Pages

Saturday, July 21, 2012

CCNA 1 Chapter 4 V4.0

1.
ccna 1 chapter 4 answers 100% 2011
ccna 1 chapter 4 answers 100% 2011
Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two.)
The local host is using three client sessions.
The local host is using web sessions to a remote server.
The local host is listening for TCP connections using public addresses.
The local host is using well-known port numbers to identify the source ports.
The local host is performing the three-way handshake with 192.168.1.101:1037.
2After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server?
13
53
80
1024
1728
3Which information is found in both the TCP and UDP header information?
sequencing
flow control
acknowledgments
source and destination
4Which is an important characteristic of UDP?
acknowledgement of data delivery
minimal delays in data delivery
high reliability of data delivery
same order data delivery
5.
ccna 1 chapter 4 answers 100% 2011
ccna 1 chapter 4 answers 100% 2011
Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result?
create a Layer 1 jam signal
reach a timeout and resend the data that needs to be acknowledged
send a RESET bit to the host
change the window size in the Layer 4 header
6.
ccna 1 chapter 4 answers 100% 2011
ccna 1 chapter 4 answers 100% 2011
Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed?
session establishment
segment retransmit
data transfer
session disconnect
7.
ccna 1 chapter 4 answers 100% 2011
ccna 1 chapter 4 answers 100% 2011
Refer to the exhibit. The initial TCP exchange of data between two hosts is shown in the exhibit. Assuming an initial sequence number of 0, what sequence number will be included in Acknowledgment 2 if Segment 6 is lost?
2
3
6
1850
3431
3475
8Why is flow control used for TCP data transfer?
to synchronize equipment speed for sent data
to synchronize and order sequence numbers so data is sent in complete numerical order
to prevent the receiver from being overwhelmed by incoming data
to synchronize window size on the server
to simplify data transfer to multiple hosts
9During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message?
The packets will not be delivered.
The packets will be retransmitted from the source.
The packets will be delivered and reassembled at the destination.
The packets will be delivered and not reassembled at the destination.
10With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications?
0 to 255
256 to 1022
0 to 1023
1024 to 2047
49153 to 65535
11Which transport layer protocol provides low overhead and would be used forapplications which do not require reliable data delivery?
TCP
IP
UDP
HTTP
DNS
12What are two features of the User Datagram Protocol (UDP)? (Choose two.)
flow control
low overhead
connectionless
connection-oriented
sequence and acknowledgements
13What mechanism is used by TCP to provide flow control as segments travel from source to destination?
sequence numbers
session establishment
window size
acknowledgments
14What is dynamically selected by the source host when forwarding data?
destination logical address
source physical address
default gateway address
source port
15Why are port numbers included in the TCP header of a segment?
to indicate the correct router interface that should be used to forward a segment
to identify which switch ports should receive or forward the segment
to determine which Layer 3 protocol should be used to encapsulate the data
to enable a receiving host to forward the data to the appropriate application
to allow the receiving host to assemble the packet in the proper order
16Which two options represent Layer 4 addressing? (Choose two.)
identifies the destination network
identifies source and destination hosts
identifies the communicating applications
identifies multiple conversations between the hosts
identifies the devices communicating over the local media
17Which three features allow TCP to reliably and accurately track the transmission of data from source to destination?
encapsulation
flow control
connectionless services
session establishment
numbering and sequencing
best effort delivery
18Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately?
application
presentation
session
transport
network
19.
ccna 1 chapter 4 answers 100% 2011
ccna 1 chapter 4 answers 100% 2011
Based on the transport layer header shown in the diagram, which of the following statements describe the established session? (Choose two.)
This is a UDP header.
**This contains a Telnet request.
This contains a TFTP data transfer.
The return packet from this remote host will have an Acknowledgement Number of 43693.
**This is a TCP header.
20Which event occurs during the transport layer three-way handshake?
The two applications exchange data.
**TCP initializes the sequence numbers for the sessions.
UDP establishes the maximum number of bytes to be sent.
The server acknowledges the bytes of data received from the client.
21.
ccna 1 chapter 4 answers 100% 2011
ccna 1 chapter 4 answers 100% 2011
Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next? 
Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.
Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1

