Module 3: The Transport and Application Layers
Looking for โthe bits and bytes of computer networking module 3 answersโ?
In this post, I provide complete, accurate, and detailed explanations for the answers to Module 3: The Transport and Application Layers of Course 2: The Bits and Bytes of Computer Networking โ Google IT Support Professional Certificate
Whether youโre preparing for quizzes or brushing up on your knowledge, these insights will help you master the concepts effectively. Letโs dive into the correct answers and detailed explanations for each question!
The Transport Layer
Practice Quiz
1. What ordering of TCP flags make up the Three-Way Handshake?
- SYN, ACK, FIN
- SYN, ACK, SYN, ACK
- SYN, SYN/ACK, ACK
- FIN, FIN/ACK, ACK
Explanation:
- The Three-Way Handshake establishes a reliable TCP connection:
- SYN โ The client sends a SYN (synchronize) packet to the server.
- SYN/ACK โ The server responds with a SYN/ACK (synchronize-acknowledge).
- ACK โ The client sends an ACK (acknowledge) to finalize the handshake.
2. Transport layer protocols, like TCP and UDP, introduce the concept of a port. How many bits are in a port field?
- 4
- 16
- 8
- 32
Explanation:
- TCP and UDP ports are represented using 16-bit fields.
- This allows for 65,536 (2^16) unique port numbers, ranging from 0 to 65535.
3. A device that blocks traffic that meets certain criteria is known as a ________.
- Firewall
- Hub
- Switch
- Router
Explanation:
- A firewall is a security device that monitors and filters incoming and outgoing network traffic based on pre-defined rules.
- It blocks unauthorized access and malicious traffic.
4. Which TCP flag is used to make the listening program respond immediately?
- PSH
- URG
- RST
- ACK
Explanation:
- The PSH (Push) flag forces data to be immediately delivered to the application without waiting for the buffer to fill.
- It ensures low-latency communication.
5. _________are identified as ports 49152 through 65535.
- User ports
- Ephemeral ports
- System ports
- Sockets
Explanation:
- Ephemeral ports (49152โ65535) are temporary ports used by the OS for short-lived connections.
- These ports are dynamically assigned for client-server communication.
The Application Layer
Practice Quiz
6. Unlike our five-layer model, the OSI network model adds two more layers on top of the Application Layer. Select examples of these new layers below.
- The interconnection layer
- The session layer
- The presentation layer
- The compression layer
Explanation:
- The OSI model consists of seven layers, whereas the TCP/IP model has five layers.
- The two extra layers in the OSI model are:
- Session Layer โ Manages sessions between applications.
- Presentation Layer โ Handles data translation, encryption, and compression.
7. An example of something that operates at the application layer is:
- A web browser
- UDP
- TCP
- A router
Explanation:
- The Application Layer is responsible for providing network services to end users.
- A web browser (like Chrome or Firefox) operates at this layer by using protocols like HTTP/HTTPS.
- TCP and UDP operate at the Transport Layer.
- A router operates at the Network Layer.
8. What's the standard number for a TTL field?
- 8
- 16
- 32
- 64
Explanation:
- The TTL (Time To Live) field in an IP packet determines the maximum number of hops a packet can take before being discarded.
- The standard default TTL value is 64 (though it can vary depending on the OS).
- This prevents packets from endlessly circulating in a network.
9. Which part of the operating system does the application use to communicate the need to establish a TCP connection?
- Networking stack
- ARP message
- The source port
- The router
Explanation:
- The Networking stack is a part of the OS that manages network communication.
- Applications use it to establish TCP connections, send and receive data, and manage network interactions.
10. Which of the following sections of the TCP/IP Five-Layer Network Model contain the data the application wants to send? Select all that apply.
- The header of the Ethernet frame
- The payload section of the IP Datagram
- The payload section of the Ethernet frame
- The payload of the TCP segment
Explanation:
- Data sent from an application is encapsulated in various layers:
- TCP Segment (Payload Section) โ Holds application data.
- IP Datagram (Payload Section) โ Contains the TCP segment.
- Ethernet Frame (Payload Section) โ Contains the IP datagram.
