Networking Basics Module 15 – 17 Checkpoint Exam Answers

Networking Basics Module 15 – 17 Checkpoint Exam Answers

1. What information is used by TCP to reassemble and reorder received segments?

  • acknowledgment numbers
  • fragment numbers
  • port numbers
  • sequence numbers

Explanation: At the transport layer, TCP uses the sequence numbers in the header of each TCP segment to reassemble the segments into the correct order.

2. A PC user issues the netstat command without any options. What is displayed as the result of this command?

  • a local routing table
  • a list of all established active TCP connections
  • a network connection and usage report
  • a historical list of successful pings that have been sent

Explanation: When used by itself (without any options), the netstat command will display all the active TCP connections that are available.

3. Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

  • The client sends a synchronization segment to begin the session.
  • The client sends an ISN to the server to start the 3-way handshake.
  • The client sets the window size for the session.
  • The client randomly selects a source port number.

Explanation: Because a session does not have to be established for UDP, the client selects a random source port to begin a connection. The random port number selected is inserted into the source port field of the UDP header.

4. Refer to the exhibit. A TCP segment was sent by PC1 to the web server via port 80. Because of an unexpected network failure, the data was forwarded by R1 but was not received by R2. Which statement is correct about this scenario?
Networking Basics Module 15 - 17 Checkpoint Exam 4

  • The web server will not acknowledge this segment. The PC1 timer will expire and PC1 will resend the segment.​
  • R1 forwarded the data to R2 but R2 did not receive it. R2 will send a request to R1 to resend the segment.
  • R1 will request that PC1 resend the segment.
  • The timer on R1 will expire and R1 will resend the segment to R2.​

Explanation: The TCP protocol works between end devices, not between each device on the network. Routers, switches, etc. do not participate in the packet recovery process. For each TCP segment (or group of segments) sent by a host, there is an acknowledgment. If the sender does not receive an acknowledgment within a period of time, the sender resends the segment.

5. A destination PC receives an email message with the sequence numbers on packets out of order. Which layer of the TCP/IP model is responsible for reassembling the packets of the message in the correct order?

  • application
  • network access
  • transport
  • internet

Explanation: The transport layer of the TCP/IP model is responsible for ensuring that all packets in a message are received, reassembling the message in the correct order after all packets are received, and identifying which applications are sending and receiving network data.

6. A client device has initiated a secure HTTP request to a web browser. Which well-known port address number is associated with the destination address?

  • 404
  • 110
  • 443
  • 80

Explanation: Port numbers are used in TCP and UDP communications to differentiate between the various services running on a device. The well-known port number used by HTTPs is port 443.

7. What type of applications are best suited for using UDP?

  • applications that need reliable delivery
  • applications that are sensitive to delay
  • applications that are sensitive to packet loss
  • applications that require retransmission of lost segments

Explanation: UDP is not a connection-oriented protocol and does not provide retransmission, sequencing, or flow control mechanisms. It provides basic transport layer functions with a much lower overhead than TCP. Lower overhead makes UDP suitable for applications which are sensitive to delay.

8. Match the term to a function.

Networking Basics Module 15 - 17 Checkpoint Exam 8

Networking Basics Module 15 – 17 Checkpoint Exam 8


Explanation: Place the options in the following order:

hosts a web page web server
requests a web page web client
used to create web pages HTML
secure protocol that uses port 443 HTTPS
protocol commonly used by a web browser HTTP

9. Which three pieces of information are identified by a URL? (Choose three.)

  • the domain name that is being accessed
  • the MAC address of the web server
  • the location of the resource
  • the protocol that is being used
  • the version of the browser
  • the IP address of the gateway

Explanation: URLs are used to access specific content on a web server through a web browser. The URL identifies the protocol that is being used such as HTTP or FTP, the domain of the server, and the location of the resource on the server.

10. Open the PT activity. Perform the tasks in the activity instructions and then answer the question.
What is the application layer service being requested from Server0 by PC0?

