Check answers here:
Modules 14 – 15: Network Application Communications Exam Answers
Quiz-summary
0 of 69 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
Information
CCNA 1 v7 Modules 14 – 15: Network Application Communications - Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 69 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- Answered
- Review
-
Question 1 of 69
1. Question
1 pointsWhich action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?Correct
Incorrect
-
Question 2 of 69
2. Question
1 pointsWhich transport layer feature is used to guarantee session establishment?Correct
Incorrect
-
Question 3 of 69
3. Question
1 pointsWhat is the complete range of TCP and UDP well-known ports?Correct
Incorrect
-
Question 4 of 69
4. Question
1 pointsWhat is a socket?Correct
Incorrect
-
Question 5 of 69
5. Question
1 pointsA PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?Correct
Incorrect
-
Question 6 of 69
6. Question
1 pointsWhich factor determines TCP window size?Correct
Incorrect
Hint
Window is the number of bytes that the sender will send prior to expecting an acknowledgement from the destination device. The initial window is agreed upon during the session startup via the three-way handshake between source and destination. It is determined by how much data the destination device of a TCP session is able to accept and process at one time. -
Question 7 of 69
7. Question
1 pointsWhat does a client do when it has UDP datagrams to send?Correct
Incorrect
Hint
When a client has UDP datagrams to send, it just sends the datagrams. -
Question 8 of 69
8. Question
1 pointsWhich three fields are used in a UDP segment header? (Choose three.)Correct
Incorrect
Hint
A UDP header consists of only the Source Port, Destination Port, Length, and Checksum fields. Sequence Number, Acknowledgment Number, and Window Size are TCP header fields. -
Question 9 of 69
9. Question
1 pointsWhat are two roles of the transport layer in data communication on a network? (Choose two.)Correct
Incorrect
Hint
The transport layer has several responsibilities. The primary responsibilities include the following:- Tracking the individual communication streams between applications on the source and destination hosts
- Segmenting data at the source and reassembling the data at the destination
- Identifying the proper application for each communication stream through the use of port numbers
-
Question 10 of 69
10. Question
1 pointsWhat information is used by TCP to reassemble and reorder received segments?Correct
Incorrect
-
Question 11 of 69
11. Question
1 pointsWhat important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device?Correct
Incorrect
-
Question 12 of 69
12. Question
1 pointsWhich two characteristics are associated with UDP sessions? (Choose two.)Correct
Incorrect
Hint
TCP:- Provides tracking of transmitted data segments
- Destination devices will acknowledge received data.
- Source devices will retransmit unacknowledged data.
- Destination devices will not acknowledge received data
- Headers use very little overhead and cause minimal delay.
-
Question 13 of 69
13. Question
1 pointsA client application needs to terminate a TCP communication session with a server. Place the termination process steps in the order that they will occur. (Not all options are used.)Sort elements
- client sends FIN
- server sends ACK
- server sends FIN
- client sends ACK
- client sends SYN
- server sends SYN
-
step 1
-
step 2
-
step 3
-
step 4
Correct
Incorrect
-
Question 14 of 69
14. Question
1 pointsWhich flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?Correct
Incorrect
-
Question 15 of 69
15. Question
1 pointsWhich protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication?Correct
Incorrect
Hint
Some applications may use both TCP and UDP. DNS uses UDP when clients send requests to a DNS server, and TCP when two DNS serves directly communicate. -
Question 16 of 69
16. Question
1 pointsWhat is a characteristic of UDP?Correct
Incorrect
Hint
UDP has no way to reorder the datagrams into their transmission order, so UDP simply reassembles the data in the order it was received and forwards it to the application. -
Question 17 of 69
17. Question
1 pointsWhat kind of port must be requested from IANA in order to be used with a specific application?Correct
Incorrect
Hint
Registered ports (numbers 1024 to 49151) are assigned by IANA to a requesting entity to use with specific processes or applications. These processes are primarily individual applications that a user has chosen to install, rather than common applications that would receive a well-known port number. For example, Cisco has registered port 1985 for its Hot Standby Routing Protocol (HSRP) process. -
Question 18 of 69
18. Question
1 pointsWhich three application layer protocols use TCP? (Choose three.)Correct
Incorrect
Hint
Some protocols require the reliable data transport that is provided by TCP. In addition, these protocols do not have real time communication requirements and can tolerate some data loss while minimizing protocol overhead. Examples of these protocols are SMTP, FTP, and HTTP. -
Question 19 of 69
19. Question
1 pointsWhich three statements characterize UDP? (Choose three.)Correct
Incorrect
-
Question 20 of 69
20. Question
1 pointsWhich two fields are included in the TCP header but not in the UDP header? (Choose two.)Correct
Incorrect
Hint
The sequence number and window fields are included in the TCP header but not in the UDP header. -
Question 21 of 69
21. Question
1 pointsWhich field in the TCP header indicates the status of the three-way handshake process?Correct
Incorrect
Hint
The value in the control bits field of theTCP header indicates the progress and status of the connection. -
Question 22 of 69
22. Question
1 pointsWhy does HTTP use TCP as the transport layer protocol?Correct
Incorrect
-
Question 23 of 69
23. Question
1 pointsWhich two types of applications are best suited for UDP? (Choose two.)Correct
Incorrect
