Nwc204 Fe Key
Nwc204 Fe Key
network communication
network security
routing
service discovery
Explanation: BGP and OSPF are routing protocols. They enable routers to
exchange route information to reach remote networks.
2. Which two protocols are service discovery protocols?
(Choose two.)
DNS
TCP
SSH
DHCP
Explanation: Service discovery protocols, such as DNS and DHCP enable
automatic detection of service. DHCP is used to discover services for
automatic IP address allocation and DNS for name-to-IP address resolution
services.
3. What is the purpose of the sequencing function in
network communication?
to uniquely label transmitted segments of data for
proper reassembly by the receiver
to determine if data is corrupted during transmission
to ensure data flows at an efficient rate between sender and
receiver
to guarantee delivery of data
Explanation: Sequencing uniquely identifies or labels each transmitted
segment with a sequence number that is used by the receiver to reassemble
the segments in the proper order.
4. This protocol is responsible for guaranteeing the reliable
delivery of information.
TCP
IP
HTTP
Ethernet
Explanation: Transmission Control Protocol (TCP) manages the
conversation between end devices and guarantees the reliable delivery of
information.
3.3.6 Check Your Understanding – Protocol
Suites Answers
1. UDP and TCP belong to which layer of the TCP/IP protocol?
application
transport
internet
network access
Explanation: TCP and UDP are both transport layer protocols.
2. Which two protocols belong in the TCP/IP model
application layer?
EIGRP
DNS
OSPF
ICMP
DHCP
Explanation: DHCP and DNS are both application layer protocols.
3. Which protocol operates at the network access layer of
the TCP/IP model?
HTTP
IP
DNS
Ethernet
Explanation: Ethernet is a network access layer protocol.
4. Which of the following are protocols that provide
feedback from the destination host to the source host
regarding errors in packet delivery? (Choose two.)
IPv4
TCP
ICMPv4
IPv6
UDP
ICMPv6
Explanation: ICMPv4 and ICMPv6 provide feedback when errors occur.
5. A device receives a data link frame with data and
processes and removes the Ethernet information. What
information would be the next to be processed by the
receiving device?
HTTP at the application layer
HTML at the application layer
IP at the internet layer
UDP at the internet layer
TCP at the transport layer
Explanation: Data is de-encapsulated so the next layer to receive the data
would be the internet layer.
6. Which services are provided by the internet layer of the
TCP/IP protocol suite? (Choose three.)
File Transfer
Address Resolution
Routing Protocols
Messaging
Ethernet
Internet Protocol
Explanation: IP (Internet Protocol), ICMP (Messaging), and Routing
Protocols are services provided at the Internet Layer.
AAA Server
firewall
ESA/WSA
IPS
Explanation: A firewall is a dedicated device that helps prevent
unauthorized access by not allowing external traffic to initiate connections to
internal hosts.
2. Which device is used by other network devices to
authenticate and authorize management access?
AAA Server
firewall
ESA/WSA
IPS
Explanation: AAA servers perform authentication, authorization and
accounting services on behalf of other devices to manage access to
resources.
3. Which backup policy consideration is concerned with
using strong passwords to protect the backups and for
restoring data?
frequency
storage
security
validation
Explanation: Backup validation is concerned with using strong passwords
to protect backups and for restoring data.
4. This zone is used to house servers that should be
accessible to outside users.
inside
outside
internet
DMZ
Explanation: The DMZ, or demilitarized zone, is used for servers that need
to be accessible to external users.
5. Which is appropriate for providing endpoint security?
a AAA server
antivirus software
a server-based firewall
an ESA/WSA
Explanation: Antivirus software running on an endpoint or host is part of a
comprehensive endpoint security solution.
17.1.6 Check Your Understanding – Devices in a
Small Network Answers
1. Which statement correctly relates to a small network?
Playvolume00:00/01:00TruvidfullScreen
Small networks are complex.
Small networks require an IT department to maintain.
The majority of businesses are small.
Explanation: The majority of businesses are small.
2. Which factor must be considered when selecting network
devices?
color
console connections
cost
elasticity
Explanation: Factors to be considered include cost, speed and types of
ports/interfaces, expandability, and operating system features and services.
3. What is necessary to plan and use when implementing a
network?
device names
IP addressing scheme
MAC addressing scheme
printer location
Explanation: When implementing a network, planning and using an IP
addressing scheme is necessary.
4. What is required to maintain a high degree of reliability
and eliminate single points of failure?
accessibility
expandability
integrity
redundancy
Explanation: Redundancy is required to maintain a high degree of
reliability and eliminate single points of failure.
5. What is required to classify traffic according to priority?
IP addressing scheme
quality of service (QoS)
routing
switching
Explanation: QoS is required to classify traffic according to priority.
17.2.4 Check Your Understanding – Small
Network Applications and Protocols Answers