ccna 1 10
What are two characteristics of peer-to-peer networks? (Choose two.)
decentralized resources resource sharing without a dedicated server
What is an example of network communication that uses the client-server model?
A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.*
What is true about the Server Message Block protocol?
Clients establish a long term connection to servers.
A DHCP-enabled client PC has just booted. During which two steps will the client PC use broadcast messages when communicating with a DHCP server? (Choose two.)
DHCPDISCOVER DHCPREQUEST
A manufacturing company subscribes to certain hosted services from their ISP. The services required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)
FTP HTTP SMTP
Select three protocols that operate at the Application Layer of the OSI model. (Choose three.)
FTP POP3 DHCP
Which application layer protocol uses message types such as GET, PUT, and POST?
HTTP
What is the acronym for the protocol that is used when securely communicating with a web server?
HTTPS
What is an advantage for small organizations of adopting IMAP instead of POP?
Messages are kept in the mail servers until the client manually deletes them.
Which PC or PCs are sending FTP packets to the server?
PC_2
PICTURE
PICTURE
PITCURE
PICTURE
Which two actions are taken by SMTP if the destination email server is busy when email messages are sent? (Choose two.)
SMTP tries to send the messages at a later time. SMTP periodically checks the queue for messages and attempts to send them again.
Which three statements describe a DHCP Discover message? (Choose three.)
The destination IP address is 255.255.255.255. The message comes from a client seeking an IP address. All hosts receive the message, but only a DHCP server replies.
A user accessed the game site www.nogamename.com last week. The night before the user accesses the game site again, the site administrator changes the site IP address. What will be the consequence of that action for the user?
The user will access the site without problems.
Which two tasks are functions of the presentation layer? (Choose two.)
compression encryption
Which phrase describes an FTP daemon?
a program that is running on an FTP server*
Which DNS server in the DNS hierarchy would be considered authoritative for the domain name records of a company named netacad?
netacad.com
What command was used to resolve a given host name by querying the name servers?
nslookup
Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)
session layer application layer presentation layer
When would it be more efficient to use SMB to transfer files instead of FTP?
when downloading large numbers of files from the same server*