-
Question 24 of 69
24. Question
1 pointsHow are port numbers used in the TCP/IP encapsulation process?Correct
Incorrect
Hint
Both UDP and TCP use port numbers to provide a unique identifier for each conversation. Source port numbers are randomly generated and are used to track different conversations. Destination port numbers identify specific services by using either a default port number for the service or a port number that is assigned manually by a system administrator. -
Question 25 of 69
25. Question
1 pointsIn what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.)Correct
Incorrect
Hint
UDP is a very simple transport layer protocol that does not guarantee delivery. Devices on both ends of the conversation are not required to keep track of the conversation. UDP is used as the transport protocol for applications that need a speedy, best-effort delivery. -
Question 26 of 69
26. Question
1 pointsWhat are three responsibilities of the transport layer? (Choose three.)Correct
Incorrect
-
Question 27 of 69
27. Question
1 pointsWhich three statements describe a DHCP Discover message? (Choose three.)Correct
Incorrect
Hint
When a host configured to use DHCP powers up on a network it sends a DHCPDISCOVER message. FF-FF-FF-FF-FF-FF is the L2 broadcast address. A DHCP server replies with a unicast DHCPOFFER message back to the host. -
Question 28 of 69
28. Question
1 pointsWhich two protocols may devices use in the application process that sends email? (Choose two.)Correct
Incorrect
-
Question 29 of 69
29. Question
1 pointsWhat is true about the Server Message Block protocol?Correct
Incorrect
Hint
The Server Message Block protocol is a protocol for file, printer, and directory sharing. Clients establish a long term connection to servers and when the connection is active, the resources can be accessed. Every SMB message has the same format. The use of SMB differs from FTP mainly in the length of the sessions. SMB messages can authenticate sessions. -
Question 30 of 69
30. Question
1 pointsWhat is the function of the HTTP GET message?Correct
Incorrect
-
Question 31 of 69
31. Question
1 pointsWhich OSI layer provides the interface between the applications used to communicate and the underlying network over which messages are transmitted?Correct
Incorrect
-
Question 32 of 69
32. Question
1 pointsWhich networking model is being used when an author uploads one chapter document to a file server of a book publisher?Correct
Incorrect
Hint
In the client/server network model, a network device assumes the role of server in order to provide a particular service such as file transfer and storage. In the client/server network model, a dedicated server does not have to be used, but if one is present, the network model being used is the client/server model. In contrast, a peer-to-peer network does not have a dedicated server. -
Question 33 of 69
33. Question
1 pointsWhat do the client/server and peer-to-peer network models have in common?Correct
Incorrect
Hint
In both the client/server and peer-to-peer network models, clients and servers exist. In peer-to-peer networks, no dedicated server exists, but a device can assume the server role to provide information to a device serving in the client role. -
Question 34 of 69
34. Question
1 pointsIn what networking model would eDonkey, eMule, BitTorrent, Bitcoin, and LionShare be used?Correct
Incorrect
Hint
In a peer-to-peer networking model, data is exchanged between two network devices without the use of a dedicated server. Peer-to-peer applications such as Shareaz, eDonkey, and Bitcoin allow one network device to assume the role of server, while one or more other network devices assume the role of client using the peer-to-peer application. -
Question 35 of 69
35. Question
1 pointsWhat is a common protocol that is used with peer-to-peer applications such as WireShare, Bearshare, and Shareaza?Correct
Incorrect
-
Question 36 of 69
36. Question
1 pointsWhat is a key characteristic of the peer-to-peer networking model?Correct
Incorrect
Hint
The peer-to-peer (P2P) networking model allows data, printer, and resource sharing without a dedicated server. -
Question 37 of 69
37. Question
1 pointsThe application layer of the TCP/IP model performs the functions of what three layers of the OSI model? (Choose three.)Correct
Incorrect
Hint
The network access layer of the TCP/IP model performs the same functions as the physical and data link layers of the OSI model. The internetwork layer equates to the network layer of the OSI model. The transport layers are the same in both models. The application layer of the TCP/IP model represents the session, presentation, and application layers of the OSI model. -
Question 38 of 69
38. Question
1 pointsWhat is an example of network communication that uses the client-server model?Correct
Incorrect
Hint
When a user types a domain name of a website into the address bar of a web browser, a workstation needs to send a DNS request to the DNS server for the name resolution process. This request is a client/server model application. The eMule application is P2P. Sharing a printer on a workstation is a peer-to-peer network. Using ARP is just a broadcast message sent by a host. -
Question 39 of 69
39. Question
1 pointsWhich layer in the TCP/IP model is used for formatting, compressing, and encrypting data?Correct
Incorrect
Hint
The application layer of the TCP/IP model performs the functions of three layers of the OSI model – application, presentation, and session. The application layer of the TCP/IP model is the layer that provides the interface between the applications, is responsible for formatting, compressing, and encrypting data, and is used to create and maintain dialogs between source and destination applications. -
Question 40 of 69
40. Question
1 pointsWhat is an advantage of SMB over FTP?Correct
Incorrect
-
Question 41 of 69
41. Question
1 pointsA manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)Correct
Incorrect
