1.
A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type? (Choose two)
Correct Answer(s)
B. Security is difficult to enforce
E. A computer that responds to a file sharing request is functioning as a server
2.
What are two characteristics of peer-to-peer networks? (Choose two)
Correct Answer(s)
C. Decentralized resources
E. Resource sharing without a dedicated server
Explanation
Peer-to-peer networks have two main characteristics. First, they are decentralized, meaning that resources are distributed across the network rather than being concentrated in a central location. This allows for greater flexibility and resilience. Second, peer-to-peer networks enable resource sharing without the need for a dedicated server. Each node in the network can act as both a client and a server, allowing for efficient sharing of files, data, or other resources directly between users.
3.
What application layer protocol describes the services that are used for file sharing in Microsoft networks?
Correct Answer
C. SMB
Explanation
SMB (Server Message Block) is the correct answer because it is an application layer protocol that describes the services used for file sharing in Microsoft networks. SMB allows clients to access files and resources on a server over a network and is commonly used for sharing files, printers, and other resources between computers in a Windows environment.
4.
What are two characteristics of clients in data networks? (Choose two)
Correct Answer(s)
B. Initiate data exchanges
D. May upload data to servers
Explanation
Clients in data networks have two main characteristics. Firstly, they initiate data exchanges, meaning they are the ones who start the communication process by sending requests or initiating transactions with servers or other clients. Secondly, clients may upload data to servers, indicating that they have the capability to send data or files to servers for storage or processing. These characteristics highlight the active role of clients in data networks, as they are responsible for initiating and participating in data exchanges with other network entities.
5.
What is the role of the OSI application layer?
Correct Answer
C. Provides the interface between the applications on either end of the network
Explanation
The OSI application layer serves as the interface between the applications on both ends of the network. It allows these applications to communicate with each other by providing a standard set of protocols and services. This layer is responsible for tasks such as data formatting, encryption, and data conversion, ensuring that the applications can understand and interpret the data being exchanged. By providing a common interface, the application layer enables seamless communication between different applications regardless of the underlying network infrastructure.
6.
How does the application layer on a server usually process multiple client request for services?
Correct Answer
D. Uses support from lower layer functions to distinguish between connections to the service
Explanation
The application layer on a server usually processes multiple client requests for services by using support from lower layer functions to distinguish between connections to the service. This means that the application layer utilizes functions provided by lower layers of the network stack to differentiate between different client connections and handle them accordingly. By leveraging these lower layer functions, the server can effectively manage and respond to multiple client requests simultaneously.
7.
What is the purpose of resource records in DNS?
Correct Answer
B. Used by the server to resolve names
Explanation
Resource records in DNS are used by the server to resolve names. These records contain information such as IP addresses, domain names, and other data that helps in translating human-readable domain names into machine-readable IP addresses. When a client sends a query to the DNS server, the server uses the resource records to determine the corresponding IP address for the requested domain name. Therefore, resource records play a crucial role in the functioning of the DNS system by facilitating the resolution of domain names to their respective IP addresses.
8.
What is the automated service that matches resource names with the required IP address?
Correct Answer
D. DNS
Explanation
DNS (Domain Name System) is the automated service that matches resource names with the required IP address. It is responsible for translating domain names (such as www.example.com) into IP addresses (such as 192.168.1.1) that computers can understand. DNS allows users to access websites and other resources on the internet by using easy-to-remember domain names instead of complex IP addresses.
9.
What three protocols operate at the Application layer of the OSI model? (Choose three)
Correct Answer(s)
B. DNS
D. SMTP
E. POP
Explanation
The three protocols that operate at the Application layer of the OSI model are DNS, SMTP, and POP. DNS (Domain Name System) is responsible for translating domain names into IP addresses. SMTP (Simple Mail Transfer Protocol) is used for sending email messages between servers. POP (Post Office Protocol) is used for retrieving email messages from a mail server. ARP, PPP, and ICMP operate at lower layers of the OSI model and are not application layer protocols.
