280 likes | 435 Views
CCNA 1 v3.1. Module 11 Review. At which layer of the TCP/IP model does Telnet operate?. application. What are two protocols that can be used to transfer files between systems?. FTP TFTP. Which of the following SNMP components would a router be considered?. secure ports agents
E N D
CCNA 1 v3.1 Module 11 Review
At which layer of the TCP/IP model does Telnet operate? • application
What are two protocols that can be used to transfer files between systems? • FTP • TFTP
Which of the following SNMP components would a router be considered? • secure ports • agents • network management system • managed devices • secure ports • agents • network management system • managed devices
What SNMP component is responsible for using the majority of memory resources? • network management system
What protocol is used by e-mail servers to communicate with each other? • SMTP
Which of the following are components of SNMP? (Choose three.) • protocol inspector • secure ports • agents • protocol analyzer • network management system • managed devices • protocol inspector • secure ports • agents • protocol analyzer • network management system • managed devices
Which type of institution does the domain suffix .org represent? • non-profit
Which protocol is used by FTP to transfer files over the Internet? • TCP
What service is used to translate a web address into an IP address? • DNS
Which TCP/IP layer is responsible for dialog control? • application
What does TCP use to begin the three-way handshaking process? • The sending host sends a SYN segment.
What are two protocols that use TCP? • HTTP • FTP
Which of the following protocols operate at the application layer of the OSI model? (Choose two.) • UDP • HTTP • TCP • FTP • UDP • HTTP • TCP • FTP
What are three features of the User Datagram Protocol (UDP)? • no guaranteed delivery of datagrams • reliability provided by the application layer • connectionless
What protocol can be used to load or retrieve Cisco IOS images to or from a router? • TFTP
Which acknowledgement number should be sent by the receiver shown in the graphic? • 3 • 4 • 6 • 7 • 9 • 12 • 3 • 4 • 6 • 7 • 9 • 12
Which of the following describes the operation of TCP window size? • Window size increases as all data transfers. • Window size is the TCP process used prepare data for transmission. • Window size is decreased if packets are lost. • Window size of 15 means that the next byte expected is byte number 15. • Window size increases as all data transfers. • Window size is the TCP process used prepare data for transmission. • Window size is decreased if packets are lost. • Window size of 15 means that the next byte expected is byte number 15.
Which of the following characteristics of TCP is provided by windowing? • connectionless data transport • flow control • well-known ports • best-effort delivery • connectionless data transport • flow control • well-known ports • best-effort delivery
End systems use port numbers to select the proper application. What is the smallest port number that can be dynamically assigned by a host system? • 1024
What 2 port numbers are commonly assigned for FTP use? • 20 • 21
What are 3 features that allow TCP to reliably and accurately transport and regulate the flow of information from source to destination? • sliding windows • sequencing numbers • acknowledgments
TCP/IP connection-oriented sessions begin with a three-way handshake. What are 3 terms that describe the handshake process? • acknowledge • synchronize • negotiate
During data transfer, what are two main responsibilities of the receiving host? • acknowledgment • reassembly
What is the purpose of TCP/UDP port numbers? • track different conversations crossing the network at the same time
Which of the following uses a connectionless protocol to transfer files? • HTTP • SNMP • TFTP • FTP • HTTP • SNMP • TFTP • FTP
Which application layer protocol allows network devices to exchange management information? • SNMP