- The header of the Ethernet frame contains control information (e.g., MAC addresses), not application data.
Module 3 challenge: The Transport and Application Layer
Graded Quiz
11. The concept of taking traffic thatโs all aimed at the same node and delivering it to the proper receiving service is known as _________.
- routing
- encapsulation
- multiplexing
- demultiplexing
Explanation:
- Demultiplexing is the process of directing incoming traffic to the correct application or service on a receiving device.
- It ensures that data sent to a computerโs IP address is delivered to the appropriate application based on port numbers.
- Example: If a computer receives web traffic (port 80) and email traffic (port 25), demultiplexing ensures they reach the correct applications.
12. Which field in a Transmission Control Protocol (TCP) header is chosen from ephemeral ports?
- Destination port
- Sequence number
- Acknowledgement number
- Source port
Explanation:
- Ephemeral ports are temporary ports assigned to outgoing connections (range: 49152โ65535).
- The source port field in the TCP header holds the ephemeral port assigned to a specific session.
- Example: When you visit a website, your device uses an ephemeral port as the source port, while the web server listens on a well-known port (e.g., 443 for HTTPS).
13. A device involved in a Transmission Control Protocol (TCP) connection is ready to close the connection. The other device in the connection agrees. What has occurred?
- Two-way handshake
- Three-way handshake
- Four-way handshake
- Handshake
Explanation:
- Closing a TCP connection involves a four-way handshake, using FIN (Finish) and ACK (Acknowledge) flags:
- Device 1 sends FIN to request connection closure.
- Device 2 responds with ACK.
- Device 2 sends its own FIN to confirm closing.
- Device 1 replies with ACK, completing the closure.
14. A Transmission Control Protocol (TCP) connection is in working order and both sides can send each other data. What is the TCP socket state?
- ESTABLISHED
- SYN_SENT
- LISTEN
- SYN_RECEIVED
Explanation:
- ESTABLISHED is the state where a TCP connection is fully set up, and both devices can send/receive data.
- Other states:
- SYN_SENT: Waiting for a response after sending a connection request.
- LISTEN: Waiting for incoming connection requests.
- SYN_RECEIVED: Received a connection request but not fully established.
15. If the checksum doesn't compute for a packet sent at the Internet Protocol (IP) level, what will happen to the data?
- The data will be sent back to the sending node with an error.
- The data will be discarded
- It will be sent, but may be out of order.
- The data will be resent
Explanation:
- A checksum is used to detect errors in transmitted packets.
- If the checksum verification fails, it means the packet is corrupted, so it is discarded to prevent bad data from being processed.
- TCP (which operates above IP) will retransmit lost data if necessary.
16. The OSI network model has _____ layers.
- seven
- six
- five
- eight
Explanation:
- The OSI Model consists of 7 layers:
- Physical (Bits, cables)
- Data Link (MAC addresses, switches)
- Network (IP addresses, routers)
- Transport (TCP/UDP, port numbers)
- Session (Managing connections)
- Presentation (Data encryption, compression)
- Application (User-facing applications)
17. You are sending a very small amount of information that you need the listening program to respond to immediately. Which Transmission Control Protocol (TCP) flag will be used?
- ACK
- RST
- PSH
- URG
Explanation:
- The PSH (Push) flag tells the receiver to process the data immediately without buffering.
- Example: When you send a message in a chat application, PSH ensures the message is processed right away.
18. What layer of the TCP/IP Five-Layer Network Model allows applications to communicate in a way they understand?
- User layer
- Application layer
- Data layer
- Transport layer
Explanation:
- The Application Layer is responsible for communication between user applications and the network.
- Examples: HTTP (web browsing), SMTP (email), FTP (file transfer).
19. Ports that are generally used to establish outbound connections are known as ______ ports.
- reserved
- registered
- ephemeral
- system
Explanation:
- Ephemeral ports are temporary, dynamically assigned ports used for outbound connections.
- They range from 49152 to 65535.
- Example: When you open a website, your device selects a random ephemeral port as the source port for the session.