10.
What are three properties of peer-to-peer applications? (Choose three)
Correct Answer(s)
A. Acts as both a client and server within the same communication
C. Hybrid mode includes a centralized directory of files
D. Can be used in client-server networks
Explanation
Peer-to-peer applications have three main properties. Firstly, they act as both a client and server within the same communication, allowing users to both request and provide resources. Secondly, they can be used in client-server networks, meaning they can operate alongside traditional client-server applications. Lastly, hybrid mode includes a centralized directory of files, which helps in locating and accessing shared resources. These properties highlight the decentralized nature of peer-to-peer applications, where resources are distributed across multiple devices without the need for centralized account administration, direct physical connections, or centralized authentication.
11.
Which application layer protocols correctly match a corresponding function? (Choose two)
Correct Answer(s)
B. HTTP transfers data from a web server to a client
E. Telnet provides a virtual connection for remote access
Explanation
HTTP is an application layer protocol that is used to transfer data from a web server to a client. It is commonly used for accessing websites and retrieving web pages. Telnet, on the other hand, is a protocol that provides a virtual connection for remote access. It allows users to remotely access and control devices or systems over a network. Telnet is commonly used for remote administration or troubleshooting purposes.
12.
Which email components are used to forward mail between servers? (Choose two)
Correct Answer(s)
C. MTA
E. SMTP
Explanation
MTA (Mail Transfer Agent) and SMTP (Simple Mail Transfer Protocol) are the email components used to forward mail between servers. MTA is responsible for receiving emails from the sender's MUA (Mail User Agent) and forwarding them to the recipient's MTA. SMTP, on the other hand, is the protocol used by the MTA to transmit the email messages over the internet. Therefore, MTA and SMTP are the correct choices for forwarding mail between servers.
13.
As compared to SSH, what is the primary disadvantage of telnet?
Correct Answer
B. Does not support encryption
Explanation
The primary disadvantage of telnet compared to SSH is that it does not support encryption. This means that any data transmitted over a telnet connection is sent in plain text, making it vulnerable to interception and unauthorized access. Encryption is important for ensuring the confidentiality and integrity of data, especially when it involves sensitive information or authentication credentials. Without encryption, telnet is not suitable for secure communication over untrusted networks.
14.
Which statements are correct concerning the role of the MTA in handling email? (Choose three)
Correct Answer(s)
B. Receives email from the client's MUA
D. Passes email to the MDA for final delivery
E. Uses SMTP to route email between servers
Explanation
The MTA (Mail Transfer Agent) is responsible for receiving email from the client's MUA (Mail User Agent) and passing it to the MDA (Mail Delivery Agent) for final delivery. It also uses the SMTP (Simple Mail Transfer Protocol) to route email between servers. Therefore, the correct statements are: receives email from the client's MUA, passes email to the MDA for final delivery, and uses SMTP to route email between servers.
15.
Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two)
Correct Answer(s)
D. HTTP
E. HTTPS
Explanation
HTTP (Hypertext Transfer Protocol) and HTTPS (Hypertext Transfer Protocol Secure) are the two protocols used to control the transfer of web resources from a web server to a client browser. HTTP is the standard protocol for transmitting web pages and other content over the internet. HTTPS is a secure version of HTTP that encrypts the data being transmitted, providing an extra layer of security for sensitive information such as passwords or credit card details. Both protocols are essential for the smooth and secure transfer of web resources between the server and the client browser.
16.
What application layer protocol is commonly used to support for file transfers between a client and a server?
Correct Answer
C. FTP
Explanation
FTP (File Transfer Protocol) is commonly used to support file transfers between a client and a server. It is a standard network protocol that allows for the transfer of files over a TCP/IP network. FTP provides a simple and reliable way to transfer files, allowing users to upload, download, and manage files on a remote server. It is widely used for website maintenance, software updates, and file sharing. HTML (Hypertext Markup Language) is a markup language used for creating web pages, HTTP (Hypertext Transfer Protocol) is a protocol used for communication between web browsers and servers, and Telnet is a protocol used for remote login.
