Download presentation
1
CCNA 1 v3.1 Module 11 Review
2
At which layer of the TCP/IP model does Telnet operate?
application
3
What are two protocols that can be used to transfer files between systems?
FTP TFTP
4
Which of the following SNMP components would a router be considered?
secure ports agents network management system managed devices secure ports agents network management system managed devices
5
What SNMP component is responsible for using the majority of memory resources?
network management system
6
What protocol is used by e-mail servers to communicate with each other?
SMTP
7
Which of the following are components of SNMP? (Choose three.)
protocol inspector secure ports agents protocol analyzer network management system managed devices protocol inspector secure ports agents protocol analyzer network management system managed devices
8
Which type of institution does the domain suffix .org represent?
non-profit
9
Which protocol is used by FTP to transfer files over the Internet?
TCP
10
What service is used to translate a web address into an IP address?
DNS
11
Which TCP/IP layer is responsible for dialog control?
application
12
What does TCP use to begin the three-way handshaking process?
The sending host sends a SYN segment.
13
What are two protocols that use TCP?
HTTP FTP
14
Which of the following protocols operate at the application layer of the OSI model? (Choose two.)
UDP HTTP TCP FTP UDP HTTP TCP FTP
15
What are three features of the User Datagram Protocol (UDP)?
no guaranteed delivery of datagrams reliability provided by the application layer connectionless
16
What protocol can be used to load or retrieve Cisco IOS images to or from a router?
TFTP
17
Which acknowledgement number should be sent by the receiver shown in the graphic?
3 4 6 7 9 12 3 4 6 7 9 12
18
Which of the following describes the operation of TCP window size?
Window size increases as all data transfers. Window size is the TCP process used prepare data for transmission. Window size is decreased if packets are lost. Window size of 15 means that the next byte expected is byte number 15. Window size increases as all data transfers. Window size is the TCP process used prepare data for transmission. Window size is decreased if packets are lost. Window size of 15 means that the next byte expected is byte number 15.
19
Which of the following characteristics of TCP is provided by windowing?
connectionless data transport flow control well-known ports best-effort delivery connectionless data transport flow control well-known ports best-effort delivery
20
End systems use port numbers to select the proper application
End systems use port numbers to select the proper application. What is the smallest port number that can be dynamically assigned by a host system? 1024
21
What 2 port numbers are commonly assigned for FTP use?
20 21
22
What are 3 features that allow TCP to reliably and accurately transport and regulate the flow of information from source to destination? sliding windows sequencing numbers acknowledgments
23
TCP/IP connection-oriented sessions begin with a three-way handshake
TCP/IP connection-oriented sessions begin with a three-way handshake. What are 3 terms that describe the handshake process? acknowledge synchronize negotiate
24
During data transfer, what are two main responsibilities of the receiving host?
acknowledgment reassembly
25
What is the purpose of TCP/UDP port numbers?
track different conversations crossing the network at the same time
26
Which of the following uses a connectionless protocol to transfer files?
HTTP SNMP TFTP FTP HTTP SNMP TFTP FTP
27
Which application layer protocol allows network devices to exchange management information?
SNMP
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.