20. A 32-bit number that's used to keep track of where you are in a sequence of TCP segments is known as a(n) ______ number.
- sequence
- acknowledgement
- address
- TCP
Explanation:
- The Sequence Number in a TCP header tracks the order of packets in a TCP session.
- Since data is split into multiple segments, sequence numbers ensure they are reassembled correctly.
- Example:
- If a file is broken into three segments, each will have a sequence number (e.g., 1000, 2000, 3000).
- The receiver uses these numbers to reconstruct the data in the correct order.
21. The transport layer uses ____ to handle multiplexing and demultiplexing.
- Switches
- Routers
- Hubs
- Ports
Explanation:
- Multiplexing allows multiple applications to use the network simultaneously.
- Demultiplexing ensures the received data is directed to the correct application.
- Ports serve as endpoints for communication, distinguishing different services running on the same device.
- Example: HTTP typically uses port 80, while FTP uses port 21.
22. Which field in a Transmission Control Protocol (TCP) header provides the next expected segment?
- Checksum
- Acknowledgement number
- Data offset
- Sequence number
Explanation:
- In TCP, each segment contains a sequence number and an acknowledgment number.
- The acknowledgment number tells the sender the next expected byte from the receiver.
- This ensures ordered and reliable data transmission.
23. A Transmission Control Protocol (TCP) connection is established and two devices ensure that they're speaking the same protocol. What has occurred?
- Three-way handshake
- Four-way handshake
- Two-way handshake
- Handwaving
Explanation:
- Before exchanging data, TCP uses the three-way handshake to establish a connection:
- SYN โ The client sends a Synchronize (SYN) message.
- SYN-ACK โ The server responds with Synchronize-Acknowledgment (SYN-ACK).
- ACK โ The client replies with an Acknowledgment (ACK), completing the handshake.
- This process ensures both devices are ready and agree on initial sequence numbers.
24. A connection has been terminated and no communication is possible. What is the Transmission Control Protocol (TCP) socket state?
- FIN_WAIT
- CLOSED
- CLOSE_WAIT
- FINISHED
Explanation:
- When a TCP connection is terminated using a four-way handshake (FIN, FIN-ACK, ACK, ACK), it enters the CLOSED state.
- No further data transmission is possible.
25. Connection-oriented protocols protect against dropped data by forming connections and using a constant stream of what?
- Approvals
- Verifiers
- Recognition
- Acknowledgements
Explanation:
- TCP ensures reliable communication by requiring acknowledgments (ACKs) for each received packet.
- If a packet is lost, TCP resends it.
- This is different from UDP, which does not provide acknowledgment or retransmission.
26. Which Transmission Control Protocol (TCP) flag is used to make sure the receiving end knows to examine the sequence number field?
- RST
- FIN
- PSH
- SYN
Explanation:
- The SYN flag (Synchronize) is used to initiate a TCP connection.
- It tells the receiver to check the sequence number in the TCP header, allowing both devices to synchronize their communication.
27. HTTP is an example of a(n) ______ layer protocol.
- network
- application
- transport
- data-link
Explanation:
- The Application layer in the OSI and TCP/IP models handles user interactions.
- HTTP (HyperText Transfer Protocol) is an Application layer protocol used for web communication.
- Other examples: FTP, SMTP (email), and DNS.
28. What port does the File Transfer Protocol (FTP) typically listen on?
- 25
- 443
- 21
- 80
- TP (File Transfer Protocol) is used for file transfers between a client and server.
- It operates on:
- Port 21 (control commands).
- Port 20 (data transfer).
29. A communication between two devices is over the maximum limit of an ethernet frame size. The Transmission Control Protocol (TCP) splits up the data into segments. Which field in the header helps keep track of the many segments?
- Sequence number
- Urgent pointer
- Acknowledgement number
- Checksum
Explanation:
- TCP divides large data into smaller segments to fit within network constraints.
- The sequence number ensures that the receiving device can reassemble the segments in the correct order.
- Without sequence numbers, data could arrive out of order or get lost.
30. Nodes on a network have the ability to direct traffic toward many different receiving services. What provides this ability in the transport layer?
