0% found this document useful (0 votes)
8 views6 pages

Module 14 15

The document contains a series of questions and answers related to networking concepts, specifically focusing on the OSI and TCP/IP models, transport layer functions, and various protocols. It addresses topics such as the roles of different layers, the functionality of protocols like DHCP, HTTP, and SMB, and characteristics of UDP and TCP. The content serves as a study guide for understanding key networking principles and protocols.

Uploaded by

nhatdz2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views6 pages

Module 14 15

The document contains a series of questions and answers related to networking concepts, specifically focusing on the OSI and TCP/IP models, transport layer functions, and various protocols. It addresses topics such as the roles of different layers, the functionality of protocols like DHCP, HTTP, and SMB, and characteristics of UDP and TCP. The content serves as a study guide for understanding key networking principles and protocols.

Uploaded by

nhatdz2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

1Which three layers of the OSI model provide similar network services to those

provided by the application layer of the TCP/IP model? (Choose three.)


 application layer
 session layer
 transport layer
 presentation layer
 physical layer
 data link layer
2Which scenario describes a function provided by the transport layer?
 A student has two web browser windows open in order to access two web sites. The transport layer ensures
the correct web page is delivered to the correct browser window.
 A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a
transport layer address used to contact another network device on the same network.
 A student is playing a short web-based movie with sound. The movie and sound are encoded within the
transport layer header.
 A corporate worker is accessing a web server located on a corporate network. The transport layer formats
the screen so the web page appears properly no matter what device is being used to view the web site.
3Which protocol is used by a client to communicate securely with a web server?
 SMTP
 SMB
 IMAP
 HTTPS
4Which three protocols operate at the application layer of the TCP/IP model? (Choose
three.)
 UDP
 ARP
 POP3
 FTP
 DHCP
 TCP
5What do the client/server and peer-to-peer network models have in common?
 Both models require the use of TCP/IP-based protocols.
 Both models are used only in the wired network environment.
 Both models have dedicated servers.
 Both models support devices in server and client roles.
6What is the func on of the HTTP GET message?

 to upload content to a web server from a web client


 to retrieve client email from an email server using TCP port 110
 to send error information from a web server to a web client
 to request an HTML page from a web server
 Navigation Bar

7Which three statements describe a DHCP Discover message? (Choose three.)


 All hosts receive the message, but only a DHCP server replies.
 Only the DHCP server receives the message.
 The message comes from a client seeking an IP address.
 The destination IP address is 255.255.255.255.
 The message comes from a server offering an IP address.
 The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF).
8Which layer in the TCP/IP model is used for forma ng, compressing, and encryp ng
data?

 internetwork
 network access
 application
 session
 presentation
 Navigation Bar

9What is true about the Server Message Block protocol?

 Different SMB message types have a different format.


 SMB uses the FTP protocol for communication.
 Clients establish a long term connection to servers.
 SMB messages cannot authenticate a session.
 Navigation Bar

10In what networking model would eDonkey, eMule, BitTorrent, Bitcoin, and
LionShare be used?
 client-based
 point-to-point
 peer-to-peer
 master-slave
11Which applica ons or services allow hosts to act as client and server at the same
me?

 email applications
 client/server applications
 authentication services
 P2P applications
 Navigation Bar

12Which OSI layer provides the interface between the applications used to
communicate and the underlying network over which messages are transmitted?
 session
 presentation
 transport
 application
3Which networking model is being used when an author uploads one chapter
document to a file server of a book publisher?
 client/server
 point-to-point
 peer-to-peer
 primary-secondary
14What is an advantage of SMB over FTP?
 SMB is more reliable than FTP because SMB uses TCP and FTP uses UDP.
 Only with SMB can data transfers occur in both directions.
 SMB clients can establish a long-term connection to the server.
 Only SMB establishes two simultaneous connections with the client, making the data transfer faster.
15Which applica on layer protocol uses message types such as GET, PUT, and POST?

