CISCO CCNA - Book 1, Chapter 4

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By JRoadkill
J
JRoadkill
Community Contributor
Quizzes Created: 4 | Total Attempts: 2,517
Questions: 34 | Attempts: 741

SettingsSettingsSettings
CISCO CCNA - Book 1, Chapter 4 - Quiz

OSI Transport Layer Why there is a need for the transport layer The role of the transport layer as it provides the end-to-end transfer of data between applications The role of two TCP/IP transport layer protocols: TCP and UDP How the key functions of the transport layer protocol, including reliability, port addressing and segmentation, work How TCP and UDP handle the key functions When it is appropriate to use TCP or UDP and some examples of applications that use each protocol


Questions and Answers
  • 1. 

    Based on the transport layer header shown in the diagram, which of the following statements describe the established session? (Choose two)

    • A.

      This is a UDP header

    • B.

      This contains a Telnet request

    • C.

      This contains a TFTP data transfer

    • D.

      The return packet from this remote host will have an Acknowledgement Number of 43693

    • E.

      This is a TCP header

    Correct Answer(s)
    B. This contains a Telnet request
    E. This is a TCP header
    Explanation
    The given transport layer header is a TCP header because it contains a Telnet request. TCP is a connection-oriented protocol commonly used for Telnet, which is a remote login protocol. Therefore, the statement "This is a TCP header" is correct. Additionally, the established session can be inferred from the Telnet request, as Telnet establishes a session between a client and a server. Hence, the statement "This contains a Telnet request" is also correct.

    Rate this question:

  • 2. 

    Refer to the exhibit. What two pieces of information can be determined from the output that is shown? (Choose two)

    • A.

      The local host is using three client sessions

    • B.

      The local host is using web sessions to a remote server

    • C.

      The local host is listening for TCP connections using public addresses

    • D.

      The local host is using well-known port numbers to identify the source ports

    • E.

      The local host is performing the three-way handshake with 192.168.1.101:1037

    Correct Answer(s)
    A. The local host is using three client sessions
    B. The local host is using web sessions to a remote server
    Explanation
    From the output shown, it can be determined that the local host is using three client sessions and is using web sessions to a remote server.

    Rate this question:

  • 3. 

    Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?

    • A.

      Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2

    • B.

      Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2

    • C.

      Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2

    • D.

      Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1

    • E.

      Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1

    • F.

      Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1

    Correct Answer
    F. Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1
    Explanation
    After receiving the SYN message from Host1, Host2 will respond by sending a segment with the ACK flag set to 1 and the SYN flag set to 1. This segment is known as a SYN-ACK segment and it acknowledges the receipt of the SYN message from Host1 while also initiating its own synchronization request. This exchange of SYN and SYN-ACK segments is part of the TCP three-way handshake process, which is used to establish a reliable connection between two hosts.

    Rate this question:

  • 4. 

    Refer to the exhibit. In line 7 of this Wireshark capture, what TCP operation is being performed?

    • A.

      Session establishment

    • B.

      Segment retransmit

    • C.

      Data transfer

    • D.

      Session disconnect

    Correct Answer
    A. Session establishment
    Explanation
    In line 7 of the Wireshark capture, the TCP operation being performed is session establishment. This can be inferred from the context of the question, which is asking about a specific line in the capture. The term "session establishment" refers to the process of establishing a connection between two devices or hosts over a TCP/IP network.

    Rate this question:

  • 5. 

    Refer to the exhibit. Host A is using FTP to download a large file from Server 1. During the download process, Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data. What action will Server 1 take as a result?

    • A.

      Create a Layer 1 jam signal

    • B.

      Reach a timeout and resend the data that needs to be acknowledged

    • C.

      Send a RESET bit to the host

    • D.

      Change the window size in the Layer 4 header

    Correct Answer
    B. Reach a timeout and resend the data that needs to be acknowledged
    Explanation
    If Server 1 does not receive an acknowledgment from Host A for several bytes of transferred data, it will reach a timeout and resend the data that needs to be acknowledged. This is a common mechanism in network communication protocols where if a sender does not receive an acknowledgment within a certain time period, it assumes that the data was not successfully received and retransmits it to ensure its delivery.

    Rate this question:

  • 6. 

    With TCP/IP data encapsulation, which range of port numbers identifies all well-known applications?

    • A.

      0 to 255

    • B.

      256 to 1022

    • C.

      0 to 1023

    • D.

      1024 to 2047

    • E.

