Networking Essentials 3.0 Module 15-17 | Checkpoint Exam: Protocols for Specific Tasks Answers Full 100% 2023 2024

This Networking Essentials 3.0 Module 15-17 section for Checkpoint Exam: Protocols for Specific Tasks Answers which is provided with the correct answers to 100% of the questions. This module 15-17 exam answer is used for the Cisco SkillsForAll platform which is the latest version just released in 2023 2024. Review all the questions and answers here, then you will meet randomly 20 questions from all here.

  1. A client device has initiated a secure HTTP request to a web browser. Which well-known port address number is associated with the destination address?

    • 443
    • 110
    • 80
    • 404

      Explanation:

      Port numbers are used in TCP and UDP communications to differentiate between the various services running on a device. The well-known port number used by HTTPs is port 443.

  2. Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

    • The client sets the window size for the session.
    • The client sends an ISN to the server to start the 3-way handshake.
    • The client sends a synchronization segment to begin the session.
    • The client randomly selects a source port number.

      Explanation:

      Because a session does not have to be established for UDP, the client selects a random source port to begin a connection. The random port number selected is inserted into the source port field of the UDP header.

  3. Refer to the exhibit. A TCP segment was sent by PC1 to the web server via port 80. Because of an unexpected network failure, the data was forwarded by R1 but was not received by R2. Which statement is correct about this scenario?

    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers 01
    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers 01
    • The web server will not acknowledge this segment. The PC1 timer will expire and PC1 will resend the segment.​
    • R1 forwarded the data to R2 but R2 did not receive it. R2 will send a request to R1 to resend the segment.
    • The timer on R1 will expire and R1 will resend the segment to R2.​
    • R1 will request that PC1 resend the segment.

      Explanation:

      The TCP protocol works between end devices, not between each device on the network. Routers, switches, etc. do not participate in the packet recovery process. For each TCP segment (or group of segments) sent by a host, there is an acknowledgment. If the sender does not receive an acknowledgment within a period of time, the sender resends the segment.

  4. What information is used by TCP to reassemble and reorder received segments?

    • port numbers
    • acknowledgment numbers
    • sequence numbers
    • fragment numbers

      Explanation:

      At the transport layer, TCP uses the sequence numbers in the header of each TCP segment to reassemble the segments into the correct order.

  5. A destination PC receives an email message with the sequence numbers on packets out of order. Which layer of the TCP/IP model is responsible for reassembling the packets of the message in the correct order?

    • application
    • network access
    • internet
    • transport

      Explanation:

      The transport layer of the TCP/IP model is responsible for ensuring that all packets in a message are received, reassembling the message in the correct order after all packets are received, and identifying which applications are sending and receiving network data.

  6. A PC user issues the netstat command without any options. What is displayed as the result of this command?

    • a list of all established active TCP connections
    • a local routing table
    • a historical list of successful pings that have been sent
    • a network connection and usage report

      Explanation:

      When used by itself (without any options), the netstat command will display all the active TCP connections that are available.

  7. What type of applications are best suited for using UDP?

    • applications that are sensitive to packet loss
    • applications that require retransmission of lost segments
    • applications that need reliable delivery
    • applications that are sensitive to delay

      Explanation:

      UDP is not a connection-oriented protocol and does not provide retransmission, sequencing, or flow control mechanisms. It provides basic transport layer functions with a much lower overhead than TCP. Lower overhead makes UDP suitable for applications which are sensitive to delay.

  8. Open the PT activity. Perform the tasks in the activity instructions and then answer the question.

    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers PT 03
    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers PT 03

    What is the application layer service being requested from Server0 by PC0?

    • DNS
    • HTTP
    • HTTPS
    • SMTP
    • FTP

      Explanation:

      From the PDU, the destination port is 443, which means the service requested is HTTPS.

  9. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers PT 02A
    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers PT 02A
    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers PT 02B
    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers PT 02B

    What message is displayed on the webpage?

    • A web server provides secure communication!
    • A secure web server is running!
    • A web server should run secure services!
    • A secure web server is the way to go!

      Explanation:

      Because the HQ web server runs a secure web service, the protocol HTTPS must be used to access the website. This means that the URL of https://www.cisco.com must be used to access the HQ web server and locate the message.

  10. A new employee is attempting to configure a cell phone to connect to the email server of the company. Which port number should be selected when using the IMAP4 protocol to access email messages stored on the local server?

    • 110
    • 25
    • 69
    • 143

      Explanation:

      The IMAP4 protocol uses the TCP protocol with port 143 for accessing emails stored on a local server.

