1.
What is the purpose of resource records in DNS?
used by the server to resolve names
2.
What are two forms of application layer software?
applications
syntax
3.
What application layer protocol is commonly used to support for file transfers between a client and a server?
FTP
4.
What are two characteristics of peer-to-peer networks?
decentralized resources
resource sharing without a dedicated server
5.
Which layer of the OSI model supplies services that allow user to interface with the network?
application
6.
What are three properties of peer-to-peer applications?
acts as both a client and server within the same communication
hybrid mode includes a centralized directory of files
does not require specialized software
7.
What is the role of the OSI application layer?
provides the interface between the applications on either end of the network
8.
What three protocols operate at the Application layer of the OSI model?
DNS, SMTP, POP
9.
Which email components are used to forward mail between servers?
MDA, MTA
10.
Which two protocols are used to control the transfer of web resources from a web server to a client browser?
HTTPS
HTTP
11.
Which statements are correct concerning the role of the MTA in handling email?
receives email from the client's MUA
passes email to the MDA for final delivery
uses SMTP to route email between servers
12.
As compared to SSH, what is the primary disadvantage of telnet?
does not support encryption
13.
Which application layer protocols correctly match a corresponding function?
DNS dynamically allocates IP addresses to hosts
Telnet provides a virtual connection for remote access
14.
What is the automated service that matches resource names with the required IP address?
DNS
15.
Refer to the exhibit. What is the destination port for the communication that is represented on line 5?
80
16.
What are two characteristics of clients in data networks?
initiate data exchanges
may upload data to servers
17.
What application layer protocol describes the services that are used for file sharing in Microsoft networks?
SMB
18.
A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model?
centralized administration
security is easier to enforce
19.
A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type?
User accounts are centralized.
Security is difficult to enforce.
20.
How does the application layer on a server usually process multiple client request for services?
uses support from lower layer functions to distinguish between connections to th
CCNA 1 - Module 3
1.
What is the purpose of resource records in DNS?
used by the server to resolve names
2.
What are two forms of application layer software?
applications
syntax
3.
What application layer protocol is commonly used to support for file transfers between a client and a server?
FTP
4.
What are two characteristics of peer-to-peer networks?
decentralized resources
resource sharing without a dedicated server
5.
Which layer of the OSI model supplies services that allow user to interface with the network?
application
6.
What are three properties of peer-to-peer applications?
acts as both a client and server within the same communication
hybrid mode includes a centralized directory of files
does not require specialized software
7.
What is the role of the OSI application layer?
provides the interface between the applications on either end of the network
8.
What three protocols operate at the Application layer of the OSI model?
DNS, SMTP, POP
9.
Which email components are used to forward mail between servers?
MDA, MTA
10.
Which two protocols are used to control the transfer of web resources from a web server to a client browser?
HTTPS
HTTP
11.
Which statements are correct concerning the role of the MTA in handling email?
receives email from the client's MUA
passes email to the MDA for final delivery
uses SMTP to route email between servers
12.
As compared to SSH, what is the primary disadvantage of telnet?
does not support encryption
13.
Which application layer protocols correctly match a corresponding function?
DNS dynamically allocates IP addresses to hosts
Telnet provides a virtual connection for remote access
14.
What is the automated service that matches resource names with the required IP address?
DNS
15.
Refer to the exhibit. What is the destination port for the communication that is represented on line 5?
80
16.
What are two characteristics of clients in data networks?
initiate data exchanges
may upload data to servers
17.
What application layer protocol describes the services that are used for file sharing in Microsoft networks?
SMB
18.
A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model?
centralized administration
security is easier to enforce
19.
A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type?
User accounts are centralized.
Security is difficult to enforce.
20.
How does the application layer on a server usually process multiple client request for services?
uses support from lower layer functions to distinguish between conn
e service
Subscribe to:
Post Comments (Atom)
Popular Posts
-
Hot nude scenes of Kim Min Sun ....! Large | Medium | Small | By webmaster ] Trailer of the film "Portrait of a Beauty" wa...
-
click here to view full size
-
Rolls-Royce says one part caused Qantas A380 blow-out Rolls Royce engine The engine broke apart on a Qantas A380 aircraft on 4 November Cont...
-
Top 25 body 'sexy' best bikini Tuesday, 08/06/2010 16:00 (2Sao) - Home entertainment network information can count the number of...
-
Cisco has very recently launched the new version of Packet Tracer 5.1. I have uploaded the software with tutorials for the users who are pr...
-
Angelina Jolie had to do incest with her stepfather at age 16 Large | Medium | Small | By webmaster ] After a drunken night with t...
-
1. Which two things can be determined by using the ping command? (Choose two.) the number of routers between the source and destination dev...
-
Go bar dancing hobby's drunk teen girl from china Author: l_lovestory_l 01:22 - When night falls cover the city of Beijing is also...
-
Renault can name new car Zoe as girls' case rejected Renault's zero-emissions car, Zoe, due for release in 2012 Renault has been giv...
-
1. Refer to the exhibit. Host B attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured at the FastEth...
2 comments
what the answers to questions posted?
It is the latest version i known
Post a Comment