当前位置:首页 > 思科CCNA1第三章
1. What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
encapsulation ? flow control ? access method ? response timeout
?
2. What type of communication will send a message to all devices on a local area network?
broadcast ? multicast ? unicast ? allcast
?
3. What process is used to place one message inside another message for transfer from the source to the destination?
access control ? decoding ? encapsulation ? flow control
?
4. A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, IP, TCP, Ethernet ? HTTP, TCP, IP, Ethernet ? Ethernet, TCP, IP, HTTP ? Ethernet, IP, TCP, HTTP
?
5. Which statement is correct about network protocols?
Network protocols define the type of hardware that is used and how it is mounted in racks.
? They define how messages are exchanged between the source and the
destination.
? They all function in the network access layer of TCP/IP.
? They are only required for exchange of messages between devices on
remote networks.
?
6. Which statement is true about the TCP/IP and OSI models?
The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.
? The TCP/IP network access layer has similar functions to the OSI network
layer.
? The OSI Layer 7 and the TCP/IP application layer provide identical
functions.
? The first three OSI layers describe general services that are also provided
by the TCP/IP internet layer.
?
7. What is an advantage of using standards to develop and implement protocols?
A particular protocol can only be implemented by one manufacturer. ? Products from different manufacturers can interoperate successfully.
? Different manufacturers are free to apply different requirements when
implementing a protocol.
? Standards provide flexibility for manufacturers to create devices that
comply with unique requirements.
?
8. What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
? ? ? ? ? ?
ARP DHCP DNS FTP NAT PPP
9. What are proprietary protocols?
protocols developed by private organizations to operate on any vendor hardware
? protocols that can be freely used by any organization or vendor
? protocols developed by organizations who have control over their definition
and operation
? a collection of protocols known as the TCP/IP protocol suite
?
10. What is an advantage of network devices using open standard protocols?
Network communications is confined to data transfers between devices from the same vendor.
? A client host and a server running different operating systems can
successfully exchange data.
? Internet access can be controlled by a single ISP in each market. ? Competition and innovation are limited to specific types of products.
?
11. Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?
ITN Chapter 3 Exam Answers 001
only application and Internet layers ? only Internet and network access layers
?
only application, Internet, and network access layers
? application, transport, Internet, and network access layers
? only application, transport, network, data link, and physical layers ? application, session, transport, network, data link, and physical layers
?
12. Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)
? ? ? ? ? ? ?
application presentation session transport data link physical network
13. At which layer of the OSI model would a logical address be added during encapsulation?
physical layer ? data link layer ? network layer ? transport layer
?
14. Which PDU format is used when bits are received from the network medium by the NIC of a host?
file ? frame ? packet ? segment
?
15. Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?
bits ? frame ? packet
?
共分享92篇相关文档