      49153 to 65535

    Correct Answer
    C. 0 to 1023
    Explanation
    The well-known applications in TCP/IP data encapsulation are identified by port numbers ranging from 0 to 1023. These port numbers are reserved for commonly used protocols and services such as HTTP (port 80), FTP (port 21), and SSH (port 22).

    Rate this question:

  • 7. 

    Why are port numbers included in the TCP header of a segment?

    • A.

      To indicate the correct router interface that should be used to forward a segment

    • B.

      To identify which switch ports should receive or forward the segment

    • C.

      To determine which Layer 3 protocol should be used to encapsulate the data

    • D.

      To enable a receiving host to forward the data to the appropriate application

    • E.

      To allow the receiving host to assemble the packet in the proper order

    Correct Answer
    D. To enable a receiving host to forward the data to the appropriate application
    Explanation
    Port numbers are included in the TCP header of a segment to enable a receiving host to forward the data to the appropriate application. Port numbers act as identifiers for different applications running on a host. When a segment arrives at the receiving host, the port number in the TCP header helps the host determine which application or process should receive the data. This allows for proper delivery and processing of the data by the intended application.

    Rate this question:

  • 8. 

    Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately?

    • A.

      Application

    • B.

      Presentation

    • C.

      Session

    • D.

      Transport

    • E.

      Network

    Correct Answer
    D. Transport
    Explanation
    The transport layer of the OSI model is responsible for regulating the flow of information from source to destination, reliably and accurately. It ensures that data is transmitted correctly by breaking it into smaller packets, numbering them, and reassembling them at the destination. It also handles error detection and correction, ensuring that the data arrives intact and in the correct order.

    Rate this question:

  • 9. 

    Why is flow control used for TCP data transfer?

    • A.

      To synchronize equipment speed for sent data

    • B.

      To synchronize and order sequence numbers so data is sent in complete numerical order

    • C.

      To prevent the receiver from being overwhelmed by incoming data

    • D.

      To synchronize window size on the server

    • E.

      To simplify data transfer to multiple hosts

    Correct Answer
    C. To prevent the receiver from being overwhelmed by incoming data
    Explanation
    Flow control is used for TCP data transfer to prevent the receiver from being overwhelmed by incoming data. This is important because the sender may transmit data at a faster rate than the receiver can process it. Flow control mechanisms, such as TCP's sliding window protocol, allow the receiver to inform the sender about its available buffer space to avoid congestion and ensure that data is delivered at a manageable pace. By regulating the flow of data, flow control helps maintain reliable and efficient communication between the sender and receiver.

    Rate this question:

  • 10. 

    Which two options represent Layer 4 addressing? (Choose two)

    • A.

      Identifies the destination network

    • B.

      Identifies source and destination hosts

    • C.

      Identifies the communicating applications

    • D.

      Identifies multiple conversations between the hosts

    • E.

      Identifies the devices communicating over the local media

    Correct Answer(s)
    C. Identifies the communicating applications
    D. Identifies multiple conversations between the hosts
    Explanation
    Layer 4 addressing refers to the Transport layer of the OSI model. This layer is responsible for end-to-end communication between hosts and provides services such as segmentation, flow control, and error recovery. The options "identifies the communicating applications" and "identifies multiple conversations between the hosts" represent Layer 4 addressing because they both relate to the communication between applications running on different hosts and the management of multiple simultaneous conversations between these hosts.

    Rate this question:

  • 11. 

    What is dynamically selected by the source host when forwarding data?

    • A.

      Destination logical address

    • B.

      Source physical address

    • C.

      Default gateway address

    • D.

      Source port

    Correct Answer
    D. Source port
    Explanation
    The source port is dynamically selected by the source host when forwarding data. The source port is a 16-bit number that identifies the specific application or process on the source host that is sending the data. It allows the destination host to correctly route the data back to the correct application or process. The source port is randomly chosen by the source host from the available port numbers, and it is used along with the destination IP address and port to establish a unique connection between the source and destination hosts.

    Rate this question:

  • 12. 

    What are two features of the User Datagram Protocol (UDP)? (Choose two)

    • A.

      Flow control

    • B.

      Low overhead

    • C.

      Connectionless

    • D.

      Connection-oriented

    • E.

      Sequence and acknowledgements

    Correct Answer(s)
    B. Low overhead
    C. Connectionless
    Explanation
    UDP has two main features: low overhead and connectionless.

    Low overhead refers to the minimal amount of additional data that UDP adds to the original message. Unlike TCP, which adds a lot of control information, UDP only includes a small header, making it more efficient for transmitting small amounts of data.

