- Posts: 1
- Thank you received: 0
CCNA1: pleasseee help me on these questions anyyone
19 years 9 months ago #6834
by tdoggrme
CCNA1: pleasseee help me on these questions anyyone was created by tdoggrme
1) Two peer hosts are running applications that exchange data using UDP. During the current session, a datagram fails to arrive at the destination. What is true?
concerning the retransmission of the datagram?
Datagram retransmission occurs when the retransmission timer expires in the source host.
Datagram retransmission occurs when the retransmission timer expires in the destination host.
Datagram retransmission is controlled by the application layer protocol.
Datagram retransmission involves only the data with sequence numbers equal to or higher than the sequence number of the current datagram.
2)A network administrator is placing an older router back in to service. The administrator discovered that the IOS and configuration files need to be updated
to meet the LAN specifications. Which application layer protocol is used to transfer the new configuration files into the router memory?
SNMP
SMTP
HTTP
TFTP
3)Which of the following subnet masks could be used when subnetting a Class B IP address? (Choose two.)
255.0.0.0
255.255.0.0
255.192.255.0
255.224.0.0
255.255.252.0
255.255.255.128
4)Which of the following describe the token-passing logical topology? (Choose two.)
FDDI is an example of a token-passing network.
Token-passing logical topologies must also be physical ring topologies.
One of the disadvantages of the token-passing logical topology is the high collision rate.
Computers transmit data after "listening" to the wire to detect other traffic.
Computers are allowed to transmit data only when they possess a token.
5)How will the MAIN router dynamically learn a route to the 10.16.10.48/28 subnetwork in the diagram?
with a routed protocol
with a routing protocol
with a static route
with a directly connected route
PPLLLEEASSEEE HELP ME ANSWER THESE OF YOU KNOW THE ANSWER. Thank you
concerning the retransmission of the datagram?
Datagram retransmission occurs when the retransmission timer expires in the source host.
Datagram retransmission occurs when the retransmission timer expires in the destination host.
Datagram retransmission is controlled by the application layer protocol.
Datagram retransmission involves only the data with sequence numbers equal to or higher than the sequence number of the current datagram.
2)A network administrator is placing an older router back in to service. The administrator discovered that the IOS and configuration files need to be updated
to meet the LAN specifications. Which application layer protocol is used to transfer the new configuration files into the router memory?
SNMP
SMTP
HTTP
TFTP
3)Which of the following subnet masks could be used when subnetting a Class B IP address? (Choose two.)
255.0.0.0
255.255.0.0
255.192.255.0
255.224.0.0
255.255.252.0
255.255.255.128
4)Which of the following describe the token-passing logical topology? (Choose two.)
FDDI is an example of a token-passing network.
Token-passing logical topologies must also be physical ring topologies.
One of the disadvantages of the token-passing logical topology is the high collision rate.
Computers transmit data after "listening" to the wire to detect other traffic.
Computers are allowed to transmit data only when they possess a token.
5)How will the MAIN router dynamically learn a route to the 10.16.10.48/28 subnetwork in the diagram?
with a routed protocol
with a routing protocol
with a static route
with a directly connected route
PPLLLEEASSEEE HELP ME ANSWER THESE OF YOU KNOW THE ANSWER. Thank you
19 years 9 months ago #6836
by KiLLaBeE
Replied by KiLLaBeE on topic Re: CCNA1: pleasseee help me on these questions anyyone
I haven't studied any cisco material in a while, but I'm sure the answers are:
2. TFTP
3. 255.255.0.0, 255.255.252.0
4. FDDI is an example of a token-passing network, Computers are allowed to transmit data only when they possess a token.
2. TFTP
3. 255.255.0.0, 255.255.252.0
4. FDDI is an example of a token-passing network, Computers are allowed to transmit data only when they possess a token.
19 years 9 months ago #6839
by nske
Replied by nske on topic Re: CCNA1: pleasseee help me on these questions anyyone
1) I would pick "Datagram retransmission is controlled by the application layer protocol."
5) It should be "routing protocol" (what diagram?)
PS. tdoggrme, I hope you will do some research to see why each answer is correct (besides.. we could be wrong )
5) It should be "routing protocol" (what diagram?)
PS. tdoggrme, I hope you will do some research to see why each answer is correct (besides.. we could be wrong )
19 years 9 months ago #7217
by mew
Replied by mew on topic Re: CCNA1: pleasseee help me on these questions anyyone
KiLLaBeE gave you the correct answers for 2 and 4. nske gave you the correct answers for 1 and 5.
However, 255.255.0.0 is the standard class B subnet mask before subnetting. Both 255.255.252.0 and 255.255.255.128 are valid subnet masks for Class B.
In the first one you have borrowed 6 out of 16 bits and in the second you have borrowed 9 out of 16 bits.
However, 255.255.0.0 is the standard class B subnet mask before subnetting. Both 255.255.252.0 and 255.255.255.128 are valid subnet masks for Class B.
In the first one you have borrowed 6 out of 16 bits and in the second you have borrowed 9 out of 16 bits.
- Ballisaini
- Offline
- New Member
Less
More
- Posts: 10
- Thank you received: 0
19 years 3 months ago #9526
by Ballisaini
Replied by Ballisaini on topic Re: CCNA1: pleasseee help me on these questions anyyone
Hello tdoggrme,
I will give answer for all questions .
1.Two peer hosts are running applications that exchange data using UDP. During the current session, a datagram fails to arrive at the destination. What is true?
concerning the retransmission of the datagram.
Answer1.Datagram retransmission occurs when the retransmission timer expires in the destination host.
2.network administrator is placing an older router back in to service. The administrator discovered that the IOS and configuration files need to be updated
to meet the LAN specifications. Which application layer protocol is used to transfer the new configuration files into the router memory?
Answer2.TFTP=Trivial-File Transfer-Protocol.
3.Which of the following subnet masks could be used when subnetting a Class B IP address? (Choose two.)
Answer3.255.255.252.0 ,255.255.255.128 (Its talking about Subnetting with Class
4.Which of the following describe the token-passing logical topology? (Choose two.)
Answer4.Token-passing logical topologies must also be physical ring topologies.
Computers are allowed to transmit data only when they possess a token.
5.How will the MAIN router dynamically learn a route to the 10.16.10.48/28 subnetwork in the diagram
Answer5.with a routing protocol (like RIP,IGRP,OSPF,EIGRP)
I will give answer for all questions .
1.Two peer hosts are running applications that exchange data using UDP. During the current session, a datagram fails to arrive at the destination. What is true?
concerning the retransmission of the datagram.
Answer1.Datagram retransmission occurs when the retransmission timer expires in the destination host.
2.network administrator is placing an older router back in to service. The administrator discovered that the IOS and configuration files need to be updated
to meet the LAN specifications. Which application layer protocol is used to transfer the new configuration files into the router memory?
Answer2.TFTP=Trivial-File Transfer-Protocol.
3.Which of the following subnet masks could be used when subnetting a Class B IP address? (Choose two.)
Answer3.255.255.252.0 ,255.255.255.128 (Its talking about Subnetting with Class
4.Which of the following describe the token-passing logical topology? (Choose two.)
Answer4.Token-passing logical topologies must also be physical ring topologies.
Computers are allowed to transmit data only when they possess a token.
5.How will the MAIN router dynamically learn a route to the 10.16.10.48/28 subnetwork in the diagram
Answer5.with a routing protocol (like RIP,IGRP,OSPF,EIGRP)
Time to create page: 0.133 seconds