1.What application layer protocol is commonly used to support for file transfers between a client and a server?

HTML

HTTP

FTP

Telnet

2.What are two forms of application layer software? (Choose two.)

Applications

Dialogs

Requests

Services

Syntax

3. A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.)

Centralized administration

Does not require specialized software

Security is easier to enforce

Lower cost implementation

Provides a single point of failure

4. What is the purpose of resource records in DNS?

Temporarily holds resolved entries

Used by the server to resolve names

Sent by the client to during a query

Passes authentication information between the server and client

5. What is the automated service that matches resource names with the required IP address?

HTTP

SSH

FQDN

DNS

Telnet

SMTP

6.What three protocols operate at the Application layer of the OSI model? (Choose three.)

ARP

DNS

PPP

SMTP

POP

ICMP

7. What are three properties of peer-to-peer applications? (Choose three.)

Acts as both a client and server within the same communication

Requires centralized account administration

Hybrid mode includes a centralized directory of files

Can be used in client-server networks

Requires a direct physical connection between devices

Centralized authentication is required

8. Which application layer protocols correctly match a corresponding function? (Choose two.)

DNS dynamically allocates IP addresses to hosts

HTTP transfers data from a web server to a client

POP delivers email from the client to the server email server

SMTP supports file sharing

Telnet provides a virtual connection for remote access

9. Which email components are used to forward mail between servers? (Choose two.)

MDA

IMAP

MTA

POP

SMTP

MUA

10. As compared to SSH, what is the primary disadvantage of telnet?

Not widely available

Does not support encryption

Consumes more network bandwidth

Does not support authentication

11. Which statements are correct concerning the role of the MTA in handling email? (Choose three.)

Routes email to the MDA on other servers

Receives email from the client’s MUA

Receives email via the POP3 protocol

Passes email to the MDA for final delivery

Uses SMTP to route email between servers

Delivers email to clients via the POP3 protocol

12. Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)

ASP

FTP

HTML

HTTP

HTTPS

IP

13. A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type? (Choose two.)

User accounts are centralized.

Security is difficult to enforce.

Specialized operating system software is required.

File permissions are controlled by a single computer.

A computer that responds to a file sharing request is functioning as a server.


14. Which layer of the OSI model supplies services that allow user to interface with the network?

Physical

Session

Network

Presentation

Application

Transport

15. Refer to the exhibit. What is the destination port for the communication that is represented on line 5?

80

1261

15533

3912

65520

16. What are two characteristics of peer-to-peer networks? (Choose two.)

Scalable

One way data flow

Decentralized resources

Centralized user accounts

Resource sharing without a dedicated server


17. What application layer protocol describes the services that are used for file sharing in Microsoft networks?

DHCP

DNS

SMB

SMTP

Telnet

18. What are two characteristics of clients in data networks? (Choose two.)

Use daemons

Initiate data exchanges

Are repositories of data?

May upload data to servers

Listen for requests from servers

19. What is the role of the OSI application layer?

Provides segmentation of data

Provides encryption and conversion of data

Provides the interface between the applications on either end of the network

Provides control of all the data flowing between the source and destination devices

20. How does the application layer on a server usually process multiple client requests for services?

Ceases all connections to the service

Denies multiple connections to a single daemon

Suspends the current connection to allow the new connection

Uses support from lower layer functions to distinguish between connections to the service

Advertisements

1.         Which statements correctly identify the role of intermediary devices in the network? (Choose three.)

Determine pathways for data

Initiate data communications

Retime and retransmit data signals

Originate the flow of data

Manage data flows

Final termination point for data flow

2.         Select the statements that are correct concerning network protocols. (Choose three.)

Define the structure of layer specific PDU’s

Dictate how to accomplish layer functions

Outline the functions necessary for communications between layers

Limit the need for hardware compatibility

Require layer dependent encapsulations

Eliminate standardization among vendors

3.         What are two functions of encapsulation? (Choose two.)

Tracks delay between end devices

Enables consistent network paths for communication

Allows modification of the original data before transmission

Identifies pieces of data as part of the same communication

Ensures that data pieces can be directed to the correct receiving end device

4.         What is a primary function of the trailer information added by the data link layer encapsulation?

Supports error detection

Ensures ordered arrival of data

Provides delivery to correct destination

Identifies the devices on the local network

Assists intermediary devices with processing and path selection

5.         Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.)

Network

Transport

Physical

Data Link

Session

6.         What is a PDU?

Corruption of a frame during transmission

Data reassembled at the destination

Retransmitted packets due to lost communication

A layer specific encapsulation

7.         Which characteristic correctly refers to end devices in a network?

Manage data flows

Originate data flow

Retime and retransmit data signals

Determine pathways for data

8.         Refer to the exhibit. “Cell A” at IP address 10.0.0.34 has established an IP session with “IP Phone 1” at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function of wireless device “Cell A?”

The destination device

An end device

An intermediate device

A media device

9.         Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown? (Choose three.)

Network A — WAN

Network B — WAN

Network C — LAN

Network B — MAN

Network C — WAN

Network A — LAN

10.       Which three statements best describe a Local Area Network (LAN)? (Choose three.)

A LAN is usually in a single geographical area.

The network is administered by a single organization.

The connection between segments in the LAN is usually through a leased connection.

The security and access control of the network are controlled by a service provider.

A LAN provides network services and access to applications for users within a common organization.

Each end of the network is generally connected to a Telecommunication Service Provider (TSP).

11.       Refer to the exhibit. Which networking term describes the data interleaving process represented in the graphic?

Piping

PDU

Streaming

Multiplexing

Encapsulation

12.       What is the primary purpose of Layer 4 port assignment?

To identify devices on the local media

To identify the hops between source and destination

To identify to the intermediary devices the best path through the network

To identify the source and destination end devices that is communicating

To identify the processes or services that is communicating within the end devices

13.       What device is considered an intermediary device?

File server

IP phone

Laptop

Printer

Switch

14.       Refer to the exhibit. Which term correctly identifies the device type that is included in the area B?

Source

End

Transfer

Intermediary

15.       Refer to the exhibit. What type of network is shown?

WAN

MAN

LAN

WLAN

16.       Which layer encapsulates the segment into packets?

Physical

Data link

Network

Transport

17.       What can be identified by examining the network layer header?

The destination device on the local media

The destination host address

The bits that will be transferred over the media

The source application or process creating the data

18.       Refer to the exhibit. Which set of devices contains only end devices?

A, C, D

B, E, G, H

C, D, G, H, I, J

D, E, F, H, I, J

E, F, H, I, J

19.       During the encapsulation process, what occurs at the data link layer?

No address is added.

The logical address is added.

The physical address is added.

The process port number is added

20.       What is the purpose of the TCP/IP Network Access layer?

Path determination and packet switching

Data presentation

Reliability, flow control, and error detection

Network media control

The division of segments into packets

21.       What is the proper order of the layers of the OSI model from the highest layer to the lowest layer?

Physical, network, application, data link, presentation, session, transport

Application, physical, session, transport, network, data link, presentation

Application, presentation, physical, session, data link, transport, network

Application, presentation, session, transport, network, data link, physical

Presentation, data link, session, transport, network, physical, application




CCNA