- File Transfer
- Socket address
- Multiplexing
- Demultiplexing
Explanation:
Multiplexing in the transport layer allows multiple applications or services to use the same network connection simultaneously. It ensures that data from different applications is correctly sent and received by the intended service.
31. A communication sent through Transmission Control Protocol (TCP) arrives out of order. What allows the data to be put back together in the correct order?
- Acknowledgement number
- Sequence numbers
- Preamble
- Checksum
Explanation:
Each TCP segment contains a Sequence number, which tells the receiver the correct order of data. If packets arrive out of order, the receiver uses these sequence numbers to reassemble them properly.
32. In the OSI network model, the ________ is responsible for facilitating the communication between actual applications and the transport layer.
- presentation layer
- application layer
- physical layer
- session layer
Explanation:
The Session layer (Layer 5) of the OSI model is responsible for establishing, managing, and terminating communication sessions between applications. It ensures that different sessions donโt interfere with each other.
33. One side in a Transmission Control Protocol (TCP) connection has not been able to properly recover from a series of malformed segments. Which Transmission Control Protocol (TCP) flag will be used?
- PSH
- FIN
- SYN
- RST
Explanation:
The RST (Reset) flag in TCP is used to forcefully terminate a connection when there is an error, such as receiving corrupted or malformed data. This ensures that the connection does not continue in an unstable state.
34. The sequence of SYN, SYN/ACK, and ACK packets is known as the _________.
- three-way handshake
- high five
- four-way handshake
- two-way handshake
Explanation: The three-way handshake is a process used in TCP to establish a reliable connection:
- SYN โ Client requests to initiate a connection.
- SYN-ACK โ Server acknowledges and responds.
- ACK โ Client confirms the connection is established.
35. In the OSI network model, the ________ is responsible for making sure that the unencapsulated application layer data is actually able to be understood by the application in question.
- session layer
- application layer
- data layer
- presentation layer
Explanation:
The presentation layer (Layer 6) translates data into a format the application layer can understand. It handles encryption, compression, and character encoding.
36. Application layer data lives in the _____ section of the transport layer protocol.
- footer
- header
- flags
- payload
Explanation:
The payload is the actual data being transmitted. The transport layer encapsulates the application layer data within its segment before sending it over the network.w
37. A user requests an unencrypted webpage from a web server running on a computer, listening on the Internet Protocol address 10.1.1.150. What will be the socket address?
- 10.1.1.150:80
- 10.1.1.150.80
- 10.1.1.150.21
- 10.1.1.150:21
Explanation:
A socket address consists of an IP address and a port number. Since HTTP runs on port 80, the correct socket address is 10.1.1.150:80.
Module 3 challenge: The Five-Layer Network Model
Graded Quiz
Use the following scenario to answer the 10 questions below:
You have 3 networks (A, B, and C) and 2 routers (Y and Z).
Network A has an address space of 10.1.1.0/24 and is connected to router Y, using the interface 10.1.1.1.
Network B has an address space of 192.168.1.0/24 and is connected to Router Y, using the interface 192.168.1.254. Network B is also connected with router Z, using the interface of 192.168.1.1.
Network C has an address space of 172.16.1.0/24 and is connected to router Z, using the interface 172.16.1.1. The diagram below represents these connections and interfaces.

38. Computer 1 on network A, with IP address of 10.1.1.205, wants to send a packet to Computer 2, with IP address of 172.16.1.57. On which network is computer 2?
- Network B
- Network A
- Local network
- Network C
Explanation:
The IP 172.16.1.57 belongs to Network C (172.16.1.0/24).
39. Computer 1 wants to send a packet to Computer 2. Since computer 2 is not on the local network, Computer 1 checks the ARP table for the corresponding ______ that matches the gateway IP.
- MAC address
- TTL value
- Destination MAC address
- Port number
Explanation:
ARP (Address Resolution Protocol) maps an IP address to a MAC address.
40. If itโs a TCP connection, which is the first segment that computer 1 needs to build?
- TCP segment
- Ethernet frame
- handshake
- IP datagram
Explanation:
The first step in establishing a TCP connection is sending a SYN packet within a TCP segment.
