Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

ITN Chapter 10 Exam Online

Last Updated on May 20, 2021 by Admin

ITN Chapter 10 Exam Online

ITN -- Chapter 10 Exam

Time limit: 0

Quiz-summary

0 of 23 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23

Information

ITN — Chapter 10 Exam

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 23 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  1. Answered
  2. Review
  1. Question 1 of 23
    1. Question
    2 points
    Which two definitions accurately describe the associated application layer protocol? (Choose two.)
    Correct

    Incorrect

    The Domain Name Service (DNS) protocol resolves Internet names to IP addresses. Hypertext Transfer Protocol (HTTP) transfers files that make up the web pages of the World Wide Web. The Simple Mail Transfer Protocol (SMTP) transfers mail messages and attachments. Telnet, a terminal emulation protocol, provides remote access to servers and networking devices. The File Transfer Protocol (FTP) transfers files between systems.

    Hint
    The Domain Name Service (DNS) protocol resolves Internet names to IP addresses. Hypertext Transfer Protocol (HTTP) transfers files that make up the web pages of the World Wide Web. The Simple Mail Transfer Protocol (SMTP) transfers mail messages and attachments. Telnet, a terminal emulation protocol, provides remote access to servers and networking devices. The File Transfer Protocol (FTP) transfers files between systems.
  2. Question 2 of 23
    2. Question
    3 points
    The application layer of the TCP/IP model performs the functions of what three layers of the OSI model? (Choose three.)
    Correct

    Incorrect

    The network access layer of the TCP/IP model performs the same functions as the physical and data link layers of the OSI model. The internetwork layer equates to the network layer of the OSI model. The transport layers are the same in both models. The application layer of the TCP/IP model represents the session, presentation, and application layers of the OSI model.​

    Hint
    The network access layer of the TCP/IP model performs the same functions as the physical and data link layers of the OSI model. The internetwork layer equates to the network layer of the OSI model. The transport layers are the same in both models. The application layer of the TCP/IP model represents the session, presentation, and application layers of the OSI model.​
  3. Question 3 of 23
    3. Question
    1 points
    Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?
    Correct

    Incorrect

    The application layer of the TCP/IP model performs the functions of three layers of the OSI model – application, presentation, and session. The application layer of the TCP/IP model is the layer that provides the interface between the applications, is responsible for formatting, compressing, and encrypting data, and is used to create and maintain dialogs between source and destination applications.

    Hint
    The application layer of the TCP/IP model performs the functions of three layers of the OSI model – application, presentation, and session. The application layer of the TCP/IP model is the layer that provides the interface between the applications, is responsible for formatting, compressing, and encrypting data, and is used to create and maintain dialogs between source and destination applications.
  4. Question 4 of 23
    4. Question
    2 points
    What are two characteristics of the application layer of the TCP/IP model? (Choose two.)
    Correct

    Incorrect

    The application layer of the TCP/IP model is the layer that is closest to the end user, providing the interface between the applications. It is responsible for formatting, compressing, and encrypting data, and is used to create and maintain dialog between source and destination applications.

    Hint
    The application layer of the TCP/IP model is the layer that is closest to the end user, providing the interface between the applications. It is responsible for formatting, compressing, and encrypting data, and is used to create and maintain dialog between source and destination applications.
  5. Question 5 of 23
    5. Question
    3 points
    A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)
    Correct

    Incorrect

    The ISP uses the HTTP protocol in conjunction with hosting web pages, the FTP protocol with file transfers, and SMTP with e-mail. DNS is used to translate domain names to IP addresses. SNMP is used for network management traffic. DHCP ic commonly used to manage IP addressing.

