Module 15 Practice Flashcards
This layer of the OSI model is concerned with the protocols that exchange data between programs running on hosts.
application
transport
network
physical
application
MKV, GIF, and JPG standards are associated with which OSI layer?
application
presentation
session
transport
presentation
These three OSI layers define the same functions as the TCP/IP model application layer.
application
presentation
session
transport
network
data link
application
presentation
session
Which two are protocols that belong in the OSI application layer?
PNG
DNS
SMTP
QuickTime
DNS
SMTP
This is a function of the OSI session layer.
compress and decompress data
provide an interface between applications
format data for the application layer
exchange of information to initiate dialog between peers
exchange of information to initiate dialog between peers
True or false? The peer-to-peer networking model requires the implementation of a dedicated server for data access.
True
False
False
True or false? In a peer-to-peer network environment every peer can function as both a client and a server.
True
False
True
This protocol is used by a web browser to establish a connection to a web server.
HTTP
SSL
IMAP
SMTP
HTTP
Which peer-to-peer application allows users to share pieces of many files with each other at the same time?
Hybrid
Gnutella
BitTorrent
BitTorrent
This message type is used when uploading data files to a web server.
GET
POST
PUT
POST
Which of the following is a feature of the Gnutella protocol?
Users can share whole files with other users.
Users can share pieces of files with other users.
Users can access an index server to get the location of resources shared by other users.
Users can share whole files with other users.
This protocol is used by a client to send email to a mail server.
POP
SMTP
IMAP
HTTP
SMTP
Which is a feature of IMAP?
It uploads email messages to a server.
It listens passively on port 110 for client requests.
It downloads a copy of email messages leaving the original on the server.
It downloads a copy of email messages leaving the original on the server.
True or false? HTTP is a secure protocol.
True
False
False
Which of the following DNS record types is used to resolve IPv6 addresses?
A
NS
AAAA
MX
AAAA
True or false? A DNS server that receives a request for a name resolution that is not within its DNS zone will send a failure message to the requesting client.
True
False
False
Which of the following is displayed by the nslookup utility?
the configured default DNS server
the IP address of the end device
all cached DNS entries
the configured default DNS server
Which of the following DNS resource record types resolves authoritative name servers?
NS
A
MX
AAAA
NS
How many connections are required by FTP between client and server?
1
2
3
4
2
True or false? FTP data transfers take place from client to server (push) and from server to client (pull).
True
False
True
Which of these ports are used by FTP? (Choose two.)
20
21
25
110
20
21
True or false? Resource sharing over SMB is only supported on Microsoft operating systems.
True
False
False
On a home network, which device is most likely to provide dynamic IP addressing to clients on the home network?
a dedicated file server
a home router
an ISP DHCP server
a DNS server
a home router
What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?
.com
www
http
index
.com
What are two characteristics of the application layer of the TCP/IP model? (Choose two.)
responsibility for logical addressing
responsibility for physical addressing
the creation and maintenance of dialogue between source and destination applications
closest to the end user
the establishing of window size
the creation and maintenance of dialogue between source and destination applications
closest to the end user
What message type is used by an HTTP client to request data from a web server?
GET
POST
PUT
ACK
GET
Which statement is true about FTP?
The client can choose if FTP is going to establish one or two connections with the server.
The client can download data from or upload data to the server.
FTP is a peer-to-peer application.
FTP does not provide reliability during data transmission.
The client can download data from or upload data to the server.
A wireless host needs to request an IP address. What protocol would be used to process the request?
FTP
HTTP
DHCP
ICMP
SNMP
DHCP
Which TCP/IP model layer is closest to the end user?
application
internet
network access
transport
application
Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)
ТСР
HTTP
MPEG
GIF
IP
UDP
HTTP
MPEG
GIF
Which protocol uses encryption?
DHCP
DNS
FTP
HTTPS
HTTPS
Why is DHCP preferred for use on large networks?
Large networks send more requests for domain to IP address resolution than do smaller networks.
DHCP uses a reliable transport layer protocol.
It prevents sharing of files that are copyrighted.
It is a more efficient way to manage IP addresses than static address assignment.
Hosts on large networks require more IP addressing configuration settings than hosts on small networks.
It is a more efficient way to manage IP addresses than static address assignment.
When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?
IMAP
РОР
SMTP
HTTPS
IMAP
Which two tasks can be performed by a local DNS server? (Choose two.)
providing IP addresses to local hosts
allowing data transfer between two network devices
mapping name-to-IP addresses for internal hosts
forwarding name resolution requests between servers
retrieving email messages
mapping name-to-IP addresses for internal hosts
forwarding name resolution requests between servers
Which protocol can be used to transfer messages from an email server to an email client?
SMTP
POP3
SNMP
HTTP
POP3
Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?
HTTP
SMTP
DHCP
SMB
SMB
An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?
client
master
server
slave
transient
client