17.
What are two forms of application layer software? (Choose two)
Correct Answer(s)
A. Applications
D. Services
Explanation
The two forms of application layer software are applications and services. Applications refer to the software programs that are designed to perform specific tasks or functions, such as word processors, web browsers, or email clients. Services, on the other hand, are software components that provide specific functionalities to other applications or users, such as web servers, database management systems, or file transfer protocols. Both applications and services are essential components of the application layer, which is responsible for facilitating communication between different applications or services over a network.
18.
A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two)
Correct Answer(s)
A. Centralized administration
C. Security is easier to enforce
Explanation
The client-server model offers the advantage of centralized administration, which means that the network can be managed and controlled from a single location, making it easier to monitor and troubleshoot. Additionally, security is easier to enforce in a client-server model as access permissions and authentication can be centrally managed, reducing the risk of unauthorized access and data breaches.
19.
Refer to the exhibit. What is the destination port for the communication that is represented on line 5?
Correct Answer
A. 80
Explanation
The destination port for the communication represented on line 5 is 80.
20.
The application layer is ______________ of the OSI model.
Correct Answer
D. Layer 7
Explanation
The application layer is the topmost layer of the OSI model. It is responsible for providing network services to the user's applications. This layer interacts directly with the user and the user's application programs. It includes protocols such as HTTP, SMTP, FTP, and DNS, which are used for communication between applications. Layer 7 is often referred to as the "application layer" because it deals with the application-specific protocols and data formats that applications use to communicate with each other.
21.
The TCP/IP application layer consists roughly of which three OSI layers?
Correct Answer
B. Application, Presentation, Session
Explanation
The correct answer is "Application, Presentation, Session". In the TCP/IP model, the application layer is responsible for providing services to the end-user applications. This layer interacts with the presentation layer, which handles the formatting and encryption of data. The session layer manages the communication sessions between applications, including establishing, maintaining, and terminating connections. These three layers work together to ensure reliable and secure communication between applications.
22.
HTTP is used to do which of the following?
Correct Answer
C. Transfer files that make up the web pages of the World Wide Web
Explanation
HTTP (Hypertext Transfer Protocol) is a protocol used to transfer files that make up the web pages of the World Wide Web. It allows for the communication between a web client (such as a web browser) and a web server, facilitating the transfer of HTML, images, videos, and other resources that are necessary to display web pages. HTTP is responsible for requesting and delivering these files, enabling users to access and view websites on the internet.
23.
Post Office Protocol (POP) uses which port?
Correct Answer
D. UDP port 110
Explanation
POP (Post Office Protocol) is a protocol used for retrieving emails from a mail server. It operates on UDP port 110. UDP (User Datagram Protocol) is a connectionless protocol that does not require a handshake before transmitting data, making it suitable for applications like email retrieval where speed is important. TCP (Transmission Control Protocol) ports mentioned in the options (53 and 80) are typically used for DNS and HTTP respectively, while TCP port 25 is used for SMTP (Simple Mail Transfer Protocol) which is responsible for sending emails, not retrieving them.
24.
What is GET?
Correct Answer
A. A client request for data
Explanation
GET is an HTTP method used by clients to request data from a server. It is commonly used to retrieve information such as web pages, images, or files. When a client sends a GET request, it asks the server to send back a specific resource or data that it needs. This can include information from a database, API, or any other source that the server has access to. The server then processes the request and responds with the requested data, which the client can then use or display.
25.
Which is the most popular network service?
Correct Answer
D. E-mail
Explanation
E-mail is the most popular network service because it allows users to send and receive messages electronically. It is widely used for communication purposes, both personal and professional, allowing individuals to easily exchange information, documents, and media files over the internet. E-mail services are available on various devices and platforms, making it convenient and accessible for users worldwide.
26.
FTP requires ______________ connection(s) between client and server to successfully transfer files.
