martes, 1 de septiembre de 2009

Examen cisco CCNA1 CAPITULO 3

1 A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.)
* centralized administration
does not require specialized software
* security is easier to enforce
lower cost implementation
provides a single point of failure

2 Which of the following are benefits of peer-to-peer networks? (Choose three.)
centralized security
* easy to create
very scalable
* no centralized equipment required
* centralized administrator not required
centralized control of assets

3 Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)
ASP
FTP
HTML
* HTTP
* HTTPS
IP

4 Which statements are correct concerning the role of the MTA in handling email? (Choose three.)
routes email to the MDA on other servers
* receives email from the client's MUA
receives email via the POP3 protocol
* passes email to the MDA for final delivery
* uses SMTP to route email between servers
delivers email to clients via the POP3 protocol

5 What is the automated service that matches resource names with the required IP address?
HTTP
SSH
FQDN
* DNS
Telnet
SMTP

6 What three protocols operate at the Application layer of the OSI model? (Choose three.)
ARP
* DNS
PPP
* SMTP
* POP
ICMP

7 What are the two forms of application layer software? (Choose two.)
* applications
processes
* services
dialogs
syntax
daemons

8 What are three properties of peer-to-peer applications? (Choose three.)
* acts as both a client and server within the same communication
requires centralized account administration
* hybrid mode includes a centralized directory of files
* can be used in client-server networks
does not require specialized software
centralized authentication is required

9 Which application layer protocols correctly match a corresponding function? (Choose two.)
DNS dynamically allocates IP addresses to hosts
* HTTP transfers data from a web server to a client
POP delivers email from the client to the server email server
SMTP supports file sharing
Telnet provides a virtual connection for remote access

10 Which are valid DNS resource record types? (Choose three.)
* A
* NS
MTA
* MX
FQDN
MAU

11 Which email components are used to forward mail between servers? (Choose two.)
MDA
IMAP
* MTA
POP
* SMTP
MUA

12 What is the primary disadvantage of telnet?
does not support authentication
consumes network bandwidth
utilizes client resources
not widely available
* does not support encryption
requires remote access

13 What are three common HTTP message types? (Choose three.)
* GET
PUSH
* POST
HTML
UPLOAD
* PUT

14 Which of the following are examples of TCP/IP application layer protocols? (Choose three.)
* a terminal emulation protocol that supports remote console connections with various network devices
a protocol created by IBM that makes it easier for mainframes to connect to remote offices
* a protocol responsible for transporting electronic mail on TCP/IP networks and the Internet
a protocol that controls the rate at which data is sent to another computer
* a protocol that exchanges network management information between a network device and a management console
o the 0 bterm correctly identifies the device type that is included in the green area?
source
end
transfer
* intermediary

16
Which three statements best describe a Local Area Network (LAN)? (Choose three.)
* A LAN is usually in a single geographical area.
* The network is administered by a single organization.
The connection between segments in the LAN is usually through a leased connection.
The security and access control of the network are controlled by a service provider.
* A LAN provides network services and access to applications for users within a common organization.
Each end of the network is generally connected to a Telecommunication Service Provider (TSP).

17
Refer to the exhibit. What type of network is shown?
WAN
MAN
* LAN
WLAN

18
What is the purpose of the TCP/IP Network Access layer?
path determination and packet switching
* data representation, encoding, and control
reliability, flow control, and error detection
detailing the components that make up the physical link and how to access it
the division of segments into packets

19
Which characteristic correctly refers to end devices in a network?
manage data flows
originate data flow
* retime and retransmit data signals
determine pathways for data

20
What is the primary purpose of Layer 4 port assignment?
to identify devices on the local media
to identify the hops between source and destination
to identify to the intermediary devices the best path through the network
to identify the source and destination end devices that are communicating
* to identify the processes or services that are communicating within the end devices

21
Select the statements that are correct concerning network protocols. (Choose three.)
* define the structure of layer specific PDU's
dictate how to accomplish layer functions
* outline the functions necessary for communications between layers
limit hardware compatibility
* require layer dependent encapsulations
eliminate standardization among vendors

No hay comentarios:

Publicar un comentario