Professional Documents
Culture Documents
Untitled
Untitled
were sent to the destination. What is one way that the TCP protocol addresses this?
The source decreases the amount of data that it transmits before it
receives an acknowledgement from the destination.
▪ Which two operations are provided by TCP but not by UDP? (Choose
two.) acknowledging received data / retransmitting any
unacknowledged data
▪ How does a networked server manage requests from multiple clients for
different services? Each request is assigned source and destination
port numbers.
▪ Which two services or protocols use the preferred UDP protocol for fast
transmission and low overhead? (Choose two) DNS / VoIP
▪ Which two flags in the TCP header are used in a TCP three-way
handshake to establish connectivity between two network devices?
(Choose two.) ACK / SYN
▪ What type of applications are best suited for using UDP? applications that
are sensitive to delay
▪ What is the complete range of TCP and UDP well-known ports? 0 to 1023
▪ Which ICMP message is used by the traceroute utility during the process
of finding the path between two end hosts? time exceeded
▪ Which utility uses the Internet Control Messaging Protocol (ICMP)? Ping
▪A user who is unable to connect to the file server contacts the help desk.
The helpdesk technician asks the user to ping the IP address of the
default gateway that is configured on the workstation. What is the
purpose for this ping command? to test that the host has the capability
to reach hosts on other networks
▪A user calls to report that a PC cannot access the internet. The network
technician asks the user to issue the command ping 127.0.0.1 in a
command prompt window. The user reports that the result is four positive
replies. What conclusion can be drawn based on this connectivity test?
The TCP/IP implementation is functional.
▪ Which protocol provides feedback from the destination host to the source
host about errors in packet delivery? ICMP
▪ Refer to the exhibit. A TCP segment was sent by PC1 to the web server
via port 80. Because of an unexpected network failure, the data was
forwarded by R1 but was not received by R2. Which statement is correct
about this scenario? The web server will not acknowledge this
segment. The PC1 timer will expire and PC1 will resend the segment.
▪ What type of applications are best suited for using UDP? applications
that are sensitive to delay
▪ Open the PT activity. Perform the tasks in the activity instructions and
then answer the question.
What is the application layer service being requested from Server0 by
PC0? HTTPS
▪ Open the PT Activity. Perform the tasks in the activity instructions and then
answer the question or complete the task.
Capture traffic in simulation mode. What application layer service is PC-
A requesting from the web server? FTP
▪ This layer of the OSI model is concerned with the protocols that exchange
data between programs running on hosts. application
▪ MKV, GIF, and JPG standards are associated with which OSI layer?
Presentation
▪ These three OSI layers define the same functions as the TCP/IP model
application layer. Application / presentation / session
▪ Which two are protocols that belong in the OSI application layer? DNS /
SMTP
▪ What are two characteristics of the application layer of the TCP/IP model?
(Choose two.) the creation and maintenance of dialogue between
source and destination applications / closest to the end user
▪ What message type is used by an HTTP client to request data from a web
server? GET
▪ Which statement is true about FTP? The client can download data from
or upload data to the server.
▪ Which three protocols or standards are used at the application layer of the
TCP/IP model? (Choose three.) HTTP / MPEG / GIF
▪ Which two tasks can be performed by a local DNS server? (Choose two.)
mapping name-to-IP addresses for internal hosts / forwarding name
resolution requests between servers
▪ Which benefit does SSH offer over Telnet for remotely managing a router?
Encryption
▪ What is one of the most effective security tools available for protecting
users from external threats? Firewalls
▪ Which three services are provided by the AAA framework? (Choose three.)
accounting / authorization / authentication
▪ What does the term vulnerability mean? a weakness that makes a target
susceptible to an attack
▪ Which two traffic types require delay sensitive delivery? (Choose two.)
voice / video
▪ A network technician suspects that a particular network connection
between two Cisco switches is having a duplex mismatch. Which
command would the technician use to see the Layer 1 and Layer 2
details of a switch port? show interfaces
▪ Where are Cisco IOS debug output messages sent by default? console
line
▪ A small company has only one router as the exit point to its ISP. Which
solution could be adopted to maintain connectivity if the router itself, or
its connection to the ISP, fails? Have a second router that is connected
to another ISP.
▪ What type of traffic would most likely have the highest priority through the
network? Voice