Answer
b) The next expected (SEQ) sequence number from the remote host
d) The current SEQ number from the remote host "plus" 1.
Following are three captures that clearly show the ACK and SEQ numbers of a three-way handshake.
First Part
Second Part
Third Part
51. [OxNx] Simple Network Management Protocol uses what numeric value, in decimal, of the destination port field of the User Datagram Protocol (UDP) header?
a) 20
b) 21
c) 23
d) 69
e) 161
Answer
e) 161
52. [OxNx] The first segment of the "Three-Way Handshake" will most likely carry an ACK of (Choose the best answer):
a) 1
b) The SEQ number of the remote host "plus" 1
c) 0
d) There is no ACK.
e) A randomly generated number
Answer
c) 0
Below is an example of the first part of a Three-Way Handshake.
In this first part of the handshake, take note of the Sequence and Acknowledgement numbers. Since this is the first part of the handshake the ACK is 0. The host initiating this connection-oriented conversation can not acknowledge a number that has not been received. This is the key factor in creating an access list that provides the ability to telnet out, but not allow the outside world to telnet in. The key word "established" means permit only those packets where the ACK is non-zero. (Refer to Question 4 of the June Issue.)
53. [OxNx] Which one of the following layers "best" describes the ability of the upper layers to gain independence over LAN media access?
a) Application Layer 7
b) Presentation Layer 6
c) Session Layer 5
d) Transport Layer 4
e) Network Layer 3
f) Data Link Layer 2
g) Physical Layer 1
h) MAC sublayer
i) LLC sublayer
Answer
i) LLC sublayer
54. [OxNx] The Media Access Control (MAC) address is made up of the following two parts.
a) Vendor Code
b) Network Address
c) Host Address
d) Serial Number
e) No such address
Answer
a) Vendor Code
d) Serial Number
The MAC address consists of 48 bits. The first 24 bits are the Vendor code or the Organizational Unique Identifier (OUI) number. The IEEE assigns these addresses to each vendor. It is the responsibility of each vendor to make sure that each card produced has a unique serial number. A vendor may have more than one Vendor Code.
Has anyone ever caught a vendor in a screw up? When would a user ever know if there has been a screw up by a vendor?
Some Examples of OUI numbers:
CISCO 00 00 0c xx xx xx
Novell 00 00 1b xx xx xx
3COM 02 60 8c xx xx xx
Take note of the organizational code below:
55. [OxNx] Which one of the following describes the process of a TCP/IP host learning a remote host MAC address?
a) ARP (Address Resolution Protocol)
b) SLARP (Serial Line Address Resolution Protocol)
c) RARP (Reverse Address Resolution Protocol)
d) IARP (Inverse Address Resolution Protocol)
e) MOP (Maintenance Operation Protocol)
Answer
a) ARP (Address Resolution Protocol)
Below is an ARP request: Take note of the destination MAC address!
Followed by an ARP reply:
Notice that the reply includes the source MAC address.
56. [OxNx] What is the major difference between the Ethernet version 2 frame and the 802.3 frame?
a) 802.3 frame uses a two-byte Length field where Ethernet describes type.
b) 802.3 frame uses a two-byte field for sequence numbers where Ethernet describes Type.
c) Ethernet uses a 802.2 header to describe type.
d) Ethernet uses a SNAP header.
e) There is no major difference.
f) None of the above.
Answer
a) 802.3 frame uses a two-byte Length field where Ethernet describes type.
Bob Metcalf usually gets named as the man who invented ethernet, he was working for XEROX at the time. In this original ethernet frame from the 1970s there was a two-byte field describing type. The IEEE took the two byte field and used it to describe length. IEEE uses SSAP, DSAP and sometimes SNAP to describe type.
57. [OxNx] What is the purpose of the 802.3 Subnet Access Protocol (SNAP) format?
a) To make ethernet perform faster
b) To identify the length of the frame
c) To identify proprietary protocols
d) To allow windowing
e) To allow flow control
Answer
c) To identify proprietary protocols
The following is a capture of a proprietary protocol.
Can you identify the vendor? (That s easy.) Can you identify the protocol? (That s a little harder.)
责任编辑:小草