CCNA Discovery 2 Chapter 7 V4.1 Answers

DsmbISP Chapter 7 – CCNA Discovery: Working at a Small-to-Medium Business or ISP (Version 4.1)

1. Which DNS zone resolves an IP address to a qualified domain name?

dynamic lookup

forward lookup

resolution lookup

reverse lookup

 

2. To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.)

accessibility

adaptability

availability

reliability

scalability

 

3. What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur?

dynamic

zone transfer

local recursive query

root domain query

top-level domain query

 

4. Within TCP, what combination makes up a socket pair?

source port with destination port

source IP address with destination port

source IP address and destination IP address

source IP address and port with a destination IP address and port

 

5. Which two options correctly match protocol and well-known port number? (Choose two.)

DNS - 25

FTP - 110

HTTP - 80

POP3 - 25

SMTP – 25

 

6.

CCNA Discovery 2 Chapter 7

Refer to the exhibit. Which two statements are true about this file? (Choose two.)

If the gateway address changes, the file will be updated dynamically.

The command ping fileserv will use IP address 172.16.5.10.

If the ping www.cisco.com command is issued, the file will be checked for the Cisco web server IP address before DNS is queried.

The file must be created by the user if it is to be used by a workstation.

Name to IP address mappings are added to the file after they are received from DNS.

 

7. What are three characteristics of network reliability? (Choose three.)

Redundant hardware provides enhanced reliability.

Reliability is measured as a percent.

Reliability is the responsibility of the ISP customers.

Fault tolerance is a measure of reliability.

The longer the MTBF, the greater the reliability.

 

8. Which two statements are true about the OSI and TCP/IP models? (Choose two.)

The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model.

The TCP/IP model is a theoretical model and the OSI model is based on actual protocols.

The OSI network layer is comparable to the Internet layer of the TCP/IP model.

The TCP/IP model specifies protocols for the physical network interconnection.

The TCP/IP model is based on four layers and the OSI model is based on seven layers.

 

9.

DsmbISP Chapter 7

Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?

Host1 sends an ACK message to Host2.

Host1 sends a SYN message to Host2.

Host1 sends a SYN-ACK message to Host2.

Host2 sends an ACK message to Host1.

Host2 sends a SYN message to Host1.

Host2 sends a SYN-ACK message to Host1.

 

10. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client?

The server will apply the default service configured in directory services.

The server will use ARP to discover the appropriate service from the local router.

The server will send a request to the client asking for the appropriate service.

The server will determine the appropriate service from the destination port field.

 

11. When a host is communicating with multiple applications on the same server at the same time, which of the following will have the same value for each session? (Choose two.)

IP address

MAC address

session number

sequence number

 

12. Which two statements describe the FTP protocol? (Choose two.)

It uses well-known port 23.

The protocol interpreter is responsible for the data transfer function.

In passive data connections, the FTP client initiates the transfer of data.

It requires two connections between client and server.

FTP servers open a well-known port on the client machine.

 

13. User1 is sending an e-mail to User2@cisco.com. What are two characteristics of the process of sending this data? (Choose two.)

It utilizes TCP port 110.

A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message.

It utilizes a store and forward process.

The same application layer protocol is used to send the e-mail and retrieve it from the destination server.

SMTP is used to send the e-mail message to the mail servers.

 

14. What is the function of the TCP three-way handshake?

It enables the synchronization of port numbers between source and destination hosts.

It immediately triggers the retransmission of lost data.

It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence numbers.

It identifies the destination application on the receiving host.

 

15.

Working at a Small-to-Medium Business or ISP Chapter 7

Refer to the exhibit. The PC is requesting HTTP data from the server. What is a valid representation of source and destination sockets for this request?

Source - 192.168.1.17:80 ; Destination - 192.168.2.39:80

Source - 192.168.1.17:80 ; Destination - 192.168.2.39:1045

Source - 192.168.1.17:1045 ; Destination - 192.168.2.39:80

Source - 192.168.1.17:1045 ; Destination - 192.168.2.39:1061

 

16. What type of DNS server is typically maintained by an ISP?

caching-only

root

second-level

top-level

 

17. Which protocol is used to send e-mail, either from a client to a server or from a server to another server?

SNMP

FTP

SMTP

HTTPS

 

18. Which two tasks are the responsibility of the local DNS server? (Choose two.)

maintaining a large number of cached DNS entries

maintaining the ISP server

mapping name-to-IP addresses for internal hosts

forwarding name resolution requests to a caching-only server

forwarding all name resolution requests to root servers on the Internet

 

19. A manufacturing company is looking into subscribing to services from a new ISP. The company requires hosted world wide web, file transfer, and e-mail services. Which three protocols represent the key application services that are required by the company? (Choose three.)

FTP

HTTP

ICMP

PPP

Telnet

SMTP

 

20. What are three unique characteristics of UDP? (Choose three.)

connection oriented

full-duplex operation

low overhead

no flow control

no error-recovery function

reliable transmission

 

21. What are three characteristics of HTTPS? (Choose three.)

It uses a different client request-server response process than HTTP uses.

It specifies additional rules for passing data between the application and data link layers.

It supports authentication.

It allows more simultaneous connections than HTTP allows.

It encrypts packets with SSL.

It requires additional server processing time.

Leave a Reply