Anda di halaman 1dari 4

Chapter 2

1.) Which OSI layer is associated with IP Addressing?- 3


2.) Which type of addressing is found at the OSI Layer 2?(choose two)-
Physical- MAC
3.) When a server responds to a web request, what occurs next in the
encapsulation process after the web page data is formatted and separated
into TCP segments?- The server adds the source and destination IP
address to each segment header to deliver the packets to the destination.
4.) Which term describes a specific set of rules that determines the
formatting of messages and process of encapsulation used to forward
data?- Protocol
5.) Which two protocols associated with layer 4 of the OSI model?
(Choose two)- TCP- UDP
6.) Drag and drop the terms with ther corresponding definition.-
Segmentation - Dividing data streams into smaller pieces suitable for
transmission- Encapsulation - The process of adding layer-specific
information or labels necessary to transmit data.- Multiplexing -
Interleaving multiple data streams onto a shared communication channel
or network medium- Protocol - Formal rules outlining the structure and
process of network communication- PDU - Term used for a data packet
often implying a specific layer protocol
7.) Drag the networking terms on the left and drop them into their
appropriate layer on the right- Transport - Port Numbers - Sequence
Numbers - Segments- Network - Packets - Logical Addressing - IP
Address- Data Link - Physical Addressing - MAC Address - Frames
8.) Drag and drop the functional description of the OSI Layers ti
appropriate name of the layer.- Defines interfaces between application
software - Application- Standardizes the data formats between systems -
Presentation- Manages users sessions and dialogues - Session- End-to-
end message delivery aover the network - Transport- Routes packets
according to unique network address - Network- Defines procedures for
accessing the media - Data Link- Cabling, voltages, bits, and data rates -
Physical

Chapter 3
1.) Which three Layers of the OSI model make up the Application layer of
the TCP/IP model? (choose three)- Session- Presentation- Application
2.) Which protocol is used to transfer web pages from server to client?-
HTTP
3.) Refer to the exhibit. Which term applied to a data transfer in the
direction indicated by the arrow?- Upload
4.) Which protocols use authentication and encryption to secure data
travelling between client and server? choose two- HTTPS- SSH
5.) refer to the exhibit. What is the top-level domain of the URL
shown?- .com
6.) Drag each DNS resource record type on the left and drop it onto the
resource it identifies on the right.- End device adress - A- Authoritative
name server - NS- Canonical or Fully Qualified Domain name for an alias -
CNAME- Maps a domain name to a list of mail exchange servers for that
domain - MX
7.) Drag the functions on the left and drop them into the appropriate email
component on the right.- MTA - Receives mail from client - Forwards
mail between servers using SMTP- MDA - Resolves final delivery issues
- Performs actual delivery to user's mailbox- MUA - Client used to access
and read mail - Retrieves mail using POP
8.) A network administrator is troubleshooting failed access to
www.cisco.com. Typing the IP address of the web server into the browser
successfully brings up the web page. What application layer protocol is
responsible for the failure?- DNS

Chapter 4
1.) Match the TCP Port numbers with the correct protocol by dragging the
options on the left to the targets on the right- HTTP - 80- Telnet - 23- FTP
- 20- SMTP - 25
2.) Categorize the options based on whether they describe TCP or UDP-
TCP (TRANSMISSION CONTROL PROTOCOL) - Re-sends anything not
received - Reliable - Reassembles messages at destination host -
Connection-oriented- UDP (USER DATAGRAM PROTOCOL) - No flow
control - Unreliable - Connectionless - Does not reassemble incoming
messages
3.) At the transport layer, which of the following controls is used to avoud a
transmitting host overflowing the buffers of a receiving host?- Flow Control
4.) End sysyems use port numbers to select the proper application. What
is the smallest port number that can be dynamically assigned by a host
system?- 1024
5.) During data transfer, what are the main responsibilities of the receiving
host? (choose 2)- Acknowledgment- Reassembly
6.) At which layer of the TCP/IP model does TCP Operate?- Transport
7.) What determines how much data a sending station running TCP/IP can
transmit before it must receive an acknowledgment?- Window Size
8.) What is the purpose of the sequence number in the TCP header?-
Reassemble the segments into data
9.) Which acknowledgement number should be sent by the receiver
shown in the graphic?- 7
10.) What is the purpose of TCP/UDP port numbers?- Track different
conversations crossing the network at the same time
Chapter 5
1.) Which protocol provides connectionless network layer services?- IP
2.) What protocol is connectionless?- UDP
3.) Which part of a network layer address does the router use during path
determination?- The network address
4.) Which network layer device can seperate a network into different
broadcast domains?- Router
5.) What network layer problem is avoided or reduced by using consistent
end-to-end addressing?- Reduces unnecessary broadcasts
6.) What commands can be used to view a hosts routing table? (choose
2)- netstat -r- route PRINT
7.) What are the three pieces of information about a route are contained in
a routing table?- Next-Hop- Metric- Destination Network Address
8.) What kinds of problems are cause by excessive broadcasts traffic on a
network segment? (choose three)- Consumes network bandwith-
Increases overhead on network- Interrupts other host functions
9.) What are the key factors to consider when groupig hosts into a
common network?(Choose 3)- Purpose- Geographical Location-
Ownership

Chapter 6
1.) What are the differences between binary and decimal numbers? (2)-
Binary numbers are based on powers of 2 and decimal numbers are
based on powers of 10- Computers use binary numbers and people
normally use decimal numbers
2.) Examine the graphic with current configurations. Host A in the Clerical
office failed and was replaced. Although a ping to 127.0.0.1 was
successful, the replacement computer cannot access the company
network. With proxy ARP disabled on the Fa0/0 interface of the New York
router, what is the likely cause of this problem?- Subnet mask incorrectly
entered
3.) Refer to the exhibit. A network administrator is testing the configuration
on a host computer. What type of address is 127.0.0.1?- Loopback
4.) What portion of the IP address does the prefix represent?- Network
5.) Which is true regarding IP network addresses?- All host bits are sert to
0
6.) Which address type has all host bits set to 1?- Broadcast
7.) How many binary digits are in an IPv6 address?- 128 bits
8.) What is the primary reason for development of IPv6?- Expanded
addressing capabilities
9.) Refer to the exhibit. The numbers in the exhibit are part of a single
subnet. Which statements are true regarding these numbers? (Choose 3)-
They have 27 high-order bits in common.- 255.255.255.224 is an
appropriate mask for their range- 192.168.223.127 is the broadcast
address for their range
10.) Drop the options on the left to the correct target on the right-
192.168.16.192/30 - Two usable hosts per subnet- 172.27.64.98/23 - 512
Addresses per subnet- 192.168.87.21/24 - A classful network-
172.18.125.6/20 - Four bits borrowed from classful network subnets-
172.31.16.128/19 - Eight subnets from classful network.

Anda mungkin juga menyukai