Introduction to Networks (version 6.00) – ITN Chapter 9 Exam Beta Answers 2018 100%

Last Updated on January 20, 2019 by Admin

Introduction to Networks (version 6.00) – ITN Chapter 9 Exam Beta Answers 2018 100%

Cisco CCNA 1 ITN v6.0 chapter 9 exam beta answers Routing and Switching (R&S) Introduction to Networks (ITN) (Version 6.00) collection year 2017, 2018 and 2019 Full 100%. CCNA 1 has been know as ITN. The following are the questions exam answers. Guarantee Passed 100%. CCNA 1 v6.0 chapter 9 exam beta answers has some new update from ITN version 6.0 without beta. You can review all chapter 9 exam beta answers. You will get passed scored 100% with this version 6.0. Good Luck for Cisco Netacad ITN v6.0 Exam or ITN Pilot version 6.0 !

This is the first release of this form for the CCNA R&S Introduction to Networks curriculum from Cisco Netacad.com. There are 31 items are available in ITN Chapter 9 Exam Beta. You will get only selected 18 items which are displayed in random sequence, while you take exam with Cisco Netacad.

  1. A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgment from the PC?

    • 1 segment
    • 10 segments
    • 100 segments
    • 1000 segments
      Explanation:

      With a window of 1000 bytes, the destination host accepts segments until all 1000 bytes of data have been received. Then the destination host sends an acknowledgment.
  2. Which scenario describes a function provided by the transport layer?

    • A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network.
    • A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header.
    • A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.
    • A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site.
      Explanation:

      The source and destination port numbers are used to identify the correct application and window within that application.
  3. Which transport layer feature is used to guarantee session establishment?

    • UDP ACK flag
    • TCP 3-way handshake
    • UDP sequence number
    • TCP port number
      Explanation:

      TCP uses the 3-way handshake. UDP does not use this feature. The 3-way handshake ensures there is connectivity between the source and destination devices before transmission occurs.
  4. Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)

    • ACK
    • FIN
    • PSH
    • RST
    • SYN
    • URG
      Explanation:

      TCP uses the SYN and ACK flags in order to establish connectivity between two network devices.
  5. What happens if part of an FTP message is not delivered to the destination?

    • The message is lost because FTP does not use a reliable delivery method.
    • The FTP source host sends a query to the destination host.
    • The part of the FTP message that was lost is re-sent.
    • The entire FTP message is re-sent.
      Explanation:

      Because FTP uses TCP as its transport layer protocol, sequence and acknowledgment numbers will identify the missing segments, which will be re-sent to complete the message.
  6. Which factor determines TCP window size?

    • the amount of data to be transmitted
    • the number of services included in the TCP segment
    • the amount of data the destination can process at one time
    • the amount of data the source is capable of sending at one time
      Explanation:

      Window is the number of bytes that the sender will send prior to expecting an acknowledgement from the destination device. The initial window is agreed upon during the session startup via the three-way handshake between source and destination. It is determined by how much data the destination device of a TCP session is able to accept and process at one time.
  7. What is a socket?

    • the combination of the source and destination IP address and source and destination Ethernet address
    • the combination of a source IP address and port number or a destination IP address and port number
    • the combination of the source and destination sequence and acknowledgment numbers
    • the combination of the source and destination sequence numbers and port numbers
      Explanation:

      A socket is a combination of the source IP address and source port or the destination IP address and the destination port number.
  8. During a TCP session, a destination device sends an acknowledgment number to the source device. What does the acknowledgment number represent?

    • the total number of bytes that have been received
    • one number more than the sequence number
    • the next byte that the destination expects to receive
    • the last sequence number that was sent by the source
  9. What is the complete range of TCP and UDP well-known ports?

    • 0 to 255
    • 0 to 1023
    • 256 – 1023
    • 1024 – 49151
      Explanation:

      There are three ranges of TCP and UDP ports. The well-know range of port numbers is from 0 – 1023.
  10. What happens if the first packet of a TFTP transfer is lost?

    • The client will wait indefinitely for the reply.
    • The TFTP application will retry the request if a reply is not received.
    • The next-hop router or the default gateway will provide a reply with an error code.
    • The transport layer will retry the query if a reply is not received.
      Explanation:

      The TFTP protocol uses UDP for queries, so the TFTP application must implement the reliability, if needed.
  11. What does a client do when it has UDP datagrams to send?

