CCNA1 Chapter 10 Exam & Answer


Soal Beserta jawaban Latihan CCNA 1

CHAPTER 10
STMIK Nusa Mandiri Jakarta

1. What is true about the Server Message Block protocol?
SMB messages cannot authenticate a session.
SMB uses the FTP protocol for communication.
Clients establish a long term connection to servers.
Different SMB message types have a different format.



2. Which two definitions accurately describe the associated application layer protocol? (Choose two.)
FTP - transfers email messages and attachments
HTTP - enables devices on a network to obtain IP addresses
DNS - resolves Internet names to IP addresses
SMTP - transfers web pages from web servers to clients
Telnet - provides remote access to servers and networking devices



3. Which two tasks can be performed by a local DNS server? (Choose two.)
forwarding name resolution requests between servers
mapping name-to-IP addresses for internal hosts
retrieving email messages
providing IP addresses to local hosts
allowing data transfer between two network devices



4. Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?
network access
internetwork
application
presentation
session



5. What is the function of the Nslookup utility?
to view the network settings on a host
to manually query the name servers to resolve a given host name
to manually force a client to send a DHCP request
to display all cached DNS entries on a host



6. Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?
master-slave
peer-to-peer
point-to-point
client-based



7. What is an advantage for small organizations of adopting IMAP instead of POP?
When the user connects to a POP server, copies of the messages are kept in the mail server for a short time, but IMAP keeps them for a long time.
IMAP sends and retrieves email, but POP only retrieves email.
Messages are kept in the mail servers until they are manually deleted from the email client.
POP only allows the client to store messages in a centralized way, while IMAP allows distributed storage.



8. Which application layer protocol uses message types such as GET, PUT, and POST?
DNS
SMTP
HTTP
DHCP
POP3



9. Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?
DHCP
HTTP
SMTP
SMB



10. A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)
HTTP
SMTP
DHCP
FTP
SNMP
DNS



11. 
The PT initialization was skipped. You will not be able to view the PT activity.
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

Which PC or PCs are sending FTP packets to the server?
PC_3
PC_2
PC_1
PC_1 and PC_3



12
What do the client/server and peer-to-peer network models have in common?
Both models require the use of TCP/IP-based protocols.
Both models support devices in server and client roles.
Both models have dedicated servers.
Both models are used only in the wired network environment.



13. When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?
IMAP
HTTPS
POP
SMTP



14. Which three statements describe a DHCP Discover message? (Choose three.)
The destination IP address is 255.255.255.255.
All hosts receive the message, but only a DHCP server replies.
The message comes from a server offering an IP address.
Only the DHCP server receives the message.
The message comes from a client seeking an IP address.
The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF).



15. Which protocol is used by a client to communicate securely with a web server?
SMTP
SMB
HTTPS
IMAP



16. What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?
http
.com
www
index



17. What are two characteristics of the application layer of the TCP/IP model? (Choose two.)
responsibility for physical addressing
the establishing of window size
responsibility for logical addressing
closest to the end user
the creation and maintenance of dialogue between source and destination applications



18. The application layer of the TCP/IP model performs the functions of what three layers of the OSI model? (Choose three.)
network
transport
presentation
session
physical
data link
application



19. Which statement is true about FTP?
FTP is a peer-to-peer application.
FTP does not provide reliability during data transmission.
The client can choose if FTP is going to establish one or two connections with the server.
The client can download data from or upload data to the server.



20. What message type is used by an HTTP client to request data from a web server?
POST
ACK
PUT
GET



21. Option 5: sends email messages. Press spacebar to enter matching mode. 
Match the functions to the name of the application. (Not all options are used.)

Telnet
  
DHCP
dynamically assigns IP addresses to clients
DNS
maps URLs to numerical addresses
IMAP
allows viewing of messages on email clients
HTTP
displays web pages
SMTP
sends email messages
FTP


22. What is an example of network communication that uses the client-server model?
A user prints a document by using a printer that is attached to a workstation of a coworker.
A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.
A workstation initiates an ARP to find the MAC address of a receiving host.
A user uses eMule to download a file that is shared by a friend after the file location is determined.



23. Option 3: a background service is required. Press spacebar to enter matching mode. 
Match a statement to the related network model. (Not all options are used.)


peer-to-peer network
no dedicated server is required
client and server roles are set on a per request basis
peer-to-peer application
requires a specific user interface
a background service is required

0 komentar:

Copyright © 2013 Sulhansubs