CCNA 1 Chapter 6

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Lytayquize
L
Lytayquize
Community Contributor
Quizzes Created: 5 | Total Attempts: 6,737
Questions: 22 | Attempts: 1,840

SettingsSettingsSettings
CCNA 1 Chapter 6 - Quiz

These quiz is prepared to take for whom want to measure the knowledge and ability only. This is not the only way to cheat other but it can improve your knowledge base on what you have learn.


Questions and Answers
  • 1. 

    A user types www.cisco.com into a web browser address textbox. What does www.cisco.com represent?

    • A.

      The IP address of a web server

    • B.

      A physical network address

    • C.

      The closest router interface to the source

    • D.

      The source IP address in the data transmission

    Correct Answer
    A. The IP address of a web server
    Explanation
    www.cisco.com represents the domain name of a website. When a user types this domain name into a web browser address textbox, the browser translates it into the corresponding IP address of the web server hosting the website. This IP address is used to establish a connection with the server and retrieve the requested web page. The domain name acts as a human-readable identifier for the web server's IP address.

    Rate this question:

  • 2. 

    What type of server would use IMAP?

    • A.

      DNS

    • B.

      DHCP

    • C.

      E-mail

    • D.

      FTP

    • E.

      Telnet

    Correct Answer
    C. E-mail
    Explanation
    IMAP stands for Internet Message Access Protocol. It is a protocol used by email servers to retrieve and access email messages from a remote server. Therefore, the correct answer is "e-mail" because IMAP is specifically designed for email servers to handle email communication and allow users to access their emails from different devices.

    Rate this question:

  • 3. 

    Which type of server would most likely be used first by a network client in a corporate environment?

    • A.

      DNS

    • B.

      DHCP

    • C.

      E-mail

    • D.

      FTP

    • E.

      Telnet

    Correct Answer
    B. DHCP
    Explanation
    In a corporate environment, the most likely type of server to be used first by a network client would be DHCP. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network automatically. When a client connects to the network, it sends a DHCP request to obtain an IP address, subnet mask, and other network configuration information. This allows the client to quickly and efficiently connect to the network without manual configuration. DNS, e-mail, FTP, and Telnet servers may be used later for specific purposes, but DHCP is the initial server required for network connectivity.

    Rate this question:

  • 4. 

    Which protocol is used by FTP to transfer files over the Internet?

    • A.

      TCP

    • B.

      SMTP

    • C.

      UDP

    • D.

      SNMP

    Correct Answer
    A. TCP
    Explanation
    FTP (File Transfer Protocol) uses the TCP (Transmission Control Protocol) to transfer files over the Internet. TCP is a reliable and connection-oriented protocol that ensures the successful delivery of data packets between the FTP client and server. It establishes a connection, breaks the file into smaller packets, numbers them, and reassembles them at the destination. TCP also provides error checking, flow control, and congestion control mechanisms, making it suitable for file transfer applications like FTP.

    Rate this question:

  • 5. 

    Which protocols are TCP/IP application layer protocols? (Choose two.)

    • A.

      UDP

    • B.

      FTP

    • C.

      IP

    • D.

      SMTP

    • E.

      TCP

    Correct Answer(s)
    B. FTP
    D. SMTP
    Explanation
    FTP and SMTP are TCP/IP application layer protocols. FTP (File Transfer Protocol) is used for transferring files between a client and a server over a network. SMTP (Simple Mail Transfer Protocol) is used for sending and receiving email messages. Both protocols operate at the application layer of the TCP/IP protocol suite, which is responsible for providing network services to applications. UDP, IP, and TCP are transport layer protocols, not application layer protocols. UDP is a connectionless protocol used for lightweight communication, IP is responsible for routing packets across networks, and TCP is a reliable, connection-oriented protocol used for establishing and maintaining network connections.

    Rate this question:

  • 6. 

    Which of the following are layers of the TCP/IP model? (Choose three.)

    • A.

      Application

    • B.

      Physical

    • C.

      Internet

    • D.

      Network Access

    • E.