    Hint
    The ISP uses the HTTP protocol in conjunction with hosting web pages, the FTP protocol with file transfers, and SMTP with e-mail. DNS is used to translate domain names to IP addresses. SNMP is used for network management traffic. DHCP ic commonly used to manage IP addressing.
  6. Question 6 of 23
    6. Question
    1 points
    What is an example of network communication that uses the client-server model?
    Correct

    Incorrect

    When a user types a domain name of a website into the address bar of a web browser, a workstation needs to send a DNS request to the DNS server for the name resolution process. This request is a client/server model application. The eMule application is P2P. Sharing a printer on a workstation is a peer-to-peer network. Using ARP is just a broadcast message sent by a host.

    Hint
    What is an example of network communication that uses the client-server model?
  7. Question 7 of 23
    7. Question
    1 points
    Two students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?
    Correct

    Incorrect

    In a peer-to-peer (P2P) networking model, data is exchanged between two network devices without the use of a dedicated server. ​​

    Hint
    In a peer-to-peer (P2P) networking model, data is exchanged between two network devices without the use of a dedicated server. ​​
  8. Question 8 of 23
    8. Question
    1 points
    What do the client/server and peer-to-peer network models have in common?
    Correct

    Incorrect

    In both the client/server and peer-to-peer network models, clients and servers exist. In peer-to-peer networks, no dedicated server exists, but a device can assume the server role to provide information to a device serving in the client role.

    Hint
    In both the client/server and peer-to-peer network models, clients and servers exist. In peer-to-peer networks, no dedicated server exists, but a device can assume the server role to provide information to a device serving in the client role.
  9. Question 9 of 23
    9. Question
    1 points
    What is an advantage for small organizations of adopting IMAP instead of POP?
    Correct

    Incorrect

    IMAP and POP are protocols that are used to retrieve email messages. The advantage of using IMAP instead of POP is that when the user connects to an IMAP-capable server, copies of the messages are downloaded to the client application. IMAP then stores the email messages on the server until the user manually deletes those messages.

    Hint

    IMAP and POP are protocols that are used to retrieve email messages. The advantage of using IMAP instead of POP is that when the user connects to an IMAP-capable server, copies of the messages are downloaded to the client application. IMAP then stores the email messages on the server until the user manually deletes those messages.

  10. Question 10 of 23
    10. Question
    1 points
    Which application layer protocol uses message types such as GET, PUT, and POST?
    Correct

    Incorrect

    The GET command is a client request for data from a web server. A PUT command uploads resources and content, such as images, to a web server. A POST command uploads data files to a web server.

    Hint
    The GET command is a client request for data from a web server. A PUT command uploads resources and content, such as images, to a web server. A POST command uploads data files to a web server.
  11. Question 11 of 23
    11. Question
    1 points
    Which protocol is used by a client to communicate securely with a web server?
    Correct

    Incorrect

    HTTPS is a secure form of HTTP used to access web content hosted by a web server.

    Hint
    HTTPS is a secure form of HTTP used to access web content hosted by a web server.
  12. Question 12 of 23
    12. Question
    1 points
    What message type is used by an HTTP client to request data from a web server?
    Correct

    Incorrect

    HTTP clients send GET messages to request data from web servers.

    Hint
    HTTP clients send GET messages to request data from web servers.
  13. Question 13 of 23
    13. Question
    1 points
    When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?
    Correct

    Incorrect

    IMAP is preferred for small-to medium-sized businesses as IMAP allows centralized storage and backup of emails, with copies of the emails being forwarded to clients. POP delivers the emails to the clients and deletes them on the email server. SMTP is used to send emails and not to receive them. HTTPS is not used for secure web browsing.

    Hint
    IMAP is preferred for small-to medium-sized businesses as IMAP allows centralized storage and backup of emails, with copies of the emails being forwarded to clients. POP delivers the emails to the clients and deletes them on the email server. SMTP is used to send emails and not to receive them. HTTPS is not used for secure web browsing.
  14. Question 14 of 23
    14. Question
    3 points
    Which three statements describe a DHCP Discover message? (Choose three.)
    Correct

    Incorrect

    When a host configured to use DHCP powers up on a network it sends a DHCPDISCOVER message. FF-FF-FF-FF-FF-FF is the L2 broadcast address. A DHCP server replies with a unicast DHCPOFFER message back to the host.

