1. If Host A is setting up a three-way handshake with Host B, and Host A sends a segment with sequence number n to Host B, what is Host B going to send back to Host A as an acknowledgment?

  2. A. n
    B. n1
    C. n + n
    D. n + 1

  3. Which protocol is found in the Transport Layer?

  4. A. IPX
    B. LLC
    C. RIP
    D. UDP

  5. What is the purpose of ICMPs?

  6. A. They put the internetwork in control mode so that protocols can be set up.
    B. They are messages that the network uses to monitor connection protocols
    C. They are standard binary messages that act as model internetwork protocols
    D. They are messages carried in IP datagrams used to send error and control messages

  7. What provides sequencing of segments with a forward reference acknowledgment, numbers datagrams before transmission, and reassembles the segments into a complete message?

  8. A. Simple UDP acknowledgment
    B. Expectational acknowledgments
    C. TCP sequence and acknowledgment numbers
    D. Header checksums and data protocol checksums

  9. What is the function of ARP?

  10. A. It is used to map a known MAC address to an unknown IP address
    B. It is used to develop a cached Layer 4 address resource table
    C. It is used to map a known IP address to an unknown MAC address
    D. It sends a broadcast message looking for the router IP address

  11. Which layer in the TCP/IP model includes file transfer, e-mail, remote login, and network management?

  12. A. Application
    B. Transport
    C. Internet
    D. Network

  13. At which Layer of the OSI model would flow control problems exist?

  14. A. Application
    B. Presentation
    C. Session
    D. Transport

  15. If a device on a network does not know its Layer 3 address how can it find it?

  16. A. ARP
    B. RARP
    C. Sends an alert to the network administrator
    D. Broadcasts a request to the Domain Name Server (DNS) for help

  17. What best describes the function of broadcast addresses?

  18. A. Used to send a message to all nodes on a network/subnet
    B. Used to send a message to a single network destination
    C. Used to send a message to every node the router has access to.
    D. Used to send a message to every router on a network in a WAN

  19. If you want to associate a name with an IP address, such as asu 129.219.2.1, what command structure would you use?

  20. A. ip name asu 129.219.2.1
    B. ip host asu 129.219.2.1
    C. ip host name asu 129.219.2.1
    D. ip host address asu 129.219.2.1

  21. What is the purpose of the protocol field?

  22. A. Allows dynamic generation of source protocols
    B. Changes other protocols so that they can be used by IP
    C. Numbers the Layer 3 protocol and makes it similar to a port number
    D. Determines the Layer 4 protocol being carried within an IP datagram

  23. If a router has a serial interface S0, with IP address 107.85.20.2, using a subnet mask of 255.255.255.240, what is the broadcast address used for hosts on this subnet?

  24. A. 107.85.20.15
    B. 107.85.20.255
    C. 107.85.255.255
    D. 107.255.255.255

  25. In the output of show hosts , what does perm mean?

  26. A. The entry has not yet expired.
    B. The entry was acquired from DNS use.
    C. The entry was learned from DNS and now has permanent status.
    D. The entry was manually configured in a static host table.

  27. How are IP addresses usually expressed?

  28. A. Binary code
    B. 4 octet subnet m
    C. 32-bit dotted decimal
    D. Transmission control protocol

  29. What is one way port numbers are used?

  30. A. Source systems generate port numbers to predict destination addresses
    B. To keep track of different conversations crossing the network at the same time
    C. Source systems use port numbers to keep session organized and to select the proper application
    D. End systems use port numbers to dynamically assign end users to a particular session, depending on their application use

  31. If you want to turn off the name-to-address translation in the router, which command would you use?

  32. A. no ip host
    B. no ip address
    C. no ip name-search
    D. no ip domain-lookup

  33. What does the response * mean, when it comes in response to the trace command

  34. A. The network refused the trace
    B. Timed out waiting for trace reply
    C. The destination device refused the trace
    D. The source used a trace that was not supported by the network protocol

  35. If you want to specify one or more hosts that supply host name information, which command would you use?

  36. A. ip host
    B. ip address
    C. ip name-server
    D. ip domain-lookup

  37. What is the purpose of ICMP testing?

  38. A. Determines if messages reach their destination
    B. Makes sure that all activity on the network is being monitored
    C. Determines if the network is in privileged mode or user mode

  39. Which of the following best describes the TCP/IP protocol stack?

  40. A. Transfers information in a sequence of datagrams
    B. Enables communication among any set of interconnected networks
    C. Maps closely to the OSI reference model in the upper layers
    D. Reassembles datagrams into complete messages at the receiving location

  41. How does the Cisco IOS software deal with name-to-address mappings?

  42. A. It does not use name-to-address mappings
    B. It takes each IP address and assigns a unique name to it.
    C. It identifies the subnet mask being used at the destination site and routes data there
    D. It maintains a cache of host name-to-address mappings for use by commands

  43. Which command locates path failures from the source to destination?

  44. A. ARP
    B. Ping
    C. Trace
    D. Telnet

  45. What will the source do if it is using a window size that is too large for the destination to handle and does not receive an acknowledgement from the destination?

  46. A. Resend the data
    B. Stop sending data
    C. Confirm the window size with the destination
    D. Query the destination to see if the line is still up

  47. Which of the following best describes TCP/IP?

  48. A. 7 Layer Model that enables communication among any set of interconnected networks
    B. Proprietary protocol that can only be used with WANs
    C. Proprietary protocol that can only be used with LANs
    D. Allows communication among a variety of interconnected networks and can be used in both LANs and WANs
  49. A router received a packet with a destination address of 172.16.14.228. Assuming a subnet mask of 255.255.248.0, what is the subnet network address for the destination host?

  50. A. 172.16.1.0
    B. 172.16.4.0
    C. 172.16.8.0
    D. 172.16.12.0