-
What are the key functions of encapsulation? (Choose three.)
- **identifies pieces of data as part of the same communication
- **ensures that data pieces can be directed to the correct receiving end device
- **enables the reassembly of complete messages
-
Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.)
**Physical**Data Link
-
According to the OSI model, FTP, TFTP, Telnet, and HTTP are used to check connectivity up to which layer?
**Application
-
What is true of data as it flows across the internetwork? (Choose three.)
- **Overhead is used to notify devices on a network that errors have been detected in data transmission.
- **Path selection is important for optimizing data flow and increasing performance.
- **Managing data flow and regulating traffic types is handled by intermediary devices.
-
Which devices connect individual hosts to the network and can connect
multiple individual networks to form an internetwork? (Choose three.)
- **communication server
- **firewall
- **router
-
What are the primary functions of the header and trailer information resulting from encapsulation? (Choose three.)
- **assist intermediary devices with processing and path selection
- **uniquely identifies source and destination devices
- **manage error recovery and data integrity
-
What is true regarding information that travels from the source to the destination? (Choose two.)
- **Headers are added to uniquely identify hosts.
- **Protocols determine the type, structure and purpose of labels and addressing.
-
Which statements correctly identify the role of intermediary devices in the network? (Choose three.)
- **determine pathways for data
- **retime and retransmit data signals
- **manage data flows
-
Select the statements that represent processes network protocols describe. (Choose three.)
- **the process by which networking devices share information about network paths
- **how and where error and system messages are passed between devices
- **establishment and termination of data transfer sessions
-
Select the statements that are correct concerning network protocols. (Choose three.)
- **define the structure of layer specific PDU's
- **outline the functions necessary for communications between layers
- **require layer dependent encapsulations
-
What are the benefits of using a layered approach to assist with network troubleshooting? (Choose three.)
- **Prevent technology change at one layer from affecting technology at another layer of the model.
- **To make network communication easier to understand.
- **Allow competitors to design products at different layer of the model and have them work together.
-
A
network administrator is designing a network for a new branch office
of twenty-five users. What are the advantages of using a client-server
model? (Choose two.)
- centralized administration
- security is easier to enforce
-
Which of the following are benefits of peer-to-peer networks? (Choose three.)
- easy to create
- no centralized equipment required centralized administrator not required
-
Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)
-
Which statements are correct concerning the role of the MTA in handling email? (Choose three.)
- receives email from the client's MUA
- passes email to the MDA for final delivery
- uses SMTP to route email between servers
-
What is the automated service that matches resource names with the required IP address?
DNS
-
What three protocols operate at the Application layer of the OSI model? (Choose three.)
-
What are the two forms of application layer software? (Choose two.)
-
What are three properties of peer-to-peer applications? (Choose three.)
- acts as both a client and server within the same communication.
- hybrid mode includes a centralized directory of files.
- can be used in client-server networks.
-
Which application layer protocols correctly match a corresponding function? (Choose two.)
- HTTP transfers data from a web server to a client
- Telnet provides a virtual connection for remote access
-
Which are valid DNS resource record types? (Choose three.)
-
Which email components are used to forward mail between servers? (Choose two.)
-
What is the primary disadvantage of telnet?
does not support encryption
-
What are three common HTTP message types? (Choose three.)
-
Which of the following are examples of TCP/IP application layer protocols? (Choose three.)
- *a terminal emulation protocol that supports remote console connections with various network devices
- *a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet
- *a protocol that exchanges network management information between a network device and a management console
-
What is the purpose of the TCP three-way handshake?
to synchronize sequence numbers prior to data transmission
-
What are the features of the User Datagram Protocol (UDP). (Choose three.)
- *no guaranteed delivery of datagrams
- *reliability provided by the application layer *connectionless
-
Which protocol is used by FTP to transfer files over the Internet?
TCP
-
How does windowing ensure that a data packet will be delivered to the
recipient in the same order, undamaged, and reliably? (Choose two.)
- acknowledgements
- window size adjustment
-
The network administrator for ABC company needs to send large amounts of
information to many destinations at one time and does not need any
verification that the data has been received. Which transport protocol
would the administrator use?
UDP
-
With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications?
0 to 1023
-
What is dynamically assigned by the source host when forwarding data?
source port number
-
Why are port numbers included in the TCP header of a segment?
to enable a receiving host to forward the data to the appropriate application
-
Which OSI model layer is responsible for regulating the flow of information
from source to destination, reliably and accurately?
transport
-
Why is flow control used for TCP data transfer?
to prevent the receiver from being overwhelmed by incoming data
-
In an IPv4 environment, what information is used by the router to forward
data packets from one interface of a router to another?
destination network address
-
Which two of the following statements accurately describe a default gateway? (Choose two.)
