SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

CCNA 1 Chapter 6 V4.0

Labels: CCNA 1 Chapter 6 V4.0
1) A user types http://www.cisco.com into a web browser address textbox. What does
http://www.cisco.com represent?
* the IP address of a web server
a physical network address
the closest router interface to the source
the source IP address in the data transmission

2) What type of server would use IMAP?
DNS
DHCP
* e-mail
FTP
Telnet
web

3) Which type of server would most likely be used first by a network client in a
corporate environment?
DNS
* DHCP
e-mail
FTP
Telnet
web

4) Which protocol is used by FTP to transfer files over the Internet?
* TCP
SMTP
UDP
SNMP

5) Which protocols are TCP/IP application layer protocols? (Choose two.)
UDP
* FTP
IP
* SMTP
TCP

6) Which of the following are layers of the TCP/IP model? (Choose three.)
* Application
Physical
* Internet
* Network Access
Presentation

7) You are creating a network-based video game. What influences your decision
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

about which transport protocol to use for the application?
* UDP will not disrupt the game to retransmit dropped packets.
TCP provides extra acknowledgements that will ensure smooth video delivery.
Both TCP and UDP can be used simultaneously to ensure speed and guaranteed
delivery.
Both TCP and UDP may slow transmission and disrupt game operation, so no
transport protocol should be used.

8) Whenever e-mail clients send letters, what device is used to translate the domain
names into their associated IP addresses?
Uniform Resource Locator
Network redirector server
SNMP server
* DNS server

9) Which application is most likely used to translate http://www.cisco.com to
198.133.219.25?
DHCP
* DNS
FTP
HTTP
POP
SMTP

10)
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/




Refer to the graphic. Which protocol is used to access this website?
IM
FTP
* HTTP
SNMP
VoIP

11) Which port number is used by SMTP?
20
21
* 25
26
110

12) Which protocol is used by e-mail servers to communicate with each other?
FTP
HTTP
TFTP
* SMTP
POP
SNMP

13) What client software enables logged in users to communicate with other logged in
users in real time?
blog
e-mail
web mail
* instant messaging

14) An Internet server is running both FTP and HTTP services. How does the server
know which of these applications should handle an incoming segment?
The packet header identifies it as an HTTP or FTP packet.
The data in the segment is specially formatted for either HTTP or FTP.
* The segment destination port number identifies the application that should handle it.
The source port number is associated with one of these well known server
applications.

15) What term is used to describe how TCP/IP protocols are layered and interact to
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/

format, address, and transmit information across a network?
protocol hierarchy
protocol modeling
* protocol stack
protocol layering

16) hat three items are contained in an Ethernet frame? (Choose three.)
source IP address
* source MAC address
destination IP address
* destination MAC address
* error-checking information

17) What information is contained in an IP header?
* source and destination IP addresses
source and destination MAC addresses
only destination IP and MAC addresses
both source and destination IP and MAC addresses

18) Cabling issues are associated with which OSI layer?
4
2
*1
3

19) A device receives an Ethernet frame and recognizes the MAC address as its own.
What does the device do to the message to get to the encapsulated data?
removes the IP header
removes the TCP header
passes data to the application layer
* removes the Ethernet header and trailer

20) A client has decoded a frame and started the de-encapsulation process. In which
order does the de-encapsulation process occur?
1) remove IP header
2) remove Ethernet header and trailer
3) remove TCP header
4) pass data to the application

1) add TCP header to data
2) add an IP header
3) add frame header and trailer
4) encode the frame into bits

* 1) remove Ethernet header and trailer
2) remove IP header
3) remove TCP header
4) pass data to the application
CCNA Discovery 4.1 - CCNA Discovery Answers
http://ccna-discovery-4.blogspot.com/


1) add TCP header to data
2) add Ethernet header and trailer
3) add an IP header
4) encode the frame into bits

21) What is an advantage of the use of layers in the OSI reference model?
It breaks network communications into larger parts.
It increases complexity.
* It prevents changes in one layer from affecting other layers.
It requires the use of single-vendor equipment for hardware and software
communications.

22) What is the correct order of the layers of the OSI reference model, starting at the
lowest layer and working up the model?
data link, physical, transport, network, presentation, session, application
physical, data link, network, session, transport, presentation, application
physical, data link, network, transport, presentation, session, application
* physical, data link, network, transport, session, presentation, application
application, session, presentation, transport, data link, network, physical

Mais conteúdo relacionado

Mais de ccna4discovery

Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 AnswersCcna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 AnswersCcna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 Answersccna4discovery
 
Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answersccna4discovery
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answersccna4discovery
 
Ccna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 AnswersCcna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 Answersccna4discovery
 
Ccna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 AnswersCcna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 Answersccna4discovery
 
Ccna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 AnswersCcna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 Answersccna4discovery
 
Ccna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 AnswersCcna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 Answersccna4discovery
 
Ccna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 AnswersCcna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 Answersccna4discovery
 

Mais de ccna4discovery (10)

Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answers
 
Ccna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 AnswersCcna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 Answers
 
