A PC downloads a large file from a server. The TCP window is 1000 bytes. The server sends the file in 100 byte segments. How many segments does the server send before it needs an acknowledgment from the PC?
- 1 Segment
- 10 Segments
- 100 Segments
- 1000 Segments
Answers Explanation & Notes:
With a 1000 byte window, the target host will accept segments until all 1000 bytes of data have been received. Then the target host sends an acknowledgment.
What factor determines TCP window size?
- the amount of data to be transferred
- the number of services contained in the TCP segment
- the amount of data that the target can process at one time
- the amount of data that the source can send at one time
Answers Explanation & Notes:
Window is the number of bytes the sender sends before expecting an acknowledgment from the target device. The initial window is negotiated during session start via the three-way handshake between source and destination. It is determined by how much data the target device of a TCP session can accept and process at the same time.
What does a client do when it needs to send UDP datagrams?
- It only sends the datagrams.
- It queries the server if it is ready to receive data.
- It sends a simplified three-way handshake to the server.
- It sends a segment with the SYN flag set to the server to synchronize the conversation.
Answers Explanation & Notes:
When a client has UDP datagrams to send, it simply sends the datagrams.
What three fields are used in a UDP segment header? (Choose three.)
- window size
- Long
- Quellport
- confirmation number
- checksum
- sequence number
Answers Explanation & Notes:
A UDP header consists only of the Source Port, Destination Port, Length and Checksum fields. Sequence Number, Acknowledgment Number, and Window Size are TCP header fields.
What are the two roles of the transport layer in data communication in a network? (Choose two.)
- Identifying the right application for each communication stream
- Trace individual communication between applications on the source and destination hosts
- providing a frame boundary to identify bits that make up a frame
- Performing a cyclic redundancy check of the frame for errors
- Providing the interface between applications and the underlying network over which messages travel
Answers Explanation & Notes:
The transport layer has several tasks. The main tasks include:
Trace each communication stream between applications on the source and destination hosts
Segment data at the source and reassemble it at the destination
Identifying the correct application for each communication stream through the use of port numbers
What information does TCP use to reassemble and reorder received segments?
- port numbers
- sequence numbers
- confirmation numbers
- fragment numbers
Antworten Erklärung & Hinweise:
At the transport layer, TCP uses the sequence numbers in the header of each TCP segment to reassemble the segments in the correct order.
What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote network device?
- timing and synchronization
- destination and source port numbers
- physical destination and source addresses
- logical destination and source network addresses
Answers Explanation & Notes:
The destination and source port numbers are used to identify exactly which protocol and process is requesting or responding to a request.
What two characteristics are associated with UDP sessions? (Choose two.)
- Target devices receive traffic with minimal delay.
- Transmitted data segments are tracked.
- Target devices reassemble messages and forward them to an application.
- Received data is not confirmed.
- Unacknowledged data packets are retransmitted.
Answers Explanation & Notes:
TCP:
· Provides tracking of transmitted data segments
· Target devices confirm received data.
· Source devices retransmit unacknowledged data.UDP
· Target devices will not acknowledge received data
· Headers consume very little overhead and cause minimal delays
A client application needs to end a TCP communication session with a server. Arrange the steps of the termination process in the order in which they are performed. (Not all options are used.)

Answers Explanation & Notes:
To end a TCP session, the client sends a segment with the FIN flag set to the server. The server acknowledges the client by sending a segment with the ACK flag set. The server sends a FIN to the client to end the server-to-client session. The client acknowledges completion by sending a segment with the ACK flag set.
What flag in the TCP header is used in response to a received FIN to terminate connectivity between two network devices?
- FIN
- ACK
- SYN
- RST
Answers Explanation & Notes:
When a device has no more data to send in a TCP session, it sends a segment with the FIN flag set. The connected device receiving the segment responds with an ACK to acknowledge that segment. The device that sent the ACK then sends a FIN message to close the connection it has with the other device. Sending the FIN should be followed by receiving an ACK from the other device
What protocol or service uses UDP for client-to-server communication and TCP for server-to-server communication?
- HTTP
- FTP
- DNS
- SMTP
Answers Explanation & Notes:
Some applications can use both TCP and UDP. DNS uses UDP when clients send queries to a DNS server and TCP when two DNS servers communicate directly.
What is a feature of UDP?
- UDP datagrams take the same path and arrive at the destination in the correct order
- Applications using UDP are always considered unreliable
- UDP reassembles the received datagrams in the order in which they were received.
- UDP only submits data to the network when the destination is ready to receive the data.