    • It just sends the datagrams.
    • It queries the server to see if it is ready to receive data.
    • It sends a simplified three-way handshake to the server.
    • It sends to the server a segment with the SYN flag set to synchronize the conversation.
      Explanation:

      When a client has UDP datagrams to send, it just sends the datagrams.
  12. A host device needs to send a large video file across the network while providing data communication to other users. Which feature will allow different communication streams to occur at the same time, without having a single data stream using all available bandwidth?

    • window size
    • multiplexing
    • port numbers
    • acknowledgments
      Explanation:

      Multiplexing is useful for interleaving multiple communication streams. Window size is used to slow down the rate of data communication. Port numbers are used to pass data streams to their proper applications. Acknowledgments are used to notify a sending device that a stream of data packets has or has not been received.
  13. What information is used by TCP to reassemble and reorder received segments?

    • port numbers
    • sequence numbers
    • acknowledgment numbers
    • fragment numbers
      Explanation:

      At the transport layer, TCP uses the sequence numbers in the header of each TCP segment to reassemble the segments into the correct order.
  14. Which two characteristics are associated with UDP sessions? (Choose two.)

    • Destination devices receive traffic with minimal delay.
    • Transmitted data segments are tracked.
    • Destination devices reassemble messages and pass them to an application.
    • Received data is unacknowledged.
    • Unacknowledged data packets are retransmitted.
      Explanation:

      TCP:
      · Provides tracking of transmitted data segments
      · Destination devices will acknowledge received data.
      · Source devices will retransmit unacknowledged data.

      UDP
      · Destination devices will not acknowledge received data
      · Headers use very little overhead and cause minimal delay.​

  15. A host device is receiving live streaming video. How does the device account for video data that is lost during transmission?

    • The device will immediately request a retransmission of the missing data.
    • The device will use sequence numbers to pause the video stream until the correct data arrives. ​
    • The device will delay the streaming video until the entire video stream is received.
    • The device will continue receiving the streaming video, but there may be a momentary disruption.
      Explanation:

      When TCP is used as the transport protocol, data must be received in a specific sequence or all data must be fully received in order for it to be used. TCP will use sequence numbers, acknowledgments and retransmission to accomplish this. However, when UDP is used as the transport protocol, data that arrives out of order or with missing segments may cause a momentary disruption, but the destination device may still be able to use the data that it has received. This technology results in the least amount of network delay by providing minimal reliability. Since live streaming video applications use UDP as the transport protocol, the receiver will continue showing the video although there may be a slight delay or reduction in quality.
  16. Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?

    • FIN
    • ACK
    • SYN
    • RST
      Explanation:

      In a TCP session, when a device has no more data to send, it will send a segment with the FIN flag set. The connected device that receives the segment will respond with an ACK to acknowledge that segment. The device that sent the ACK will then send a FIN message to close the connection it has with the other device. The sending of the FIN should be followed with the receipt of an ACK from the other device.​
  17. What type of information is included in the transport header?

    • destination and source logical addresses
    • destination and source physical addresses
    • destination and source port numbers
    • encoded application data
      Explanation:

      In a segment, the transport layer header will include the source and destination process, or port numbers. Destination and source physical addressing is included in the frame header. Destination and source logical addressing is included in the network header. Application data is encoded in the upper layers of the protocol stack.
  18. What is the TCP mechanism used in congestion avoidance?

    • three-way handshake
    • socket pair
    • two-way handshake
    • sliding window
      Explanation:

      TCP uses windows to attempt to manage the rate of transmission to the maximum flow that the network and destination device can support while minimizing loss and retransmissions. When overwhelmed with data, the destination can send a request to reduce the of the window. This congestion avoidance is called sliding windows.
  19. Which protocol or service uses UDP for a client-to-server communication and TCP for server-to-server communication?

    • HTTP
    • FTP
    • DNS
    • SMTP
      Explanation:

      Some applications may use both TCP and UDP. DNS uses UDP when clients send requests to a DNS server, and TCP when two DNS serves directly communicate.
  20. What is a characteristic of UDP?

    • UDP datagrams take the same path and arrive in the correct order at the destination.​
    • Applications that use UDP are always considered unreliable.​
    • UDP reassembles the received datagrams in the order they were received.
    • UDP only passes data to the network when the destination is ready to receive the data.
      Explanation:

      UDP has no way to reorder the datagrams into their transmission order, so UDP simply reassembles the data in the order it was received and forwards it to the application.​
  21. What kind of port must be requested from IANA in order to be used with a specific application?

    • registered port
    • private port
    • dynamic port
    • source port
      Explanation:

      Registered ports (numbers 1024 to 49151) are assigned by IANA to a requesting entity to use with specific processes or applications. These processes are primarily individual applications that a user has chosen to install, rather than common applications that would receive a well-known port number. For example, Cisco has registered port 1985 for its Hot Standby Routing Protocol (HSRP) process.​
  22. What is a characteristic of a TCP server process?