- *A default gateway is the IP address assigned to the near-side router interface.
- *A default gateway is used when a host transfers data to a host on another network segment.
-
What information is added during encapsulation at OSI Layer 3?
source and destination IP address
-
In a connectionless system, which of the following is correct?
The destination is not contacted before a packet is sent.
-
Which statement below is talking about the network layer?
Uses the Internet Protocol addressing scheme to determine the best way to move data from one place to another.
-
Which IP packet field will prevent endless loops?
time-to-live
-
Which portion of the network layer address does a router use to forward packets?
network portion
-
If the default gateway is configured incorrectly on the host, what is the impact on communications?
The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
-
What is the purpose of a default gateway?
identifies the device that allows local network computers to communicate with devices on other networks
-
What type of routing uses information that is manually entered into the routing table?
static
-
What are the functions of a routing protocol? (Choose three.)
- *provides the process for sharing route information between routers
- *enables routers to maintain the routing tables
- *enables routers to choose the best path to route the packet
-
When the destination network is not listed in the routing table of a
Cisco router, what are two possible actions that the router might take?
(Choose two.)
- *The router discards the packet.
- *The router forwards the packet out the interface indicated by the default route entry
-
Which statements are true regarding IP addressing? (Choose two.)
- *Private addresses are blocked from public Internet by router.
- *IP address 127.0.0.1 can be used for a host to direct traffic to itself.
-
Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address?
This is a network address.
-
Which of the following are features of IPv6? (Choose three.)
- *larger address space
- *data types and classes of service
- *authentication and encryption
-
A router interface has been assigned an IP address of 172.16.192.166
with a mask of 255.255.255.248. To which subnet does the IP address
belong?
172.16.192.160
-
Which IPv4 subnetted addresses represent valid host addresses? (Choose three.)
- 172.16.4.155 /26
- 172.16.4.193 /26
- 172.16.4.207 /27
-
What subnet mask would a network administrator assign to a network address of 172.30.1.0 if it were possible to have up to 254 hosts?
255.255.255.0
-
Which of the following network devices are recommended to be assigned static IP addresses? (Choose three.)
- servers
- network printers
- routers
-
Which three IP addresses are private? (Choose three.)
- 10.35.66.70
- 192.168.99.5
- 172.18.88.90
-
Which process do routers use to determine the subnet network address based upon a given IP address and subnet mask?
binary ANDing
-
Which of the following is a characteristic of DHCP?
provides an IP address dynamically to a device from a defined range of IP addresses
-
Which IEEE specification defines Wi-Fi technology?
802.11
-
What is true regarding media access control? (Choose three.)
- *Ethernet utilizes CSMA/CD
- *defined as placement of data frames on the media
- *Data Link layer protocols define the rules for access to different media
-
Which characteristics describe carrier sense multiple access collision detect (CSMA/CD)? (Choose three.)
- nondeterministic
- collision environment
- first-come, first-served approach
-
Which options are properties of contention-based media access for a shared media? (Choose three.)
- non-deterministic
- less overhead
- collisions exist
-
What determines the method of media access control? (Choose two.)
- media sharing
- logical topology
-
What is true concerning physical and logical topologies?
Logical topologies consist of virtual connections between nodes.
-
Which of the following are sublayers of the Data Link layer?
MAC, LLC
-
Which features describe the concept of Carrier Sense Multiple Access with Collision Detection? (Choose two.)
- non-deterministic
- uses first-come, first-served approach
-
What is the purpose of the preamble in an Ethernet frame?
is used for timing synchronization with alternating patterns of ones and zeros
-
What are three characteristics of valid Ethernet Layer 2 addresses? (Choose three.)
- *They are 48 binary bits in length.
- *They generally represented in hexadecimal format.
- *They are considered physical addresses.
-
A network administrator has been asked to provide a graphic
representation of exactly where the company network wiring and equipment
are located in the building. What is this type of drawing?
physical topology
-
Which three factors should be considered when implementing a Layer 2 protocol in a network?
- *the geographic scope of the network
- *the physical layer implementation
- *the number of hosts to be interconnected
-
Which three session options does PPP offer? (Choose three.)
- multilink
- compression
- authentication
-
Which statements describe the logical token-passing topology? (Choose two.)
- *Computers are allowed to transmit data only when they possess a token.
- *Electronic tokens are passed sequentially to each other.
|
|