CCNA1 Chapter 10 Exam & Answer
Soal Beserta jawaban Latihan CCNA 1
CHAPTER 10
STMIK Nusa Mandiri Jakarta
1. What is true about the Server Message Block protocol?
SMB
messages cannot authenticate a session.
SMB
uses the FTP protocol for communication.
Clients
establish a long term connection to servers.
Different
SMB message types have a different format.
2. Which two definitions accurately describe the associated
application layer protocol? (Choose two.)
FTP
- transfers email messages and attachments
HTTP
- enables devices on a network to obtain IP addresses
DNS
- resolves Internet names to IP addresses
SMTP
- transfers web pages from web servers to clients
Telnet
- provides remote access to servers and networking devices
3. Which two tasks can be performed by a local DNS server? (Choose
two.)
forwarding
name resolution requests between servers
mapping
name-to-IP addresses for internal hosts
retrieving
email messages
providing
IP addresses to local hosts
allowing
data transfer between two network devices
4. Which layer in the TCP/IP model is used for formatting,
compressing, and encrypting data?
network
access
internetwork
application
presentation
session
5. What is the function of the Nslookup utility?
to
view the network settings on a host
to
manually query the name servers to resolve a given host name
to
manually force a client to send a DHCP request
to
display all cached DNS entries on a host
6. Two students are working on a network design project. One
student is doing the drawing, while the other student is writing the proposal.
The drawing is finished and the student wants to share the folder that contains
the drawing so that the other student can access the file and copy it to a USB
drive. Which networking model is being used?
master-slave
peer-to-peer
point-to-point
client-based
7. What is an advantage for small organizations of adopting IMAP
instead of POP?
When
the user connects to a POP server, copies of the messages are kept in the mail
server for a short time, but IMAP keeps them for a long time.
IMAP
sends and retrieves email, but POP only retrieves email.
Messages
are kept in the mail servers until they are manually deleted from the email
client.
POP
only allows the client to store messages in a centralized way, while IMAP
allows distributed storage.
8. Which application layer protocol uses message types such as GET,
PUT, and POST?
DNS
SMTP
HTTP
DHCP
POP3
9. Which application layer protocol is used to provide file-sharing
and print services to Microsoft applications?
DHCP
HTTP
SMTP
SMB
10. A manufacturing company subscribes to certain hosted services
from its ISP. The services that are required include hosted world wide web,
file transfer, and e-mail. Which protocols represent these three key applications?
(Choose three.)
HTTP
SMTP
DHCP
FTP
SNMP
DNS
11.
The PT initialization was skipped. You will
not be able to view the PT activity.
Open the PT Activity. Perform the tasks in the activity
instructions and then answer the question.
Which PC or PCs are sending FTP packets to the server?
Which PC or PCs are sending FTP packets to the server?
PC_3
PC_2
PC_1
PC_1
and PC_3
12
What do the client/server and peer-to-peer network models have
in common?
Both
models require the use of TCP/IP-based protocols.
Both
models support devices in server and client roles.
Both
models have dedicated servers.
Both
models are used only in the wired network environment.
13. When retrieving email messages, which protocol allows for easy,
centralized storage and backup of emails that would be desirable for a small-
to medium-sized business?
IMAP
HTTPS
POP
SMTP
14. Which three statements describe a DHCP Discover message? (Choose
three.)
The
destination IP address is 255.255.255.255.
All
hosts receive the message, but only a DHCP server replies.
The
message comes from a server offering an IP address.
Only
the DHCP server receives the message.
The
message comes from a client seeking an IP address.
The
source MAC address is 48 ones (FF-FF-FF-FF-FF-FF).
15. Which protocol is used by a client to communicate securely with
a web server?
SMTP
SMB
HTTPS
IMAP
16. What part of the URL, http://www.cisco.com/index.html,
represents the top-level DNS domain?
http
.com
www
index
17. What are two characteristics of the application layer of the
TCP/IP model? (Choose two.)
responsibility
for physical addressing
the
establishing of window size
responsibility
for logical addressing
closest
to the end user
the
creation and maintenance of dialogue between source and destination
applications
18. The application layer of the TCP/IP model performs the functions
of what three layers of the OSI model? (Choose three.)
network
transport
presentation
session
physical
data
link
application
19. Which statement is true about FTP?
FTP
is a peer-to-peer application.
FTP
does not provide reliability during data transmission.
The
client can choose if FTP is going to establish one or two connections with the
server.
The
client can download data from or upload data to the server.
20. What message type is used by an HTTP client to request data from
a web server?
POST
ACK
PUT
GET
21. Option 5: sends email
messages. Press spacebar to enter matching mode.
Match the functions to the name of the application. (Not all
options are used.)
Telnet
DHCP
dynamically assigns IP addresses to clients
DNS
maps URLs to numerical addresses
IMAP
allows viewing of messages on email clients
HTTP
displays web pages
SMTP
sends email messages
FTP
22. What is an example of network communication that uses the
client-server model?
A
user prints a document by using a printer that is attached to a workstation of
a coworker.
A
workstation initiates a DNS request when the user types www.cisco.com in the
address bar of a web browser.
A
workstation initiates an ARP to find the MAC address of a receiving host.
A
user uses eMule to download a file that is shared by a friend after the file
location is determined.
23. Option 3: a background
service is required. Press spacebar to enter matching mode.
Match a statement to the related network model. (Not all options
are used.)
peer-to-peer network
no dedicated server is required
client and server roles are set on a per request basis
peer-to-peer application
requires a specific user interface
a background service
is required
0 komentar: