Cisco CCNA 1-3

0.0(0)
studied byStudied by 8 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/45

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1
New cards
What application layer protocol is commonly used to support for file transfers b/w a client & a server?
• HTML
• HTTP
• FTP
• Telnet
FTP
2
New cards
What are 2 forms of application layer software? (choose two)
• applications
• dialogs
• requests
• services
• syntax
1. Applications
2. Services
3
New cards
A network administrator is designing a network for a new branch office of 25 users. What are the advantages of using client-server model? (choose 2)
• centralized administration
• does not require specialized software
• security is easier to enforce
• lower cost implementation
• provides a single point of failure
1. Centralized administration
2. Security is easier to enfore
4
New cards
What 3 protocols operate at the Application layer of the OSI model? (choose three)
• ARP
• DNS
• PPP
• SMTP
• POP
• ICMP
• DNS
• SMTP
• POP
5
New cards
What is the purpose of resource records in DNS?
• temporarily holds resolved entries
• used by the server to resolve names
• sent by the client to during a query
• passes authentication information between the server and client
Used by the server to resolve names
6
New cards
What is the automate service that matches resource names w/ the required IP address?
• HTTP
• SSH
• FQDN
• DNS
• Telnet
• SMTP
DNS
7
New cards
What are 3 properties of peer-to-peer application?
• acts as both a client and server within the same communication.
• requires centralized account administration.
• hybrid mode includes a centralized directory of files.
• can be used in client-server networks.
• requires a direct physical connection between devices.
• centralized authentication is required.
1. Acts as both client & server w/in the same communication
2. Hybrid mode includes a centralized directory of files.
3. Can be used in client-server networks
8
New cards
Which application protocols correctly match a corresponding function? (choose 2)
• DNS dynamically allocates IP addresses to hosts
• HTTP transfers data from a web server to a client
• POP delivers email from the client to the server email server
• SMTP supports file sharing
• Telnet provides a virtual connection for remote access
1. HTTP transfer data from a web server to a client
2. Telnet provides a virtual connection for remote access
9
New cards
Which email components are used to forward mail b/w servers? (choose two)
• MDA
• IMAP
• MTA
• POP
• SMTP
• MUA
1. MTA
2. SMTP
10
New cards
As compared to SSH, what is the primary disadvantage of telnet?
• not widely available
• does not support encryption
• consumes more network bandwidth
• does not support authentication
does not support encryption
11
New cards
Which statements are correct concerning the role of MTA in handling mail? (choose three)
• routes email to the MDA on other servers
• receives email from the client's MUA
• receives email via the POP3 protocol
• passes email to the MDA for final delivery
• uses SMTP to route email between servers
• delivers email to clients via the POP3 protocol
1. receives email from the client's MUA
2. passes email to the MDA for final delivery
3. uses SMTP to route email b/w servers
12
New cards
Which 2 protocols are used to control the transfer of web resources from a web server to a client browser? (choose two)
• ASP
• FTP
• HTML
• HTTP
• HTTPS
• IP
1. HTTP
2. HTTPS
13
New cards
A small home network has been installed to interconnected 3 computers together for gaming & file sharing. What 2 properties represent this network type? (choose two)
• User accounts are centralized.
• Security is difficult to enforce.
• Specialized operating system software is required.
• File permissions are controlled by a single computer.
• A computer that responds to a file sharing request is functioning as a server.
1. Security is difficult to enforce
2. A computer that responds to a file sharing request is functioning as a server
14
New cards
Which layer of the OSI model supplies services that allow user to interface w/ the network?
• physical
• session
• network
• presentation
• application
• transport
Application
15
New cards
Refer to the exhibit. What is the destination port for the communication that is represented on line 5?
• 80
• 1261
• 15533
• 3912
• 65520
80
16
New cards
What are 2 characteristics of peer-to-peer networks? (choose two)
• scalable
• one way data flow
• decentralized resources
• centralized user accounts
• resource sharing without a dedicated server
1. decentralized resources
2. resource sharing w/o a dedicated server
17
New cards
What application layer protocol describes the services that are used file sharing in Microsoft networks?
• DHCP
• DNS
• SMB
• SMTP
• Telnet
SMB
18
New cards
What are 2 characteristics of clients in data networks?
• use daemons
• initiate data exchanges
• are repositories of data
• may upload data to servers
• listen for requests from servers
1. initiate data exchanges
2. may upload data to servers
19
New cards
What is the role of the OSI application layer?
• provides segmentation of data
• provides encryption and conversion of data
• provides the interface between the applications on either end of the network
• provides control of all the data flowing between the source and destination devices
provides the interface between the applications on either end of the network
20
New cards
How does the application layer on a server usually process multiple client request for services?
• ceases all connections to the service
• denies multiple connections to a single daemon
• suspends the current connection to allow the new connection
• uses support from lower layer functions to distinguish between connections to the service
uses support from lower functions to distinguish between connections to the service
21
New cards
Which 3 layers of the OSI model make up the Application layer of the TCP/IP model?
1. Session
2. Presentation
3. Application
22
New cards
What protocol is used to transfer web pages from server to client?
HTTP
23
New cards
Which protocols use authentication and encryption to secure data traveling b/w client & server?
1. HTTPS
2. SSH
24
New cards
Match the functions into the appropriate email component.
* MTA
- forwards mail b/w servers using SMTP
- receives mail from client
* MDA
- resolves final delivery issues
- performs actual delivery to user's mailbox
* MUA
- retrieves mail using POP
- client used to access and read mail
25
New cards
Match the description to the organization. (Not all options are used.)
ISOC - This organization promotes the open development, evolution, and use of the Internet throughout the world.