CCNA 1 Chapter 3 V4.0


1What application layer protocol is commonly used to support for file transfersbetween a client and a server?
HTML
HTTP
FTP
Telnet
2What are two forms of application layer software? (Choose two.)
applications
dialogs
requests
services
syntax

3A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.)
centralized administration
does not require specialized software
security is easier to enforce
lower cost implementation
provides a single point of failure
4What is the purpose of resource records in DNS?
temporarily holds resolved entries
used by the server to resolve names
sent by the client to during a query
passes authentication information between the server and client
5What is the automated service that matches resource names with the required IP address?
HTTP
SSH
FQDN
DNS
Telnet
SMTP
6What three protocols operate at the Application layer of the OSI model? (Choose three.)
ARP
DNS
PPP
SMTP
POP
ICMP
7What are three properties of peer-to-peer applications? (Choose three.)
acts as both a client and server within the same communication.
requires centralized account administration.
hybrid mode includes a centralized directory of files.
can be used in client-server networks.
requires a direct physical connection between devices.
centralized authentication is required.
8Which application layer protocols correctly match a corresponding function? (Choose two.)
DNS dynamically allocates IP addresses to hosts
HTTP transfers data from a web server to a client
POP delivers email from the client to the server email server
SMTP supports file sharing
Telnet provides a virtual connection for remote access
9Which email components are used to forward mail between servers? (Choose two.)
MDA
IMAP
MTA
POP
SMTP
MUA
10As compared to SSH, what is the primary disadvantage of telnet?
not widely available
does not support encryption
consumes more network bandwidth
does not support authentication
11Which statements are correct concerning the role of the MTA in handling email? (Choose three.)
routes email to the MDA on other servers
receives email from the client’s MUA
receives email via the POP3 protocol
passes email to the MDA for final delivery
uses SMTP to route email between servers
delivers email to clients via the POP3 protocol
12Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)
ASP
FTP
HTML
HTTP
HTTPS
IP
13A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type? (Choose two.)
User accounts are centralized.
Security is difficult to enforce.
Specialized operating system software is required.
File permissions are controlled by a single computer.
A computer that responds to a file sharing request is functioning as a server.
14Which layer of the OSI model supplies services that allow user to interface with the network?
physical
session
network
presentation
application
transport
15.
ccna 1 chapter 3 answers 100%
ccna 1 chapter 3 answers 100%
Refer to the exhibit. What is the destination port for the communication that is represented on line 5?
80
1261
15533
3912
65520
16. What are two characteristics of peer-to-peer networks? (Choose two.)
scalable
one way data flow
decentralized resources
centralized user accounts
resource sharing without a dedicated server
17What application layer protocol describes the services that are used for file sharing in Microsoft networks?
DHCP
DNS
SMB
SMTP
Telnet
18What are two characteristics of clients in data networks? (Choose two.)
use daemons
initiate data exchanges
are repositories of data
may upload data to servers
listen for requests from servers
19What is the role of the OSI application layer?
provides segmentation of data
provides encryption and conversion of data
provides the interface between the applications on either end of the network
provides control of all the data flowing between the source and destination devices
20How does the application layer on a server usually process multiple clientrequest for services?
ceases all connections to the service
denies multiple connections to a single daemon
suspends the current connection to allow the new connection
uses support from lower layer functions to distinguish between connections to the service

