01. What are two forms of application layer software? (Choose two.)
- applications;
- dialogs;
- requests;
- services;
- syntax.
- temporarily holds resolved entries;
- used by the server to resolve names;
- sent by the client to during a query;
- passes authentication information between the server and client.
- ARP;
- DNS;
- PPP;
- SMTP;
- POP;
- ICMP.
- DNS dynamically allocates IP addresses to hosts;
- HTTP transfers data from a web server to a client;
- POP delivers email from the client to the server email server;
- SMTP supports file sharing;
- Telnet provides a virtual connection for remote access.
- not widely available;
- does not support encryption;
- consumes more network bandwidth;
- does not support authentication.
- acts as both a client and server within the same communication;
- requires centralized account administration;
- hybrid mode includes a centralized directory of files;
- can be used in client-server networks;
- requires a direct physical connection between devices;
- centralized authentication is required.
- MDA;
- IMAP;
- MTA;
- POP;
- SMTP;
- MUA.
- DHCP;
- DNS;
- SMB;
- SMTP;
- Telnet.
- routes email to the MDA on other servers;
- receives email from the client's MUA;
- receives email via the POP3 protocol;
- passes email to the MDA for final delivery;
- uses SMTP to route email between servers;
- delivers email to clients via the POP3 protocol.
- ceases all connections to the service;
- denies multiple connections to a single daemon;
- suspends the current connection to allow the new connection;
- uses support from lower layer functions to distinguish between connections to the service .
- physical;
- session;
- network;
- presentation;
- application ;
- transport.
- HTTP;
- SSH;
- FQDN;
- DNS ;
- Telnet ;
- SMTP ;
- 80 ;
- 1261;
- 15533;
- 3912;
- 65520.
- scalable;
- one way data flow;
- decentralized resources;
- centralized user accounts;
- resource sharing without a dedicated server.
- centralized administration;
- does not require specialized software;
- security is easier to enforce;
- lower cost implementation;
- provides a single point of failure.
- ASP;
- FTP;
- HTML;
- HTTP ;
- HTTPS;
- IP.
- provides segmentation of data;
- provides encryption and conversion of data;
- provides the interface between the applications on either end of the network ;
- provides control of all the data flowing between the source and destination devices .
- User accounts are centralized.
- Security is difficult to enforce.
- Specialized operating system software is required.
- File permissions are controlled by a single computer.
- A computer that responds to a file sharing request is functioning as a server.
- HTML;
- HTTP;
- FTP;
- Telnet.
- use daemons;
- initiate data exchanges;
- are repositories of data;
- May upload data to servers;
- listen for requests from servers.
0 Comment to "CCNA 1 Chapter 03"
Posting Komentar