    Connectionless means that UDP does not establish a dedicated connection between the sender and receiver before transmitting data. This lack of connection setup and teardown processes makes UDP faster and more lightweight than connection-oriented protocols like TCP.

    Therefore, the correct answer is low overhead and connectionless.

    Rate this question:

  • 13. 

    What mechanism is used by TCP to provide flow control as segments travel from source to destination?

    • A.

      Sequence numbers

    • B.

      Session establishment

    • C.

      Window size

    • D.

      Acknowledgements

    Correct Answer
    C. Window size
    Explanation
    TCP uses the mechanism of window size to provide flow control as segments travel from source to destination. The window size represents the amount of data that the receiver is willing to accept before requiring acknowledgment from the sender. By adjusting the window size, TCP can regulate the rate at which data is sent, preventing congestion and ensuring that the receiver can handle the incoming data. This allows for efficient and reliable transmission of data between the source and destination.

    Rate this question:

  • 14. 

    Which transport layer protocol provides low overhead and would be used for applications which do not require reliable data delivery?

    • A.

      TCP

    • B.

      IP

    • C.

      UDP

    • D.

      HTTP

    • E.

      DNS

    Correct Answer
    C. UDP
    Explanation
    UDP (User Datagram Protocol) is a transport layer protocol that provides low overhead and is used for applications that do not require reliable data delivery. Unlike TCP, UDP does not provide error checking, sequencing, or flow control mechanisms. This makes UDP faster and more efficient for applications such as real-time streaming, online gaming, and DNS queries, where occasional loss of data is acceptable. UDP is a connectionless protocol, meaning it does not establish a direct connection between the sender and receiver before transmitting data packets.

    Rate this question:

  • 15. 

    Which information is found in both the TCP and UDP header information?

    • A.

      Sequencing

    • B.

      Flow control

    • C.

      Acknowledgements

    • D.

      Source and destination port

    Correct Answer
    D. Source and destination port
    Explanation
    Both TCP and UDP header information contain the source and destination port. The source port identifies the sending application or process, while the destination port identifies the receiving application or process. This information is crucial for establishing communication between the sender and receiver.

    Rate this question:

  • 16. 

    Which three features allow TCP to reliably and accurately track the transmission of data from source to destination? (Choose three)

    • A.

      Flow control

    • B.

      Urgent pointer

    • C.

      Best effort delivery

    • D.

      Session establishment

    • E.

      Connectionless services

    • F.

      Numbering and sequencing

    Correct Answer(s)
    A. Flow control
    D. Session establishment
    F. Numbering and sequencing
    Explanation
    TCP uses flow control to ensure that the sender does not overwhelm the receiver with data, allowing for a smooth and efficient transmission. Session establishment is necessary for TCP to establish a connection between the source and destination, ensuring reliable communication. Numbering and sequencing allow TCP to keep track of the order of data packets, ensuring that they are received and assembled correctly at the destination.

    Rate this question:

  • 17. 

    During a TCP communication session, if the packets arrive to the destination out of order, what will happen to the original message?

    • A.

      The packets will not be delivered

    • B.

      The packets will be retransmitted from the source

    • C.

      The packets will be delivered and reassembled at the destination

    • D.

      The packets will be delivered and not reassembled at the destination

    Correct Answer
    C. The packets will be delivered and reassembled at the destination
    Explanation
    In TCP communication, if the packets arrive at the destination out of order, they will still be delivered and reassembled at the destination. TCP uses sequence numbers to ensure that packets are received in the correct order. If packets arrive out of order, the receiver will reassemble them based on their sequence numbers before delivering the original message. This ensures that the data is received accurately and in the correct order, even if the packets were not transmitted in order.

    Rate this question:

  • 18. 

    Which is an important characteristic of UDP?

    • A.

      Acknowledgement of data delivery

    • B.

      Minimal delays in data delivery

    • C.

      High reliability of data delivery

    • D.

      Same order data delivery

    Correct Answer
    B. Minimal delays in data delivery
    Explanation
    UDP (User Datagram Protocol) is a connectionless protocol that operates at the transport layer of the network. It is known for its low latency and minimal delays in data delivery. Unlike TCP, UDP does not provide acknowledgement of data delivery, high reliability, or guaranteed same order data delivery. Due to its lightweight nature, UDP is commonly used for applications that prioritize speed and real-time data transmission, such as video streaming or online gaming. Therefore, the correct characteristic of UDP mentioned in the answer is its minimal delays in data delivery.

    Rate this question:

  • 19. 

    After a web browser makes a request to a web server that is listening to the standard port, what will be the source port number in the TCP header of the response from the server?

    • A.

      13

    • B.

      53

    • C.

      80

    • D.

      1024

    • E.

      1728

    Correct Answer
    C. 80
    Explanation
    When a web browser makes a request to a web server on the standard port, the source port number in the TCP header of the response from the server will be 80. The source port number is used to identify the sending application or process on the client side, and in this case, the web browser is the client application. Port 80 is the standard port for HTTP (Hypertext Transfer Protocol), which is the protocol used for transmitting web pages and other resources over the internet. Therefore, the response from the server will have a source port number of 80.

    Rate this question:

  • 20. 

    Which event occurs during the transport layer three-way handshake?

    • A.

      The two applications exchange data

    • B.

      TCP initializes the sequence numbers for the sessions

    • C.

      UDP establishes the maximum number of bytes to be sent

    • D.

      The server acknowledges the bytes of data received from the client

    Correct Answer
    B. TCP initializes the sequence numbers for the sessions
    Explanation
    During the transport layer three-way handshake, TCP initializes the sequence numbers for the sessions. This process is crucial for establishing a reliable connection between the client and the server. The sequence numbers ensure that the data packets are delivered in the correct order and that no packets are lost during transmission. By initializing the sequence numbers, TCP sets the foundation for a successful and efficient data transfer between the two parties involved.

    Rate this question:

  • 21. 

    Which port number is used by HTTP?

    • A.

      23

    • B.

      80

    • C.

      53

    • D.

      110

    Correct Answer
    B. 80
    Explanation
    HTTP (Hypertext Transfer Protocol) is a protocol used for transmitting web pages over the internet. It operates on port number 80, which is specifically designated for HTTP communication. This port allows web browsers to establish a connection with web servers and retrieve the requested web pages. Therefore, the correct answer is 80.

    Rate this question:

  • 22. 

    Which port number is used with SMTP?

    • A.

      20

    • B.

      23

    • C.

      25

    • D.

      143

    Correct Answer
    C. 25
    Explanation
    SMTP (Simple Mail Transfer Protocol) is a protocol used for sending email messages between servers. The correct answer is 25 because port number 25 is the standard port used for SMTP. This port is used by email clients to connect to the email server and send outgoing emails.

    Rate this question:

  • 23. 

    Which characteristics are part of TCP? (Choose two)

    • A.

      Reliable

    • B.

      Connectionless

    • C.

      No flow control

    • D.

      Resends anything not received

    Correct Answer(s)
    A. Reliable
    D. Resends anything not received
    Explanation
    TCP (Transmission Control Protocol) is a reliable transport protocol that ensures the delivery of data packets in the correct order and without errors. It achieves reliability by implementing various mechanisms such as acknowledgments, retransmissions, and error checking. The statement "Resends anything not received" aligns with TCP's behavior of retransmitting lost or corrupted packets to ensure they are successfully delivered. Therefore, the answer choice "Reliable" is correct as TCP guarantees the reliable delivery of data.

    Rate this question:

  • 24. 

    At the transport layer, which of the following controls is used to keep a transmitting host from overflowing the buffers of a receiving host?

    • A.

      Best effort

    • B.

      Encryption

    • C.

      Flow control

    • D.

      Congestion avoidance

    Correct Answer
    C. Flow control
    Explanation
    Flow control is used at the transport layer to prevent a transmitting host from overwhelming the buffers of a receiving host. It ensures that the transmitting host sends data at a rate that the receiving host can handle, preventing buffer overflow and potential data loss. Flow control techniques include techniques like sliding window protocols, where the receiving host acknowledges received data and specifies how much more data it can accept. By regulating the flow of data, flow control helps maintain reliable and efficient communication between the transmitting and receiving hosts.

    Rate this question:

  • 25. 

    End systems use port numbers to select the proper application. What is the lowest port number that can be dynamically assigned by the host system?

    • A.

      1

    • B.

      128

    • C.

      256

    • D.

      1024

    Correct Answer
    D. 1024
    Explanation
    The lowest port number that can be dynamically assigned by the host system is 1024. Port numbers are used to identify specific processes or services running on an end system. Ports below 1024 are considered well-known ports and are typically reserved for specific services, such as HTTP (port 80) or FTP (port 21). Ports above 1024 can be dynamically assigned by the host system for temporary or less commonly used services.

    Rate this question:

  • 26. 

    During data transfer, what is the receiving host responsible for? (Choose the best two answers)

    • A.

      Encapsulation

    • B.