 HTTP
 DNS
 SMTP
 DHCP
 POP3
 Navigation Bar

16Which two protocols may devices use in the application process that sends email?
(Choose two.)
 HTTP
 POP3
 IMAP
 DNS
 SMTP
 POP
18A client creates a packet to send to a server. The client is requesting TFTP service.
What number will be used as the destination port number in the sending packet?
 53
 80
 67
 69
9Which three statements characterize UDP? (Choose three.)
 UDP provides connection-oriented, fast transport of data at Layer 3.
 UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.
 UDP relies on IP for error detection and recovery.
 UDP relies on application layer protocols for error detection.
 UDP provides basic connectionless transport layer functions.
 UDP provides sophisticated flow control mechanisms.
17A PC that is communicating with a web server has a TCP window size of 6,000
bytes when sending data and a packet size of 1,500 bytes. Which byte of information
will the web server acknowledge after it has received four packets of data from the
PC?
 3000
 1500
 3001
 6001

20A PC is downloading a large file from a server. The TCP window is 1000 bytes.
The server is sending the file using 100-byte segments. How many segments will the
server send before it requires an acknowledgment from the PC?
 1 segment
 10 segments
 1000 segments
 100 segments
21What does a client do when it has UDP datagrams to send?

 It queries the server to see if it is ready to receive data.


 It sends to the server a segment with the SYN flag set to synchronize the conversation.
 It sends a simplified three-way handshake to the server.
 It just sends the datagrams.
22Which two fields are included in the TCP header but not in the UDP header?
(Choose two.)
 source port
 window
 destination port
 sequence number
 checksum
23What are two roles of the transport layer in data communication on a network?
(Choose two.)
 tracking the individual communication between applications on the source and destination hosts
 performing a cyclic redundancy check on the frame for errors
 providing the interface between applications and the underlying network over which messages are
transmitted
 identifying the proper application for each communication stream
 providing frame delimiting to identify bits making up a frame
24What is a characteris c of UDP?

 Applications that use UDP are always considered unreliable.


 UDP reassembles the received datagrams in the order they were received.
 UDP datagrams take the same path and arrive in the correct order at the destination.
 UDP only passes data to the network when the destination is ready to receive the data.
 Navigation Bar

25Which factor determines TCP window size?


 the amount of data the destination can process at one time
 the amount of data the source is capable of sending at one time
 the number of services included in the TCP segment
 the amount of data to be transmitted
26Which flag in the TCP header is used in response to a received FIN in order to
terminate connectivity between two network devices?
 RST
 SYN
 FIN
 ACK
27What information is used by TCP to reassemble and reorder received segments?
 port numbers
 sequence numbers
 fragment numbers
 acknowledgment numbers
28Which protocol or service uses UDP for a client-to-server communication and TCP
for server-to-server communication?
 DNS
 SMTP
 HTTP
 FTP
29Which two characteristics are associated with UDP sessions? (Choose two.)
 Unacknowledged data packets are retransmitted.
 Destination devices reassemble messages and pass them to an application.
 Received data is unacknowledged.
 Destination devices receive traffic with minimal delay.
 Transmitted data segments are tracked.
30In what two situations would UDP be better than TCP as the preferred transport
protocol? (Choose two.)
 when a faster delivery mechanism is needed
 when delivery overhead is not an issue
 when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated
 when destination port numbers are dynamic
 when applications do not need to guarantee delivery of the data
31Which field in the TCP header indicates the status of the three-way handshake
process?
 checksum
 window
 reserved
 control bits
32What are three responsibilities of the transport layer? (Choose three.)
 identifying the applications and services on the client and server that should handle transmitted data
 meeting the reliability requirements of applications, if any
 formatting data into a compatible form for receipt by the destination devices
 multiplexing multiple communication streams from many users or applications on the same network
 directing packets towards the destination network
 conducting error detection of the contents in frames

You might also like