第三章测试.docx
- 文档编号:7788882
- 上传时间:2023-01-26
- 格式:DOCX
- 页数:93
- 大小:38.63KB
第三章测试.docx
《第三章测试.docx》由会员分享,可在线阅读,更多相关《第三章测试.docx(93页珍藏版)》请在冰豆网上搜索。
第三章测试
1
.
What application layer protocol is commonly used to support for file
transfers between a client and a server
?
HTML
HTTP
FTP
Telnet
2
.
What are two forms of application layer software?
(Choose two.)
applications
dialogs
requests
services
syntax
3
.
A
network
administrator
is
designing
a
network
for
a
new
branch
office
of twenty-five users. What are the advantages of using a client-server
model?
(Choose two.)
centralized administration
does not require specialized software
security is easier to enforce
lower cost implementation
provides a single point of failure
4
.
What is the purpose of resource records in DNS?
temporarily holds resolved entries
used by the server to resolve names
sent by the client to during a query
passes authentication information between the server and client
5
.
What is the automated service that matches resource names with the
required IP address?
HTTP
SSH
FQDN
DNS
Telnet
SMTP
6
.
What
three
protocols
operate
at
the
Application
layer
of
the
OSI
model?
(Choose three.)
ARP
DNS
PPP
SMTP
POP
ICMP
7
.
What
are
three
properties
of
peer-to-peer
applications?
(Choose
three.)
acts as both a client and server within the same communication.
requires centralized account administration.
hybrid mode includes a centralized directory of files.
can be used in client-server networks.
requires a direct physical connection between devices.
centralized authentication is required.
8
.
Which application layer protocols correctly match a corresponding
function?
(Choose two.)
DNS dynamically allocates IP addresses to hosts
HTTP transfers data from a web server to a client
POP delivers email from the client to the server email server
SMTP supports file sharing
Telnet provides a virtual connection for remote access
9
.
Which email components are used to forward mail between servers?
(Choose two.)
MDA
IMAP
MTA
POP
SMTP
MUA
10
.
As compared to SSH, what is the primary disadvantage of telnet?
not widely available
does not support encryption
consumes more network bandwidth
does not support authentication
11
.
Which statements are correct concerning the role of the MTA in
handling email?
(Choose three.)
routes email to the MDA on other servers
receives email from the client’s MUA
receives email via the POP3 protocol
passes email to the MDA for final delivery
uses SMTP to route email between servers
delivers email to clients via the POP3 protocol
12
.
Which
two
protocols
are
used
to
control
the
transfer
of
web
resources
from a web server to a client browser?
(Choose two.)
ASP
FTP
HTML
HTTP
HTTPS
IP
13
.
A small home network has been installed to interconnect three
computers together for gaming and file sharing. What two properties
represent this network type?
(Choose two.)
User accounts are centralized.
Security is difficult to enforce.
Specialized operating system software is required.
File permissions are controlled by a single computer.
A computer that responds to a file sharing request is functioning as a
server.
14
.
Which layer of the OSI model supplies services that allow user to
interface with the network?
physical
session
network
presentation
application
transport
15
.
ccna 1 chapter 3 answers 100%
Refer
to
the
exhibit.
What
is
the
destination
port
for
the
communication
that is represented on line 5?
80
1261
15533
3912
65520
16
.
What
are
two
characteristics
of
peer-to-peer
networks?
(Choose
two.)
scalable
one way data flow
decentralized resources
centralized user accounts
resource sharing without a dedicated server
17
.
What
application
layer
protocol
describes
the
services
that
are
used
for file sharing in Microsoft networks?
DHCP
DNS
SMB
SMTP
Telnet
18
.
What are two characteristics of clients in data networks?
(Choose
two.)
use daemons
initiate data exchanges
are repositories of data
may upload data to servers
listen for requests from servers
19
.
What is the role of the OSI application layer?
provides segmentation of data
provides encryption and conversion of data
provides the interface between the applications on either end of the
network
provides control of all the data flowing between the source and
destination devices
20
.
How does the application layer on a server usually process multiple
client request for services?
ceases all connections to the service
denies multiple connections to a single daemon
suspends the current connection to allow the new connection
uses support from lower layer functions to distinguish between
connections to the service
DomainKnowledge-WeightedScore
MaxPoints:
43
EarnedPoints:
43
Percentage:
100%
DomainKnowledge-BinaryScore
MaxPoints:
20
EarnedPoints:
20
Percentage:
100%
第四章
1
segment retransmit
data transfer
session disconnect
9
Refer to the exhibit. What two pieces of information can be determined from the output that is shown?
(Choose two.)
The local host is using three client sessions.
The local host is using web sessions to a remote server.
The local host is listening for TCP connections using public addresses.
The local host is using well-known port numbers to identify the source ports.
The local host is performing the three-way handshake with 192.168.1.101:
1037.
10
What is dynamically selected by the source host when forwarding data?
destination logical address
source physical address
default gateway address
source port
11
What are two features of the User Datagram Protocol (UDP)?
(Choose two.)
flow control
low overhead
connectionless
connection-oriented
sequence and acknowledgements
12
What mechanism is used by TCP to provide flow control as segments travel from source to destination?
sequence numbers
session establishment
window size
acknowledgments
13
Which transport layer protocol provides low overhead and would be used for applications which do not
require reliable data delivery?
TCP
IP
UDP
HTTP
DNS
14
Which information is found in both the TCP and UDP header information?
sequencing
flow control
acknowledgments
source and destination port
15
Which three features allow TCP to reliably and accurately track the transmission of data from source t
flow control
urgent pointer
best effort delivery
session establishment
connectionless services
numbering and sequencing
16
During a TCP communication session, if the packets arrive to the destination out of order, what will
happen to the original message?
The packets will not be delivered.
The packets will be retransmitted from the source.
The packets will be delivered and reassembled at the destination.
The packets will be delivered and not reassembled at the destination.
17
Which is an important characteristic of UDP?
acknowledgement of data delivery
minimal delays in data delivery
high reliability of data delivery
same order data delivery
18
After a web browser makes a request to a web server that is listening to the standard port, what will be
header of the response from the server?
13
53
80
1024
1728
19
Which event occurs during the transport layer three-way handshake?
The two applications exchange data.
TCP initializes the sequence numbers for the sessions.
UDP establishes the maximum number of bytes to be sent.
The server acknowledges the bytes of data received from the client.
20
Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN mes
establishment. What happens next?
Host1 sends a segment with the ACK flag = 0, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 0 to Host2.
Host1 sends a segment with the ACK flag = 1, SYN flag = 1 to Host2.
Host2 sends a segment with the ACK flag = 0, SYN flag = 1 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 0 to Host1.
Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1
1-
What mechanism is used by TCP to provide flow control as segments travel from source to
destination?
sequence numbers
session establishment
window size
acknowledgments
2-
Why is flow control used for TCP data transfer?
to synchronize equipment speed for sent data
to synchronize and order sequence numbers so data is sent in complete numerical order
to prevent the receiver from being overwhelmed by incoming data
to synchronize window size on the server
to simplify data transfer to multiple hosts
3-
Refer to the exhibit. What two pieces of information can be determined from the output that is
shown?
(Choose two.)
The local host is using three client sessions.
The local host is using web sessions to a remote server.
The local host is listening for TCP connections using public addresses.
The local host is using well-known port numbers to identify the source ports.
The local host is performing the three-way handshake with
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 第三 测试