4. What transport protocol exchanges datagrams without acknowledgments or guaranteed delivery? A. UDP B. TCP C. IRQ D. LLC

Similar documents
Transport Layer. Chapter 3.4. Think about

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

The TCP/IP Reference Model

Transport Layer Protocols

LESSON Networking Fundamentals. Understand TCP/IP

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Networking Test 4 Study Guide

Layered Architectures and Applications

Protocol Data Units and Encapsulation

The OSI and TCP/IP Models. Lesson 2

Protocols and Architecture. Protocol Architecture.

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Fundamentals of UNIX Lab Networking Commands (Estimated time: 45 min.)

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Ethernet. Ethernet. Network Devices

Network Programming TDC 561

UPPER LAYER SWITCHING

Expert Reference Series of White Papers. Basics of IP Address Subnetting

BASIC ANALYSIS OF TCP/IP NETWORKS

Data Communication Networks and Converged Networks

ΕΠΛ 674: Εργαστήριο 5 Firewalls

OSI Model. Application Presentation Session Transport Network Data Link Physical. EE156 Computer Network Architecture

Internet Concepts. What is a Network?

Lecture Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...

Lecture 23: Firewalls

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Network Layers. CSC358 - Introduction to Computer Networks

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

Linux Network Security

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

EXPLORER. TFT Filter CONFIGURATION

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Computer Networks. Chapter 5 Transport Protocols

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Network Models OSI vs. TCP/IP

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

Chapter 8 Security Pt 2

Computer Networks/DV2 Lab

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

The OSI Model and the TCP/IP Protocol Suite

Limi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, Socket Programming

TCP/IP and the Internet

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

File Sharing. Peter Lo. CP582 Peter Lo

CPS221 Lecture: Layered Network Architecture

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Internet Protocols. Background CHAPTER

Protocols. Packets. What's in an IP packet

Computer Networks CS321

Overview of TCP/IP. TCP/IP and Internet

TCP/IP Basis. OSI Model

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

Understanding Layer 2, 3, and 4 Protocols

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Unit 4. Introduction to TCP/IP. Overview. Description. Unit Table of Contents

Transport and Network Layer

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Remote login (Telnet):

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

Chapter 8 Network Security

Application. Transport. Network. Data Link. Physical. Network Layers. Goal

Basic Operation & Management of TCP/IP Networks

Technical Support Information Belkin internal use only

A PPENDIX L TCP/IP and OSI

Network Performance Evaluation. Throughput. Troy Bennett. Computer Science Department. School of Engineering. California Polytechnic State University

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Communication Networks. MAP-TELE 2011/12 José Ruela

Basic Network Configuration

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Connecting to and Setting Up a Network

Chapter 11. User Datagram Protocol (UDP)

Computer Networks - Xarxes de Computadors

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

How To Understand The Internet Of S (Netware)

File Transfer Protocol (FTP) Throughput Testing by Rachel Weiss

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

Introduction To Computer Networking

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Access Control: Firewalls (1)

524 Computer Networks

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

PART OF THE PICTURE: The TCP/IP Communications Architecture

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Transcription:

CCNA1 V3.0 Mod 11 (Ch 9) 1. When conversing with an individual whose primary language is different than yours, you might need to repeat your words and speak more slowly. Repeating your words can be compared to, and the need to speak slowly can be compared to the functions of the transport layer. A. Reliability; flow control B. Flow control; reliability C. Transport; acknowledgment D. Flow control; transport 2. The following characteristics describe what TCP/IP protocol: connection oriented; resends anything not received; divides outgoing messages into segments. A. IPX C. UDP D. SPS 3. What does the window field in a TCP segment indicate? A. Number of 32-bit words in the header B. Number of the called port C. Number used to ensure correct sequencing of the arriving data D. Number of octets that the device is willing to accept 4. What transport protocol exchanges datagrams without acknowledgments or guaranteed delivery? A. UDP C. IRQ D. LLC 5. What do TCP and UDP use to keep track of different conversations crossing a network at the same time? A. Port numbers B. IP addresses C. MAC addresses D. Route numbers 6. How does TCP synchronize a connection between the source and the destination before data transmission? A. Two-way handshake B. Three-way handshake C. Fourway handshake D. Holton functions 7. Which range of port numbers is unregulated? A. Below 255 B. Between 256 and 512 C. Between 256 and 1023 D. Above 1023 8. With TCP transmission, what occurs if a segment is not acknowledged in a certain time period? A. UDP takes over the transmission. 1

