Exam 3: Tcpip
Exam 1: Introducing Networks42 Questions
Exam 2: Network Devices42 Questions
Exam 3: Tcpip42 Questions
Exam 4: Ip Addressing42 Questions
Exam 5: Router and Ios Basics42 Questions
Exam 6: Router Startup and Configuration42 Questions
Exam 7: Routing Protocols42 Questions
Exam 8: Advanced Routing Protocols42 Questions
Exam 9: Network Services42 Questions
Exam 10: Access Lists42 Questions
Exam 11: Ppp and Frame Relay42 Questions
Exam 12: Basic Switching and Switch Configuration42 Questions
Exam 13: Advanced Switching Concepts42 Questions
Exam 14: Network Security42 Questions
Select questions type
The ____ layer in the TCP/IP model is a direct equivalent to the Network layer in the OSI reference model.
(Multiple Choice)
4.8/5
(28)
The ____ protocol provides a connectionless delivery service.
(Multiple Choice)
4.9/5
(29)
The ____ layer in the TCP/IP model handles software, or logical, addressing.
(Multiple Choice)
4.9/5
(30)
The ____________________ resolves IP addresses to MAC addresses for source hosts that know the IP address of the destination host but not the MAC address.
(Short Answer)
4.9/5
(39)
The Trivial File Transfer Protocol (TFTP) sends data using a reliable connection.
(True/False)
4.9/5
(32)
The ____ utility uses ICMP echo request/reply messages and can verify Internetwork layer (OSI-Network layer) connectivity.
(Multiple Choice)
4.9/5
(42)
____ protocols allow the routers to be updated automatically.
(Multiple Choice)
4.8/5
(36)
Describe the Distribution layer of the Cisco Three-Layer Hierarchical model.
(Essay)
4.8/5
(31)
The invention and evolution of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite resulted from a coordinated effort by the U.S. ____.
(Multiple Choice)
4.8/5
(44)
A(n) ____ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (pings) to a target device in an attempt to crash or greatly reduce the performance of the target device.
(Multiple Choice)
4.7/5
(41)
The TCP/IP ____ layer performs several functions, the most notable being end-to-end packet delivery, reliability, and flow control.
(Multiple Choice)
4.8/5
(39)
Match each item with a statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(30)
Trace shows the exact path a packet takes from the source to the destination. This is accomplished through the use of the ____ counter.
(Multiple Choice)
4.7/5
(32)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)