To all those who desire to learn Cisco Certified Network combine (CCNA) and who desire to take the CCNA exam


Which OSI class is connected with the following: The acknowledgement that transmissions, sequencing, and flow control across a network?A. Class 2B. Class 3C. Great 4D. Layer 5E. Layer 6F. Great 7Answer: CExplanation:The transport layer (Layer 4) defines several functions, consisting of the choice of protocols. The most vital Layer 4 features are error recovery and also flow control. The move layer may provide for retransmission, i.e., error recovery, and may use flow manage to prevent unnecessary jam by attempting come send data at a price that the network deserve to accommodate, or it might not, depending on the choice of protocols. Multiplexing of incoming data for different flows to applications on the same hold is additionally performed. Reordering of the just arrived data stream once packets arrive out of order is included. Examples include: TCP, UDP, and also SPX.QUESTION 22Which OSI class header consists of the deal with of a destination host that is on one more network?A. ApplicationB. PresentationC. SessionD. TransportE. NetworkF. Data linkG. PhysicalAnswer: EExplanation:Only network deal with contains this information. To transmit the packets the sender provides network resolve and datalink address. But the great 2 deal with represents just the resolve of the following hop machine on the method to the sender. It is changed on every hop. Network deal with remains the same.QUESTION 23Which that the adhering to correctly explain steps in the OSI data encapsulation process? choose two)A. The presentation layer translates bits into voltages for transmission throughout the physical link.B. The carry layer divides a data stream right into segments and also adds reliability and also flow manage information.C. Packets are created when the network layer add to Layer 3 addresses and control details to a segment.D. The data attach layer add to physical source and destination addresses and an FCS come the segment.E. Packets are created when the network great encapsulates a structure with resource and location host addresses and also protocol-related control information.Answer: B, CExplanation:The transport Layer:You deserve to think of the transfer layer the the OSI design as a boundary in between the upper and lower protocols. The transport layer provides a data transport service that shields the top layers from transport implementation issues such together the reliability of a connection.The transfer layer provides mechanisms for:Segmenting top layer applicationThe establishment, maintenance, and also orderly discontinuation of digital circuits information circulation control and reliability via TCPTransport fault detection and also recoveryThe Network Layer:Layer three of the OSI design is the network layer.The network great creates and also sends packets from source network to destination network. That provides regular end-to-end packet delivery service and control information it creates and uses layer3 addresses for usage in path determination and also to front packets.Incorrect Answers:A: This correctly explains the physical layer, not the presentation layer.D: back the data connect layer adds physical (MAC) source and destination addresses, that adds it come a frame, not a segment.E: Packets are encapsulated, not frames.QUESTION 24When documents are transferred in between a host and also an FTP server, the data is split into smaller sized pieces for transmission. Together these piece arrive in ~ the location host, they need to be reassembled to rebuild the original file. What gives for the reassembly of these pieces into the exactly order?A. The succession number in the TCP headerB. The Start structure Delimiter in the 802.3 PreambleC. The TTL in the IP headerD. The acknowledgement number in the segment headerE. The frame check sequence in the Ethernet framework trailerAnswer: AExplanation:The move layer can carry out reliable networking via acknowledgments, sequencing, and also flow control. Acknowledgments yielded segments are identified to the sender. If they room not acknowledged, the sender will certainly retransmit. Sequencing Data segments are sequenced right into their original order as soon as they come at the destination. Flow manage Provides buffer controls that protect against packet flooding to the destination host. Buffers keep bursts that data because that processing as soon as the infection is complete. Great 4 protocols encompass the following:Transmission manage Protocol (TCP)User Datagram Protocol (UDP)Sequenced Packet Exchange (SPX) A reliable interactions protocol developed by Novell NetWareQUESTION 25DRAG DROPYou work as a network administrator at Certkiller .com.Your boss, Mrs. Certkiller, is interested in the OSI layers. Complement the terms v the ideal layer. Some alternatives are not used.

You are watching: Which osi layer header contains the address of a destination host that is on another network

