The UDP destination port number identifies the application or service on the server which will handle the data.
TCP is the preferred protocol when a function requires lower network overhead.
UDP segments are encapsulated within IP packets for transport across the network.
The source port field identifies the running application or service that will handle data returning to the PC.
The TCP source port number identifies the sending host on the network
The TCP process running on the PC randomly selects the destination port when establishing a session with the server.
When applications need to guarantee that a packet arrives intact, in sequence, and unduplicated
When a faster delivery mechanism is needed
When delivery overhead is not an issue
When applications do not need to guarantee delivery of the data
When destination port numbers are dynamic
The Layer 2 header is stripped from the packet by each router.
The destination Layer 2 address of the packet does not change
The source Layer 3 address of the packet changes at each router.
The Layer 2 header changes at each router
The Layer 3 header is stripped from the packet by each router
Host A sends an ARP request to the MAC address of host D
Host D sends an ARP request to host A.
Host A sends out the packet to the switch. The switch sends the packet only to the host D, which in turn responds
Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address.
Encryption of data
A – from laptop to access point
B – from access point to attached switch
C – from host to default gateway router
D – from router to ISP
Only application and Internet layers
Only Internet and network access layers
Only application, Internet, and network access layers
Application, transport, Internet, and network access layers
Only application, transport, network, data link, and physical layers
Application, session, transport, network, data link, and physical layers
Building a routing table that is based on the first IP address in the frame header
Using the source MAC addresses of frames to build and maintain a MAC address table
Forwarding frames with unknown destination IP addresses to the default gateway
Utilizing the MAC address table to forward frames via the destination MAC address
Examining the destination MAC address to add new entries to the MAC address table
Cisco Discovery Protocol
Internet Control Message Protocol
Whenever you need to protect an unused switch port
Whenever you want the port to only allow a single host device to connect
Whenever you need the port to recognize the statically assigned MAC address in the MAC address table
Whenever multiple devices share the same port
Configure VTP on both switches so they can share VLAN information.
Assign a management VLAN on each switch with IP addresses in the same subnet.
Configure an access port on each switch.
Add a Layer 3 device to the network.
Show SSH connected hosts
Disconnect SSH connected hosts
Create a public and private key pair
Show active SSH ports on the switch
Access the SSH database configuration
There are no collisions in full-duplex mode.
A dedicated switch port is required for each node.
Hub ports are preconfigured for full-duplex mode.
The host network card must detect the availability of the media before transmitting.
The host network card and the switch port must both be in full-duplex mode.
Devices can be configured with a higher transmission priority.
A jam signal indicates that the collision has cleared and the media is not busy.
A device listens and waits until the media is not busy before transmitting.
The device with the electronic token is the only one that can transmit after a collision
All of the devices on a segment see data that passes on the network medium.
After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.
This is a usable host address.
This is a broadcast address.
This is a network address.
This is an Internet-routable address.
Here's an interesting quiz for you.