Free Essay

Ccna Ch 4

In: Computers and Technology

Submitted By wontblast
Words 973
Pages 4
CCNA 1 Chapter 4 V4.0 Answers
Posted in CCNA 1 - Network Fundamentals (V4.0) - 5 March 2010 - 1 comment - 188,626 views

1 Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.)

The local host is using three client sessions.

The local host is using web sessions to a remote server.

The local host is listening for TCP connections using public addresses.

The local host is using well-known port numbers to identify the source ports.

The local host is performing the three-way handshake with 192.168.1.101:1037.

2. After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server?

13

53

80

1024

1728

3. Which information is found in both the TCP and UDP header information?

sequencing

flow control

acknowledgments

source and destination

4. Which is an important characteristic of UDP?

acknowledgement of data delivery

minimal delays in data delivery

high reliability of data delivery

same order data delivery

5. Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result?

create a Layer 1 jam signal

reach a timeout and resend the data that needs to be acknowledged

send a RESET bit to the host

change the window size in the Layer 4 header

6.

Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed?

session establishment

segment retransmit

data transfer

session disconnect

7. Refer to the exhibit. The initial TCP exchange of data between two hosts is shown in the exhibit. Assuming an initial sequence number of 0, what sequence number will be included in Acknowledgment 2 if Segment 6 is lost?

2

3

6

1850

3431

3475

8. Why is flow control used for TCP data transfer?

to synchronize equipment speed for sent data

to synchronize and order sequence numbers so data is sent in complete numerical order

to prevent the receiver from being overwhelmed by incoming data

to synchronize window size on the server

to simplify data transfer to multiple hosts

9. During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message?

The packets will not be delivered.

The packets will be retransmitted from the source.

The packets will be delivered and reassembled at the destination.

The packets will be delivered and not reassembled at the destination.

10. With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications?

0 to 255

256 to 1022

0 to 1023

1024 to 2047

49153 to 65535

11. Which transport layer protocol provides low overhead and would be used for applications which do not require reliable data delivery?

TCP

IP

UDP

HTTP

DNS

12. What are two features of the User Datagram Protocol (UDP)? (Choose two.)

flow control

low overhead

connectionless

connection-oriented

sequence and acknowledgements

13. What mechanism is used by TCP to provide flow control as segments travel from source to destination?

sequence numbers

session establishment

window size

acknowledgments

14. What is dynamically selected by the source host when forwarding data?

destination logical address

source physical address

default gateway address

source port

15. Why are port numbers included in the TCP header of a segment?

to indicate the correct router interface that should be used to forward a segment

to identify which switch ports should receive or forward the segment

to determine which Layer 3 protocol should be used to encapsulate the data

to enable a receiving host to forward the data to the appropriate application

to allow the receiving host to assemble the packet in the proper order

16. Which two options represent Layer 4 addressing? (Choose two.)

identifies the destination network

identifies source and destination hosts

identifies the communicating applications

identifies multiple conversations between the hosts

identifies the devices communicating over the local media

17. Which three features allow TCP to reliably and accurately track the transmission of data from source to destination?

encapsulation

flow control

connectionless services

session establishment

numbering and sequencing

best effort delivery

18. Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately?

application

presentation

session

transport

network

19.

Based on the transport layer header shown in the diagram, which of the following statements describe the established session? (Choose two.)

This is a UDP header.

**This contains a Telnet request.

This contains a TFTP data transfer.

The return packet from this remote host will have an Acknowledgement Number of 43693.

**This is a TCP header.

20. Which event occurs during the transport layer three-way handshake?

The two applications exchange data.

**TCP initializes the sequence numbers for the sessions.

UDP establishes the maximum number of bytes to be sent.

The server acknowledges the bytes of data received from the client.

21. Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?
Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.

Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.

Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.

Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.

Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.

Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.

Similar Documents

Premium Essay

English 310

...telecommunications; asynchronous and synchronous protocols; codes; case studies of current commercial applications; distributed processing; carriers, services and regulatory agencies; standards; error management; reliability; design and tuning of networks; security. Prerequisites: CIS 370 Textbooks and Other Materials Required: Business Data Communications and Networking, Eleventh Edition, by J. FitzGerald and A. Dennis (ISBN: 978-1118-086834) Recommended: Network Fundamentals, CCNA Exploration Companion Guide, 1st edition, by Mark Dye, Rick McDonald, Antoon Rufi, Publisher: Cisco Press. ISBN-10: 1-58713-208-7; ISBN-13: 978-1-58713-208-7; Published: Oct 29, 2007. Network Fundamentals, CCNA Exploration Labs and Study Guide, 1st edition, by Antoon Rufi, Priscilla Oppenheimer, Belle Woodward, Gerlinde Brady. Publisher: Cisco Press. ISBN-10: 1-58713-203-6; ISBN-13: 978-1-58713-203-2; Published: Jan 18, 2008 Supplemental Materials: CCNA Exploration Course Materials, provided online. Each student is expected to have access to the Internet. Student Learning Objectives This course provides the basic knowledge and preparation for a network administrator position. The successful student will be able to: • Explain the purpose for the OSI model and the main functions of each year. • Describe the TCP/IP...

