Professional Documents
Culture Documents
6. Which three of the following are common network applications? (Choose three.)
email
collaboration
graphics creation
databases
word processing
spreadsheets
9. Which two statements about wireless networks are accurate? (Choose two.)
Instead of cables, wireless communication uses RF or infrared waves to transmit data.
To receive the signals from the access point, a computer needs to have a wireless
adapter card or wireless NIC.
For wireless LANs, a key component is a router, which propagates signal distribution.
Wireless networks are not very common and, generally, only large corporations use
them.
11. Which two factors have recently influenced the increase in threats from hackers?
(Choose two.)
Hacker tools require more technical knowledge to use.
Hacker tools have become more sophisticated.
The number of reported security threats has remained constant year to year.
Hacker tools require less technical knowledge to use.
13. Which two statements about the purpose of the OSI model are accurate? (Choose
two.)
The OSI model defines the network functions that occur at each layer.
The OSI model facilitates an understanding of how information travels throughout a
network.
The OSI model ensures reliable data delivery through its layered approach.
The OSI model allows changes in one layer to affect the other layers.
14. At which layer does de-encapsulation first occur?
application
data link
network
transport
16. Which area of the OSI model and the TCP/IP stack is most diverse?
network layer
transport layer
application layer
data-link layer
18. In a Class B address, which of the octets are the host address portion and are
assigned locally?
The first octet is assigned locally.
The first and second octets are assigned locally.
The second and third octets are assigned locally.
The third and fourth octets are assigned locally.
21. Which two of these addresses are private IP addresses? (Choose two.)
10.215.34.124
127.16.71.43
172.17.10.10
225.200.15.10
23. Which three statements about TCP are accurate? (Choose three.)
TCP operates at Layer 3 of the OSI stack.
TCP is a connection-oriented protocol.
TCP provides no error checking.
TCP packets are numbered and sequenced so that the destination can reorder packets
and determine if a packet is missing.
TCP provides no recovery service.
Upon receipt of one or more TCP packets, the receiver returns an acknowledgment to
the sender indicating that it received the packets.
25. When a single computer with one IP address has several websites open at once, this
situation is called _____.
windowing
session multiplexing
segmenting
connection-oriented protocol
26. TCP is best for which two of the following applications? (Choose two.)
email
voice streaming
downloading
video streaming
27. Which three of the following characteristics apply to UDP? (Choose three.)
Packets are treated independently.
Packet delivery cannot be prioritized.
Packet delivery is not guaranteed.
Lost or corrupted packets are not re-sent.
It is a connection-oriented protocol.
28. Which two of the following characteristics apply to TCP? (Choose two.)
Packet delivery is not guaranteed.
Lost or corrupted packets are not re-sent.
Lost or corrupted packets are re-sent.
TCP segment contains a sequence number and an acknowledgment number.
30. Ports that are used only for the duration of a specific session are called _____.
dynamically assigned ports
well-known ports
registered ports
unstable ports
31. The source port in both a UDP header and a TCP header is a _____.
16-bit number of the called port
16-bit length of the header
16-bit sum of the header and data fields
16-bit number of the calling port
32. Which field in a TCP header ensures that data arrives in the correct order?
acknowledgment number
sequence number
reserved
options
33. In a TCP connection setup, the initiating device sends which message?
ACK
receive SYN
send SYN
SYN ACK
37. Which two are used during host-to-host communication? (Choose two.)
Layer 1 addressing
Layer 2 addressing
Layer 3 addressing
ARP addressing
38. Which message is sent during the TCP session establishment process when the SYN
ACK is received?
TCP ACK
SYN START
SYN END
TCP START
39. Which three host-based tools are typically used to verify the connectivity? (Choose
three.)
ping
tracert
arp
TCP
UDP