CCNA Exploration 1: ENetwork Chapter 3 Exam Answers (v4.0)

ENetwork Chapter 3 – CCNA Exploration: Network Fundamentals (Version 4.0)

1. Refer to the exhibit. What is the destination port for the communication that is represented on line 5?

CCNA Exploration 1: ENetwork Chapter 3 Exam Answers (v4.0) 1

  • 80
  • 1261
  • 15533
  • 3912
  • 65520

2. What are two forms of application layer software? (Choose two.)

  • applications
  • dialogs
  • requests
  • services
  • syntax

3. A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.)

  • centralized administration
  • does not require specialized software
  • security is easier to enforce
  • lower cost implementation
  • provides a single point of failure

4. What is the purpose of resource records in DNS?

  • temporarily holds resolved entries
  • used by the server to resolve names
  • sent by the client to during a query
  • passes authentication information between the server and client

5. What is the automated service that matches resource names with the required IP address?

  • HTTP
  • SSH
  • FQDN
  • DNS
  • Telnet
  • SMTP

6. What three protocols operate at the Application layer of the OSI model? (Choose three.)

  • ARP
  • DNS
  • PPP
  • SMTP
  • POP
  • ICMP

7. What are three properties of peer-to-peer applications? (Choose three.)

  • acts as both a client and server within the same communication.
  • requires centralized account administration.
  • hybrid mode includes a centralized directory of files.
  • can be used in client-server networks.
  • requires a direct physical connection between devices.
  • centralized authentication is required.

8. Which application layer protocols correctly match a corresponding function? (Choose two.)

  • DNS dynamically allocates IP addresses to hosts
  • HTTP transfers data from a web server to a client
  • POP delivers email from the client to the server email server
  • SMTP supports file sharing
  • Telnet provides a virtual connection for remote access

9. Which email components are used to forward mail between servers? (Choose two.)

  • MDA
  • IMAP
  • MTA
  • POP
  • SMTP
  • MUA

10. As compared to SSH, what is the primary disadvantage of telnet?

  • not widely available
  • does not support encryption
  • consumes more network bandwidth
  • does not support authentication

11. Which statements are correct concerning the role of the MTA in handling email? (Choose three.)

  • routes email to the MDA on other servers
  • receives email from the client’s MUA
  • receives email via the POP3 protocol
  • passes email to the MDA for final delivery
  • uses SMTP to route email between servers
  • delivers email to clients via the POP3 protocol

12. Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)

  • ASP
  • FTP
  • HTML
  • HTTP
  • IP

13. A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type? (Choose two.)

  • User accounts are centralized.
  • Security is difficult to enforce.
  • Specialized operating system software is required.
  • File permissions are controlled by a single computer.
  • A computer that responds to a file sharing request is functioning as a server.

14. Which layer of the OSI model supplies services that allow user to interface with the network?

  • physical
  • session
  • network
  • presentation
  • application
  • transport

15. What application layer protocol is commonly used to support for file transfers between a client and a server?

  • HTML
  • HTTP
  • FTP
  • Telnet

16. What are two characteristics of peer-to-peer networks? (Choose two.)

  • scalable
  • one way data flow
  • decentralized resources
  • centralized user accounts
  • resource sharing without a dedicated server

Explanation: Peer-to-peer networks have decentralized resources because every computer can serve as both a server and a client. One computer might assume the role of server for one transaction while acting as a client for another transaction. Peer-to-peer networks can share resources among network devices without the use of a dedicated server.

17. What application layer protocol describes the services that are used for file sharing in Microsoft networks?

  • DHCP
  • DNS
  • SMB
  • SMTP
  • Telnet

Explanation: SMB file sharing and print services are used for file sharing in Microsoft networking.

18. What are two characteristics of clients in data networks? (Choose two.)

  • use daemons
  • initiate data exchanges
  • are repositories of data
  • may upload data to servers
  • listen for requests from servers

19. What is the role of the OSI application layer?

  • provides segmentation of data
  • provides encryption and conversion of data
  • provides the interface between the applications on either end of the network
  • provides control of all the data flowing between the source and destination devices

20. How does the application layer on a server usually process multiple client request for services?

  • ceases all connections to the service
  • denies multiple connections to a single daemon
  • suspends the current connection to allow the new connection
  • uses support from lower layer functions to distinguish between connections to the service
Notify of

Inline Feedbacks
View all comments