Answers Explanation & Notes:
UDP has no way of reordering the datagrams in their transmission order, so UDP simply reassembles the data in the order it was received and forwards it to the application
What type of port needs to be requested from the IANA to be used with a specific application?
- registered port
- private port
- Dynamic port
- Quellport
Answers Explanation & Notes:
Registered ports (numbers 1024 through 49151) are assigned by the IANA to a requestor for use with specific processes or applications. These processes are primarily individual applications that a user chose to install, rather than general applications that would be given a known port number. For example, Cisco registered port 1985 for its Hot Standby Routing Protocol (HSRP) process
What three application layer protocols use TCP? (Choose three.)
- SMTP
- FTP
- SNMP
- HTTP
- TFTP
- DHCP
Answers Explanation & Notes:
Some protocols require the reliable data transport provided by TCP. Also, these protocols have no real-time communication requirements and can tolerate some data loss while minimizing protocol overhead. Examples of these protocols are SMTP, FTP and HTTP.
Which three statements characterize UDP? (Choose three.)
- UDP provides basic connectionless transport layer functionality.
- UDP offers a connection-oriented, fast data transport on layer 3.
- UDP relies on application layer protocols for error detection.
- UDP is a low-overhead protocol that does not provide any sequencing or flow control mechanisms.
- UDP relies on IP for error detection and recovery.
- UDP offers sophisticated flow control mechanisms.
Answers Explanation & Notes:
UDP is a simple protocol that provides the basic transport layer functions. It has a much lower overhead than TCP because it is not connection-oriented and does not offer the sophisticated transmission, sequencing, and flow control mechanisms that ensure reliability.
What two fields are in the TCP header but not in the UDP header? (Choose two.)
- Window
- checksum
- Quellport
- destination port
- sequence number
Answers Explanation & Notes:
The sequence number and window fields are included in the TCP header but not in the UDP header.
Which field in the TCP header indicates the status of the three-way handshake process?
- Window
- reserved
- checksum
- control bits
Answers Explanation & Notes:
The value in the control bits field of the TCP header indicates the progress and status of the connection.
Why does HTTP use TCP as the transport layer protocol?
- to ensure the fastest possible download speed
- because HTTP is a best effort protocol
- because transmission errors can easily be tolerated
- because HTTP requires reliable delivery
Answers Explanation & Notes:
(Video) CCNAv7 | Introduction to Networks | Modules 14-15: Network Application Communications ExamWhen a host requests a web page, transmission security and integrity must be guaranteed. Therefore, HTTP uses TCP as the transport layer protocol.
What two types of applications are best suited to UDP? (Choose two.)
- Applications that require data flow control
- Applications that require reliable delivery
- Applications that take care of reliability themselves
- Applications that require segment reordering
- Applications that can tolerate some data loss but require little or no delay
Answers Explanation & Notes:
Applications that can tolerate some data loss, require a simple request and response, and handle themselves with reliability are best suited to UDP. UDP has low overhead and does not require reliability. TCP provides reliability, flow control, and segment reordering services.
How are port numbers used in the TCP/IP encapsulation process?
- Source port numbers and destination port numbers are not required when UDP is the transport layer protocol used for communication.
- Source port and destination port numbers are randomly generated.
- When multiple conversations are taking place using the same service, the source port number is used to keep track of the separate conversations.
- Destination port numbers are assigned automatically and cannot be changed.
Answers Explanation & Notes:
Both UDP and TCP use port numbers to provide a unique identifier for each conversation. Source port numbers are randomly generated and used to track various conversations. Destination port numbers identify specific services using either a default port number for the service or a port number manually assigned by a system administrator.
In what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.)
- when applications need to guarantee that a packet arrives intact, sequential, and non-duplicate
- when a faster delivery mechanism is needed
- if delivery costs are not an issue
- when applications do not have to guarantee the delivery of the data
- if destination port numbers are dynamic
Answers Explanation & Notes:
UDP is a very simple transport layer protocol that does not guarantee delivery. Devices at both ends of the conversation are not required to track the conversation. UDP is used as a transport protocol for applications that require fast and best possible delivery.
What are the three tasks of the transport layer? (Choose three.)
- Meeting the reliability requirements of applications, if any
- Multiplexing of multiple communication streams from many users or applications on the same network
- Identifying the applications and services on the client and server that should process transmitted data
- Forward packets to the destination network
- Format data into a compatible form for reception by target devices
- Perform error detection of the content in frames
Answers Explanation & Notes:
The transport layer has several tasks. Some of the main tasks include the following:
Trace each communication stream between applications on the source and destination hosts
Segment data at the source and reassemble it at the destination
Identifying the correct application for each communication stream through the use of port numbers
Multiplexing of communications from multiple users or applications over a single network
Manage application reliability requirements
Which three statements describe a DHCP Discover message? (Choose three.)
