Presentation is loading. Please wait.

Presentation is loading. Please wait.

CCNA 1 v3.1 Module 11 Review.

Similar presentations


Presentation on theme: "CCNA 1 v3.1 Module 11 Review."— Presentation transcript:

1 CCNA 1 v3.1 Module 11 Review

2 At which layer of the TCP/IP model does Telnet operate?
application

3 What are two protocols that can be used to transfer files between systems?
FTP TFTP

4 Which of the following SNMP components would a router be considered?
secure ports agents network management system managed devices secure ports agents network management system managed devices

5 What SNMP component is responsible for using the majority of memory resources?
network management system

6 What protocol is used by e-mail servers to communicate with each other?
SMTP

7 Which of the following are components of SNMP? (Choose three.)
protocol inspector secure ports agents protocol analyzer network management system managed devices protocol inspector secure ports agents protocol analyzer network management system managed devices

8 Which type of institution does the domain suffix .org represent?
non-profit

9 Which protocol is used by FTP to transfer files over the Internet?
TCP

10 What service is used to translate a web address into an IP address?
DNS

11 Which TCP/IP layer is responsible for dialog control?
application

12 What does TCP use to begin the three-way handshaking process?
The sending host sends a SYN segment.

13 What are two protocols that use TCP?
HTTP FTP

14 Which of the following protocols operate at the application layer of the OSI model? (Choose two.)
UDP HTTP TCP FTP UDP HTTP TCP FTP

15 What are three features of the User Datagram Protocol (UDP)?
no guaranteed delivery of datagrams reliability provided by the application layer connectionless

16 What protocol can be used to load or retrieve Cisco IOS images to or from a router?
TFTP

17 Which acknowledgement number should be sent by the receiver shown in the graphic?
3 4 6 7 9 12 3 4 6 7 9 12

18 Which of the following describes the operation of TCP window size?
Window size increases as all data transfers. Window size is the TCP process used prepare data for transmission. Window size is decreased if packets are lost. Window size of 15 means that the next byte expected is byte number 15. Window size increases as all data transfers. Window size is the TCP process used prepare data for transmission. Window size is decreased if packets are lost. Window size of 15 means that the next byte expected is byte number 15.

19 Which of the following characteristics of TCP is provided by windowing?
connectionless data transport flow control well-known ports best-effort delivery connectionless data transport flow control well-known ports best-effort delivery

20 End systems use port numbers to select the proper application
End systems use port numbers to select the proper application. What is the smallest port number that can be dynamically assigned by a host system? 1024

21 What 2 port numbers are commonly assigned for FTP use?
20 21

22 What are 3 features that allow TCP to reliably and accurately transport and regulate the flow of information from source to destination? sliding windows sequencing numbers acknowledgments

23 TCP/IP connection-oriented sessions begin with a three-way handshake
TCP/IP connection-oriented sessions begin with a three-way handshake. What are 3 terms that describe the handshake process? acknowledge synchronize negotiate

24 During data transfer, what are two main responsibilities of the receiving host?
acknowledgment reassembly

25 What is the purpose of TCP/UDP port numbers?
track different conversations crossing the network at the same time

26 Which of the following uses a connectionless protocol to transfer files?
HTTP SNMP TFTP FTP HTTP SNMP TFTP FTP

27 Which application layer protocol allows network devices to exchange management information?
SNMP

28


Download ppt "CCNA 1 v3.1 Module 11 Review."

Similar presentations


Ads by Google