Answer of CCNA Discovery : Version 4.1 by -NoNaMeZzz-

1. Which two statements are true about the OSI and TCP/IP models? (Choose two.)

The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model.
The TCP/IP model is a theoretical model and the OSI model is based on actual protocols.
• The OSI network layer is comparable to the Internet layer of the TCP/IP model.
The TCP/IP model specifies protocols for the physical network interconnection.
• The TCP/IP model is based on four layers and the OSI model is based on seven layers.

2. To meet customer expectations, an ISP must guarantee a level of service that is based on what two factors? (Choose two.)

• availability
• reliability

3. User1 is sending an e-mail to What are two characteristics of the process of sending this data? (Choose two.)

• It utilizes TCP port 110.
A TCP connection is established directly between the User1 and User2 client computers in order to send the e-mail message.
• It utilizes a store and forward process.
The same application layer protocol is used to send the e-mail and retrieve it from the destination server.
SMTP is used to send the e-mail message to the mail servers.

4. Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?

Host1 sends an ACK message to Host2.
Host1 sends a SYN message to Host2.
Host1 sends a SYN-ACK message to Host2.
Host2 sends an ACK message to Host1.
Host2 sends a SYN message to Host1.
• Host2 sends a SYN-ACK message to Host1.

5. What are three characteristics of network reliability? (Choose three.)

• Redundant hardware provides enhanced reliability.
Reliability is measured as a percent.
Reliability is the responsibility of the ISP customers.
• Fault tolerance is a measure of reliability.
• The longer the MTBF, the greater the reliability.

6. Which two statements describe the FTP protocol? (Choose two.)
It uses well-known port 23.

The protocol interpreter is responsible for the data transfer function.
• In passive data connections, the FTP client initiates the transfer of data.
• It requires two connections between client and server.
FTP servers open a well-known port on the client machine.

7. What is the function of the TCP three-way handshake?

• It enables the synchronization of port numbers between source and destination hosts.
It immediately triggers the retransmission of lost data.
• It synchronizes both ends of a connection by allowing both sides to agree upon initial sequence numbers.
It identifies the destination application on the receiving host.

8. What are three characteristics of HTTPS? (Choose three.)

It uses a different client request-server response process than HTTP uses.
It specifies additional rules for passing data between the application and data link layers.
• It supports authentication.
It allows more simultaneous connections than HTTP allows.
• It encrypts packets with SSL.
• It requires additional server processing time.

9. Which DNS zone resolves an IP address to a qualified domain name?

dynamic lookup
forward lookup
resolution lookup
• reverse lookup


What type of update allows client computers to register and update their resource records with a DNS server whenever changes occur?

• dynamic
zone transfer
local recursive query
root domain query
top-level domain query

11. Refer to the exhibit. Which two statements are true about this file? (Choose two.)

If the gateway address changes, the file will be updated dynamically.
• The command ping fileserv will use IP address
• If the ping command is issued, the file will be checked for the Cisco web server IP address before DNS is queried.
The file must be created by the user if it is to be used by a workstation.
Name to IP address mappings are added to the file after they are received from DNS.

12. Which two tasks are the responsibility of the local DNS server? (Choose two.)

maintaining a large number of cached DNS entries
maintaining the ISP server
• mapping name-to-IP addresses for internal hosts
• forwarding name resolution requests to a caching-only server
forwarding all name resolution requests to root servers on the Internet

13. What are three unique characteristics of UDP? (Choose three.)

connection oriented
full-duplex operation
• low overhead
• no flow control
• no error-recovery function
reliable transmission

14. A manufacturing company is looking into subscribing to services from a new ISP. The company requires hosted world wide web, file transfer, and e-mail services. Which three protocols represent the key application services that are required by the company? (Choose three.)


15. Which two options correctly match protocol and well-known port number? (Choose two.)

DNS – 25
FTP – 110
• HTTP – 80
POP3 – 25
• SMTP – 25

16. Within TCP, what combination makes up a socket pair?

source port with destination port
source IP address with destination port
source IP address and destination IP address
• source IP address and port with a destination IP address and port

17. Which protocol is used to send e-mail, either from a client to a server or from a server to another server?


18. Refer to the exhibit. The PC is requesting HTTP data from the server. What is a valid representation of source and destination sockets for this request?

Source – ; Destination –
Source – ; Destination –
• Source – ; Destination –
Source – ; Destination –

19. What type of DNS server is typically maintained by an ISP?

• caching-only

20. A client is communicating with a server on a different segment of the network. How does the server determine what service is being requested by the client?

The server will apply the default service configured in directory services.
The server will use ARP to discover the appropriate service from the local router.
The server will send a request to the client asking for the appropriate service.
• The server will determine the appropriate service from the destination port field.


When a host is communicating with multiple applications on the same server at the same time, which of the following will have the same value for each session? (Choose two.)

• IP address
• MAC address
session number
sequence number

Which three fields do a TCP header and UDP header have in common? (Choose three.)

