思科CCNA1第三章

1. What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

encapsulation ? flow control ? access method ? response timeout

?

2. What type of communication will send a message to all devices on a local area network?

broadcast ? multicast ? unicast ? allcast

?

3. What process is used to place one message inside another message for transfer from the source to the destination?

access control ? decoding ? encapsulation ? flow control

?

4. A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

HTTP, IP, TCP, Ethernet ? HTTP, TCP, IP, Ethernet ? Ethernet, TCP, IP, HTTP ? Ethernet, IP, TCP, HTTP

?

5. Which statement is correct about network protocols?

Network protocols define the type of hardware that is used and how it is mounted in racks.

? They define how messages are exchanged between the source and the

destination.

? They all function in the network access layer of TCP/IP.

? They are only required for exchange of messages between devices on

remote networks.

?

6. Which statement is true about the TCP/IP and OSI models?

The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.

? The TCP/IP network access layer has similar functions to the OSI network

layer.

? The OSI Layer 7 and the TCP/IP application layer provide identical

functions.

? The first three OSI layers describe general services that are also provided

by the TCP/IP internet layer.

?

7. What is an advantage of using standards to develop and implement protocols?

A particular protocol can only be implemented by one manufacturer. ? Products from different manufacturers can interoperate successfully.

? Different manufacturers are free to apply different requirements when

implementing a protocol.

? Standards provide flexibility for manufacturers to create devices that

comply with unique requirements.

?

8. What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)

? ? ? ? ? ?

ARP DHCP DNS FTP NAT PPP

9. What are proprietary protocols?

protocols developed by private organizations to operate on any vendor hardware

? protocols that can be freely used by any organization or vendor

? protocols developed by organizations who have control over their definition

and operation

? a collection of protocols known as the TCP/IP protocol suite

?

10. What is an advantage of network devices using open standard protocols?

Network communications is confined to data transfers between devices from the same vendor.

? A client host and a server running different operating systems can

successfully exchange data.

? Internet access can be controlled by a single ISP in each market. ? Competition and innovation are limited to specific types of products.

?

11. Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?

ITN Chapter 3 Exam Answers 001

only application and Internet layers ? only Internet and network access layers

?

联系客服:779662525#qq.com(#替换为@) 苏ICP备20003344号-4