Chapter 10: Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain? .com www http index

.com The components of the URL http://www.cisco.com/index.htm are as follows: http = protocol www = part of the server name cisco = part of the domain name index = file name com = the top-level domain

What is an example of network communication that uses the client-server model? A user uses eMule to download a file that is shared by a friend after the file location is determined. A workstation initiates an ARP to find the MAC address of a receiving host. A user prints a document by using a printer that is attached to a workstation of a coworker. A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.

A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.

What is true about the Server Message Block protocol? Different SMB message types have a different format. Clients establish a long term connection to servers. SMB messages cannot authenticate a session. SMB uses the FTP protocol for communication

Clients establish a long term connection to servers.

What message type is used by an HTTP client to request data from a web server? GET POST PUT ACK

GET

Which application layer protocol uses message types such as GET, PUT, and POST? DNS DHCP SMTP HTTP

HTTP

Which protocol is used by a client to communicate securely with a web server? SMTP SMB IMAP HTTPS

HTTPS

When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business? IMAP POP SMTP HTTPS

IMAP

Match a statement to the related network model. (Not all options are used.)

Peer-to-peer networks do not require the use of a dedicated server, and devices can assume both client and server roles simultaneously on a per request basis. Because they do not require formalized accounts or permissions, they are best used in limited situations. Peer-to-peer applications require a user interface and background service to be running, and can be used in more diverse situations.

Which two definitions accurately describe the associated application layer protocol? (Choose two.) SMTP - transfers web pages from web servers to clients Telnet - provides remote access to servers and networking devices DNS - resolves Internet names to IP addresses FTP - transfers email messages and attachments HTTP - enables devices on a network to obtain IP addresses

Telnet - provides remote access to servers and networking devices DNS - resolves Internet names to IP addresses Explanation: The Domain Name Service (DNS) protocol resolves Internet names to IP addresses. Hypertext Transfer Protocol (HTTP) transfers files that make up the web pages of the World Wide Web. The Simple Mail Transfer Protocol (SMTP) transfers mail messages and attachments. Telnet, a terminal emulation protocol, provides remote access to servers and networking devices. The File Transfer Protocol (FTP) transfers files between systems.

Which statement is true about FTP? The client can choose if FTP is going to establish one or two connections with the server. The client can download data from or upload data to the server. FTP is a peer-to-peer application. FTP does not provide reliability during data transmission.

The client can download data from or upload data to the server.

Which three statements describe a DHCP Discover message? (Choose three.) The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF). The destination IP address is 255.255.255.255. The message comes from a server offering an IP address. The message comes from a client seeking an IP address. All hosts receive the message, but only a DHCP server replies. Only the DHCP server receives the message

The destination IP address is 255.255.255.255. The message comes from a client seeking an IP address. All hosts receive the message, but only a DHCP server replies.

Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data? internetwork session presentation application network access

application

What do the client/server and peer-to-peer network models have in common? Both models have dedicated servers. Both models support devices in server and client roles. Both models require the use of TCP/IP-based protocols.

both models support devices in server and client roles

Which two tasks can be performed by a local DNS server? (Choose two.) providing IP addresses to local hosts allowing data transfer between two network devices mapping name-to-IP addresses for internal hosts forwarding name resolution requests between servers retrieving email messages

mapping name-to-IP addresses for internal hosts forwarding name resolution requests between servers

Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?

peer-to-peer

What are two characteristics of the application layer of the TCP/IP model? (Choose two.) responsibility for logical addressing responsibility for physical addressing the creation and maintenance of dialogue between source and destination applications closest to the end user

the creation and maintenance of dialogue between source and destination applications closest to the end user

A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.) SMTP FTP HTTP DNS SNMP DHCP

SMTP FTP HTTP

What is an advantage for small organizations of adopting IMAP instead of POP? Messages are kept in the mail servers until they are manually deleted from the email client. When the user connects to a POP server, copies of the messages are kept in the mail server for a short time, but IMAP keeps them for a long time. IMAP sends and retrieves email, but POP only retrieves email. POP only allows the client to store messages in a centralized way, while IMAP

Messages are kept in the mail servers until they are manually deleted from the email client.

The application layer of the TCP/IP model performs the functions of what three layers of the OSI model? (Choose three.) physical session network presentation data link transport application

session presentation application

What is the function of the Nslookup utility? to manually force a client to send a DHCP request to view the network settings on a host to manually query the name servers to resolve a given host name to display all cached DNS entries on a host

to manually query the name servers to resolve a given host name


Conjuntos de estudio relacionados

Prep U CH 48: Management of Patients with Kidney Disorders

View Set

Cannon Post Test Study Guide 1-5

View Set

PH Chp. 21- The Nurse-led Health Center: A Model for Community Nursing Practice

View Set

Phylogenetic Trees & Collatagram

View Set