  • DNS
  • FTP
  • HTTP
  • SMTP
  • HTTPS

Explanation: From the PDU, the destination port is 443, which means the service requested is HTTPS.
Networking Basics Module 15 - 17 Checkpoint Exam 10

11. Which number or set of numbers represents a socket?

  • 192.168.1.1:80
  • 10.1.1.15
  • 21
  • 01-23-45-67-89-AB

Explanation: A socket is defined by the combination of an IP address and a port number, and uniquely identifies a particular communication.

12. A new employee is attempting to configure a cell phone to connect to the email server of the company. Which port number should be selected when using the IMAP4 protocol to access email messages stored on the local server?

  • 69
  • 25
  • 143
  • 110

Explanation: The IMAP4 protocol uses the TCP protocol with port 143 for accessing emails stored on a local server.

13. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question or complete the task.
Capture traffic in simulation mode. What application layer service is PC-A requesting from the web server?

  • TFTP
  • SSH
  • HTTP
  • telnet
  • FTP

Explanation: When a client is initiating a request to open an FTP session, it does so by sending a packet to the FTP server with the destination port 21.

14. While a network security product is being deployed, a customizable list of allowable protocols is shown. Which three protocols should be allowed to provide for the use of email on a network? (Choose three.)

  • Telnet
  • TFTP
  • POP3
  • HTTP
  • IMAP4
  • SMTP
  • DNS

Explanation: The email protocols used on a network are SMTP, POP3, and IMAP4. SMTP is used to send messages to a local email server, whereas POP and IMAP are used to receive email.

15. Match the command line utility with the description.

Explanation: Place the options in the following order:

Displays the route taken to the destination. tracert
Directly queries the name server for information on a destination domain. nslookup
Tests connections to other IP hosts. ping
Displays network connections. netstat
Displays IP configuration information. ipconfig

16. Match the command line utility with the function.

Explanation: Place the options in the following order:

Use the ping command utility for IPv4 only. ping -4
Use the ping command utility for IPv6 only. ping -6
Use the ping command utility to resolve the address to the hostname. ping -a
Use the ping command utility to continue pinging the target interface until manually stopped. ping -t

17. What is a function of the tracert command that differs from the ping command when they are used on a workstation?

  • The tracert command reaches the destination faster.
  • The tracert command is used to test the connectivity between two devices.
  • The tracert command shows the information of routers in the path.
  • The tracert command sends one ICMP message to each hop in the path.

Explanation: The tracert command sends three pings to each hop (router) in the path toward the destination and displays the domain name and IP address of hops from their responses. Because tracert uses the ping command, the travel time is the same as a standalone ping command. The primary function of a standalone ping command is to test the connectivity between two hosts.

18. A technician is troubleshooting a network where it is suspected that a defective node in the network path is causing packets to be dropped. The technician only has the IP address of the end point device and does not have any details of the intermediate devices. What command can the technician use to identify the faulty node?

  • ipconfig /flushdns
  • ping
  • tracert
  • ipconfig /displaydns

Explanation: The ping command is used to verify connectivity to a device,the commands ipconfig /flushdns will cause the adapter to flush the DNS cache, while ipconfig / displaydns will result in the display of the DNS information in the cache.

19. Which statement describes the use of the ping command?

  • The ping command tests end-to-end connectivity between two devices.
  • The ping command can be used to determine the exact location of the problem when troubleshooting reachability issues.
  • The ping command can be used to test reachability using the physical address of the device.
  • The ping command shows current Layer 4 sessions.

Explanation: The ping command is used to test end-to-end connectivity between the source and destination IP address. It measures the time it takes a test message to make a round trip between the two end points. However, if the message does not reach the destination, or in the case of delays, there is no way to determine where the problem is located.

20. A computer has been assigned an IP address of 169.254.33.16. What command initiates the process of requesting a new IP address?

  • net computer
  • nslookup
  • tracert
  • ipconfig /release

Explanation: Forcing a PC to release its DHCP binding allows a new DHCP request operation to occur. The net, tracert, and nslookup commands do not have any effect on DHCP configurations.


guest
0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x