CCNA 1 Chapter 2 V4.0


1Which statements correctly identify the role of intermediary devices in the network? (Choose three.)
determine pathways for data
initiate data communications
retime and retransmit data signals
originate the flow of data
manage data flows
final termination point for data flow
2Select the statements that are correct concerning network protocols. (Choose three.)
define the structure of layer specific PDU’s 
dictate how to accomplish layer functions
outline the functions necessary for communications between layers 
limit the need for hardware compatibility
require layer dependent encapsulations 
eliminate standardization among vendors
3What are two functions of encapsulation? (Choose two.)
tracks delay between end devices
enables consistent network paths for communication
allows modification of the original data before transmission
identifies pieces of data as part of the same communication 
ensures that data pieces can be directed to the correct receiving end device

4What is a primary function of the trailer information added by the data link layer encapsulation?
supports error detection 
ensures ordered arrival of data
provides delivery to correct destination
identifies the devices on the local network
assists intermediary devices with processing and path selection
5Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.)
Network
Transport
Physical 
Data Link
Session
6What is a PDU?
corruption of a frame during transmission
data reassembled at the destination
retransmitted packets due to lost communication
a layer specific encapsulation
7Which characteristic correctly refers to end devices in a network?
manage data flows
originate data flow 
retime and retransmit data signals
determine pathways for data
8.
ccna 1 chapter 2
ccna 1 chapter 2
Refer to the exhibit. “Cell A” at IP address 10.0.0.34 has established an IP session with “IP Phone 1″ at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function of wireless device “Cell A?”
the destination device
an end device
an intermediate device
a media device
9.
ccna 2 chapter 2
ccna 1 chapter 2
Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown? (Choose three.)
Network A — WAN
Network B — WAN
Network C — LAN
Network B — MAN
Network C — WAN
Network A – LAN
10Which three statements best describe a Local Area Network (LAN)? (Choose three.)
A LAN is usually in a single geographical area.
The network is administered by a single organization.
The connection between segments in the LAN is usually through a leased connection.
The security and access control of the network are controlled by a service provider.
A LAN provides network services and access to applications for users within a common organization.
Each end of the network is generally connected to a Telecommunication Service Provider(TSP).
11.
ccna 2 chapter 2
ccna 1 chapter 2
Refer to the exhibit. Which networking term describes the data interleaving process represented in the graphic?
piping
PDU
streaming
multiplexing
encapsulation
12What is the primary purpose of Layer 4 port assignment?
to identify devices on the local media
to identify the hops between source and destination
to identify to the intermediary devices the best path through the network
to identify the source and destination end devices that are communicating
to identify the processes or services that are communicating within the end devices
13What device is considered an intermediary device?
file server
IP phone
laptop
printer
switch
14.
ccna 2 chapter 2
ccna 1 chapter 2
Refer to the exhibit. Which term correctly identifies the device type that is included in the area B?
source
end
transfer
intermediary
15.
ccna 1 chapter 2
ccna 1 chapter 2
Refer to the exhibit. What type of network is shown?
WAN
MAN
LAN
WLAN
16Which layer encapsulates the segment into packets?
physical
data link
network
transport
17What can be identified by examining the network layer header?
the destination device on the local media
the destination host address
the bits that will be transferred over the media
the source application or process creating the data
18.
ccna 1 chapter 2
ccna 1 chapter 2
Refer to the exhibit. Which set of devices contains only end devices?
A, C, D
B, E, G, H
C, D, G, H, I, J
D, E, F, H, I, J
E, F, H, I, J
19During the encapsulation process, what occurs at the data link layer?
No address is added.
The logical address is added.
The physical address is added.
The process port number is added.
20What is the purpose of the TCP/IP Network Access layer?
path determination and packet switching
data presentation
reliability, flow control, and error detection
network media control
the division of segments into packets
21What is the proper order of the layers of the OSI model from the highest layer to the lowest layer?
physical, network, application, data link, presentation, session, transport
application, physical, session, transport, network, data link, presentation
application, presentation, physical, session, data link, transport, network
application, presentation, session, transport, network, data link, physical
presentation, data link, session, transport, network, physical, application

CCNA 1 Chapter 1 V4.0



1Which of the following descriptions are true regarding the management connections on a Cisco router? (Choose three.)
They are non-network connections.
They are used to connect the router to the rest of the production network.
They are synchronous serial ports.
They are used for initial router configuration.
They are asynchronous serial ports.
They are accessed using their assigned IP address.
2The console port can be used for which of the following? (Choose three.)
debugging.
password recovery.
routing data between networks.
troubleshooting.
connecting one router to another.
3Which of the following describes the function of a WAN?
connects peripherals in a single location.
connects multiple networks in a single building.
provides connectivity on a LAN.
provides connectivity over a large geographic area.