- The source MAC address consists of 48 ones (FF-FF-FF-FF-FF-FF).
- The destination IP address is 255.255.255.255.
- The message comes from a server that offers an IP address.
- The message is from a client looking for an IP address.
- All hosts get the message, but only one DHCP server responds.
- Only the DHCP server receives the message.
Answers Explanation & Notes:
When a host configured to use DHCP boots up on a network, it sends a DHCPDISCOVER message. FF-FF-FF-FF-FF-FF is the L2 broadcast address. A DHCP server responds back to the host with a unicast DHCPOFFER message.
What two protocols are devices allowed to use in the application process that sends email? (Choose two.)
- HTTP
- SMTP
- POP
- IMAP
- DNS
- POP3
Answers Explanation & Notes:
POP, POP3, and IMAP are protocols used to retrieve email from servers. SMTP is the standard protocol used to send emails. DNS can be used by the sender email server to find the address of the destination email server.
What's True About the Server Message Block Protocol?
- Different SMB message types have a different format.
- Clients establish a long-term connection to servers.
- SMB messages cannot authenticate a session.
- SMB uses FTP protocol for communication.
Answers Explanation & Notes:
The Server Message Block protocol is a file, printer, and directory sharing protocol. Clients establish a long-term connection to servers, and when the connection is active, the resources can be accessed. Every SMB message has the same format. Using SMB differs from FTP mainly in the length of the sessions. SMB messages can authenticate sessions.
What is the function of the HTTP GET message?
- to request an HTML page from a web server
- to send error information from a web server to a web client
- Upload content from a web client to a web server
- for retrieving client emails from an email server over TCP port 110
Answers Explanation & Notes:
There are three common HTTP message types: GET - used by clients to request data from the web server
POST - Used by clients to upload data to a web server
PUT - Used by clients to upload data to a web server
Which OSI layer forms the interface between the applications used for communication and the underlying network over which messages are transmitted?
- Application
- presentation
- meeting
- Transport
Answers Explanation & Notes:
(Video) Ethernet Concepts Exam CCNA v7.02 ITNThe application layer is the layer closest to the end user and provides the interface between the underlying network and the applications used for communication.
What network model is used when an author uploads a chapter document to a book publisher's file server?
- Peer-To-Peer
- master-slave
- customer server
- point to point
Answers Explanation & Notes:
In the client/server network model, a network device takes on the role of a server to provide a specific service such as file transfer and storage. The client/server network model does not require the use of a dedicated server, but if one is present, the network model used is the client/server model. In contrast, a peer-to-peer network does not have a dedicated server.
What do the client/server and peer-to-peer network models have in common?
- Both models have dedicated servers.
- Both models support devices in server and client roles.
- Both models require the use of TCP/IP based protocols.
- Both models are only used in the wired network environment.
Answers Explanation & Notes:
Clients and servers exist in both client/server and peer-to-peer network models. A dedicated server does not exist in peer-to-peer networks, but a device can assume the server role to deliver information to a device serving in the client role.
In which network model would eDonkey, eMule, BitTorrent, Bitcoin and LionShare be used?
- Peer-To-Peer
- Client based
- master-slave
- point to point
Answers Explanation & Notes:
In a peer-to-peer network model, data is exchanged between two network devices without using a dedicated server. Peer-to-peer applications such as Shareaz, eDonkey, and Bitcoin allow one network device to take on the role of the server while one or more other network devices take on the role of the client using the peer-to-peer application.
What is a common protocol used with peer-to-peer applications like WireShare, Bearshare, and Shareaza?
- Ethernet
- Gnutella
- POP
- SMTP
Answers Explanation & Notes:
The Gnutella protocol is used when a user shares an entire file with another user. A person would load a Gnutella-based application such as gtk-gnutella or WireShare and use that application to find and access resources shared by others.
What is a key feature of the peer-to-peer network model?
- Wireless networking
- Social networks without internet
- Network printing using a print server
- sharing resources without a dedicated server
Answers Explanation & Notes:
The peer-to-peer (P2P) network model allows data, printers and resources to be shared without a dedicated server
The application layer of the TCP/IP model performs the functions of which three layers of the OSI model? (Choose three.)
- physically
- meeting
- network
- presentation
- Data Connection
- Transport
- Application
Answers Explanation & Notes:
The network access layer of the TCP/IP model performs the same functions as the physical and data link layers of the OSI model. The internetwork layer corresponds to the network layer of the OSI model. The transport layers are the same for both models. The application layer of the TCP/IP model represents the session, presentation, and application layers of the OSI model
What is an example of network communication using the client-server model?
