Information Technology Reference
In-Depth Information
What does the flag PSH do?
5
a. Tells the sending TCP process to send the segment immediately
b. Tells the routers to forward the packets with higher priority
c. Tells the destination TCP to push the IP packet to the application layer
d. Tells the IP layer to send immediately
Which of the following describes TFTP?
6
a. A protocol that uses TCP to transfer files with no authentication
b. A protocol for the transfer of files reliably using port 69
c. A protocol for the transfer of files using UDP
d. A protocol to transfer files using TCP 21
Which ICMP protocol type does the PING application use?
7
a. IP protocol 6
b. ICMP echo
c. TCP
d. ARP request
What is blocked in the following access list?
8
access-list 105 deny tcp any host 10.1.1.1 eq 23
access-list 105 permit tcp any any
a. Packets from host 10.1.1.1 are denied.
b. Packets from any TCP host are denied.
c. Packets from any host sent to host 10.1.1.1 to the Telnet port are denied.
d. Packets to host 10.1.1.1 are permitted, all others are denied.
Which methods acquire a default gateway?
9
a. ARP and RARP
b. BOOTP and DHCP
c. RARP and BOOTP
d. IP address and subnet mask
What is the inside global address in NAT?
10
a. The translated IP address of the device that resides in the internal network
b. The translated IP address of the device that resides in the Global Internet
Search WWH ::




Custom Search