4An internetwork must include which of the following? (Choose three.)
switching.
static addressing.
IETF standardization.
dynamic or static routing. 
consistent end-to-end addressing.
5ABC Company just purchased three new routers to start their company network. Which items are needed to establish a terminal session between a PC and the router for the initial configuration? (Choose three.) 
straight-through cable. 
terminal emulation software. 
rollover cable. 
RJ-45 to DB-9 connector.
V.35 cable.
6. Terminal emulation software, such as HyperTerminal, can be used to configure a router. Which of the following HyperTerminal options shown in the graphic are correctly set to allow configuration of a Cisco router? (Choose three.) 
bits per second.
data bits. 
parity. 
stop bits.
flow control.
7Which of the following devices are used in the construction of a WAN? (Choose three.) 
hubs.
routers. 
communication servers. 
transceivers.
modems. 
multi-port repeaters.
8Which of the following are functions of RAM? (Choose three.) 
contains startup configuration file.
stores routing table. 
holds fast switching cache. 
retains contents when power is removed.
stores running configuration file.
9Why is a console connection to a router or switch preferred when troubleshooting? (Choose two.) 
can be accessed remotely. 
does not depend on network services. 
displays startup and error messages by default.
does not require special components.
ccna answers ccna final ccna exploration
10Which basic components do a router and a standard desktop PC have in common? (Choose three.) 
CPU.
hard drive.
input/output interfaces.
keyboard.
monitor.
system bus.
11During the initial configuration of a 2600 series Cisco router, which cable is required for connecting a PC to the console port? 
twisted.
crossover.
rollover.
straight.
12A router is composed of many internal components. Which of the following components stores a copy of the router’s configuration file?
metal-oxide memory.
read only memory.
flash memory.
non-volatile random access memory.
13What contains the instructions that a router uses to control the flow of traffic through its interfaces?
packet configuration.
configuration files.
flash memory.
internal components.
14Several Ethernet hosts on a LAN need the gateway services of a Cisco 2500 series router. Which of the following would be needed to physically connect a router to all of the hosts on the LAN? (Choose two.) 
a crossover cable between the transceiver on a router and a switch.
a crossover cables between a switch and hosts on a LAN.
a straight-through cable between the auxiliary port on a router and a switch.
a rollover cable between the console port on a router and a switch.
straight-through cables between a switch and hosts on a LAN.
a straight-through cable between the transceiver on a router and a switch.
15Which router component holds the configuration file when power is lost? 
volatile random access memory.
read only memory.
non-volatile random access memory.
flash memory.
16Which of the following layers of the OSI model are incorporated in WAN standards? (Choose two.)
physical layer.
application layer.
transport layer.
data link layer.
session layer.
17Which of the following are true regarding router interfaces? (Choose three.) 
provide temporary memory for the router configuration files.
connect the router to the network for packet entry and exit.
can be on the motherboard or a separate module.
hold the IOS image.
connect the router to LANs and WANs.
18Which of the following tasks can be accomplished through a management connection on a router? (Choose three.) 
troubleshooting problems.
monitoring the system. 
capturing LAN data packets.
configuring the router. 
routing data packets.
19What do routers use to select the best path for outgoing data packets? 
ARP tables.
bridging tables.
routing tables. 
switching tables.
20Which of the following are functions of NVRAM? (Choose two.) 
stores the routing table.
retains contents when power is removed. 
stores the startup configuration file. 
contains the running configuration file.
stores the ARP table.
21Select the statements that correctly describe flash memory in a 2600 series router? (Choose two.) 
holds the startup configuration by default.
can be upgraded with single in-line memory modules. 
stores Cisco IOS software images. 
stores routing table information by default.
maintains the only copy of an IOS image after the router is booter.
21. Which WAN technology allows telecommunication companies to offer enterprises services such as storage networking, secure Layer 2 and Layer 3 VPNs, and disaster recovery on public networks?DSL
ATM
ISDN
metro Ethernet
22 .What three technologies are associated with ISDN PRI? (Choose three.)
DLCI
circuit switching
packet switching
data bearer channels
switched virtual circuits
time division multiplexing