  11. While a network security product is being deployed, a customizable list of allowable protocols is shown. Which three protocols should be allowed to provide for the use of email on a network? (Choose three.)

    • DNS
    • IMAP4
    • TFTP
    • Telnet
    • SMTP
    • POP3
    • HTTP

      Explanation:

      The email protocols used on a network are SMTP, POP3, and IMAP4. SMTP is used to send messages to a local email server, whereas POP and IMAP are used to receive email.

  12. Which number or set of numbers represents a socket?

    • 21
    • 01-23-45-67-89-AB
    • 10.1.1.15
    • 192.168.1.1:80

      Explanation:

      A socket is defined by the combination of an IP address and a port number, and uniquely identifies a particular communication.

  13. Which three pieces of information are identified by a URL? (Choose three.)

    • the MAC address of the web server
    • the protocol that is being used
    • the location of the resource
    • the IP address of the gateway
    • the domain name that is being accessed
    • the version of the browser

      Explanation:

      URLs are used to access specific content on a web server through a web browser. The URL identifies the protocol that is being used such as HTTP or FTP, the domain of the server, and the location of the resource on the server.

  14. Match the term to a function.

    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers 001
    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers 001
    • protocol commonly used by a web browser  —> HTTP
    • used to create web pages  —> HTML
    • requests a web page  —> web client
    • hosts a web page  —> web server
    • secure protocol that uses port 443  —> HTTPS

      Explanation:

      Place the options in the following order:

      Hosts a web page Web server
      Requests a web page Web client
      Used to create web pages HTML
      Secure protocol that uses port 443 HTTPS
      Protocol commonly used by a web browser HTTP
  15. Match the command line utility with the description.

    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers 002
    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers 002
    • Displays IP configuration information.  —> ipconfig
    • Tests connections to other IP hosts.  —> ping
    • Displays network connections.  —> netstat
    • Displays the route taken to the destination.  —> tracert
    • Directly queries the name server for information on a destination domain.  —> nslookup

      Explanation:

      Place the options in the following order:

      Displays the route taken to the destination. Tracert
      Directly queries the name server for information on a destination domain. Nslookup
      Tests connections to other IP hosts. Ping
      Displays network connections. Netstat
      Displays IP configuration information. Ipconfig
  16. What is a function of the tracert command that differs from the ping command when they are used on a workstation?

    • The tracert command reaches the destination faster.
    • The tracert command sends one ICMP message to each hop in the path.
    • The tracert command is used to test the connectivity between two devices.
    • The tracert command shows the information of routers in the path.

      Explanation:

       
  17. A technician is troubleshooting a network where it is suspected that a defective node in the network path is causing packets to be dropped. The technician only has the IP address of the end point device and does not have any details of the intermediate devices. What command can the technician use to identify the faulty node?

    • tracert
    • ipconfig /displaydns
    • ping
    • ipconfig /flushdns

      Explanation:

       
  18. Which statement describes the use of the ping command?

    • The ping command tests end-to-end connectivity between two devices.
    • The ping command can be used to determine the exact location of the problem when troubleshooting reachability issues.
    • The ping command can be used to test reachability using the physical address of the device.
    • The ping command shows current Layer 4 sessions.

      Explanation:

       
  19. A computer has been assigned an IP address of 169.254.33.16. What command initiates the process of requesting a new IP address?

    • nslookup
    • net computer
    • tracert
    • ipconfig /release

      Explanation:

       
  20. Match the command line utility with the function.

    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers 003
    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers 003
    • Use the ping command utility for IPv4 only.  —> ping -4
    • Use the ping command utility for IPv6 only.  —> ping -6
    • Use the ping command utility to resolve the address to the hostname.  —> ping -a
    • Use the ping command utility to continue pinging the target interface until manually stopped.  —> ping -t

      Explanation:

      Place the options in the following order:

      Use the ping command utility for IPv4 only. Ping -4
      Use the ping command utility for IPv6 only. Ping -6
      Use the ping command utility to resolve the address to the hostname. Ping -a
      Use the ping command utility to continue pinging the target interface until manually stopped. Ping -t
  21. Open the PT Activity.  Perform the tasks in the activity instructions and then answer the question or complete the task.

    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers PT 01
    Networking Essentials 3.0 Module 15-17 Checkpoint Exam Protocols for Specific Tasks Answers PT 01

    Capture traffic in simulation mode. What application layer service is PC-A requesting from the web server?

    • SSH
    • FTP
    • HTTP
    • TFTP
    • telnet

      Explanation & Hint:

      When a client is initiating a request to open an FTP session, it does so by sending a packet to the FTP server with the destination port 21.

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments