Options With Highlight Colours are Correct Answer
1. What application layer protocol is commonly used to support for file transfers between a client and a server?
• HTML
• HTTP
• FTP
• Telnet
2. What are two forms of application layer software? (Choose two.)
• applications
• dialogs
• requests
• services
• syntax
3. A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.)
• centralized administration
• does not require specialized software
• security is easier to enforce
• lower cost implementation
• provides a single point of failure
4. What is the purpose of resource records in DNS?
• temporarily holds resolved entries
• used by the server to resolve names
• sent by the client to during a query
• passes authentication information between the server and client
5. What is the automated service that matches resource names with the required IP address?
• HTTP
• SSH
• FQDN
• DNS
• Telnet
• SMTP
6. What three protocols operate at the Application layer of the OSI model? (Choose three.)
• ARP
• DNS
• PPP
• SMTP
• POP
• ICMP
7. What are three properties of peer-to-peer applications? (Choose three.)
• acts as both a client and server within the same communication.
• requires centralized account administration.
• hybrid mode includes a centralized directory of files.
• can be used in client-server networks.
• requires a direct physical connection between devices.
• centralized authentication is required.
8. Which application layer protocols correctly match a corresponding function? (Choose two.)
• DNS dynamically allocates IP addresses to hosts
• HTTP transfers data from a web server to a client
• POP delivers email from the client to the server email server
• SMTP supports file sharing
• Telnet provides a virtual connection for remote access
9. Which email components are used to forward mail between servers? (Choose two.)
• MDA
• IMAP
• MTA
• POP
• SMTP
• MUA
10. As compared to SSH, what is the primary disadvantage of telnet?
• not widely available
• does not support encryption
• consumes more network bandwidth
• does not support authentication
11. Which statements are correct concerning the role of the MTA in handling email? (Choose three.)
• routes email to the MDA on other servers
• receives email from the client's MUA
• receives email via the POP3 protocol
• passes email to the MDA for final delivery
• uses SMTP to route email between servers
• delivers email to clients via the POP3 protocol
12. Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)
• ASP
• FTP
HTML
• HTTP
• HTTPS
• IP
13. A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type? (Choose two.)
• User accounts are centralized.
• Security is difficult to enforce.
• Specialized operating system software is required.
• File permissions are controlled by a single computer.
• A computer that responds to a file sharing request is functioning as a server.
14. Which layer of the OSI model supplies services that allow user to interface with the network?
• physical
• session
• network
• presentation
• application
• transport
15. Refer to the exhibit. What is the destination port for the communication that is represented on line 5?
• 80
• 1261
• 15533
• 3912
• 65520
16. What are two characteristics of peer-to-peer networks? (Choose two.)
• scalable
• one way data flow
• decentralized resources
• centralized user accounts
• resource sharing without a dedicated server
17. What application layer protocol describes the services that are used for file sharing in Microsoft networks?
• DHCP
• DNS
• SMB
• SMTP
• Telnet
18. What are two characteristics of clients in data networks? (Choose two.)
• use daemons
• initiate data exchanges
• are repositories of data
• may upload data to servers
• listen for requests from servers
19. What is the role of the OSI application layer?
• provides segmentation of data
• provides encryption and conversion of data
• provides the interface between the applications on either end of the network
• provides control of all the data flowing between the source and destination devices
20. How does the application layer on a server usually process multiple client request for services?
• ceases all connections to the service
• denies multiple connections to a single daemon
• suspends the current connection to allow the new connection
• uses support from lower layer functions to distinguish between connections to the service
No comments:
Post a Comment