Words: 1655 - Pages: 7

Free Essay

Using Ios Cli with Switch Mac Address Tables

...C-B Interface G0/1 G VLAN 1 V VLAN 1 V NIC N NIC N IP Ad ddress 192.168 8.1.1 192.168 8.1.11 192.168 8.1.12 192.168 8.1.3 192.168 8.1.2 Subnet Mas sk 25 55.255.255.0 0 25 55.255.255.0 0 25 55.255.255.0 0 25 55.255.255.0 0 25 55.255.255.0 0 Default Gateway N/A 192.168.1.1 192.168.1.1 192.168.1.1 192.168.1.1 O Objectives Part 1: Bu and Con uild nfigure the Network   Cable the network according to the topology diagram. e Config gure the netw work devices according to the Addressin Table. a t ng Part 2: Ex xamine the Switch MAC Address Tab S A ble  the Use show commands to observ the proces of building t switch MA address ta s ve ss AC able. B Backgroun / Scenar nd rio The purpo of a Layer 2 LAN switc is to deliver Ethernet fra ose ch ames to host d devices on th local netwo The he ork. switch rec cords host MA addresses that are visible on the ne twork, and m AC s maps those MA addresses to its AC s own Ethernet switch po orts. This proc cess is called building the MAC address table. When a switch rec d n ceives a m amines the fra ame’s source and destinat tion MAC add dresses. The s source MAC address frame from a PC, it exa © 2013 Cisco and its affiliates. All rights reserve This docume is Cisco Publiic. d/or ed. ent Page 1 of 5 Lab - Using IOS CLI with Switch MAC Address Tables is recorded and mapped to the switch port from which it arrived. Then the destination MAC address is looked up in the MAC address table. If the destination MAC address is a known address...

Words: 1819 - Pages: 8

Premium Essay

Testing

...Certifications: A+ ACE Associate Project Manager CAPM Certification CBAP" - Certified Business Analysis Professional CCCI - Certified Computer Crime Investigator CCE - Certified Computer Examiner CCFT - Certified Computer Forensic Technician CCSA/CCSE Check Point CEECS - Certified Electronic Evidence Collection Specialist CEH - Certified Ethical Hacker CEIC - Computer and Enterprise Investigations Conference CFCE - Certified Forensic Computer Examiner CFE - Certified Fraud Examiner CFIA - Certified Forensic Investigation Analyst CHFI - Certified Hacking Forensic Investigator CIFI - Certified International Information Systems Forensic Investigator CISA - Certified Information Systems Auditor CISM - Certified Information Security Manager CISSP - Certified Information Systems Security Professional CISSP-ISSAP - Information Systems Security Architecture Professional CISSP-ISSEP - Information Systems Security Engineering Professional CISSP-ISSMP - Information Systems Security Management Professional CIW - Certified Internet Webmaster CNA - Certified Novell 5 Administrator CNE - Certified Netware Engineer CNSS 4013 Recognition CPE - Certified PGP Engineer - PGP Corporation CSA - Certified Security Analyst CSE - Certified Steganography Examiner CSFA - CyberSecurity Forensic Analyst CSICI - CyberSecurity Institute Certified Instructor CSIH - Certified Computer Security Incident Handler CSTA - Certified Security Testing Associate CSTP - Certified Security...

Words: 1957 - Pages: 8

Free Essay

Traffic Modeling

...Cisco Unified Presence Deployment Guide Release 6.0(1) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Customer Order Number: Text Part Number: OL-12732-02 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS...

Words: 13683 - Pages: 55

Premium Essay

Forensic Evidence in It

...U.S. Department of Justice Office of Justice Programs National Institute of Justice APR. 04 Special REPORT Forensic Examination of Digital Evidence: A Guide for Law Enforcement U.S. Department of Justice Office of Justice Programs 810 Seventh Street N.W. Washington, DC 20531 John Ashcroft Attorney General Deborah J. Daniels Assistant Attorney General Sarah V. Hart Director, National Institute of Justice This and other publications and products of the U.S. Department of Justice, Office of Justice Programs, National Institute of Justice can be found on the World Wide Web at the following site: Office of Justice Programs National Institute of Justice http://www.ojp.usdoj.gov/nij APR. 04 Forensic Examination of Digital Evidence: A Guide for Law Enforcement NCJ 199408 Sarah V. Hart Director This document is not intended to create, does not create, and may not be relied upon to create any rights, substantive or procedural, enforceable at law by any party in any matter civil or criminal. Opinions or points of view expressed in this document represent a consensus of the authors and do not represent the official position or policies of the U.S. Department of Justice. The products, manufacturers, and organizations discussed in this document are presented for informational purposes only and do not constitute product approval or endorsement by the U.S. Department of Justice. This document was prepared under Interagency Agreement #1999–IJ–R–094 between...

Words: 22743 - Pages: 91

Free Essay

Dr Manger

...Organizational Theory, Design, and Change Jones 6th Edition Test Bank Click here to download the solutions manual / test bank INSTANTLY!!! http://solutionsmanualtestbanks.blogspot.com/2011/10/organizational-theory-d esign-and-change_18.html ----------------------------------------------------------------------Organizational Organizational Organizational Organizational Theory, Theory, Theory, Theory, Design, Design, Design, Design, and and and and Change Change Change Change Jones Jones Jones Jones 6th 6th 6th 6th Edition Edition Edition Edition Test Test Test Test Bank Bank Bank Bank -------------------------------------------------------------------------***THIS IS NOT THE ACTUAL BOOK. YOU ARE BUYING the Test Bank in e-version of the following book*** Name: Organizational Theory, Design, and Change Author: Jones Edition: 6th ISBN-10: 0136087310 Type: Test Bank - The test bank is what most professors use an a reference when making exams for their students, which means there’s a very high chance that you will see a very similar, if not exact the exact, question in the test! - The file is either in .doc, .pdf, excel, or zipped in the package and can easily be read on PCs and Macs. - Delivery is INSTANT. You can download the files IMMEDIATELY once payment is done. If you have any questions, please feel free to contact us. Our response is the fastest. All questions will always be answered in 6 hours. This is the quality of service we are providing and we hope to be your...

Words: 29834 - Pages: 120