Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
What application layer protocol is commonly used to support for file transfers between a client and a server? |
FTP |
|
What are two forms of applications layer software? (two answers) |
Applications
Services |
|
A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client server model? (two answers) |
centralized administration
security is easier to enforce |
|
What is the purpose of resource records in DNS? |
used by the server to resolve names. |
|
What is the automated service that matches resource names with the required IP address? |
DNS |
|
What three protocols operate at the application layer of the OSI model? (Three answers) |
DNS
SMTP
POP |
|
What are three properties of peer to peer applications? (three answers) |
Acts as both a client and server within the same communication.
Hybrid mode includes a centralized directory of files.
Can be used in client-server networks. |
|
which application layer protocols correctly match a corresponding function? |
HTTP transfer data from a web server to a client
Telnet provides a virtual connection for a remote access. |
|
Which email components are used to a forward mail between servers? |
MTA
SMTP |
|
As compared to SSH, what is the primary disadvantage of telnet? |
does not support encryption |
|
Which statements are correct concerning the role of the MTA in handling email? |
receives email from the client's MUA
Passes email to the DMA for the final delivery
Uses SMTP to route email between servers
|
|
Which two protocols are used to control the transfer of web resources from a web server to a client browser? |
HTTP
HTTPS |
|
A small home network has been installed to a interconnect three computers together for a gaming and file sharing. What two properties represent this network type? (Two answers) |
Security is difficult to enforce.
A computer that responds to a file sharing request is functioning as a server. |
|
Which layer of the OSI model supplies services that allow user to interface with the network? |
Application |
|
what is the destination port for the communication that is represented on the line 5? |
Port 80 |
|
What are two characteristics of peer to peer networks? |
decentralized resources
resource sharing without a dedicated server |
|
what application layer protocol describes the services that are used for file sharing in Microsoft networks? |
SMB |
|
What are two characteristics of a client in data networks? (two answers) |
Initiate data exchanges
may upload data to servers |
|
what is the old of the OSI application layer? |
provides the interface between the applications on either end of the network |
|
How does the application layer on a server usually process multiple client request for services? |
Uses supports from lower layer functions to distinguish between connections to the service. |