23. What can cause a reduction in available bandwidth on a cable broadband connection?smaller cells
number of subscribers
committed information rate
distance from the central office of the provider
24.At which two layers of the OSI model does a WAN operate? (Choose two.)Physical Layer
Data Link Layer
Network Layer
Transport Layer
Presentation Layer
Application Layer
25 .Which device is used to establish the communications link between the customer equipment and the local loop for digital lines?
terminal adapter
modem
CSU/DSU
PBX switch
ISDN switch
Frame Relay Switch
26.Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits?ATM
ISDN
Frame Relay
metro Ethernet
27.Which two devices are commonly used as data communications equipment? (Choose two.)modem
router
CSU/DSU
ISDN switch
Ethernet switch
28.Which switching type will allow the communication devices in the provider's network to be shared and only allocated to an individual subscriber during data transfer?circuit-switched
packet-switched
frame-switched
dedicated-switched lines
lease-switched
29.Virtual private networks (VPNs) use what type of connection from the remote site to the private network?
PVCs
DLCIs
tunnels
virtual circuits
dedicated Layer 2 links
30.Refer to the exhibit. The users in the branch office initiated three simultaneous calls to the HQ office. Which technology is used to ensure that a fixed-capacity connection is made available to each of the calls?time-division multiplexing (TDM)
signaling
X.25
ISDN BRI

31. A U.S. company requires a WAN connection used only to transfer sales data from individual stores to the home office. All transfers will occur after business hours. The required bandwidth for this connection is estimated to be less than 38 kbps. Which type of connection requires the least investment for this company?ATM
ISDN
analog dialup
T1 Leased Line

32.Which three WAN devices can be found in the cloud? (Choose three.)

Ethernet switches
Frame Relay switches
ATM switches
bridges
core routers
repeaters

33.Which term describes a device that will put data on the local loop?DLCI
CO
DCE
DTE
PRI
BRI
34.Which packet-switched WAN technology offers high-bandwidth connectivity capable of managing data, and video all on the same infrastructure?Time Division Multiplexing (TDM)
metro Ethernet
Integrated Services Digital Network (ISDN)
Public Switched Telephone Network (PSTN)
35.What are two advantages of an analog PSTN WAN connection? (Choose two.)low cost
availability
traffic encryption
available bandwidth
support for voice and video

36.Which three features are identified with Frame Relay connections? (Choose three.)CIR
DLCI
DSLAM
PVC
SPID
53-byte cells

37.Which networking device is typically used to concentrate the dial-in and dial-out traffic of multiple users and from a network?core router
access server
Frame Relay switch
ATM switch

38.What are three advantages of permanent dedicated circuits over shared lines such as Frame-Relay? (Choose three.)dedicated bandwidth capacity
eliminates latency and jitter between endpoints
low cost of implementation
connections can be multiplexed over the same leased line
each endpoint has a dedicated physical router interface
eliminates point-to-point connections

39.A company needs a WAN connection that is capable of transferring voice, video, and data at a minimum rate of 155 Mbps. Which WAN connection is the best choice?X.25
DSL
ATM
ISDN BRI
ISDN PRI