Which intermediary devices could be used to implement security between networks? (Choose two.)


router
hub
switch
firewall
access point
bridge

What is a component of a routing table entry?

the MAC address of the interface of the router

the destination Layer 4 port number

the destination host address

the next-hop address

What are the key factors to consider when grouping hosts into a common network? (Choose three.)


gateways

purpose

physical addressing

software version

geographic location

ownership

When the destination network is not listed in the routing table of a Cisco router, what are two possible actions that the router might take? (Choose two.)

The router sends an ARP request to determine the required next hop address.
The router discards the packet.
The router forwards the packet toward the next hop indicated in the ARP table.
The router forwards the packet to the interface indicated by the source address.
The router forwards the packet out the interface indicated by the default route entry.

What type of routing uses information that is manually entered into the routing table?

dynamic
interior
static
standard

What is the purpose of a default gateway?

physically connects a computer to a network
provides a permanent address to a computer
identifies the network to which a computer is connected
identifies the logical address of a networked computer and uniquely identifies it to the rest of the network
identifies the device that allows local network computers to communicate with devices on other networks

If the default gateway is configured incorrectly on the host, what is the impact on communications?

The host is unable to communicate on the local network.
The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.
The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network.
There is no impact on communications.

Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?

192.135.250.1

192.31.7.1

192.133.219.0

192.133.219.1

Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?

Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?

Refer to the exhibit. Using the network in the exhibit, what would be the default gateway address for host A in the 192.133.219.0 network?

192.135.250.1
192.31.7.1
192.133.219.0
192.133.219.1

Which portion of the network layer address does a router use to forward packets?

host portion
broadcast address
network portion
gateway address

Which IP packet field will prevent endless loops?

type-of-service
identification
flags
time-to-live
header checksum

In a connectionless system, which of the following is correct?


The destination is contacted before a packet is sent.
The destination is not contacted before a packet is sent.
The destination sends an acknowledgement to the source that indicates the packet was received.
The destination sends an acknowledgement to the source that requests the next packet to be sent.

What information is added during encapsulation at OSI Layer 3?

source and destination MAC
source and destination application protocol
source and destination port number
source and destination IP address

In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another?


destination network address
source network address
source MAC address
well known port destination address

ccna exploration 1 chapter 4 exam answers

Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.)

Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.)

The local host is using three client sessions.

The local host is using web sessions to a remote server.

The local host is listening for TCP connections using public addresses.

The local host is using well-known port numbers to identify the source ports.

The local host is performing the three-way handshake with 192.168.1.101:1037.



After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server?

13
53
80
1024
1728



Which information is found in both the TCP and UDP header information?


sequencing

flow control

acknowledgments

source and destination



Which is an important characteristic of UDP?

acknowledgement of data delivery

minimal delays in data delivery

high reliability of data delivery

same order data delivery


Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result?


Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result? 

create a Layer 1 jam signal 

reach a timeout and resend the data that needs to be acknowledged 

send a RESET bit to the host 

change the window size in the Layer 4 header




Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed?

Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed?


session establishment

segment retransmit

data transfer

session disconnect


Refer to the exhibit. The initial TCP exchange of data between two hosts is shown in the exhibit. Assuming an initial sequence number of 0, what sequence number will be included in Acknowledgment 2 if Segment 6 is lost?



Refer to the exhibit. The initial TCP exchange of data between two hosts is shown in the exhibit. Assuming an initial sequence number of 0, what sequence number will be included in Acknowledgment 2 if Segment 6 is lost?


2
3
6
1850
3431
3475



Why is flow control used for TCP data transfer?


to synchronize equipment speed for sent data

to synchronize and order sequence numbers so data is sent in complete numerical order

to prevent the receiver from being overwhelmed by incoming data

to synchronize window size on the server

to simplify data transfer to multiple hosts


During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message?

The packets will not be delivered.

The packets will be retransmitted from the source.

The packets will be delivered and reassembled at the destination.

The packets will be delivered and not reassembled at the destination.



With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications?


0 to 255
256 to 1022
0 to 1023
1024 to 2047
49153 to 65535



Which transport layer protocol provides low overhead and would be used for applications which do not require reliable data delivery?

TCP

IP

UDP

HTTP

DNS



What are two features of the User Datagram Protocol (UDP)? (Choose two.)

flow control

low overhead

connectionless

connection-oriented

sequence and acknowledgements


What mechanism is used by TCP to provide flow control as segments travel from source to destination?

sequence numbers

session establishment

window size

acknowledgments


What is dynamically selected by the source host when forwarding data?

destination logical address

source physical address

default gateway address

source port


Why are port numbers included in the TCP header of a segment?

to indicate the correct router interface that should be used to forward a segment

to identify which switch ports should receive or forward the segment

to determine which Layer 3 protocol should be used to encapsulate the data

to enable a receiving host to forward the data to the appropriate application

to allow the receiving host to assemble the packet in the proper order


Which two options represent Layer 4 addressing? (Choose two.)

identifies the destination network

identifies source and destination hosts

identifies the communicating applications

identifies multiple conversations between the hosts

identifies the devices communicating over the local media



Which three features allow TCP to reliably and accurately track the transmission of data from source to destination?

encapsulation
flow control
connectionless services
session establishmentnumbering and sequencing
best effort delivery


Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately?

application
presentation
session
transport
network


Based on the transport layer header shown in the diagram, which of the following statements describe the established session? (Choose two.)