*
Answer :
*
Explanation:The transport layer segments and reassembles data into a data stream. Services locatedin the transport layer segment and also reassemble data native upper-layer applications andunite it into the exact same data stream. They administer end-to-end data transport solutions andcan establish a logical connection in between the sending out host and also destination host on aninternetwork.TCP and UDP transfer protocol lies on deliver Layer, which break down the data comes from upper layer into segment.Windows are used to manage the quantity of outstanding, unacknowledged data segments the is likewise on move Layer.Network Layer:The Network class (also dubbed layer 3) manages device addressing, monitor the place of tools on the network, and determines the best way to relocate data, which method that the Network layer need to transport traffic between devices the aren"t in your ar attached. Routers (layer 3 devices) room specified at the Network layer and carry out the routing solutions within an internetwork. Protocol Data Packets (PDU) ~ above Network layer is recognized as Packets. Routing and also Routed protocols are lies ~ above Network Layer.Routing Protocol: RIP, IGRP, EIGRP, OSPF, BGPRouted Protocol: IP, IPXQUESTION 26Refer come the complying with exhibit:
*
What data framework is defined in the exhibit displayed above?A. IP datagramB. TCP segmentC. Ethernet frameD. UDP datagramE. FDDI frameF. Token Ring frameG. None of the aboveAnswer: BExplanation:The Figure listed below illustrates the fields and also overall layout of a TCP packet. Twelve fields make up a TCP packet.
*
The adhering to descriptions summarize the TCP packet fields portrayed above.SourcePort and DestinationPort-Identifies points in ~ which upper-layer source and location processes get TCP services. Succession Number-Usually states the number assigned to the very first byte the data in the present message. In the connection-establishment phase, this field additionally can be supplied to identify an initial succession number come be used in an upcoming transmission. Acknowledgment Number-Contains the sequence variety of the next byte that data the sender the the packet expects come receive. Data Offset-Indicates the number of 32-bit words in the TCP header. Reserved-Remains reserved for future use. Flags-Carries a range of regulate information, consisting of the SYN and also ACK bits supplied for link establishment, and also the FIN bit used for link termination. Window-Specifies the size of the sender"s receive home window (that is, the buffer space available for incoming data). Checksum-Indicates whether the header was damaged in transit. Immediate Pointer-Points to the first urgent data byte in the packet. Options-Specifies assorted TCP options. Data-Contains upper-layer information. Inquiry 27Network devices supporting the usage of flow control mechanisms has actually been recently installed in the Certkiller network. What is the purpose of flow control in a data network?A. It ensures that data is retransmitted if one acknowledgment is no received.B. It reassembles segment in the correct order on the destination device.C. It gives a device for the recipient to manage the transmission speed.D. It regulates the size of each datagram segment.E. All of the over are attributes of flow controlAnswer: CExplanation:Flow manage paces the infection of data between a sending device and a receiving device. Flow manage ensures the the receiving device can absorb the data sent out to it before the sending device sends more. As soon as the buffers on the receiving maker are full, a blog post is sent to the sending an equipment to suspend transmission until the data in the buffers has been processed.Incorrect Answers:A. Data retransmission mechanisms are not taken on by control. They space most frequently handled by deliver layer protocols such together TCP.B. This describes the reassembly part of the segmentation and reassembly (SAR) function of network equipment.D. The maximum infection unit (MTU) handles the regulation of maximum framesizes.QUESTION 28Part of the Certkiller network is shown below:
*
Study the exhibit shown above. Hold Certkiller A has created a link with the Certkiller II server attached to interface E0 that the Certkiller 2 router. I m sorry of the following statements define the information included in protocol data units sent from organize Certkiller come Certkiller II? (Choose three)A. The destination port number in a segment header will have a value of 80B. The location IP resolve of a packet will be the IP resolve of the E0 interface of the Certkiller 1 routerC. The destination IP address of a packet will certainly be the IP resolve of the network user interface of the Certkiller II serverD. The destination resolve of a framework will be the MAC attend to of the E0 user interface of Certkiller 1 routerAnswer: A, C, D question 29You have just set up a new web server top top the Certkiller network. You are forced to ensure the the internet server is available from the Internet. The network uses private addressing, so an IP-to-registered attend to mapping is required. To execute this, you go into the adhering to command:Certkiller (config)# ip nat inside source static 192.168.2.1 198.18.1.254You unsuccessfully try to ping the net from a PC organize on the LAN. During the troubleshooting process, you get in the "show ip nat translations" command but the output is blank.What is the most likely cause of the problem?A. The keyword overload is lacking from the command.B. The NAT pool must be identified first.C. An access list need to be characterized to develop static NAT translations.D. The interfaces need to be configured for NAT.E. Nobody of the aboveAnswer: D Explanation:In order to successfully configure a revolution NAT translation, the interfaces need to be configured because that NAT, in enhancement to the worldwide NAT command that was entered. The router interface that lies top top the inside component of the network must be identified using the "ip nat inside" command. Similarly, the WAN interface that is being provided for the Internet connection must be defined using the "ip nat outside" command.Incorrect Answers:A. In stimulate to make an internal server reachable native the Internet, a static one come one NAT entry must be configured for the server. The keyword "overload" is used to configure many to one NAT, or PAT.B, C. This require not be excellent in bespeak to develop a revolution NAT entry. These actions aretypically excellent in setup up NAT so the inside LAN users can access the net viaNAT.QUESTION 30Which protocol listed below uses TCP harbor 443 at layer 4?A. HTMLB. HTTPSC. TFTPD. TelnetE. SMTPF. None of the aboveAnswer: B Explanation:HTTPS is the secured variation of the HTTP application, which normally uses 128 little bit SSL encryption to secure the info sent and also received top top a net page. An example is a banking web site, or a trusted shopping net site that takes credit transaction card information. That is an applications layer protocol which uses TCP harbor 443.Incorrect Answers:A. HTML is not a protocol.C. TFTP uses UDP port 69.D.

See more: Lord Of The Flies Rising Action, Lord Of The Flies

Telnet offers TCP port 23.E. SMTP uses TCP port 25.