Skip to content Skip to sidebar Skip to footer

if host1 were to transfer a file to the server, what layers of the tcp/ip model would be used?

1. Pick iii: This organization promotes the open up development, evolution, and use of the Internet throughout the world.. Press spacebar to enter matching mode.

Match the clarification to the system. (Not all options are used.)

ISOC

This organization promotes the open up development, evolution, and use of the Internet throughout the world.

ISO

This organization is the largest developer of international standards in the world for a wide variety of products and services. It is known for its Open Systems Interconnection (OSI) reference model.

EIA

IANA

This system is responsible for overseeing and managing IP address allocation, domain name direction, and protocol identifiers.

two. What iii application layer protocols are part of the TCP/IP protocol suite? (Choose 3.)

ARP

NAT

PPP

DHCP

DNS

FTP

3. Which statement is true almost the TCP/IP and OSI models?​

The OSI Layer vii and the TCP/IP application layer provide identical functions.

The TCP/IP network access layer has like functions to the OSI network layer.​

The TCP/IP send layer and OSI Layer 4 provide similar services and functions.​

The first three OSI layers describe general services that are as well provided by the TCP/IP internet layer.​

four. What process is used to identify one message within another message for transfer from the source to the destination?

admission control

flow control

decoding

encapsulation

5. At which layer of the OSI model would a logical address be added during encapsulation?

send layer

information link layer

physical layer

network layer

Bottom of FormTop of Form

six .

Choice iii: bulletin encapsulation. Press spacebar to enter matching manner.

Lucifer each description to its corresponding term. (Not all options are used.)

the process of determining when to brainstorm sending messages on a network

the process of converting information from one format into some other adequate for transmission

message encoding

the process of placing one message format within another message format

bulletin sizing

the process of unpacking one message format from some other bulletin format

the process of breaking up a long message into individual pieces earlier being sent over the network

message encapsulation

Lesser of Form

7. What is an reward of network devices using open standard protocols?

Network communications is confined to data transfers between devices from the aforementioned vendor.

Competition and innovation are limited to specific types of products.

A client host and a server running different operating systems tin can successfully exchange information.

Internet admission can be controlled by a single Internet service provider in each market.

viii. Which characteristic describes the default gateway of a host computer?

the concrete accost of the switch interface continued to the host computer

the physical address of the router interface on the same network equally the host computer

the logical accost of the router interface on the same network as the host computer

the logical address assigned to the switch interface connected to the router

9. What are proprietary protocols?

protocols that can be freely used by any organisation or vendor

protocols developed by organizations who have control over their definition and operation

protocols developed by private organizations to operate on whatever vendor hardware

a drove of protocols known every bit the TCP/IP protocol suite

10. Which statement is correct about network protocols?

They define how messages are exchanged betwixt the source and the destination.

They all role in the network access layer of TCP/IP.

They are only required for exchange of messages betwixt devices on remote networks.

Network protocols ascertain the type of hardware that is used and how it is mounted in racks.

eleven. What method can exist used by two computers to ensure that packets are not dropped because likewise much data is being sent likewise speedily?

flow control

access method

encapsulation

response timeout

12. What will happen if the default gateway address is incorrectly configured on a host?

The host cannot communicate with other hosts in the local network.

The switch will not forward packets initiated by the host.

The host will have to use ARP to determine the correct address of the default gateway.

The host cannot communicate with hosts in other networks.

A ping from the host to 127.0.0.i would not be successful.

13. What is an advantage of using standards to develop and implement protocols?

A particular protocol can merely be implemented past one manufacturer.

Products from unlike manufacturers tin interoperate successfully.

Standards provide flexibility for manufacturers to create devices that comply with unique requirements.

Different manufacturers are free to apply different requirements when implementing a protocol.

14. Which PDU format is used when $.25 are received from the network medium by the NIC of a host?

segment

frame

file

packet

15. What type of communication will transport a message to all devices on a local area network?

multicast

allcast

unicast

broadcast

16. Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)

awarding

transport

session

physical

network

presentation

information link


17.

Host1 connects to Switch1 and so to Router1. Router1 connects to Router2 via a serial link. Router2 connects to Switch2 and Switch2 connects to a server. Router2 also connects to an ISP via a serial link.

Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?

awarding, session, transport, network, data link, and physical layers

only Internet and network access layers

only application and Cyberspace layers

only application, transport, network, information link, and concrete layers

awarding, transport, Internet, and network access layers

merely application, Internet, and network admission layers

18. Which address does a NIC use when deciding whether to accept a frame?

source MAC address

destination MAC accost

destination IP address

source Ethernet accost

source IP address

19. A spider web client is sending a request for a webpage to a spider web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for manual?

Ethernet, IP, TCP, HTTP

HTTP, IP, TCP, Ethernet

Ethernet, TCP, IP, HTTP

HTTP, TCP, IP, Ethernet

20. Option 4: taking the segments from the transport protocol, encapsulating them into packets, and assigning them with appropriate addresses. Press spacebar to enter matching style.

Lucifer the protocol function to the description while taking into consideration that a network client is visiting a web site. (Not all options are used.)

application protocol

governing the way a web server and a spider web client interact

internet protocol

taking the segments from the transport protocol, encapsulating them into packets, and assigning them with advisable addresses

network access protocol

preparing packets to be transmitted over the network media

network time protocol

transport protocol

managing the private conversations betwixt web servers and web clients

21. Which PDU is processed when a host reckoner is de-encapsulating a message at the transport layer of the TCP/IP model?

frame

segment

bits

bundle

22.

HostA is continued to RouterA through SwitchA. RouterA connects to RouterB via a serial link. RouterB is connected to ServerB through SwitchB.

Refer to the exhibit. HostA is attempting to contact ServerB. Which 2 statements correctly describe the addressing that HostA will generate in the procedure? (Choose two.)

A package with the destination IP address of ServerB.

A frame with the destination MAC accost of SwitchA.

A packet with the destination IP address of RouterA.

A packet with the destination IP address of RouterB.

A frame with the destination MAC address of ServerB.

A frame with the destination MAC address of RouterA.

mathenyprecalf.blogspot.com

Source: https://sulhansubs.blogspot.com/2018/12/ccna1-chapter-3-exam-answer.html

Post a Comment for "if host1 were to transfer a file to the server, what layers of the tcp/ip model would be used?"