Ccna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 AnswersCcna 4 Chapter 2 V4.0 Answers
Ccna 4 Chapter 2 V4.0 Answers
 
Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answers
 
Ccna 3 Final V4.0 Answers
Ccna 3 Final V4.0 AnswersCcna 3 Final V4.0 Answers
Ccna 3 Final V4.0 Answers
 
Ccna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 AnswersCcna 3 Chapter 9 V4.0 Answers
Ccna 3 Chapter 9 V4.0 Answers
 
Ccna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 AnswersCcna 3 Chapter 6 V4.0 Answers
Ccna 3 Chapter 6 V4.0 Answers
 
Ccna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 AnswersCcna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 Answers
 
Ccna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 AnswersCcna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 Answers
 
Ccna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 AnswersCcna 1 Chapter 1 V4.0 Answers
Ccna 1 Chapter 1 V4.0 Answers
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Ccna 1 Chapter 6 V4.0 Answers

  • 1. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ CCNA 1 Chapter 6 V4.0 Labels: CCNA 1 Chapter 6 V4.0 1) A user types http://www.cisco.com into a web browser address textbox. What does http://www.cisco.com represent? * the IP address of a web server a physical network address the closest router interface to the source the source IP address in the data transmission 2) What type of server would use IMAP? DNS DHCP * e-mail FTP Telnet web 3) Which type of server would most likely be used first by a network client in a corporate environment? DNS * DHCP e-mail FTP Telnet web 4) Which protocol is used by FTP to transfer files over the Internet? * TCP SMTP UDP SNMP 5) Which protocols are TCP/IP application layer protocols? (Choose two.) UDP * FTP IP * SMTP TCP 6) Which of the following are layers of the TCP/IP model? (Choose three.) * Application Physical * Internet * Network Access Presentation 7) You are creating a network-based video game. What influences your decision
  • 2. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ about which transport protocol to use for the application? * UDP will not disrupt the game to retransmit dropped packets. TCP provides extra acknowledgements that will ensure smooth video delivery. Both TCP and UDP can be used simultaneously to ensure speed and guaranteed delivery. Both TCP and UDP may slow transmission and disrupt game operation, so no transport protocol should be used. 8) Whenever e-mail clients send letters, what device is used to translate the domain names into their associated IP addresses? Uniform Resource Locator Network redirector server SNMP server * DNS server 9) Which application is most likely used to translate http://www.cisco.com to 198.133.219.25? DHCP * DNS FTP HTTP POP SMTP 10)
  • 3. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ Refer to the graphic. Which protocol is used to access this website? IM FTP * HTTP SNMP VoIP 11) Which port number is used by SMTP? 20 21 * 25 26 110 12) Which protocol is used by e-mail servers to communicate with each other? FTP HTTP TFTP * SMTP POP SNMP 13) What client software enables logged in users to communicate with other logged in users in real time? blog e-mail web mail * instant messaging 14) An Internet server is running both FTP and HTTP services. How does the server know which of these applications should handle an incoming segment? The packet header identifies it as an HTTP or FTP packet. The data in the segment is specially formatted for either HTTP or FTP. * The segment destination port number identifies the application that should handle it. The source port number is associated with one of these well known server applications. 15) What term is used to describe how TCP/IP protocols are layered and interact to
  • 4. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ format, address, and transmit information across a network? protocol hierarchy protocol modeling * protocol stack protocol layering 16) hat three items are contained in an Ethernet frame? (Choose three.) source IP address * source MAC address destination IP address * destination MAC address * error-checking information 17) What information is contained in an IP header? * source and destination IP addresses source and destination MAC addresses only destination IP and MAC addresses both source and destination IP and MAC addresses 18) Cabling issues are associated with which OSI layer? 4 2 *1 3 19) A device receives an Ethernet frame and recognizes the MAC address as its own. What does the device do to the message to get to the encapsulated data? removes the IP header removes the TCP header passes data to the application layer * removes the Ethernet header and trailer 20) A client has decoded a frame and started the de-encapsulation process. In which order does the de-encapsulation process occur? 1) remove IP header 2) remove Ethernet header and trailer 3) remove TCP header 4) pass data to the application 1) add TCP header to data 2) add an IP header 3) add frame header and trailer 4) encode the frame into bits * 1) remove Ethernet header and trailer 2) remove IP header 3) remove TCP header 4) pass data to the application
  • 5. CCNA Discovery 4.1 - CCNA Discovery Answers http://ccna-discovery-4.blogspot.com/ 1) add TCP header to data 2) add Ethernet header and trailer 3) add an IP header 4) encode the frame into bits 21) What is an advantage of the use of layers in the OSI reference model? It breaks network communications into larger parts. It increases complexity. * It prevents changes in one layer from affecting other layers. It requires the use of single-vendor equipment for hardware and software communications. 22) What is the correct order of the layers of the OSI reference model, starting at the lowest layer and working up the model? data link, physical, transport, network, presentation, session, application physical, data link, network, session, transport, presentation, application physical, data link, network, transport, presentation, session, application * physical, data link, network, transport, session, presentation, application application, session, presentation, transport, data link, network, physical