41. What information is in the data payload of the Ethernet frame?
- Handshake
- network interface
- IP datagram
- ART message
Explanation:
The IP datagram contains network layer data inside the Ethernet frame.
42. When constructing the Ethernet datagram to send the packet from Router Y to Router Z, what information needs to be in the destination MAC address?
- Router Yโs MAC address
- Computer 1โs MAC address
- Computer 2โs MAC address
- Router Zโs MAC address
Explanation:
The MAC address must be the next-hop routerโs MAC address.
43. Computer 1 on Network A sends a packet to Computer 2 on Network C. What's the second step that Router Z does after receiving the Ethernet frame?
- Calculates a checksum and compares this checksum with the one in the Ethernet frame header
- Sends an ARP broadcast message
- Sends back the packages to router Y for confirmation
- Strips away the Ethernet frame, leaving the IP datagram. Performs a checksum calculation against the entire datagram
Explanation:
Routers remove the Ethernet frame, process the IP datagram, and verify integrity using the checksum.
44. Computer 1 on network C, with IP address of 172.16.1.57, wants to send a packet to Computer 2, with IP address of 172.16.1.133. If the TTL value was set to 64 at the beginning, what is the value of the TTL once it reaches its destination?
- 65
- 64
- 0
- 61
Explanation:
Since both computers are on the same network, TTL does not decrease.
45. Computer 1 on network B, with IP address of 192.168.1.121, wants to send a packet to Computer 2, with IP address of 10.1.1.8. Taking in consideration that computer 1 is sending a request to a web server on computer 2, listening on port 80, and the source port on computer 1 is 5000, which of the following contains the correct information for the first TCP segment of data?
- Source Port: 5000
Destination Port: 80
Sequence Number: 1
Acknowledgment Number: 2 - Source Port: 8081
Destination Port: 50
Sequence Number: 4
Acknowledgment Number: 1 - Source Port: 80
Destination Port: 5000
Sequence Number: 1
Acknowledgment Number: 1 - Source Port: 80
Destination Port: 5000
Sequence Number: 1
Acknowledgment Number: 2
Explanation:
- Source Port: 5000 (random ephemeral port)
- Destination Port: 80 (web server port)
- Sequence Number: 1 (first packet in the sequence)
- Acknowledgment Number: 2 (next expected byte)
46. Computer 1 on network B, with IP address of 192.168.1.233, wants to send a packet to Computer 2, with IP address of 172.16.1.133. Which of the following has the correct IP datagram information for the fields: Version, minimum Header Length, Source IP, and Destination IP?
- Version: 4
Header Length: 20
Source IP Address: 192.168.1.233
Destination IP address: 172.16.1.133 - Version: 5
Header Length: 16
Source IP Address: 10.1.1.0/24.
Destination IP address: 172.16.1.0/24. - Version: 4
Header Length: 32
Source IP Address: 10.1.1.1
Destination IP address:172.16.1.1 - Version: 6
Header Length: 20
Source IP Address: 8a:1a:2b:3c:4d:5f
Destination IP address: 2a:2b:3c:4d:8f
Explanation:
- Version 4 (IPv4)
- Header Length: 20 bytes (standard for IPv4)
- Source IP: 192.168.1.233
- Destination IP: 172.16.1.133
47. The Cat6 cable is part of the ______ layer.
- Transport
- Physical
- Application
- Network
Explanation:
Cat6 is a physical transmission medium that operates at Layer 1.
Use the following scenario to answer the 10 questions below:
You have 3 networks (A, B, and C) and 2 routers (Y and Z).
Network A has an address space of 10.1.1.0/24 and is connected to router Y, using the interface 10.1.1.1.
Network B has an address space of 192.168.1.0/24 and is connected to Router Y, using the interface 192.168.1.254. Network B is also connected with router Z, using the interface of 192.168.1.1.
Network C has an address space of 172.16.1.0/24 and is connected to router Z, using the interface 172.16.1.1. The diagram below represents these connections and interfaces.

48. Computer 1 on network A, with the IP address of 10.1.1.8, wants to send a packet to Computer 2, with the IP address of 10.1.1.10. On which network is computer 2?
