Beruflich Dokumente
Kultur Dokumente
When a connectionless protocol is in use at a lower layer of the OSI model, how is
missing data detected and retransmitted if necessary?
A. Connectionless acknowledgements are used to request retransmission.
B. Upper-layer connection-oriented protocols keep track of the data received and
can request retransmission from the upper-level protocols on the sending host.
C. Network layer IP protocols manage the communication sessions if connection-
oriented transport services are not available.
D. The best-effort delivery process guarantees that all packets that are sent are
received.
ANSWER: B
Which field in the IPv4 header is used to prevent a packet from traversing a
network endlessly?
A. Time-to-Live
B. Sequence Number
C. Acknowledgment Number
D. Differentiated Services
ANSWER: A
What IPv4 header field identifies the upper layer protocol carried in the packet?
A. Protocol
B. Identification
C. Version
D. Differentiated Services
ANSWER: A
What is one advantage that the IPv6 simplified header offers over IPv4?
A. smaller-sized header
B. little requirement for processing checksums
C. smaller-sized source and destination IP addresses
D. efficient packet handling
ANSWER: D
What type of route is indicated by the code C in an IPv4 routing table on a Cisco
router?
A. static route
B. default route
C. directly connected route
D. dynamic route that is learned through EIGRP
ANSWER: C
What routing table entry has a next hop address associated with a destination
network?
A. directly-connected routes
B. local routes
C. remote routes
D. C and L source routes
ANSWER: C
A message is sent to all hosts on a remote network. Which type of message is it?
A. limited broadcast
B. multicast
C. directed broadcast
D. unicast
ANSWER: C
Refer to the exhibit. A company uses the address block of 128.107.0.0/16 for its
network. What subnet mask would provide the maximum number of equal size subnets
while providing enough host addresses for each subnet in the exhibit?
A. 255.255.255.0
B. 255.255.255.128
C. 255.255.255.192
D. 255.255.255.224
E. 255.255.255.240
ANSWER: B
If a network device has a mask of /28, how many IP addresses are available for
hosts on this network?
A. 256
B. 254
C. 62
D. 32
E. 14
ANSWER: E
How many bits must be borrowed from the host portion of an address to accommodate a
router with five connected networks?
A. 2
B. 3
C. 4
D. 5
ANSWER: B