- A user uses eMule to download a file shared by a friend after determining the file's location.
- A workstation initiates an ARP to find the MAC address of a receiving host.
- A user prints a document using a printer attached to a colleague's workstation.
- A workstation initiates a DNS request when the user types www.cisco.com in a web browser's address bar.
Answers Explanation & Notes:
When a user types a website's domain name into a web browser's address bar, a workstation must send a DNS query to the DNS server for the name resolution process. This requirement is a client/server model application. The eMule application is P2P. Sharing a printer on a workstation is a peer-to-peer network. Using ARP is just a broadcast message sent by a host.
What layer in the TCP/IP model is used to format, compress, and encrypt data?
- Internet work
- meeting
- presentation
- Application
- network access
Answers Explanation & Notes:
The application layer of the TCP/IP model performs the functions of three layers of the OSI model - application, presentation and session. The application layer of the TCP/IP model is the layer that provides the interface between applications, is responsible for formatting, compressing, and encrypting data, and is used to create and manage dialogs between source and target applications.
What is an advantage of SMB over FTP?
- Only SMB can transfer data in both directions.
- Only SMB establishes two simultaneous connections with the client, which makes data transfer faster
- SMB is more reliable than FTP because SMB uses TCP and FTP uses UDP
- SMB clients can establish a permanent connection to the server
Answers Explanation & Notes:
(Video) CCNA 1 v7 Modules 4 – 7: Ethernet Concepts Exam AnswersSMB and FTP are client/server protocols used for file transfer. SMB allows the connecting device to access resources as if they were on the local client device. SMB and FTP use the TCP protocol to establish a connection and can transfer data in both directions. FTP requires two connections between the client and the server, one for commands and responses, the other for the actual file transfer.
A manufacturing company subscribes to certain hosted services from its ISP. Required services include hosted World Wide Web, file transfer, and email. Which protocols do these three main applications represent? (Choose three.)
- FTP
- HTTP
- DNS
- SNMP
- DHCP
- SMTP
Answers Explanation & Notes:
The ISP uses the HTTP protocol in connection with hosting websites, the FTP protocol with file transfers, and SMTP with email. DNS is used to translate domain names into IP addresses. SNMP is used for network management traffic. DHCP ic is commonly used to manage IP addressing.
Which application layer protocol uses message types like GET, PUT and POST?
- DNS
- DHCP
- SMTP
- HTTP
- POP3
Answers Explanation & Notes:
The GET command is a client request for data from a web server. A PUT command uploads resources and content, such as images, to a web server. A POST command uploads data files to a web server.
What kind of information is contained in a DNS MX record?
- the FQDN of the alias used to identify a service
- the IP address for an FQDN entry
- the domain name associated with Mail Exchange servers
- the IP address of an authoritative name server
Answers Explanation & Notes:
MX or mail exchange messages are used to map a domain name to multiple mail exchange servers that all belong to the same domain.
What three protocols work at the application layer of the TCP/IP model? (Choose three.)
- ARP
- TCP
- UDP
- FTP
- POP3
- DHCP
Answers Explanation & Notes:
FTP, DHCP and POP3 are application layer protocols. TCP and UDP are transport layer protocols. ARP is a network layer protocol.
What protocol is used by a client to communicate securely with a web server?
- SMTP
- SMEs
- IMAP
- HTTPS
Answers Explanation & Notes:
HTTPS is a secure form of HTTP used to access web content hosted by a web server.
What applications or services allow hosts to act as client and server at the same time?
- Client/Server Applications
- Email Applications
- P2P applications
- authentication services
Answers Explanation & Notes:
P2P applications allow clients to behave as servers when needed. When using authentication services, e-mail exchanges and client/server applications, one host always acts as a server and the other as a client.
What are two characteristics of peer-to-peer networks? (Choose two.)
- scalability
- One-way data flow
- decentralized resources
- centralized user accounts
- sharing resources without a dedicated server
Answers Explanation & Notes:
Peer-to-peer networks have decentralized resources because each computer can serve as both a server and a client. A computer can act as a server for one transaction while acting as a client for another transaction. Peer-to-peer networks can share resources between network devices without using a dedicated server.
Which scenario describes a function provided by the transport layer?
- A student uses a VoIP phone in the classroom to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network.
- A student plays a short web-based movie with sound. The movie and sound are encoded in the transport layer header.