• checksum
• destination port
• source port


29 Responses to “CCNA CHAPTER 7 VER:4.1”

  1. 1 John
    January 14, 2011 at 9:01 am

    Thank You! =)

  2. April 3, 2013 at 7:33 am

    This post will assist the internet users for building up new webpage or even a blog from start
    to end.

  3. April 16, 2013 at 5:25 pm

    Good day! Do you know if they make any plugins to safeguard against hackers?

    I’m kinda paranoid about losing everything I’ve worked hard on.
    Any tips?

    • 5 NoNaMeZzzz
      May 8, 2013 at 11:39 pm

      It’s to many hacker’s on this world, everytime, hours, minutes, seconds they were growing up their skills. It’s kinda be a little bit hard to protect your file from them.

      But, as long as if you never share your file to anyone. I think they will save for unpredictable time ;D

  4. May 5, 2013 at 7:30 am

    I absolutely love your blog and find nearly all of your post’s to be just what I’m looking for.
    Does one offer guest writers to write content for yourself?
    I wouldn’t mind publishing a post or elaborating on most of the subjects you write about here. Again, awesome web log!

  5. May 9, 2013 at 1:22 pm

    I’m not sure why but this website is loading incredibly slow for me. Is anyone else having this issue or is it a issue on my end? I’ll
    check back later on and see if the problem still exists.

  6. May 9, 2013 at 5:54 pm

    Saved as a favorite, I really like your site!

  7. May 11, 2013 at 2:24 pm

    Pretty section of content. I just stumbled upon your site and in accession capital to assert that I get in fact enjoyed account
    your blog posts. Any way I’ll be subscribing to your feeds and even I achievement you access consistently rapidly.

  8. May 12, 2013 at 3:05 am

    I have read so many content concerning the blogger lovers except this piece
    of writing is really a nice piece of writing,
    keep it up.

  9. 14 oioioir
    May 15, 2013 at 1:55 am

    Question three is wrong,
    -It utilizes a store and forward process.
    -SMTP is used to send the e-mail message to the mail servers.

    But thank you!! 98%

  10. May 15, 2013 at 9:40 am

    I am really inspired with your writing skills and also with the structure
    on your weblog. Is that this a paid theme or did you modify it your self?
    Anyway keep up the excellent high quality
    writing, it’s uncommon to look a nice blog like this one today..

  11. June 7, 2013 at 1:16 am

    With havin so much content and articles do you ever run into any problems of plagorism or copyright violation?

    My website has a lot of unique content I’ve either created myself or outsourced but it seems a lot of it is popping it up all over the web without my agreement. Do you know any ways to help reduce content from being ripped off? I’d truly appreciate it.

  12. June 7, 2013 at 2:24 am

    I used to be suggested this web site by way of my cousin.

    I’m now not positive whether or not this publish is written by him as nobody else know such certain approximately my trouble. You are incredible! Thank you!

  13. June 7, 2013 at 10:31 am

    I comment whenever I appreciate a post on a site or I have something to
    valuable to contribute to the conversation. Usually it is triggered by the fire
    communicated in the post I looked at. And after this post CCNA CHAPTER 7 VER:4.
    1 | -NoNaMeZzz-. I was moved enough to leave a thought 🙂 I do
    have 2 questions for you if it’s allright. Is it only me or does it give the impression like a few of these responses come across like written by brain dead people? 😛 And, if you are writing at other online social sites, I would like to follow everything new you have to post. Would you make a list every one of all your social sites like your Facebook page, twitter feed, or linkedin profile?

    • 22 NoNaMeZzzz
      June 11, 2013 at 4:35 am

      a lot of things happened to me and a lot of things i’ve got to do in a real world 😀 . i just write articles when i want it. in fact i’d love to share everything i know for all people on the world. but i’m just to busy in here.

  14. June 8, 2013 at 6:36 pm

    Hi! I’m at work browsing your blog from my new iphone 4! Just wanted to say I love reading through your blog and look forward to all your posts! Keep up the fantastic work!

  15. June 8, 2013 at 8:52 pm

    Hi there, I discovered your web site by means of Google whilst
    searching for a related subject, your web site got here up, it looks great.
    I’ve bookmarked it in my google bookmarks.
    Hi there, simply became aware of your blog thru Google, and located that it’s really informative.
    I am gonna watch out for brussels. I’ll be grateful if you happen to continue this in future. Lots of people will be benefited from your writing. Cheers!

  16. June 8, 2013 at 10:05 pm

    I do not even know how I ended up here, but I thought this post was good.

    I don’t know who you are but certainly you’re going to a famous blogger if you
    are not already 😉 Cheers!

  17. June 8, 2013 at 10:26 pm

    whoah this blog is wonderful i like studying your posts.
    Stay up the great work! You already know, many people are
    looking round for this info, you could aid them greatly.

  18. June 9, 2013 at 8:45 pm

    Marvelous, what a web site it is! This web site presents valuable data to us,
    keep it up.

  19. June 10, 2013 at 11:48 am

    Keep this going please, great job!

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

Top Clicks

  • None


June 2018
« May    

%d bloggers like this: