ccna tcp/ip questions
DESCRIPTION
TRANSCRIPT
Chapter 3
True/False
Indicate whether the statement is true or false.
____ 1. The TCP/IP model explains how the protocol suite works to provide communications.
____ 2. The Trivial File Transfer Protocol (TFTP) sends data using a reliable connection.
____ 3. Both TCP and UDP use port numbers for communications between hosts.
____ 4. The size of the TCP window determines the number of acknowledgments sent for a given data transfer.
____ 5. A small TCP window size produces few acknowledgments.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
____ 6. The invention and evolution of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite
resulted from a coordinated effort by the U.S. ____.
a. DOD c. UCLS
b. SRI d. IEEE
____ 7. The ____ layer in the TCP/IP model maps to the OSI Application, Presentation, and Session layers.
a. Network Interface c. Application
b. Transport d. Internetwork
____ 8. The ____ layer in the TCP/IP model determines the connectionless or connection-oriented services.
a. Network Interface c. Application
b. Transport d. Internetwork
____ 9. The ____ layer in the TCP/IP model is a direct equivalent to the Network layer in the OSI reference model.
a. Network Interface c. Application
b. Transport d. Internetwork
____ 10. The ____ layer of the TCP/IP model maps to both the Data Link and Physical layers of the OSI reference
model.
a. Transport c. Network Interface
b. Internetwork d. Application
____ 11. ____ is a connection-oriented protocol that allows you to connect your computer to other computers on the
Internet and view Web page content.
a. SNMP c. TFTP
b. SMTP d. HTTP
____ 12. The TCP/IP ____ layer performs several functions, the most notable being end-to-end packet delivery,
reliability, and flow control.
a. Application c. Network Interface
b. Transport d. Internetwork
____ 13. ____ is a communication method for network devices that is designed to reduce the flow of packets from their
source.
a. Congestion avoidance c. Sliding windows
b. Buffering d. Collision avoidance
____ 14. The ____ layer in the TCP/IP model handles software, or logical, addressing.
a. Network Interface c. Transport
b. Application d. Internetwork
____ 15. The ____ protocol provides a connectionless delivery service.
a. IP c. ARP
b. ICMP d. RARP
____ 16. Many network devices maintain tables of the MAC and IP addresses of other devices on the network. These
tables are called ____.
a. addressing tables c. ARP tables
b. routing tables d. network tables
____ 17. A(n) ____ supplies the MAC address of the destination host in a unicast packet.
a. MAC frame c. RARP request
b. ARP reply d. RARP reply
____ 18. ____ provides the same basic functionality as RARP.
a. DHCP c. SNMP
b. HTTP d. IP
____ 19. Network administrators and support personnel commonly use the ____ utility to verify connectivity between
two points.
a. Path c. SYN
b. Ping d. Transport
____ 20. The ____ utility uses ICMP echo request/reply messages and can verify Internetwork layer (OSI-Network
layer) connectivity.
a. Find c. Trace
b. Path d. Route
____ 21. Trace shows the exact path a packet takes from the source to the destination. This is accomplished through the
use of the ____ counter.
a. TPI c. FIN
b. SYN d. TTL
____ 22. A(n) ____ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (pings)
to a target device in an attempt to crash or greatly reduce the performance of the target device.
a. SYN flood c. Ping of Death
b. ICMP flood d. smurf attack
____ 23. A router references its ____ to determine which of its interfaces is connected to the destination network.
a. ARP table c. interface table
b. IP table d. routing table
____ 24. ____ protocols allow the routers to be updated automatically.
a. Internetwork c. Routing
b. MAP d. TTL
____ 25. The Cisco ____ model does not describe how communications take place. Rather, it focuses on how best to
design a network, especially a relatively large network or one that is expected to grow.
a. Three-Layer Hierarchical c. Network state
b. Link-state d. Three-way
____ 26. ____ is the process of assigning unique IP addresses to devices on the network.
a. Virtual addressing c. IP access
b. Network addressing d. IP addressing
Completion
Complete each statement.
27. A series of documents called ____________________ define, describe, and standardize the implementation
and configuration of the TCP/IP protocol suite.
28. The ____________________ is the messaging or e-mail transfer protocol used with TCP/IP.
29. Before two computers can communicate over TCP, they must synchronize their ____________________.
30. ____________________, also known as windowing, is a method of controlling packet flow between hosts.
31. The ____________________ resolves IP addresses to MAC addresses for source hosts that know the IP
address of the destination host but not the MAC address.
Matching
Match each item with a statement below:
a. NFS f. Buffer
b. SNMP g. RARP
c. DNS service h. Routed protocol
d. Three-way handshake i. Ping utility
e. RST
____ 32. provides TCP/IP host name to IP address resolution
____ 33. a distributed file system developed by Sun Microsystems that allows data to be shared across a network
____ 34. indicates that a TCP connection is to be terminated without further interaction
____ 35. verifies connectivity between two points
____ 36. a connectionless protocol that permits remote tracking and management of TCP/IP hosts
____ 37. used by TCP to establish a reliable connection between two points
____ 38. a portion of memory where the device stores incoming packets until they can be processed
____ 39. contains enough information in its header to be routed through an internetwork
____ 40. provides IP address to MAC address resolution in a manner similar to that of ARP
Short Answer
41. Briefly describe the TCP and UDP protocols.
42. Describe some Well Known TCP and UDP Port numbers from RFC 1700.
43. What are the steps involved in the TCP/IP three-way handshake?
44. Briefly describe ICMP.
45. Briefly describe the RARP protocol.
46. How does an ARP request work?
47. Compare ARP and RARP.
48. Briefly describe the TCP/IP Network Interface layer.
49. Describe the Distribution layer of the Cisco Three-Layer Hierarchical model.
50. Describe the Core layer of the Cisco Three-Layer Hierarchical model.