ISO - This organization is the largest developer of international standards in the world for a wide variety of products and services. It is known for its Open Systems Interconnection (OSI) reference model.

EIA - None

IANA - This organization is responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers
26
New cards
What characteristic describes the default gateway of a host computer?
the logical address of the router interface on the same network as the host computer
27
New cards
What is an advantage of using standards to develop and implement protocols?
Products from different manufacturers can interoperate successfully.
28
New cards
What are proprietary protocols?
protocols developed by organizations who have control over their definition and operation
29
New cards
What process is used to place one message inside another message for transfer from the source to the destination?
encapsulation
30
New cards
What type of communication will send a message to all devices on a local area network?
broadcast
31
New cards
What is an advantage of network devices using open standard protocols?
A client host and a server running different operating systems can successfully exchange data.
32
New cards
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, TCP, IP, Ethernet
33
New cards
Refer to the exhibit. HostA is attempting to contact ServerB. Which two statements correctly describe the addressing that HostA will generate in the process? (Choose two.)
A packet with the destination IP address of ServerB.

A frame with the destination MAC address of RouterA.
34
New cards
Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)
application

session

presentation
35
New cards
Match the protocol function to the description while taking into consideration that a network client is visiting a web site. (Not all options are used.)
application protocol - governing the way a web server and a web client interact

internet protocol - taking the segments from the transport protocol, encapsulating them into packets, and assigning them with appropriate addresses

network time protocol - None

transport protocol - managing the individual conversations between web servers and web clients
36
New cards
Match each description to its corresponding term. (Not all options are used.)
the process of determining when to begin sending messages on a network - None

the process of converting information from one format into another acceptable for transmission - message encoding

the process of placing one message format inside another message format - message encapsulation

the process of unpacking one message format from another message format - None

the process of breaking up a long message into individual pieces before being sent over the network - message sizing
37
New cards
Which statement is correct about network protocols?
They define how messages are exchanged between the source and the destination.
38
New cards
What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)
DHCP

DNS

FTP
39
New cards
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
flow control
40
New cards
At which layer of the OSI model would a logical address be added during encapsulation?
network layer
41
New cards
Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?
segment
42
New cards
Which PDU format is used when bits are received from the network medium by the NIC of a host?
frame
43
New cards
What will happen if the default gateway address is incorrectly configured on a host?
The host cannot communicate with hosts in other networks.
44
New cards
Which address does a NIC use when deciding whether to accept a frame?
destination MAC address
45
New cards
Refer to the exhibit. If Host1 were to transfer a file to the server, what layers of the TCP/IP model would be used?
application, transport, Internet, and network access layers
46
New cards
Which statement is true about the TCP/IP and OSI models?
The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.