- A student opened two web browser windows to access two websites. The transport layer ensures that the correct web page is delivered to the correct browser window.
- A company employee accesses a web server located on a company network. The transport layer formats the screen so that the webpage is displayed correctly, no matter what device is used to view the website.
Answers Explanation & Notes:
The source and destination port numbers are used to identify the correct application and window within that application.
Which three layers of the OSI model provide network services similar to the application layer of the TCP/IP model? (Choose three.)
- physical layer
- session layer
- transport layer
- application layer
- presentation slide
- data transmission level
Answers Explanation & Notes:
(Video) CCNA 1 v7.0 Final Exam Answers Full – Introduction to Networks 2021 2022 100%The top three layers of the OSI model, the session, presentation, and application layers, provide application services similar to those provided by the application layer of the TCP/IP model. Lower layers of the OSI model are more concerned with data flow.
A PC communicating with a web server has a TCP window size of 6,000 bytes and a packet size of 1,500 bytes when sending data. What byte of information will the web server report back after receiving two packets of data from the PC?
- 3001
- 6001
- 4500
- 6000
A PC communicating with a web server has a TCP window size of 6,000 bytes and a packet size of 1,500 bytes when sending data. What byte of information will the web server report back after receiving three packets of data from the PC?
- 4501
- 6001
- 6000
- 4500
A PC communicating with a web server has a TCP window size of 6,000 bytes and a packet size of 1,500 bytes when sending data. What byte of information will the web server report back after receiving four packets of data from the PC?
- 6001
- 3001
- 1501
- 1500
A PC communicating with a web server has a TCP window size of 6,000 bytes and a packet size of 1,500 bytes when sending data. What byte of information will the web server report back after receiving four packets of data from the PC?
- 6001
- 3001
- 3000
- 1500
A PC communicating with a web server has a TCP window size of 6,000 bytes and a packet size of 1,500 bytes when sending data. What byte of information will the web server report back after receiving two packets of data from the PC?
- 3001
- 4501
- 3000
- 1500
A PC communicating with a web server has a TCP window size of 6,000 bytes and a packet size of 1,500 bytes when sending data. What byte of information will the web server report back after receiving two packets of data from the PC?
- 3001
- 4501
- 4500
- 1500
A PC communicating with a web server has a TCP window size of 6,000 bytes and a packet size of 1,500 bytes when sending data. What byte of information will the web server report back after receiving two packets of data from the PC?
- 3001
- 6001
- 4500
- 3000
A PC communicating with a web server has a TCP window size of 6,000 bytes and a packet size of 1,500 bytes when sending data. What byte of information will the web server report back after receiving two packets of data from the PC?
- 3001
- 6001
- 6000
- 3000
A PC communicating with a web server has a TCP window size of 6,000 bytes and a packet size of 1,500 bytes when sending data. What byte of information will the web server report back after receiving three packets of data from the PC?
- 4501
- 6001
- 6000
- 3000
A PC communicating with a web server has a TCP window size of 6,000 bytes and a packet size of 1,500 bytes when sending data. What byte of information will the web server report back after receiving three packets of data from the PC?
- 4501
- 6001
- 1500
- 4500
A client creates a package that is sent to a server. The client requests the TFTP service. What number is used as the destination port number in the sending packet?
- 69
- 67
- 53
- 80
A client creates a package that is sent to a server. The client requests the FTP service. What number is used as the destination port number in the sending packet?
- 21
- 69
- 67
- 80
A client creates a package that is sent to a server. The client requests the SSH service. What number is used as the destination port number in the sending packet?
- 22
- 69
- 67
- 80
A client creates a package that is sent to a server. The client requests the HTTP service. What number is used as the destination port number in the sending packet?
- 80
- 67
- 53
- 69
A client creates a package that is sent to a server. The client requests the POP3 service. What number is used as the destination port number in the sending packet?
- 110
- 67
- 53
- 69
A client creates a package that is sent to a server. The client requests the telnet service. What number is used as the destination port number in the sending packet?
- 23
- 443
- 161
- 110
A client creates a package that is sent to a server. The client requests the POP3 service. What number is used as the destination port number in the sending packet?
- 110
- 443
- 161
- 80
A client creates a package that is sent to a server. The client requests the SNMP service. What number is used as the destination port number in the sending packet?
- 161
- 443
- 110
- 80
A client creates a package that is sent to a server. The client requests the SMTP service. What number is used as the destination port number in the sending packet?
- 25
- 443
- 161
- 110
A client creates a package that is sent to a server. The client requests the HTTPS service. What number is used as the destination port number in the sending packet?
- 443
- 161
- 110
- 80