    Hint
    When a host configured to use DHCP powers up on a network it sends a DHCPDISCOVER message. FF-FF-FF-FF-FF-FF is the L2 broadcast address. A DHCP server replies with a unicast DHCPOFFER message back to the host.
  15. Question 15 of 23
    15. Question
    1 points
    What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?
    Correct

    Incorrect

    The components of the URL http://www.cisco.com/index.htm are as follows:

    • http = protocol
    • www = part of the server name
    • cisco = part of the domain name
    • index = file name
    • com = the top-level domain
    Hint

    The components of the URL http://www.cisco.com/index.htm are as follows:

    • http = protocol
    • www = part of the server name
    • cisco = part of the domain name
    • index = file name
    • com = the top-level domain
  16. Question 16 of 23
    16. Question
    2 points
    Which two tasks can be performed by a local DNS server? (Choose two.)
    Correct

    Incorrect

    Two important functions of DNS are to (1) provide IP addresses for domain names such as http://www.cisco.com, and (2) forward requests that cannot be resolved to other servers in order to provide domain name to IP address translation. DHCP provides IP addressing information to local devices. A file transfer protocol such as FTP, SFTP, or TFTP provides file sharing services. IMAP or POP can be used to retrieve an email message from a server.

    Hint
    Two important functions of DNS are to (1) provide IP addresses for domain names such as http://www.cisco.com, and (2) forward requests that cannot be resolved to other servers in order to provide domain name to IP address translation. DHCP provides IP addressing information to local devices. A file transfer protocol such as FTP, SFTP, or TFTP provides file sharing services. IMAP or POP can be used to retrieve an email message from a server.
  17. Question 17 of 23
    17. Question
    1 points
    What is the function of the Nslookup utility?
    Correct

    Incorrect

    Nslookup is a command-line utility that is used to send a query to DNS servers to resolve a specific host name to an IP address.

    Hint
    Nslookup is a command-line utility that is used to send a query to DNS servers to resolve a specific host name to an IP address.
  18. Question 18 of 23
    18. Question
    1 points
    Which statement is true about FTP?
    Correct

    Incorrect

    FTP is a client/server protocol. FTP requires two connections between the client and the server and uses TCP to provide reliable connections. With FTP, data transfer can happen in either direction. The client can download (pull) data from the server or upload (push) data to the server.

    Hint
    FTP is a client/server protocol. FTP requires two connections between the client and the server and uses TCP to provide reliable connections. With FTP, data transfer can happen in either direction. The client can download (pull) data from the server or upload (push) data to the server.
  19. Question 19 of 23
    19. Question
    1 points
    What is true about the Server Message Block protocol?
    Correct

    Incorrect

    The Server Message Block protocol is a protocol for file, printer, and directory sharing. Clients establish a long term connection to servers and when the connection is active, the resources can be accessed. Every SMB message has the same format. The use of SMB differs from FTP mainly in the length of the sessions. SMB messages can authenticate sessions.

    Hint
    The Server Message Block protocol is a protocol for file, printer, and directory sharing. Clients establish a long term connection to servers and when the connection is active, the resources can be accessed. Every SMB message has the same format. The use of SMB differs from FTP mainly in the length of the sessions. SMB messages can authenticate sessions.
  20. Question 20 of 23
    20. Question
    1 points

    Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?

    Correct

    Incorrect

    SMB is used in Microsoft networking for file-sharing and print services. The Linux operating system provides a method of sharing resources with Microsoft networks by using a version of SMB called SAMBA.

    Hint
    SMB is used in Microsoft networking for file-sharing and print services. The Linux operating system provides a method of sharing resources with Microsoft networks by using a version of SMB called SAMBA.
  21. Question 21 of 23
    21. Question
    4 points

    Match a statement to the related network model. (Not all options are used.)