- Not present
- Network C
- Network A
- Network B
49. For what purpose would computer 1 send a FF:FF:FF:FF:FF broadcast ARP message to all nodes on network A?
- To verify the internet connection
- To obtain Computer 2 MAC address
- To obtain Router Yโs MAC address
- To calculate the TTL
Explanation:
Computer 1 needs to send a packet outside its network, meaning it must forward it through Router Y. To do this, it must first determine Router Yโs MAC address, so it sends a broadcast ARP request (FF:FF:FF:FF:FF:FF) asking for the MAC address of 10.1.1.1 (Router Y).
50. Which layer constructs the IP datagram?
- Data layer
- Physical Layer
- Network layer
- Application layer
51. What information is in the data payload for the IP datagram?
- The ARP discovery request
- TCP segment
- ART table
- Network B address space
52. When constructing the Ethernet datagram to send the packet from Router Z to Computer 2 which is on Network C, what information needs to be in the destination MAC address?
- Computer 2โs MAC address
- No MAC address is needed
- Computer 1โs MAC address
- Router Yโs MAC address
53. Computer 1 on Network A sends a packet to Computer 2 on Network C. What's the first step that Router Z does after receiving the Ethernet frame?
- Increases the TTL by one
- Calculates a checksum and compares this checksum with the one in the Ethernet frame header
- Checks the destination IP address and changes it to its own
- Sends an ARP broadcast message
54. Computer 1 on network A, with IP address of 10.1.1.8, wants to send a packet to Computer 2, with IP address of 172.16.1.64. If the TTL value was set to 64 at the beginning, what is the value of the TTL once it reaches its destination?
- 62
- 0
- 60
- 65
55. Computer 1 on network C, with IP address of 172.16.1.57, wants to send a packet to Computer 2, with IP address of 192.168.1.14. Taking in consideration that computer 1 is sending a request to a web server on computer 2, listening on port 80, and the source port on computer 1 is 5000, which of the following contains the correct information for the fourth TCP segment of data?
- Source Port: 5000
Destination Port: 80
Sequence Number: 4
Acknowledgment Number: 5 - Source Port: 80
Destination Port: 5000
Sequence Number: 1
Acknowledgment Number: 1 - Source Port: 5000
Destination Port: 80
Sequence Number: 1
Acknowledgment Number: 2 - Source Port: 8081
Destination Port: 50
Sequence Number: 4
Acknowledgment Number: 1
56. Computer 1 on network A, with IP address of 10.1.1.10, wants to send a packet to Computer 2, with IP address of 172.16.1.64. Which of the following has the correct IP datagram information for the fields: Version, minimum Header Length, Source IP, and Destination IP?
- Version: 5
Header Length: 16
Source IP Address: 171.1.1.1.
Destination IP address: 172.16.1.0/24. - Version: 4
Header Length: 20
Source IP Address: 10.1.1.10
Destination IP address: 172.16.1.64 - Version: 4
Header Length: 32
Source IP Address: 10.1.1.1
Destination IP address: 172.16.1.1 - Version: 6
Header Length: 20
Source IP Address: 8a:1a:2b:3c:4d:5f
Destination IP address: 2a:2b:3c:4d:8f
57. When referring to RJ45, we are referring to the ________.
- cable plug
- network identification
- ethernet port
- router velocity
Explanation:
RJ45 (Registered Jack 45) is the connector type used for Ethernet cables, such as Cat5 or Cat6 cables. It is not a network port, protocol, or address identifierโit refers specifically to the physical plug used for wired networking.
54. The ________ layer is responsible for sending ones and zeros through a process called modulation from Computer 1 to Computer 2.
- Transport
- Physical
- Application
- Network
Explanation:
The Physical layer (Layer 1) is responsible for converting digital signals (ones and zeros) into physical signals using modulation for transmission.
Related contents:
Module 1: Introduction to Networking
Module 2: The Network Layer
Module 4: Networking Services
Module 5: Connecting to the Internet
Module 6: Troubleshooting and the Future of Networking