-
Question 42 of 69
42. Question
1 pointsWhich application layer protocol uses message types such as GET, PUT, and POST?Correct
Incorrect
Hint
The GET command is a client request for data from a web server. A PUT command uploads resources and content, such as images, to a web server. A POST command uploads data files to a web server. -
Question 43 of 69
43. Question
1 pointsWhat type of information is contained in a DNS MX record?Correct
Incorrect
Hint
MX, or mail exchange messages, are used to map a domain name to several mail exchange servers that all belong to the same domain. -
Question 44 of 69
44. Question
1 pointsWhich three protocols operate at the application layer of the TCP/IP model? (Choose three.)Correct
Incorrect
-
Question 45 of 69
45. Question
1 pointsWhich protocol is used by a client to communicate securely with a web server?Correct
Incorrect
Hint
HTTPS is a secure form of HTTP used to access web content hosted by a web server. -
Question 46 of 69
46. Question
1 pointsWhich applications or services allow hosts to act as client and server at the same time?Correct
Incorrect
-
Question 47 of 69
47. Question
1 pointsWhat are two characteristics of peer-to-peer networks? (Choose two.)Correct
Incorrect
Hint
Peer-to-peer networks have decentralized resources because every computer can serve as both a server and a client. One computer might assume the role of server for one transaction while acting as a client for another transaction. Peer-to-peer networks can share resources among network devices without the use of a dedicated server. -
Question 48 of 69
48. Question
1 pointsWhich scenario describes a function provided by the transport layer?Correct
Incorrect
Hint
The source and destination port numbers are used to identify the correct application and window within that application. -
Question 49 of 69
49. Question
1 pointsWhich three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)Correct
Incorrect
Hint
The three upper layers of the OSI model, the session, presentation, and application layers, provide application services similar to those provided by the TCP/IP model application layer. Lower layers of the OSI model are more concerned with data flow. -
Question 50 of 69
50. Question
1 pointsA PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC?Correct
Incorrect
-
Question 51 of 69
51. Question
1 pointsA PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received three packets of data from the PC?Correct
Incorrect
-
Question 52 of 69
52. Question
1 pointsA PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received four packets of data from the PC?Correct
Incorrect
-
Question 53 of 69
53. Question
1 pointsA PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received four packets of data from the PC?Correct
Incorrect
-
Question 54 of 69
54. Question
1 pointsA PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC?Correct
Incorrect
-
Question 55 of 69
55. Question
1 pointsA PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC?Correct
Incorrect
-
Question 56 of 69
56. Question
1 pointsA PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC?Correct
Incorrect
-
Question 57 of 69
57. Question
1 pointsA PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received two packets of data from the PC?Correct
Incorrect
-
Question 58 of 69
58. Question
1 pointsA PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received three packets of data from the PC?Correct
Incorrect
-
Question 59 of 69
59. Question
1 pointsA PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received three packets of data from the PC?Correct
Incorrect
-
Question 60 of 69
60. Question
1 pointsA client creates a packet to send to a server. The client is requesting TFTP service. What number will be used as the destination port number in the sending packet?Correct
Incorrect
-
Question 61 of 69
61. Question
1 pointsA client creates a packet to send to a server. The client is requesting FTP service. What number will be used as the destination port number in the sending packet?Correct
Incorrect
-
Question 62 of 69
62. Question
1 pointsA client creates a packet to send to a server. The client is requesting SSH service. What number will be used as the destination port number in the sending packet?Correct
Incorrect
-
Question 63 of 69
63. Question
1 pointsA client creates a packet to send to a server. The client is requesting HTTP service. What number will be used as the destination port number in the sending packet?Correct
Incorrect
-
Question 64 of 69
64. Question
1 pointsA client creates a packet to send to a server. The client is requesting POP3 service. What number will be used as the destination port number in the sending packet?Correct
Incorrect
-
Question 65 of 69
65. Question
1 pointsA client creates a packet to send to a server. The client is requesting telnet service. What number will be used as the destination port number in the sending packet?Correct
Incorrect
-
Question 66 of 69
66. Question
1 pointsA client creates a packet to send to a server. The client is requesting POP3 service. What number will be used as the destination port number in the sending packet?Correct
Incorrect
-
Question 67 of 69
67. Question
1 pointsA client creates a packet to send to a server. The client is requesting SNMP service. What number will be used as the destination port number in the sending packet?Correct
Incorrect
-
Question 68 of 69
68. Question
1 pointsA client creates a packet to send to a server. The client is requesting SMTP service. What number will be used as the destination port number in the sending packet?Correct
Incorrect
-
Question 69 of 69
69. Question
1 pointsA client creates a packet to send to a server. The client is requesting HTTPS service. What number will be used as the destination port number in the sending packet?Correct
Incorrect
I cant watch my question
great quiz!
Great quiz
quiz not showing
Fixed, thanks for report
Do you have the Q&A for CCNA 2 v7 Final Exam?