CCNA 1 v7

Modules 14 – 15: Network Application Communications Exam Answers

Modules 14 – 15: Network Application Communications Exam Answers Full
1. On a home network, which device is most likely to provide dynamic IP addressing to clients on the home network?

  • a dedicated file server
  • a home router
  • an ISP DHCP server
  • a DNS server

2. What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?

  • .com
  • www
  • http
  • index

3. What are two characteristics of the application layer of the TCP/IP model? (Choose two.)

  • responsibility for logical addressing
  • responsibility for physical addressing
  • the creation and maintenance of dialogue between source and destination applications
  • closest to the end user
  • the establishing of window size

4. What message type is used by an HTTP client to request data from a web server?

  • GET
  • POST
  • PUT
  • ACK

5. How does a networked server manage requests from multiple clients for different services?

  • The server sends all requests through a default gateway.
  • Each request is assigned source and destination port numbers.
  • The server uses IP addresses to identify different services.
  • Each request is tracked through the physical address of the client.

6. Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)

  • FTP
  • DNS
  • HTTP
  • POP3
  • VoIP

7. What is the purpose of using a source port number in a TCP communication?

  • to notify the remote device that the conversation is over
  • to assemble the segments that arrived out of order
  • to keep track of multiple conversations between devices
  • to inquire for a nonreceived segment

8. Which number or set of numbers represents a socket?

  • 01-23-45-67-89-AB
  • 21
  • 192.168.1.1:80
  • 10.1.1.15

9. Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)

  • ACK
  • FIN
  • PSH
  • RST
  • SYN
  • URG

10. What happens if part of an FTP message is not delivered to the destination?

  • The message is lost because FTP does not use a reliable delivery method.
  • The FTP source host sends a query to the destination host.
  • The part of the FTP message that was lost is re-sent.
  • The entire FTP message is re-sent.

11. What type of applications are best suited for using UDP?

  • applications that are sensitive to delay
  • applications that need reliable delivery
  • applications that require retransmission of lost segments
  • applications that are sensitive to packet loss

12. Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?

  • The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.
  • The source decreases the window size to decrease the rate of transmission from the destination.
  • The destination decreases the window size.
  • The destination sends fewer acknowledgement messages in order to conserve bandwidth.

13. Which two operations are provided by TCP but not by UDP? (Choose two.)

  • identifying the applications
  • acknowledging received data
  • tracking individual conversations
  • retransmitting any unacknowledged data
  • reconstructing data in the order received

14. What is the TCP mechanism used in congestion avoidance ?

  • three-way handshake
  • socket pair
  • two-way handshake
  • sliding window

15. What is a responsibility of transport layer protocols?

  • providing network access
  • tracking individual conversations
  • determining the best path to forward a packet
  • translating private IP addresses to public IP addresses

16. Which protocol can be used to transfer messages from an email server to an email client?

  • SMTP
  • POP3
  • SNMP
  • HTTP

17. When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?

  • IMAP
  • POP
  • SMTP
  • HTTPS

18. Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?

  • HTTP
  • SMTP
  • DHCP
  • SMB

19. An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?

  • client
  • master
  • server
  • slave
  • transient

20. Which statement is true about FTP?

  • The client can choose if FTP is going to establish one or two connections with the server.
  • The client can download data from or upload data to the server.
  • FTP is a peer-to-peer application.
  • FTP does not provide reliability during data transmission.

21. A wireless host needs to request an IP address. What protocol would be used to process the request?

  • FTP
  • HTTP
  • DHCP
  • ICMP
  • SNMP

22. Which TCP/IP model layer is closest to the end user?

  • application
  • internet
  • network access
  • transport

23. Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)

  • TCP
  • HTTP
  • MPEG
  • GIF
  • IP
  • UDP

24. Which protocol uses encryption?

  • DHCP
  • DNS
  • FTP
  • HTTPS

25. Why is DHCP preferred for use on large networks?

  • Large networks send more requests for domain to IP address resolution than do smaller networks.
  • DHCP uses a reliable transport layer protocol.
  • It prevents sharing of files that are copyrighted.
  • It is a more efficient way to manage IP addresses than static address assignment.
  • Hosts on large networks require more IP addressing configuration settings than hosts on small networks.

26. Which two tasks can be performed by a local DNS server? (Choose two.)

  • providing IP addresses to local hosts
  • allowing data transfer between two network devices
  • mapping name-to-IP addresses for internal hosts
  • forwarding name resolution requests between servers
  • retrieving email messages

Related Articles

Leave a Reply

avatar
Photo and Image Files
 
 
 
Audio and Video Files
 
 
 
Other File Types
 
 
 

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  Subscribe  
Notify of
Back to top button
Close