1. Which action is performed by a client when establishing
communication with a server via the use of UDP at the transport layer?
14. Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?
- The client sets the window size for the session.
- The client sends an ISN to the server to start the 3-way handshake.
- The client randomly selects a source port number.
- The client sends a synchronization segment to begin the session.
- UDP ACK flag
- TCP 3-way handshake
- UDP sequence number
- TCP port number
- 0 to 255
- 0 to 1023
- 256 – 1023
- 1024 – 49151
- the combination of the source and destination IP address and source and destination Ethernet address
- the combination of a source IP address and port number or a destination IP address and port number
- the combination of the source and destination sequence and acknowledgment numbers
- the combination of the source and destination sequence numbers and port numbers
- 1 segment
- 10 segments
- 100 segments
- 1000 segments
- the amount of data to be transmitted
- the number of services included in the TCP segment
- the amount of data the destination can process at one time
- the amount of data the source is capable of sending at one time
- It just sends the datagrams.
- It queries the server to see if it is ready to receive data.
- It sends a simplified three-way handshake to the server.
- It sends to the server a segment with the SYN flag set to synchronize the conversation.
- Window Size
- Length
- Source Port
- Acknowledgment Number
- Checksum
- Sequence Number
- identifying the proper application for each communication stream
- tracking the individual communication between applications on the source and destination hosts
- providing frame delimiting to identify bits making up a frame
- performing a cyclic redundancy check on the frame for errors
- providing the interface between applications and the underlying network over which messages are transmitted
- port numbers
- sequence numbers
- acknowledgment numbers
- fragment numbers
- timing and synchronization
- destination and source port numbers
- destination and source physical addresses
- destination and source logical network addresses
- Destination devices receive traffic with minimal delay.
- Transmitted data segments are tracked.
- Destination devices reassemble messages and pass them to an application.
- Received data is unacknowledged.
- Unacknowledged data packets are retransmitted.
14. Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?
- FIN
- ACK
- SYN
- RST
- HTTP
- FTP
- DNS
- SMTP
- UDP datagrams take the same path and arrive in the correct order at the destination.
- Applications that use UDP are always considered unreliable.
- UDP reassembles the received datagrams in the order they were received.
- UDP only passes data to the network when the destination is ready to receive the data.
- registered port
- private port
- dynamic port
- source port
- SMTP
- FTP
- SNMP
- HTTP
- TFTP
- DHCP
- UDP provides basic connectionless transport layer functions.
- UDP provides connection-oriented, fast transport of data at Layer 3.
- UDP relies on application layer protocols for error detection.
- UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms.
- UDP relies on IP for error detection and recovery.
- UDP provides sophisticated flow control mechanisms.
- window
- checksum
- source port
- destination port
- sequence number
- window
- reserved
- checksum
- control bits
- to ensure the fastest possible download speed
- because HTTP is a best-effort protocol
- because transmission errors can be tolerated easily
- because HTTP requires reliable delivery
- applications that need data flow control
- applications that require reliable delivery
- applications that handle reliability themselves
- applications that need the reordering of segments
- applications that can tolerate some data loss, but require little or no delay
- Source port numbers and destination port numbers are not necessary when UDP is the transport layer protocol being used for the communication.
- Source port and destination port numbers are randomly generated.
- If multiple conversations occur that are using the same service, the source port number is used to track the separate conversations.
- Destination port numbers are assigned automatically and cannot be changed.
- when applications need to guarantee that a packet arrives intact, in sequence, and unduplicated
- when a faster delivery mechanism is needed
- when delivery overhead is not an issue
- when applications do not need to guarantee delivery of the data
- when destination port numbers are dynamic
- meeting the reliability requirements of applications, if any
- multiplexing multiple communication streams from many users or applications on the same network
- identifying the applications and services on the client and server that should handle transmitted data
- directing packets towards the destination network
- formatting data into a compatible form for receipt by the destination devices
- conducting error detection of the contents in frames
- The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF).
- The destination IP address is 255.255.255.255.
- The message comes from a server offering an IP address.
- The message comes from a client seeking an IP address.
- All hosts receive the message, but only a DHCP server replies.
- Only the DHCP server receives the message.
- HTTP
- SMTP
- POP
- IMAP
- DNS
- POP3
- Different SMB message types have a different format.
- Clients establish a long term connection to servers.
- SMB messages cannot authenticate a session.
- SMB uses the FTP protocol for communication.
- to request an HTML page from a web server
- to send error information from a web server to a web client
- to upload content to a web server from a web client
- to retrieve client email from an email server using TCP port 110
- application
- presentation
- session
- transport
- peer-to-peer
- master-slave
- client/server
- point-to-point
- Both models have dedicated servers.
- Both models support devices in server and client roles.
- Both models require the use of TCP/IP-based protocols.
- Both models are used only in the wired network environment.
- peer-to-peer
- client-based
- master-slave
- point-to-point
- Ethernet
- Gnutella
- POP
- SMTP
- wireless networking
- social networking without the Internet
- network printing using a print server
- resource sharing without a dedicated server
- physical
- session
- network
- presentation
- data link
- transport
- application
- A user uses eMule to download a file that is shared by a friend after the file location is determined.
- A workstation initiates an ARP to find the MAC address of a receiving host.
- A user prints a document by using a printer that is attached to a workstation of a coworker.
- A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.
- internetwork
- session
- presentation
- application
- network access
- Only with SMB can data transfers occur in both directions.
- Only SMB establishes two simultaneous connections with the client, making the data transfer faster.
- SMB is more reliable than FTP because SMB uses TCP and FTP uses UDP.
- SMB clients can establish a long-term connection to the server.
- FTP
- HTTP
- DNS
- SNMP
- DHCP
- SMTP
- DNS
- DHCP
- SMTP
- HTTP
- POP3
- the FQDN of the alias used to identify a service
- the IP address for an FQDN entry
- the domain name mapped to mail exchange servers
- the IP address of an authoritative name server
- ARP
- TCP
- UDP
- FTP
- POP3
- DHCP
- SMTP
- SMB
- IMAP
- HTTPS
- client/server applications
- email applications
- P2P applications
- authentication services
- scalability
- one way data flow
- decentralized resources
- centralized user accounts
- resource sharing without a dedicated server
- A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network.
- A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header.
- A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.
- A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site.
- physical layer
- session layer
- transport layer
- application layer
- presentation layer
- data link layer
- 3001
- 6001
- 4500
- 6000
- 4501
- 6001
- 6000
- 4500
- 6001
- 3001
- 1501
- 1500
- 6001
- 3001
- 3000
- 1500
- 3001
- 4501
- 3000
- 1500
- 3001
- 4501
- 4500
- 1500
- 3001
- 6001
- 4500
- 3000
- 3001
- 6001
- 6000
- 3000
- 4501
- 6001
- 6000
- 3000
- 4501
- 6001
- 1500
- 4500
- 69
- 67
- 53
- 80
- 21
- 69
- 67
- 80
- 22
- 69
- 67
- 80
- 80
- 67
- 53
- 69
- 110
- 67
- 53
- 69
- 23
- 443
- 161
- 110
- 110
- 443
- 161
- 80
- 161
- 443
- 110
- 80
- 25
- 443
- 161
- 110
- 443
- 161
- 110
- 80
0 commentaires:
Enregistrer un commentaire