Which two traffic types use the Real-Time Transport Protocol (RTP)? (Choose two.)
-video
-web
-file transfer
-voice
-peer to peer - ANS -video
-voice
Which wireless technology has low-power and data rate requirements making it popular in home
automation applications?
-ZigBee
-LoRaWAN
-5G
-Wi-Fi - ANS ZigBee
Which layer of the TCP/IP model provides a route to forward messages through an internetwork?
-application
-network access
-internet
-transport - ANS internet
Which type of server relies on record types such as A, NS, AAAA, and MX in order to provide services?
,-DNS
-file
-web - ANS DNS
What are proprietary protocols?
-protocols developed by private organizations to operate on any vendor hardware
-protocols that can be freely used by any organization or vendor
-protocols developed by organizations who have control over their definition and operation
-a collection of protocols known as the TCP/IP protocol suite - ANS protocols developed by organizations
who have control over their definition and operation
What service is provided by DNS?
-Resolves domain names, such as cisco.com, into IP addresses.
-A basic set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the
web.
-Allows for data transfers between a client and a file server.
-Uses encryption to secure the exchange of text, graphic images, sound, and video on the web. - ANS
Resolves domain names, such as cisco.com, into IP addresses.
A client packet is received by a server. The packet has a destination port number of 110. What service is
the client requesting?
-DNS
,-DHCP
-SMTP
-POP3 - ANS POP3
What command can be used on a Windows PC to see the IP configuration of that computer?
-show ip interface brief
-ping
-show interfaces
-ipconfig - ANS ipconfig
A wired laser printer is attached to a home computer. That printer has been shared so that other
computers on the home network can also use the printer. What networking model is in use?
-client-based
-master-slave
-point-to-point
-peer-to-peer (P2P) - ANS peer-to-peer (P2P)
What characteristic describes a virus?
-a network device that filters access and traffic coming into a network
-the use of stolen credentials to access private data
-an attack that slows or crashes a device or network service
-malicious software or code running on an end device - ANS malicious software or code running on an
end device
, Three bank employees are using the corporate network. The first employee uses a web browser to view
a company web page in order to read some announcements. The second employee accesses the
corporate database to perform some financial transactions. The third employee participates in an
important live audio conference with other corporate managers in branch offices. If QoS is implemented
on this network, what will be the priorities from highest to lowest of the different data types?
-financial transactions, web page, audio conference
-audio conference, financial transactions, web page
-financial transactions, audio conference, web page
-audio conference, web page, financial transactions - ANS audio conference, financial transactions, web
page
Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would
be used?
https://i.imgur.com/JRckAas.png
-only application and Internet layers
-only Internet and network access layers
-only application, Internet, and network access layers
-application, transport, Internet, and network access layers
-only application, transport, network, data link, and physical layers
-application, session, transport, network, data link, and physical layers - ANS application, transport,
Internet, and network access layers
What service is provided by Internet Messenger?
-An application that allows real-time chatting among remote users.