B. The virtual circuit is terminated. C. Nothing happens. D. Retransmission occurs. 9. Which best describes flow control? A. A method of managing limited bandwidth B. A method of connecting two hosts synchronously C. A method of preventing buffer overrun D. A method of checking data for viruses before transmission 10. Which of the following best describes the purpose of the TCP/IP protocol stack? A. Maps closely to the OSI reference model's upper layers B. Supports all standard physical and data link protocols C. Transfers information from one host to another in a sequence of datagrams D. Reassembles datagrams into complete messages at the receiving location 11. Which of the following is one of the protocols found in the transport layer? A. UCP B. UDP C. TDP D. TDC 12. What is the purpose of port numbers? A. They keep track of different upperlayer conversations crossing the network at the same time. B. Source systems use them to keep a session organized. C. End systems use them to assign end users dynamically to a particular session, depending on their application use. D. Source systems generate them to predict destination addresses. 13. Why are TCP three-way handshake/open connections used? Select all that apply: A. To ensure that lost data can be recovered if problems occur later B. To determine how much data the receiving station can accept at one time C. To provide efficient use of bandwidth by users D. To change binary ping responses into information in the upper layers 14. What does a dynamic TCP window field do? A. It makes the window larger so that more data can come through at once, which results in more efficient use of bandwidth. B. The window size slides to each section of the datagram to receive data, which results in more efficient use of bandwidth. C. It allows the window size to be negotiated dynamically during the TCP session, which results in more efficient use of bandwidth. D. It limits the incoming data so that each segment must be sent one by one, which is an inefficient use of bandwidth. 2

15. UDP segments use what protocols to provide reliability? A. Network layer protocols B. Application layer protocols C. Internet protocols D. Transmission control protocols 16. A network redirector enables data to travel A. Only to a network print server B. Only to a network file server C. In a single direction D. None of the above 17. An example of a client/server application is A. E-mail B. A spreadsheet C. A NIC D. Hard-drive utilities 18. The client side of the client/server relationship is A. Located on the remote computer B. The requestor of services C. The most important D. Always located on the server 19. Which of the following best describes a domain name? A. It represents the numeric address of an Internet site. B. It is the same as the name you give your primary server. C. It represents the specific location where your LAN is located. D. It is an IP address used to represent a print server. 20..com is the domain typically assigned to A. Client machines B. Customers C. Network provider companies D. Corporations 21. During a Telnet connection, the remote computer is responsible for A. Nothing B. Processing C. Client-side Telnet application D. Client-side printing 22. At which three layers of the OSI model does Telnet primarily work? A. Application layer, session layer, transport layer B. Presentation layer, session layer, transport layer C. Data link layer, transport layer, presentation layer D. Application layer, presentation layer, session layer 23. Typical anonymous FTP sessions use as the login ID and as the password. A. Anonymous; the user e-mail address B. The user e-mail address; FTP C. FTP; FTP D. Guest; anonymous 3

24. Instead of working with specific application programs, redirectors work with A. Computer operating systems B. Spreadsheets C. E-mail D. Web browsers Answers 1. When conversing with an individual whose primary language is different than yours, you might need to repeat your words and speak more slowly. Repeating your words can be compared to, and the need to speak slowly can be compared to the functions of the transport layer. A. Reliability; flow control 2. The following characteristics describe what TCP/IP protocol: connection oriented; resends anything not received; divides outgoing messages into segments. 3. What does the window field in a TCP segment indicate? D. Number of octets that the device is willing to accept 4. What transport protocol exchanges datagrams without acknowledgments or guaranteed delivery? A. UDP 5. What do TCP and UDP use to keep track of different conversations crossing a network at the same time? A. Port numbers 6. How does TCP synchronize a connection between the source and the destination before data transmission? B. Three-way handshake 7. Which range of port numbers is unregulated? D. Above 1023 8. With TCP transmission, what occurs if a segment is not acknowledged in a certain time period? D. Retransmission occurs. 9. Which best describes flow control? C. A method of preventing buffer overrun 10. Which of the following best describes the purpose of the TCP/IP protocol stack? C. Transfers information from one host to another in a sequence of datagrams 11. Which of the following is one of the protocols found in the transport layer? B. UDP 4

12. What is the purpose of port numbers? A. They keep track of different upperlayer conversations crossing the network at the same time. 13. Why are TCP three-way handshake/open connections used? Select all that apply: A. To ensure that lost data can be recovered if problems occur later B. To determine how much data the receiving station can accept at one time 14. What does a dynamic TCP window field do? C. It allows the window size to be negotiated dynamically during the TCP session, which results in more efficient use of bandwidth. 15. UDP segments use what protocols to provide reliability? B. Application layer protocols 16. A network redirector enables data to travel D. None of the above 17. An example of a client/server application is A. E-mail 18. The client side of the client/server relationship is B. The requestor of services 19. Which of the following best describes a domain name? A. It represents the numeric address of an Internet site. 20..com is the domain typically assigned to D. Corporations 21. During a Telnet connection, the remote computer is responsible for B. Processing 22. At which three layers of the OSI model does Telnet primarily work? D. Application layer, presentation layer, session layer 23. Typical anonymous FTP sessions use as the login ID and as the password. A. Anonymous; the user e-mail address 24. Instead of working with specific application programs, redirectors work with A. Computer operating systems 5