      Presentation

    Correct Answer(s)
    A. Application
    C. Internet
    D. Network Access
    Explanation
    The TCP/IP model is a conceptual framework used to understand how data is transmitted over a network. It consists of four layers: Application, Transport, Internet, and Network Access. The Application layer is responsible for providing services to the end-user, such as email or web browsing. The Internet layer handles the routing of data packets across different networks. The Network Access layer deals with the physical transmission of data, including protocols for sending and receiving data on a specific network medium. Therefore, the correct answer is Application, Internet, and Network Access.

    Rate this question:

  • 7. 

    You are creating a network-based video game. What influences your decision about which transport protocol to use for the application?

    • A.

      UDP will not disrupt the game to retransmit dropped packets.

    • B.

      TCP provides extra acknowledgements that will ensure smooth video delivery.

    • C.

      Both TCP and UDP can be used simultaneously to ensure speed and guaranteed delivery.

    • D.

      Both TCP and UDP may slow transmission and disrupt game operation, so no transport protocol should be used.

    Correct Answer
    A. UDP will not disrupt the game to retransmit dropped packets.
    Explanation
    The correct answer explains that UDP is a suitable choice for a network-based video game because it does not disrupt the game to retransmit dropped packets. This means that if a packet is lost during transmission, UDP does not attempt to resend it, allowing the game to continue without interruption. This is important for real-time applications like video games, where maintaining a smooth and uninterrupted gameplay experience is crucial. TCP, on the other hand, provides extra acknowledgements and ensures smooth video delivery but may introduce delays due to retransmissions. Therefore, UDP is a more suitable choice for a network-based video game.

    Rate this question:

  • 8. 

    Whenever e-mail clients send letters, what device is used to translate the domain names into their associated IP addresses?

    • A.

      Uniform Resource Locator

    • B.

      Network redirector server

    • C.

      SNMP server

    • D.

      DNS server

    Correct Answer
    D. DNS server
    Explanation
    A DNS server is used to translate domain names into their associated IP addresses. Domain names are human-readable addresses that are easier to remember and use than numeric IP addresses. When an email client sends a letter, it needs to know the IP address of the recipient's mail server. The DNS server acts as a directory, converting the domain name of the recipient's mail server into its corresponding IP address, allowing the email client to establish a connection and send the email successfully.

    Rate this question:

  • 9. 

    Which application is most likely used to translate www.cisco.com to 198.133.219.25?

    • A.

      DHCP

    • B.

      DNS

    • C.

      FTP

    • D.

      HTTP

    • E.

      POP

    Correct Answer
    B. DNS
    Explanation
    DNS (Domain Name System) is the most likely application used to translate www.cisco.com to its corresponding IP address, 198.133.219.25. DNS is responsible for translating domain names into IP addresses, allowing users to access websites using human-readable names instead of numerical IP addresses. In this case, when a user enters www.cisco.com in their web browser, the DNS server is queried to resolve the domain name to its associated IP address, enabling the user to connect to the correct server and access the website.

    Rate this question:

  • 10. 

    Refer to the graphic. Which protocol is used to access this website?

    • A.

      IM

    • B.

      FTP

    • C.

      HTTP

    • D.

      SNMP

    • E.

      VoIP

    Correct Answer
    C. HTTP
    Explanation
    The correct answer is HTTP because HTTP (Hypertext Transfer Protocol) is the protocol used for accessing websites. It is the foundation of data communication for the World Wide Web and allows for the retrieval and display of web pages. Other protocols listed, such as IM (Instant Messaging), FTP (File Transfer Protocol), SNMP (Simple Network Management Protocol), and VoIP (Voice over Internet Protocol), are not typically used for accessing websites.

    Rate this question:

  • 11. 

    Which port number is used by SMTP?

    • A.

      20

    • B.

      21

    • C.

      25

    • D.

      26

    • E.

      110

    Correct Answer
    C. 25
    Explanation
    SMTP (Simple Mail Transfer Protocol) is a communication protocol used for sending email messages between servers. Port number 25 is specifically assigned to SMTP, making it the correct answer. This port is used to establish a connection between the email client and the email server, allowing for the transmission of email messages.

    Rate this question:

  • 12. 