    • Every application process running on the server has to be configured to use a dynamic port number.
    • There can be many ports open simultaneously on a server, one for each active server application.
    • An individual server can have two services assigned to the same port number within the same transport layer services.
    • A host running two different applications can have both configured to use the same server port.
      Explanation:

      Each application process running on the server is configured to use a port number, either by default or manually, by a system administrator. An individual server cannot have two services assigned to the same port number within the same transport layer services. A host running a web server application and a file transfer application cannot have both configured to use the same server port. There can be many ports open simultaneously on a server, one for each active server application.
  23. Which three application layer protocols use TCP? (Choose three.)

    • SMTP
    • FTP
    • SNMP
    • HTTP
    • TFTP
    • DHCP
      Explanation:

      Some protocols require the reliable data transport that is provided by TCP. In addition, these protocols do not have real time communication requirements and can tolerate some data loss while minimizing protocol overhead. Examples of these protocols are SMTP, FTP, and HTTP.
  24. What does TCP do if the sending source detects network congestion on the path to the destination?

    • The source host will send a request for more frequent acknowledgments to the destination.
    • The source will decrease the amount of data that it sends before it must receive acknowledgements from the destination.
    • The destination will request retransmission of the entire message.
    • The source will acknowledge the last segment that is sent and include a request for a smaller window size in the message.
      Explanation:

      If the source determines that TCP segments are either not being acknowledged or not acknowledged in a timely manner, then it can reduce the number of bytes it sends before receiving an acknowledgment. Notice that it is the source that is reducing the number of unacknowledged bytes it sends. This does not involve changing the window size in the segment header.
  25. What is a responsibility of transport layer protocols?

    • providing network access
    • tracking individual conversations
    • determining the best path to forward a packet
    • translating private IP addresses to public IP addresses
      Explanation:

      There are three main responsibilities for transport layer protocols TCP and UDP:

      • Tracking individual conversations
      • Segmenting data and reassembling segments
      • Identifying the applications
  26. What is a key difference between TCP and UDP?

    • TCP segments data as needed and UDP does not.
    • TCP does not support streaming video whereas UDP does.
    • TCP provides reliability for a conversation but UDP does not.
    • TCP uses multiplexing to accommodate different applications whereas UDP does not.
      Explanation:

      TCP is considered a reliable transport layer protocol that ensures that all of the data arrives at the destination. UDP is a simpler transport layer protocol that does not provide for reliability. Both TCP and UDP segment data packets, support streaming video, and use multiplexing to accommodate different network applications.
  27. Which two operations are provided by TCP but not by UDP? (Choose two.)

    • identifying the applications
    • acknowledging received data
    • tracking individual conversations
    • retransmitting any unacknowledged data
    • reconstructing data in the order received
      Explanation:

      Numbering and tracking data segments, acknowledging received data, and retransmitting any unacknowledged data are reliability operations to ensure that all of the data arrives at the destination. UDP does not provide reliability. Both TCP and UDP identify the applications and track individual conversations. UDP does not number data segments and reconstructs data in the order that it is received.
  28. Which two fields are included in the TCP header but not in the UDP header? (Choose two.)

    • window
    • checksum
    • source port
    • destination port
    • sequence number
      Explanation:

      The sequence number and window fields are included in the TCP header but not in the UDP header.
  29. Which field in the TCP header indicates the status of the three-way handshake process?

    • window
    • reserved
    • checksum
    • control bits
      Explanation:

      The value in the control bits field of theTCP header indicates the progress and status of the connection.
  30. Which type of source port number is commonly used by a server when responding to a UDP client request?

    • well-known port
    • randomly selected port
    • dynamically generated port
    • the source port contained in the client reques
      Explanation:

      When a client sends a request to a server via UDP, the client uses a random port number as the source port and the well-known service port as a destination port. In response to the request, the server uses the random port number as the destination port and the well-known port as the source port in the return packet.
  31. Which two types of applications are best suited for UDP? (Choose two.)

    • applications that need data flow control
    • applications that require reliable delivery
    • applications that handle reliability themselves
    • applications that need the reordering of segments
    • applications that can tolerate some data loss, but require little or no delay
      Explanation:

      Applications that can tolerate some data loss, require a simple request and reply, and handle reliability themselves are best suited for UDP. UDP has low overhead and no requirement of reliability. TCP provides services for reliability, controlling data flow, and the reordering of segments.