ThatQuiz Βιβλιοθήκη δοκιμασιών Εκτέλεση της δοκιμασίας τώρα
CCNA Semester 1 - Chapter 3 Review
Συνεισφορά από: Alvarado
  • 1. In DNS, resource records are used by the server to resolve
A) web site pings
B) web site traces
C) web site proxies
D) web site names
  • 2. The OSI application layer entails application software and
A) packet tracing
B) services
C) wire sharking services
D) neo tracing
  • 3. The application layer protocol used to support File Transport between servers and client is
A) FTP
B) TCP
C) POP
D) DNS
  • 4. Peer-to-Peer networks are both decentralized and provide resources without a dedicated
A) data center
B) host service center
C) supplier
D) server
  • 5. What does the application layer of the OSI model allow a user to do with a data network?
A) interface with the network
B) control the network
C) decrease network traffic
D) increase network traffic
  • 6. The following are all properties of peer-to-peer applications except acting:
A) through the use of specialized software
B) as both clients and servers
C) in hybrid mode providing file centralization
D) as either clients or servers
  • 7. The OSI Application layer allows for applications on either end of a network to:
A) hybridize their functions
B) monitor mutual multiplexing and segmentation
C) cancel each other's requests
D) interface and communicate with one another
  • 8. The following are protocols that operate at the OSI application layer except:
A) DNS
B) SMTP
C) POP
D) IP
  • 9. The two email components used to forward mail between servers are MTA and:
A) POP
B) DNS
C) IP
D) SMTP
  • 10. The two protocols used to control web resource transfers from a web server to a client browser are HTTP and:
A) DNS
B) FTP
C) HTML
D) HTTPS
  • 11. In handling email, the MTA does the following except:
A) provides a resource lists with the fastest delivery times
B) uses SMTP to route email between servers
C) receive email from the client's MUA
D) passes email to the MDA for final delivery
  • 12. Telnet is usually abandoned for SSH because Telnet does not support:
A) encryption
B) segmentation
C) multiplexing
D) packet-tracing
  • 13. The HTTP protocol provides the ability of a web server and a web client to transfer:
A) packet tracing
B) data
C) user names and passwords
D) encrypting technologies
  • 14. The Telnet service provides users with the ability to remotely access another computer through what type of connection?
A) physical
B) logical
C) operational
D) virtual
  • 15. The automated service that matches web site names with their correct IP address is:
A) TCP
B) VOIP
C) DNS
D) HTTP
  • 16. Which destination port is used by an application when the HTTP protocol is activated?
A) Port 280
B) Port 180
C) Port 80
D) Port 380
  • 17. In a data network, clients can both upload data to servers and:
A) ignore data exchanges
B) initiate data exchanges
C) multiply data exchanges
D) prioritize data exchanges
  • 18. In Microsoft Networks, the application layer protocol used to describe the services provided is:
A) POP
B) SMB
C) SMTP
D) VOIP
  • 19. There are 2 important advantages of using a client-server network model, centralized administration and better:
A) security
B) data exchange
C) pricing
D) performance
  • 20. Why is security a serious concern in a peer-to-peer network:
A) difficult to ignore
B) difficult to consider
C) difficult to purchase
D) difficult to enforce
  • 21. In a peer-to-peer network, a client that responds to a file sharing request will then become a/an:
A) end device
B) intermediary device
C) user device
D) server device
  • 22. A server's application layer usually processes multiple request for services by using support from lower layer functions to distinguish between:
A) users
B) accounts
C) connections
D) packets
  • 23. The following are examples of Peer-to-Peer networks except:
A) Bit Torrent
B) Limewire
C) Bear Share
D) Microsoft Office
  • 24. The main reason why a network administrator should block common ports used in file sharing is to avoid:
A) user complaints
B) intense wireless transmissions
C) VOIP concerns
D) illegal fire sharing
  • 25. A Peer-to-Peer network can work in a centralized and decentralized manner, this means they can work in what type of mode?
A) wire-sharked
B) neo-traced
C) hybrid
D) packet-traced
Οι μαθητές που έκαναν αυτή την δοκιμασία είδαν επίσης :

Δημιουργήθηκε με That Quiz — Όταν μια δοκιμασία εξάσκησης μαθηματικών είναι πάντα ένα κλικ μακριά.