two.)MDAIMAPMTAPOPSMTPMUA10.
As compared to SSH, what is the primary disadvantage of telnet?not widely availabledoes not support encryptionconsumes more network bandwidthdoes not support authentication11. Which statements are correct concerning the role of the MTA in handlingemail? (Choose three.)routes email to the MDA on other serversreceives email from the client's MUAreceives email via the POP3 protocolpasses email to the MDA for final deliveryuses SMTP to route email between serversdelivers email to clients via the POP3 protocol12. Which two protocols are used to control the transfer of web resourcesfrom a web server to a client browser? (Choose two.)ASPFTPHTMLHTTPHTTPSIP13. A small home network has been installed to interconnect threecomputers together for gaming and file sharing.
What two propertiesrepresent this network type? (Choose two.)User accounts are centralized.Security is difficult to enforce.Specialized operating system software is required.File permissions are controlled by a single computer.A computer that responds to a file sharing request is functioning as a server.14. Which layer of the OSI model supplies services that allow user tointerface with the network?physicalsessionnetworkpresentationapplicationtransportСтр. 22 из 2701.04.2009 0:39CISCO CCNA Certifications: CCNA 1 UPDATEDhttp://cisco-ccna-certifications.blogspot.com/search/label/CCNA%20...15.
Refer to the exhibit. What is the destination port for the communicationthat is represented on line 5?8012611553339126552016. What are two characteristics of peer-to-peer networks? (Choose two.)scalableone way data flowdecentralized resourcescentralized user accountsresource sharing without a dedicated server17. What application layer protocol describes the services that are used forfile sharing in Microsoft networks?DHCPDNSSMBSMTPTelnet18. What are two characteristics of clients in data networks? (Choose two.)use daemonsinitiate data exchangesare repositories of datamay upload data to serverslisten for requests from servers19.
What is the role of the OSI application layer?provides segmentation of dataprovides encryption and conversion of dataprovides the interface between the applications on either end of the networkprovides control of all the data flowing between the source and destination devices20. How does the application layer on a server usually process multipleclient request for services?ceases all connections to the servicedenies multiple connections to a single daemonsuspends the current connection to allow the new connectionuses support from lower layer functions to distinguish between connections to theservicecomments (3)TOP04:04CCNA 1:Module 2POSTED BY ADMINOptions With Highlight Colours are Correct Answer1.
Which statements correctly identify the role of intermediary devices inthe network? (Choose three.)determine pathways for data.initiate data communications.retime and retransmit data signals.originate the flow of data .manage data flows.final termination point for data flow.2. Select the statements that are correct concerning network protocols.(Choose three.)define the structure of layer specific PDU's.dictate how to accomplish layer functions.outline the functions necessary for communications between layers.limit hardware compatibility.require layer dependent encapsulations.eliminate standardization among vendors.3.