Based on the transport layer header shown in the diagram, which of the following statements describe the established session? (Choose two.)


This is a UDP header.
This contains a Telnet request.
This contains a TFTP data transfer.
The return packet from this remote host will have an Acknowledgement Number of 43693.
This is a TCP header.

Which event occurs during the transport layer three-way handshake?

The two applications exchange data.
TCP initializes the sequence numbers for the sessions.
UDP establishes the maximum number of bytes to be sent.
The server acknowledges the bytes of data received from the client.

Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?

Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?


Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.
Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1

Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next

Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next

Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?

Which event occurs during the transport layer three-way handshake?

The two applications exchange data.

TCP initializes the sequence numbers for the sessions.

UDP establishes the maximum number of bytes to be sent.

The server acknowledges the bytes of data received from the client.

Based on the transport layer header shown in the diagram, which of the following statements describe the established session? (Choose two.)

Based on the transport layer header shown in the diagram, which of the following statements describe the established session? (Choose two.)

Based on the transport layer header shown in the diagram, which of the following statements describe the established session? (Choose two.) 

Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately?


application

presentation

session

transport

network

Which three features allow TCP to reliably and accurately track the transmission of data from source to destination?


encapsulation


flow control


connectionless services


session establishment


numbering and sequencing


best effort delivery

Which two options represent Layer 4 addressing? (Choose two.)


identifies the destination network


identifies source and destination hosts


identifies the communicating applications

identifies multiple conversations between the hosts


identifies the devices communicating over the local media


ccna exploration 1 chapter 4 Exam Question And Answers 

Which two options represent Layer 4 addressing? (Choose two.)

Why are port numbers included in the TCP header of a segment?

to indicate the correct router interface that should be used to forward a segment


to identify which switch ports should receive or forward the segment


to determine which Layer 3 protocol should be used to encapsulate the data


to enable a receiving host to forward the data to the appropriate application


to allow the receiving host to assemble the packet in the proper order


 

ccna exploration 1 chapter 4 Exam Question And Answers 

Why are port numbers included in the TCP header of a segment?

What is dynamically selected by the source host when forwarding data?

destination logical address


source physical address

default gateway address

source port

What mechanism is used by TCP to provide flow control as segments travel from source to destination?

sequence numbers

session establishment

window size

acknowledgments


ccna exploration 1 chapter 4 Exam Question And Answers

What mechanism is used by TCP to provide flow control as segments travel from source to destination?

What are two features of the User Datagram Protocol (UDP)? (Choose two.)

flow control

low overhead


connectionless


connection-oriented


sequence and acknowledgements

Which transport layer protocol provides low overhead and would be used for applications which do not require reliable data delivery?


TCP

IP

UDP

HTTP

DNS

With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications?

0 to 255

256 to 1022

0 to 1023

1024 to 2047

49153 to 65535


ccna exploration 1 chapter 4 Exam Question And Answers

With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications?

During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message?


The packets will not be delivered.

The packets will be retransmitted from the source.

The packets will be delivered and reassembled at the destination.

The packets will be delivered and not reassembled at the destination.

Why is flow control used for TCP data transfer?

to synchronize equipment speed for sent data


to synchronize and order sequence numbers so data is sent in complete numerical order


to prevent the receiver from being overwhelmed by incoming data


to synchronize window size on the server


to simplify data transfer to multiple hosts

Refer to the exhibit. The initial TCP exchange of data between two hosts is shown in the exhibit. Assuming an initial sequence number of 0, what sequence number will be included in Acknowledgment 2 if Segment 6 is lost?

Refer to the exhibit. The initial TCP exchange of data between two hosts is shown in the exhibit. Assuming an initial sequence number of 0, what sequence number will be included in Acknowledgment 2 if Segment 6 is lost?

Refer to the exhibit. The initial TCP exchange of data between two hosts is shown in the exhibit. Assuming an initial sequence number of 0, what sequence number will be included in Acknowledgment 2 if Segment 6 is lost?

2


3


6


1850


3431

3475

Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed?






Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed?


session establishment

segment retransmit

data transfer

session disconnect

Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result?

Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result?





Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result?

create a Layer 1 jam signal

reach a timeout and resend the data that needs to be acknowledged

send a RESET bit to the host

change the window size in the Layer 4 header

Popular Posts