click below
click below
Normal Size Small Size show me how
F7 F8 Networking 1
Formative Assessments
| Question | Answer |
|---|---|
| What happens if part of an FTP message is not delivered to the destination? | The part of the FTP message that was lost is re-sent. |
| Which two operations are provided by TCP but not by UDP? | Acknowledging received data and retransmitting any unacknowledged data |
| Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? | VoIP and DNS |
| What is a responsibility of transport layer protocols? | Tracking individual conversations |
| Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? | SYN and ACK |
| Which number or set of numbers represents a socket? | 192.168.1.1:80 |
| What is the purpose of using a source port number in a TCP communication? | To keep track of multiple conversations between devices |
| How does a networked server manage requests from multiple clients for different services? | Each request is assigned source and destination port numbers |
| What is a socket? | The combination of a source IP address and port number or a destination IP address and port number |
| What is the complete range of TCP and UDP well-known ports? | 0 to 1023 |
| What is a well-known graphic-image format? | JPG |
| What is a well-known format for videos? | MOV |
| Which of the following is a feature of the Gnutella protocol? | Users can share whole files with other users. |
| This is a function of the OSI session layer. | Exchange of information to initiate dialog between peers |
| Formatting, or presenting, data at the source device into a compatible format for receipt by the destination device, is a function of which layer? | Presentation Layer |
| This layer of the OSI model is concerned with the protocols that exchange data between programs running on hosts. | Application |
| True or false? In a peer-to-peer network environment every peer can function as both a client and a server. | True |
| Which protocol can be used to transfer messages from an email server to an email client? | POP3 |
| Which two tasks can be performed by a local DNS server? | Providing IP addresses to local hosts and mapping name-to-IP addresses for internal hosts |
| Which three protocols or standards are used at the application layer of the TCP/IP model? | HTTP, GIF, MPEG |
| When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business? | IMAP |
| An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model? | Client |
| What part of the URL, represents the top-level DNS domain? | .com |
| Which TCP/IP model layer is closest to the end user? | Application |
| What message type is used by an HTTP client to request data from a web server? | GET |
| What are two characteristics of the application layer of the TCP/IP model? | Closest to the end user and the creation and maintenance of dialogue between source and destination applications |
| Why is DHCP preferred for use on large networks? | It is a more efficient way to manage IP addresses than static address assignment |
| Which protocol can be used to send email from a client to a mail server? | SMTP |
| Which three services are provided by the AAA framework? | authentication, authorization, accounting |
| One of the most effective security tools available for protecting users from external threats? | firewalls |
| For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task? | firewall settings |
| Which component is designed to protect against unauthorized communications to and from a computer? | firewall |
| Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked? | worm |
| Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds? | RouterA(config)# login block-for 30 attempts 2 within 10 |
| What is the purpose of the network security accounting function? | to keep track of the actions of a user |
| Which benefit does SSH offer over Telnet for remotely managing a router? | encryption |
| A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection? | remote access to a switch where data is encrypted during the session |
| Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe? | environmental |
| What mechanism can be implemented in a small network to help minimize network latency for real-time streaming applications? | QoS |
| Where are Cisco IOS debug output messages sent by default? | console line |
| A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices? | devices with support for modularity |
| What type of traffic would most likely have the highest priority through the network? | voice |
| What factor should be considered in the design of a small network when devices are being chosen? | cost of devices |
| Which two traffic types require delay sensitive delivery? | video, voice |
| A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails? | Have a second router that is connected to another ISP |
| A user is unable to reach the website when typing in a web browser, but can reach the same site by typing What is the issue? | DNS |
| Which network design consideration would be more important to a large corporation than to small business? | redundancy |
| A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host? | tracert 10.1.1.5 |