      Bandwidth

    • C.

      Segmentation

    • D.

      Acknowledgement

    • E.

      Reassembly

    Correct Answer(s)
    D. Acknowledgement
    E. Reassembly
    Explanation
    During data transfer, the receiving host is responsible for two main tasks: acknowledgement and reassembly. Acknowledgement refers to the process of confirming the successful receipt of data packets from the sender. This ensures that the sender knows the data has been received correctly and can proceed with the next transmission. Reassembly, on the other hand, involves reconstructing the original data from the received packets. This is especially important when data is divided into smaller segments for transmission and needs to be reassembled in the correct order at the receiving end.

    Rate this question:

  • 27. 

    Why does TCP use a sequence number in the header?

    • A.

      To reassemble the segments into data

    • B.

      To identify the application layer protocol

    • C.

      To indicate the number of the next expected byte

    • D.

      To show the maximum number of bytes allowed during a session

    Correct Answer
    A. To reassemble the segments into data
    Explanation
    TCP uses a sequence number in the header to reassemble the segments into data. This is because TCP breaks the data into smaller segments for transmission and these segments can arrive out of order at the destination. The sequence number helps the receiver to rearrange the segments in the correct order and reconstruct the original data. By using the sequence number, TCP ensures reliable and ordered delivery of data.

    Rate this question:

  • 28. 

    Which of the following determines how much data a sending host running TCP/IP can transmit before it must receive an acknowledgement?

    • A.

      Segment size

    • B.

      Transmission size

    • C.

      Bandwidth

    • D.

      Window size

    Correct Answer
    D. Window size
    Explanation
    The window size determines how much data a sending host running TCP/IP can transmit before it must receive an acknowledgement. The window size represents the amount of data that the receiving host is willing to accept before sending an acknowledgement back to the sender. It acts as a flow control mechanism, allowing the sender to adjust its transmission rate based on the receiver's capacity to receive data. A larger window size allows for more data to be transmitted before waiting for an acknowledgement, increasing the overall efficiency of the TCP connection.

    Rate this question:

  • 29. 

    What is the purpose of TCP/UDP port numbers?

    • A.

      To indicate the beginning of a three-way handshake

    • B.

      To reassemble the segments into the correct order

    • C.

      To identify the number of data packets that can be sent without acknowledgement

    • D.

      To track the different conversations crossing the network at the same time

    Correct Answer
    D. To track the different conversations crossing the network at the same time
    Explanation
    TCP/UDP port numbers are used to track the different conversations crossing the network at the same time. Each communication session between two devices on a network is assigned a unique port number, allowing multiple conversations to occur simultaneously. This helps in routing the incoming data packets to the correct application or service running on the receiving device. By using port numbers, the network can differentiate between different conversations and ensure that the data reaches the intended destination.

    Rate this question:

  • 30. 

    List three network applications that use TCP. Please separate each answer with a comma and a space.

    Correct Answer
    web, email, file transfer
    web, file transfer, email
    email, web, file transfer
    email, file transfer, web
    file transfer, email, web
    file transfer, web, email
    Explanation
    The correct answer is email, web, file transfer.

    Rate this question:

  • 31. 

    List three network applications that use UDP. Please separate each answer with a comma and a space.

    Correct Answer
    DNS, video, VoIP
    DNS, VoIP, video
    video, DNS, VoIP
    video, VoIP, DNS
    VoIP, DNS, video
    VoIP, video, DNS
  • 32. 

    What is the protocol number for UDP?

    • A.

      1

    • B.

      3

    • C.

      6

    • D.

      17

    Correct Answer
    D. 17
    Explanation
    The protocol number for UDP is 17.

    Rate this question:

  • 33. 

    Which acknowledgement number should be sent by the receiver shown in the exhibit?

    Correct Answer
    7
    Explanation
    The receiver should send an acknowledgement number of 7. This means that the receiver has successfully received and processed all the data up to sequence number 7 from the sender. The acknowledgement number is used to confirm the successful transmission of data and to inform the sender about the next expected sequence number.

    Rate this question:

  • 34. 

    What is the default DNS port number?

    • A.

      1025

    • B.

      53

    • C.

      110

    • D.

      143

    Correct Answer
    B. 53
    Explanation
    The default DNS port number is 53. DNS (Domain Name System) is responsible for translating domain names into IP addresses. It uses port 53 for communication between DNS servers and clients. This port is designated specifically for DNS traffic and is the standard port used for DNS queries and responses.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 27, 2011
    Quiz Created by
    JRoadkill
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.