    Which protocol is used by e-mail servers to communicate with each other?

    • A.

      FTP

    • B.

      HTTP

    • C.

      TFTP

    • D.

      SMTP

    • E.

      POP

    Correct Answer
    D. SMTP
    Explanation
    SMTP (Simple Mail Transfer Protocol) is used by email servers to communicate with each other. It is the standard protocol for sending and receiving emails over the internet. SMTP ensures that emails are properly routed and delivered to the intended recipients. It works in conjunction with other protocols like POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) which are used by email clients to retrieve emails from the server.

    Rate this question:

  • 13. 

    What client software enables logged in users to communicate with other logged in users in real time?

    • A.

      Blog

    • B.

      E-mail

    • C.

      Web mail

    • D.

      Instant messaging

    Correct Answer
    D. Instant messaging
    Explanation
    Instant messaging is the correct answer because it allows logged in users to communicate with each other in real time. Unlike a blog or email, which are not designed for immediate communication, instant messaging provides a platform for instant back-and-forth conversations. Web mail, while it enables email communication, does not offer the same real-time interaction as instant messaging. Therefore, instant messaging is the most suitable client software for real-time communication between logged in users.

    Rate this question:

  • 14. 

    An Internet server is running both FTP and HTTP services. How does the server know which of these applications should handle an incoming segment?

    • A.

      The packet header identifies it as an HTTP or FTP packet.

    • B.

      The data in the segment is specially formatted for either HTTP or FTP.

    • C.

      The segment destination port number identifies the application that should handle it.

    • D.

      The source port number is associated with one of these well known server applications.

    Correct Answer
    C. The segment destination port number identifies the application that should handle it.
    Explanation
    The segment destination port number identifies the application that should handle the incoming segment. Each application, including FTP and HTTP, has a specific port number associated with it. When a segment arrives at the server, the server checks the destination port number in the packet header to determine which application should handle it. If the destination port number matches the port number associated with FTP, the FTP service will handle the segment. Similarly, if the destination port number matches the port number associated with HTTP, the HTTP service will handle the segment.

    Rate this question:

  • 15. 

    What term is used to describe how TCP/IP protocols are layered and interact to format, address, and transmit information across a network?

    • A.

      Protocol hierarchy

    • B.

      Protocol modeling

    • C.

      Protocol stack

    • D.

      Protocol layering

    Correct Answer
    C. Protocol stack
    Explanation
    The term used to describe how TCP/IP protocols are layered and interact to format, address, and transmit information across a network is "protocol stack." A protocol stack refers to a set of protocols that work together in a hierarchical manner to enable communication between devices in a network. Each layer in the stack performs specific functions and interacts with the layers above and below it to ensure the reliable transmission of data.

    Rate this question:

  • 16. 

    What three items are contained in an Ethernet frame? (Choose three.)

    • A.

      Source IP address

    • B.

      Source MAC addres

    • C.

      Destination IP address

    • D.

      Destination MAC address

    • E.

      Error-checking information

    Correct Answer(s)
    B. Source MAC addres
    D. Destination MAC address
    E. Error-checking information
    Explanation
    An Ethernet frame contains the source MAC address, destination MAC address, and error-checking information. The source MAC address is the unique identifier of the device sending the frame, while the destination MAC address is the unique identifier of the device receiving the frame. The error-checking information is used to detect and correct any errors that may have occurred during transmission. The source IP address and destination IP address are not included in an Ethernet frame as they are part of the IP protocol, which operates at a higher layer of the network stack.

    Rate this question:

  • 17. 

    What information is contained in an IP heade

    • A.

      Source and destination IP addresses

    • B.

      Source and destination MAC addresses

    • C.

      Only destination IP and MAC addresses

    • D.

      Both source and destination IP and MAC addresses

    Correct Answer
    A. Source and destination IP addresses
    Explanation
    The information contained in an IP header includes the source and destination IP addresses. The IP header is a part of the IP packet and it contains various fields that provide information about the packet, such as the version of the IP protocol, the length of the packet, and the source and destination IP addresses. The source IP address represents the sender of the packet, while the destination IP address represents the intended recipient of the packet. The IP addresses are crucial for routing the packet across the network and ensuring it reaches the correct destination.