    Sort elements
    • no dedicated server is required
    • client and server roles are set on a per request basis
    • requires a specific user interface
    • a background service is required
    • devices can only function in one role at a time
    • peer-to-peer network
      • peer-to-peer network
        • peer-to-peer application
          • peer-to-peer application
            Correct

            Incorrect

            Peer-to-peer networks do not require the use of a dedicated server, and devices can assume both client and server roles simultaneously on a per request basis. Because they do not require formalized accounts or permissions, they are best used in limited situations. Peer-to-peer applications require a user interface and background service to be running, and can be used in more diverse situations.

            Hint
            Peer-to-peer networks do not require the use of a dedicated server, and devices can assume both client and server roles simultaneously on a per request basis. Because they do not require formalized accounts or permissions, they are best used in limited situations. Peer-to-peer applications require a user interface and background service to be running, and can be used in more diverse situations.
          • Question 22 of 23
            22. Question
            5 points

            Match the functions to the name of the application. (Not all options are used.)

            Sort elements
            • DHCP
            • DNS
            • IMAP
            • HTTP
            • SMTP
            • FTP
            • Telnet
            • dynamically assigns IP addressed to clients
              • maps URLs to numerical addresses
                • allows viewing of messages on email clients
                  • displays web pages
                    • sends email messages
                      Correct

                      Incorrect

                    • Question 23 of 23
                      23. Question
                      1 points

                      Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

                      Which PC or PCs are sending FTP packets to the server?

                      ITN Chapter 10 Exam Answers 01
                      ITN Chapter 10 Exam Answers 01

                      Correct

                      Incorrect

                      After you view the details of the packets that are being transferred between each PC and the server, you will see that the PC that is using a destination port number of 20 or 21 is the PC using the FTP service. PC_2 has an outbound port number of 21 to create an FTP control session with the server at 192.168.1.253.

                      Hint
                      After you view the details of the packets that are being transferred between each PC and the server, you will see that the PC that is using a destination port number of 20 or 21 is the PC using the FTP service. PC_2 has an outbound port number of 21 to create an FTP control session with the server at 192.168.1.253.
                    • CCNA1 v7
                    • CCNA2 v7
                    • CCNA3 v7
                    System Test Exam Answers
                    Modules 1 – 3 Exam Answers
                    Modules 4 – 7 Exam Answers
                    Modules 8 – 10 Exam Answers
                    Modules 11 – 13 Exam Answers
                    Modules 14 – 15 Exam Answers
                    Modules 16 – 17 Exam Answers
                    Practice Final – ITN Answers
                    Course Feedback
                    ITN Practice PT Skills Assessment (PTSA)
                    Final Exam Answers
                    Modules 1 – 4 Exam Answers
                    Modules 5 – 6 Exam Answers
                    Modules 7 – 9 Exam Answers
                    Modules 10 – 13 Exam Answers
                    Modules 14 – 16 Exam Answers
                    ITN Practice Skills Assessment – PT Answers
                    SRWE Practice Skills Assessment – PT Part 1 Answers
                    SRWE Practice Skills Assessment – PT Part 2 Answers
                    SRWE Hands On Skills Exam Answers
                    SRWE Practice Final Exam Answers
                    SRWE Final Exam Answers 
                    Modules 1 – 2 Exam Answers
                    Modules 3 – 5 Exam Answers
                    Modules 6 – 8 Exam Answers
                    Modules 9 – 12 Exam Answers
                    Modules 13 – 14 Exam Answers
                    ITN Practice PT Skills Assessment (PTSA) Answers
                    SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
                    SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
                    ENSA Practice PT Skills Assessment (PTSA) Answers
                    ENSA Hands On Skills Exam Answers
                    Practice Final – ENSA Answers
                    ENSA Final Exam Answers
                    CCNA Certification Practice Exam Answers

                    Copyright © 2023 PressExam.