CCNA 1 Chapter 10 Exam

Ace your homework & exams now with Quizwiz!

What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?

.com * The components of the URL http://www.cisco.com/index.htm are as follows: http = protocol www = part of the server name cisco = part of the domain name index = file name com = the top-level domain

What is an example of network communication that uses the client-server model?

A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser. * When a user types a domain name of a website into the address bar of a web browser, a workstation needs to send a DNS request to the DNS server for the name resolution process. This request is a client/server model application. The eMule application is P2P. Sharing a printer on a workstation is a peer-to-peer network. Using ARP is just a broadcast message sent by a host.

What do the client/server and peer-to-peer network models have in common?

Both models support devices in server and client roles. * In both the client/server and peer-to-peer network models, clients and servers exist. In peer-to-peer networks, no dedicated server exists, but a device can assume the server role to provide information to a device serving in the client role.

Which two definitions accurately describe the associated application layer protocol?

DNS - resolves Internet names to IP addresses Telnet - provides remote access to servers and networking devices * The Domain Name Service (DNS) protocol resolves Internet names to IP addresses. Hypertext Transfer Protocol (HTTP) transfers files that make up the web pages of the World Wide Web. The Simple Mail Transfer Protocol (SMTP) transfers mail messages and attachments. Telnet, a terminal emulation protocol, provides remote access to servers and networking devices. The File Transfer Protocol (FTP) transfers files between systems.

Which statement is true about FTP?

FTP is a client/server protocol. FTP requires two connections between the client and the server and uses TCP to provide reliable connections. With FTP, data transfer can happen in either direction. The client can download (pull) data from the server or upload (push) data to the server.

Fill in the blank. The HTTP message type used by the client to request data from the web server is the message.​

GET * GET is one of the message types used by HTTP. A client (web browser) sends the GET message to the web server to request HTML pages.​

Which application layer protocol uses message types such as GET, PUT, and POST?

HTTP * The GET command is a client request for data from a web server. A PUT command uploads resources and content, such as images, to a web server. A POST command uploads data files to a web server.

A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications?

HTTP SMTP FTP * The ISP uses the HTTP protocol in conjunction with hosting web pages, the FTP protocol with file transfers, and SMTP with e-mail. DNS is used to translate domain names to IP addresses. SNMP is used for network management traffic. DHCP ic commonly used to manage IP addressing.

Fill in the blank. What is the acronym for the protocol that is used when securely communicating with a web server?

HTTPS * Hypertext Transfer Protocol Secure (HTTPS) is the protocol that is used for accessing or posting web server information using a secure communication channel.

When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?

IMAP * IMAP is preferred for small-to medium-sized businesses as IMAP allows centralized storage and backup of emails, with copies of the emails being forwarded to clients. POP delivers the emails to the clients and deletes them on the email server. SMTP is used to send emails and not to receive them. HTTPS is not used for secure web browsing.

What is an advantage for small organizations of adopting IMAP instead of POP?

Messages are kept in the mail servers until they are manually deleted from the email client. * IMAP and POP are protocols that are used to retrieve email messages. The advantage of using IMAP instead of POP is that when the user connects to an IMAP-capable server, copies of the messages are downloaded to the client application. IMAP then stores the email messages on the server until the user manually deletes those messages.

Fill in the blank. Refer to the exhibit. What command was used to resolve a given host name by querying the name servers?

NSLOOKUP * A user can manually query the name servers to resolve a given host name using the nslookup command.​ Nslookup is both a command and a utility.​

PT Activity - Perform the tasks in the activity instructions and then answer the question. Which PC or PCs are sending FTP packets to the server?

PC_2 * After you view the details of the packets that are being transferred between each PC and the server, you will see that the PC that is using a destination port number of 20 or 21 is the PC using the FTP service. PC_2 has an outbound port number of 21 to create an FTP control session with the server at 192.168.1.253.

match a statement to the related network model

Peer-to-peer networks do not require the use of a dedicated server, and devices can assume both client and server roles simultaneously on a per request basis. Because they do not require formalized accounts or permissions, they are best used in limited situations. Peer-to-peer applications require a user interface and background service to be running, and can be used in more diverse situations.

Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?

SMB * SMB is used in Microsoft networking for file-sharing and print services. The Linux operating system provides a method of sharing resources with Microsoft networks by using a version of SMB called SAMBA.

Which three statements describe a DHCP Discover message? (Choose three.)

The message comes from a client seeking an IP address. The destination IP address is 255.255.255.255. All hosts receive the message, but only a DHCP server replies. * When a host configured to use DHCP powers up on a network it sends a DHCPDISCOVER message. FF-FF-FF-FF-FF-FF is the L2 broadcast address. A DHCP server replies with a unicast DHCPOFFER message back to the host.

Which phrase describes an FTP daemon?

a program that is running on an FTP server * An FTP server runs an FTP daemon, which is a program that provides FTP services. End users who request services must run an FTP client program.

Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?

application * The application layer of the TCP/IP model performs the functions of three layers of the OSI model - application, presentation, and session. The application layer of the TCP/IP model is the layer that provides the interface between the applications, is responsible for formatting, compressing, and encrypting data, and is used to create and maintain dialogs between source and destination applications.

Which two tasks can be performed by a local DNS server? (Choose two.)

mapping name-to-IP addresses for internal hosts forwarding name resolution requests between servers * Two important functions of DNS are to (1) provide IP addresses for domain names such as www.cisco.com, and (2) forward requests that cannot be resolved to other servers in order to provide domain name to IP address translation. DHCP provides IP addressing information to local devices. A file transfer protocol such as FTP, SFTP, or TFTP provides file sharing services. IMAP or POP can be used to retrieve an email message from a server.

The application layer of the TCP/IP model performs the functions of what three layers of the OSI model?

presentation application session * The network access layer of the TCP/IP model performs the same functions as the physical and data link layers of the OSI model. The internetwork layer equates to the network layer of the OSI model. The transport layers are the same in both models. The application layer of the TCP/IP model represents the session, presentation, and application layers of the OSI model.​

What are two characteristics of the application layer of the TCP/IP model

the creation and maintenance of dialogue between source and destination applications closest to the end user * The application layer of the TCP/IP model is the layer that is closest to the end user, providing the interface between the applications. It is responsible for formatting, compressing, and encrypting data, and is used to create and maintain dialog between source and destination applications.


Related study sets

Chemistry Module I Lesson 6: Stoichiometry

View Set

Prep U: Chapter 63 Adult Nursing

View Set

Which of the following statements defines the open door policy?

View Set

AD Banker Chapter 2 Exam Questions

View Set

Quiz 7: Thyroid & Parathyroid; Adrenal & Pituitary

View Set