    Rate this question:

  • 18. 

    Cabling issues are associated with which OSI layer?

    • A.

      4

    • B.

      2

    • C.

      1

    • D.

      3

    Correct Answer
    C. 1
    Explanation
    Cabling issues are associated with the physical layer of the OSI model. This layer is responsible for transmitting raw data bits over a physical medium, such as cables. Cabling problems can include issues like damaged cables, loose connections, or interference that can disrupt the transmission of data signals.

    Rate this question:

  • 19. 

    A device receives an Ethernet frame and recognizes the MAC address as its own. What does the device do to the message to get to the encapsulated data?

    • A.

      Removes the IP header

    • B.

      Removes the TCP header

    • C.

      Passes data to the application layer

    • D.

      Removes the Ethernet header and trailer

    Correct Answer
    D. Removes the Ethernet header and trailer
    Explanation
    When a device receives an Ethernet frame and recognizes the MAC address as its own, it needs to remove the Ethernet header and trailer in order to access the encapsulated data. The Ethernet header and trailer contain information necessary for transmitting the frame across the network, but once the frame reaches its intended destination, this information is no longer needed. By removing the Ethernet header and trailer, the device can extract the encapsulated data and pass it to the appropriate layers of the network stack for further processing.

    Rate this question:

  • 20. 

    A client has decoded a frame and started the de-encapsulation process. In which order does the de-encapsulation process occur?

    • A.

      1) remove IP header 2) remove Ethernet header and trailer 3) remove TCP header 4) pass data to the application

    • B.

      1) add TCP header to data 2) add an IP header 3) add frame header and trailer 4) encode the frame into bits

    • C.

      1) remove Ethernet header and trailer 2) remove IP header 3) remove TCP header 4) pass data to the application

    • D.

      1) add TCP header to data 2) add Ethernet header and trailer 3) add an IP header 4) encode the frame into bits

    Correct Answer
    C. 1) remove Ethernet header and trailer 2) remove IP header 3) remove TCP header 4) pass data to the application
    Explanation
    The de-encapsulation process occurs in the following order: first, the Ethernet header and trailer are removed. Then, the IP header is removed. After that, the TCP header is removed. Finally, the data is passed to the application.

    Rate this question:

  • 21. 

    What is an advantage of the use of layers in the OSI reference model?

    • A.

      It breaks network communications into larger parts.

    • B.

      It increases complexity.

    • C.

      It prevents changes in one layer from affecting other layers.

    • D.

      It requires the use of single-vendor equipment for hardware and software communications.

    Correct Answer
    C. It prevents changes in one layer from affecting other layers.
    Explanation
    The advantage of using layers in the OSI reference model is that it prevents changes in one layer from affecting other layers. Each layer has a specific set of functions and responsibilities, and they communicate with each other through well-defined interfaces. This modular approach allows for easier troubleshooting, maintenance, and upgrades, as changes made to one layer can be isolated and do not impact the functionality of other layers. This also promotes interoperability, as different vendors can develop and implement their own solutions for each layer without affecting the overall network communication.

    Rate this question:

  • 22. 

    What is the correct order of the layers of the OSI reference model, starting at the lowest layer and working up the model?

    • A.

      Data link, physical, transport, network, presentation, session, application

    • B.

      Physical, data link, network, session, transport, presentation, application

    • C.

      Physical, data link, network, transport, presentation, session, application

    • D.

      Physical, data link, network, transport, session, presentation, application

    • E.

      Application, session, presentation, transport, data link, network, physical

    Correct Answer
    D. pHysical, data link, network, transport, session, presentation, application
    Explanation
    The OSI reference model is a conceptual framework that standardizes the functions of a communication system. It consists of seven layers, starting from the lowest layer to the highest layer. The correct order of the layers is physical, data link, network, transport, session, presentation, and application. This order represents the flow of data from the physical transmission of bits to the application layer where data is presented to the user.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 20, 2010
    Quiz Created by
    Lytayquize
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.