Correct Answer
B. 2
Explanation
FTP requires 2 connections between the client and server to successfully transfer files. One connection is used for control purposes, such as sending commands and receiving responses, while the other connection is used for data transfer. This separation of control and data connections helps to ensure efficient and reliable file transfers over the FTP protocol.
27.
DHCP enables clients on a network to do which of the following?
Correct Answer
C. Obtain IP addresses
Explanation
DHCP, which stands for Dynamic Host Configuration Protocol, allows clients on a network to obtain IP addresses. This means that when a device connects to a network, it can automatically receive a unique IP address from the DHCP server, eliminating the need for manual configuration. This enables efficient and seamless communication between devices on the network, as each device can be identified by its IP address.
28.
The Linux and UNIX operating systems use SAMBA, which is a version of which protocol?
Correct Answer
A. SMB
Explanation
Linux and UNIX operating systems use SAMBA, which is a version of the SMB (Server Message Block) protocol. SMB is a network file sharing protocol that allows computers to share files, printers, and other resources over a network. SAMBA provides interoperability between Linux/UNIX systems and Windows systems, allowing them to communicate and share resources seamlessly.
29.
Which of the following is a connection using Telnet?
Correct Answer
C. Virtual Terminal (VTY) session
Explanation
A Virtual Terminal (VTY) session is a connection that uses Telnet. Telnet is a network protocol that allows a user to remotely access and manage a device over a network. A VTY session is typically used to establish a remote management connection to a networking device such as a router or switch. It provides a command-line interface (CLI) that allows the user to configure and monitor the device. Telnet is commonly used for remote administration purposes, enabling network administrators to manage devices from a remote location.
30.
Is eBay a peer-to-peer or client/server application?
Correct Answer
B. Client/server
Explanation
eBay is a client/server application because it follows the traditional client/server model where clients (users) connect to a central server to access and interact with the application. In eBay's case, the server manages the database of listings, handles user authentication, and facilitates transactions between buyers and sellers. Clients (users) connect to the server through their devices (computers, smartphones) using the eBay website or mobile app, making requests and receiving responses from the server. This centralized architecture allows for better control, scalability, and security, making eBay a client/server application.
31.
In the client/server model, the device requesting the service is referred to as the ______________.
Correct Answer
client
Explanation
In the client/server model, the device requesting the service is referred to as the client. The client is the end-user device or application that initiates the request for a service or resource from a server. It sends the request to the server and waits for the server to process and respond to the request. The client can be a computer, smartphone, tablet, or any other device that can connect to a network and request services from a server.
32.
HTTP is referred to as a request/response protocol. What are three typical message formats?
Please separate the answers with a space and a comma.
Correct Answer
GET, PUT, POST
PUT, GET, POST
POST, GET, PUT
GET, POST, PUT
PUT, POST, GET
POST, PUT, GET
Explanation
The three typical message formats in HTTP are GET, PUT, and POST. These formats are used to define the type of request being made to a server. GET is used to retrieve data from a server, PUT is used to update or replace existing data on a server, and POST is used to submit data to be processed by a server.
33.
DHCP allows the automation of what?
Please separate the answers with a space and a comma.
Correct Answer
IP address, subnet mask, default gateway
IP address, default gatewaym subnet mask
subnet mask, default gateway, IP address
subnet mask, IP address, default gateway
default gateway, IP address, subnet mask
default gateway, subnet mask, IP address
Explanation
DHCP allows the automation of assigning IP addresses, subnet masks, and default gateways to devices on a network. This automation eliminates the need for manual configuration of these network parameters, making it easier to manage and maintain the network.
34.
What does FTP stand for?
Correct Answer
File Transfer Protocol
Explanation
FTP stands for File Transfer Protocol. It is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. FTP provides a simple and reliable way to transfer files, allowing users to upload, download, and manipulate files on a remote server. It is commonly used by web developers to upload website files to a hosting server, and by individuals to share files with others over the internet. FTP operates on a client-server architecture, where the client initiates a connection to the server and can perform various file operations using FTP commands.