CISCOKILLERS
Would you like to react to this message? Create an account in a few clicks or log in to continue.

CISCOKILLERS

CCNA, CCNP, WLAN ANSWERS AND MUCH MOREEEEE!!
 
HomeSearchLatest imagesRegisterLog in

 

 Module 10

Go down 
AuthorMessage
Admin
Admin



Number of posts : 72
Age : 37
Localisation : Cyprus
Registration date : 2007-02-22

Module 10 Empty
PostSubject: Module 10   Module 10 Icon_minitimeTue Nov 13, 2007 12:07 pm

CCNA 2
Chapter 10

Leeched by: ciscokiller
http://www.ciscokillers.tk
=========================
Use this at your own risk.
I'm not responsible for
what you do with it.
Happy cheating ^^
=========================


===========================================================================
A computer programmer is developing software that requires a reliable stream of data. Which protocol can be used in the software design to eliminate the need for building error detection and recovery into the application program?

TCP*
IP
ICMP
UDP
HTTP
===========================================================================
Which of the following would an administrator do to defend against a denial of service SYN flooding attack? (Choose two.)

Hide the source of incoming IP addresses.
Decrease the connection timeout period.*
Synchronize all host communication.
X Increase the connection queue size.*
Flood the network with false SYN requests.
===========================================================================
What is the purpose of Positive Acknowledgment and Retransmission (PAR)?
PAR allows the presentation layer to request that data be resent in a format the destination host can process.
PAR provides a mechanism for the receiving device to request that all segments be retransmitted if one segment is corrupt.
PAR helps ensure that a number of data segments sent by one host are received by another host before additional data segments are sent.*
PAR is used to renegotiate the window size during the synchronization process.
===========================================================================
Which of the following describe types of port numbers that can be represented in the header of TCP and UDP segments? (Choose two.)

connectionless
well-known*
operational
dynamic*
static
===========================================================================
Why is TCP considered a connection-oriented protocol?

It establishes a virtual connection between hosts using a two-way handshake.
It uses IP to guarantee delivery of packets between hosts.
It requires hosts to go through a synchronization process prior to data transmission.*
It creates a connection that depends on application layer protocols for error detection.
===========================================================================
What is the purpose of using port numbers in the transport layer?

to identify the segment as being either TCP or UDP
to provide reliability during data transport
to identify the interface port number used by the router when forwarding data
to track multiple conversations that occur between hosts*
===========================================================================
What does TCP use to ensure reliable delivery of data segments?

upper layer protocols
lower layer protocols
sequence numbers*
port numbers
===========================================================================
Which authority has control over the assignment of port numbers for applications?

IEEE
IANA*
InterNIC
Software Developers Association
===========================================================================
Which of the following describes how TCP adds reliability to communication? (Choose two.)

Hosts using TCP set up virtual circuits at the beginning of the transmission using the three-way handshake.*
Hosts using TCP set the error-checking frequency at the beginning of the transmission and maintain this frequency for the duration.
The receiving host acknowledges that it has received the expected number of segments and requests additional data.*
The receiving host acknowledges any incorrectly received data and requests retransmission of damaged or missing bytes.
===========================================================================
Which address is dynamically assigned by the source host when forwarding data?

destination IP address
destination port number
default gateway address
source IP address
source port number*
===========================================================================
Which of the following are functions of the TCP protocol? (Choose three.)

translation of data
synchronization*
path determination
flow control*
data representation
reliability*
===========================================================================
Which transport layer unit of information places the port number in the header?

data
segment*
packet
frame
bit
===========================================================================
What is the purpose of the three-way handshake that occurs between hosts using TCP as the transport layer protocol?

to determine the number of packets that can be sent before an acknowledgment is required
to allow a host to forward data to a router
to establish a round trip connection between sender and receiver before data is transferred*
to provide a mechanism for data encryption and compression
===========================================================================
At which point in the transmission process are segments numbered?

when received
when reassembling
before transmission*
while negotiating window size
===========================================================================
What type of segment and data is shown in the graphic?

a UDP segment carrying e-mail traffic
a TCP segment carrying FTP traffic
an IP segment carrying FTP traffic
a UDP segment carrying web traffic
a TCP segment carrying web traffic*
an IP segment carrying e-mail traffic
===========================================================================
When a host receives a data segment, what allows the host to determine which application should receive the segment?

IP source address
IP destination address
PAR
sliding window
port number*
SYN packet
===========================================================================
Which statement is true regarding the TCP protocol?

Flow control at the transport layer is provided by adding a sequence number to each segment.
A sliding window allows for communicating devices to negotiate the amount of unacknowledged data that can be sent.*
A window size of 1 would require a receiving device to send ACK 1 after the Segment 1 has been received.
TCP is used by sending hosts to segment large data files prior to transmission while IP is used by receiving host to reassemble the smaller segments.
===========================================================================
What is used by both TCP and UDP when creating a segment?

IP address
MAC address
IPX address
socket or port number*
acknowledgment number
sequence number
===========================================================================
What is used by UDP to determine if the data or header has been transferred without corruption?

lower layer protocols
checksum*
PAR
sliding window
acknowledgment and retransmission
IP
===========================================================================
How are originating source port numbers assigned during the data encapsulation process?

assigned manually by the user when starting the application
assigned dynamically by the source host*
assigned by the routing protocol during the lookup process
assigned by the destination host during session negotiation
===========================================================================
Which of the following protocols uses UDP for transport layer services?

SMTP
HTTP
DNS*
FTP
===========================================================================
Which of the following determines the amount of data that can be sent without an acknowledgment when sending a TCP segment?

segment number
priority number
window size*
value in the length field
value in the port field
acknowledgment number
===========================================================================
During the encapsulation process, in which order are the IP address, MAC address, and port number assigned when the router is establishing communication with the TFTP server?

IP address, MAC address, port number
MAC address, IP address, port number
port number, IP address, MAC address*
port number, MAC address, IP address
===========================================================================
Which of the following describes a type of denial of service attack designed to exploit the normal function of the TCP three-way handshake?

A host sends a packet with a spoofed source IP address.*
A host sends a packet with an incorrect destination IP address.
A source sends a packet containing a garbled header.
A host sends an oversized packet that fills the memory buffers of the destination host.
A host sends a packet that contains a virus.
A host sends a packet that contains a worm.
Back to top Go down
http://www.ciscokillers.tk
 
Module 10
Back to top 
Page 1 of 1
 Similar topics
-
» Module 5
» Module 9
» module 8
» Module 6
» module 9

Permissions in this forum:You cannot reply to topics in this forum
CISCOKILLERS :: CCNA :: CCNA 2-
Jump to: