CCNA 1 - Chapter 3 for Students

download CCNA 1 - Chapter 3 for Students

of 74

Transcript of CCNA 1 - Chapter 3 for Students

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    1/74

    2007 Cisco System s, Inc. All rights reserved. Cisco Public

    ITE PC v4.0

    Chapter 1 1

    Application Layer

    Functionality andProtocols

    Network Fundamentals Chapter 3

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    2/74

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    3/74

    ITE PC v4.0

    Chapter 1 3Rainier Pimentel

    T

    wo basic types of networks

    Peer-to-PeerNetworks

    Client/Server

    N

    etworks

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    4/74

    ITE PC v4.0

    Chapter 1 4Rainier Pimentel

    P

    eer-to-P

    eer Networks In a peer-to-peer network, networked computers act asequal partners, or peers.

    As peers, each computer can take on the client function or

    the server function.

    In a peer-to-peer network, individual users control their own

    resources.

    Since individual users make these decisions, there is nocentral point of control or administration in the network.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    5/74

    ITE PC v4.0

    Chapter 1 5Rainier Pimentel

    Peer-to-Peer Networks

    Peer-to-peer networks are relatively easy to install and

    operate.

    No additional equipment is necessary beyond a suitable

    operating system installed on each computer.

    Since users control their own resources, no dedicated

    administrators are needed.

    As networks grow, peer-to-peer relationships becomeincreasingly difficult to coordinate. A peer-to-peer network

    works well with 10 or fewer computers.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    6/74

    ITE PC v4.0

    Chapter 1 6Rainier Pimentel

    Peer to Peer

    1. decentralizedresources

    2. resource

    sharingwithout adedicatedserver

    3. Security is

    difficult toenforce.

    A computer that responds to a file sharing request is

    functioning as a server.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    7/74

    ITE PC v4.0

    Chapter 1 7Rainier Pimentel

    A small home network has been installed

    to interconnect three computers togetherfor gaming and file sharing. What twoproperties represent this network type?(Choose two.)

    a. User accounts are centralized.

    b. Security is difficult to enforce.

    c. Specialized operating system software is required.

    d. File permissions are controlled by a single computer.

    e. A computer that responds to a file sharing request isfunctioning as a server.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    8/74

    ITE PC v4.0

    Chapter 1 8Rainier Pimentel

    A small home network has been installed

    to interconnect three computers togetherfor gaming and file sharing. What twoproperties represent this network type?(Choose two.)

    a. User accounts are centralized.

    b. Security is difficult to enforce.

    c. Specialized operating system software is required.

    d. File permissions are controlled by a single computer.

    e. A computer that responds to a file sharing request isfunctioning as a server.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    9/74

    ITE PC v4.0

    Chapter 1 9Rainier Pimentel

    What are two characteristics of peer-to-peer networks? (Choose two.)

    a. scalable

    b. one way data flow

    c. decentralized resources

    d. centralized user accounts

    e. resource sharing without a dedicated server

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    10/74

    ITE PC v4.0

    Chapter 1 10Rainier Pimentel

    What are two characteristics of peer-to-peer networks? (Choose two.)

    a. scalable

    b. one way data flow

    c. decentralized resources

    d. centralized user accounts

    e. resource sharing without a dedicated server

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    11/74

    ITE PC v4.0

    Chapter 1 11Rainier Pimentel

    Peer to Peer

    Some P2P applications use a hybrid systemwhere resource sharing is decentralized but the

    indexes that point to resource locations arestored in a centralized directory.

    Peer-to-peer applications can be used on peer-to-peer networks, client/server networks, and

    across the Internet.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    12/74

    ITE PC v4.0

    Chapter 1 12Rainier Pimentel

    What are three properties of peer-to-peerapplications? (Choose three.)

    a. acts as both a client and server within the samecommunication

    b. requires centralized account administrationc. hybrid mode includes a centralized directory of files

    d. can be used in client-server networks

    e. requires a direct physical connection between devices

    f. centralized authentication is required

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    13/74

    ITE PC v4.0

    Chapter 1 13Rainier Pimentel

    What are three properties of peer-to-peerapplications? (Choose three.)

    a. acts as both a client and server within the samecommunication

    b. requires centralized account administrationc. hybrid mode includes a centralized directory of files

    d. can be used in client-server networks

    e. requires a direct physical connection between devices

    f. centralized authentication is required

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    14/74

    ITE PC v4.0

    Chapter 1 14Rainier Pimentel

    Client/Server Networks

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    15/74

    ITE PC v4.0

    Chapter 1 15Rainier Pimentel

    Client/Server Network

    Some nodes (SERVER) are dedicated to presentservices to other nodes (CLIENTS)

    Client1

    Client2 Server

    Client3

    centralized administration security is easier to

    enforce

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    16/74

    ITE PC v4.0

    Chapter 1 16Rainier Pimentel

    Client/Server Network

    centralized user accounts

    Client computers initiate dataexchanges and may upload data

    to servers

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    17/74

    ITE PC v4.0

    Chapter 1 17Rainier Pimentel

    Client/Server Networks

    In a client/server arrangement, network services are

    located on a dedicated computer called a server.

    The server responds to the requests of clients.

    The server is a central computer that is continuously

    available to respond to requests from clients for file, print,

    application, and other services.

    Servers are designed to handle requests from many clientssimultaneously.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    18/74

    ITE PC v4.0

    Chapter 1 18Rainier Pimentel

    What are two characteristics of clients in

    data networks? (Choose two.)

    1. initiate data exchanges

    2. are repositories of data

    3. may upload data to servers

    4. listen for requests from servers

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    19/74

    ITE PC v4.0

    Chapter 1 19Rainier Pimentel

    What are two characteristics of clients in

    data networks? (Choose two.)

    1. initiate data exchanges

    2. are repositories of data

    3. may upload data to servers

    4. listen for requests from servers

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    20/74

    ITE PC v4.0

    Chapter 1 20Rainier Pimentel

    A network administrator is designing anetwork for a new branch office of twenty-fiveusers. What are the advantages of using aclient-server model? (Choose two.)

    a. centralized administration

    b. does not require specialized software

    c. security is easier to enforce

    d. lower cost implementation

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    21/74

    ITE PC v4.0

    Chapter 1 21Rainier Pimentel

    A network administrator is designing anetwork for a new branch office of twenty-fiveusers. What are the advantages of using aclient-server model? (Choose two.)

    a. centralized administration

    b. does not require specialized software

    c. security is easier to enforce

    d. lower cost implementation

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    22/74

    ITE PC v4.0

    Chapter 1 22Rainier Pimentel

    Applications The Interface BetweenHuman and Data Networks

    Applications provide the means for generating and

    receiving data that can be transported on the network

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    23/74

    ITE PC v4.0

    Chapter 1 23Rainier Pimentel

    Application layer (definitions)

    Application layer supplies services that allow user tointerface with the network.

    It provides the interface between the applications oneither end of the network

    Application layer provides services for an applicationprogram to ensure that effective communication withanother application program in a network.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    24/74

    ITE PC v4.0

    Chapter 1 24Rainier Pimentel

    Which layer of the OSI model suppliesservices that allow user to interface with the

    network?

    a. physical

    b. session

    c. network

    d. presentation

    e. application

    f. transport

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    25/74

    ITE PC v4.0

    Chapter 1 25Rainier Pimentel

    Which layer of the OSI model suppliesservices that allow user to interface with the

    network?

    a. physical

    b. session

    c. network

    d. presentation

    e. application

    f. transport

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    26/74

    ITE PC v4.0

    Chapter 1 26Rainier Pimentel

    What is the role of the OSI applicationlayer?

    a. provides segmentation of data

    b. provides encryption and conversion of data

    c. provides the interface between the applications oneither end of the network

    d. provides control of all the data flowing between thesource and destination devices

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    27/74

    ITE PC v4.0

    Chapter 1 27Rainier Pimentel

    What is the role of the OSI applicationlayer?

    a. provides segmentation of data

    b. provides encryption and conversion of data

    c. provides the interface between the applications oneither end of the network

    d. provides control of all the data flowing between thesource and destination devices

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    28/74

    ITE PC v4.0

    Chapter 1 28Rainier Pimentel

    2 Forms ofApplication

    Layer Software

    Applications

    Web browsers, Email program

    Services

    Application Protocols(FTP, HTTP, DNS, Telnet, DHCP)

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    29/74

    ITE PC v4.0

    Chapter 1 29Rainier Pimentel

    What are two forms of application layersoftware? (Choose two.)

    a. applications

    b. dialogs

    c. requests

    d. services

    e. spreadsheet

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    30/74

    ITE PC v4.0

    Chapter 1 30Rainier Pimentel

    What are two forms of application layersoftware? (Choose two.)

    a. applications

    b. dialogs

    c. requests

    d. services

    e. spreadsheet

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    31/74

    ITE PC v4.0

    Chapter 1 31Rainier Pimentel

    Application LayerProtocols

    FTP and TFTP

    File TransferProtocol (FTP)

    FTP enables file sharing between hosts.

    FTP is commonly used to support for filetransfers between a client and a server

    Trivial File TransferProtocol (TFTP)

    TFTP is a connectionless service that uses theUserDatagram Protocol (UDP).

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    32/74

    ITE PC v4.0

    Chapter 1 32Rainier Pimentel

    What application layer protocol is commonly used tosupport for file transfers between a client and a

    server?

    a. DNS

    b. HTTP

    c. FTP

    d. Telnet

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    33/74

    ITE PC v4.0

    Chapter 1 33Rainier Pimentel

    What application layer protocol is commonly used tosupport for file transfers between a client and a

    server?

    a. DNS

    b. HTTP

    c. FTP

    d. Telnet

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    34/74

    ITE PC v4.0

    Chapter 1 34Rainier Pimentel

    Application LayerProtocols

    Server Message Block (SMB) is an applicationlayer protocol that describes the services that areused for file sharing in Microsoft networks

    Network File System (NFS)NFS is a

    distributed file system protocol suite developed bySun Microsystems that allows file access to aremote storage device such as a hard disk across

    a network.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    35/74

    ITE PC v4.0

    Chapter 1 35Rainier Pimentel

    What application layer protocol describes theservices that are used for file sharing in

    Microsoft networks?

    a. DHCP

    b. DNS

    c. SMB

    d. SMTP

    e. WINS

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    36/74

    ITE PC v4.0

    Chapter 1 36Rainier Pimentel

    What application layer protocol describes theservices that are used for file sharing in

    Microsoft networks?

    a. DHCP

    b. DNS

    c. SMB

    d. SMTP

    e. WINS

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    37/74

    ITE PC v4.0

    Chapter 1 37Rainier Pimentel

    Application LayerProtocols

    Simple Mail TransferProtocol (SMTP) SMTPadministers the transmission of e-mail overcomputer networks.

    It is used to forward mail between servers.

    It is a protocol that operates at the Applicationlayer of the OSI model

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    38/74

    ITE PC v4.0

    Chapter 1 38Rainier Pimentel

    Application LayerProtocols

    (Telnet and SSH) Terminal emulation (Telnet) Telnet provides the

    capability to remotely access another computer.

    Secure Shell (SSH), a common network protocol forremote administration of Unix computers.

    Telnet does not support encryption

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    39/74

    ITE PC v4.0

    Chapter 1 39Rainier Pimentel

    Telnet protocol

    Telnetprovides a

    virtualconnection forremote access

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    40/74

    ITE PC v4.0

    Chapter 1 40Rainier Pimentel

    Which application layer protocols correctlymatch a corresponding function? (Choose

    two.)

    a. DNS dynamically allocates IP addresses to hosts

    b. HTTP transfers data from a web server to a client

    c. POP delivers email from the client to the server emailserver

    d. SMTP supports file sharing

    e. Telnet provides a virtual connection for remote access

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    41/74

    ITE PC v4.0

    Chapter 1 41Rainier Pimentel

    Which application layer protocols correctlymatch a corresponding function? (Choose

    two.)

    a. DNS dynamically allocates IP addresses to hosts

    b. HTTP transfers data from a web server to a client

    c. POP delivers email from the client to the server emailserver

    d. SMTP supports file sharing

    e. Telnet provides a virtual connection for remote access

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    42/74

    ITE PC v4.0

    Chapter 1 42Rainier Pimentel

    As compared to SSH, what is the primarydisadvantage of telnet?

    a. not widely available

    b. does not support encryption

    c. consumes more network bandwidth

    d. does not support authentication

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    43/74

    ITE PC v4.0

    Chapter 1 43Rainier Pimentel

    As compared to SSH, what is the primarydisadvantage of telnet?

    a. not widely available

    b. does not support encryption

    c. consumes more network bandwidth

    d. does not support authentication

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    44/74

    ITE PC v4.0

    Chapter 1 44Rainier Pimentel

    Application LayerProtocols

    Simple Network Management Protocol (SNMP)SNMP is a protocol that provides a way to monitorand control network devices, and to manageconfigurations, statistics collection, performance,and security.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    45/74

    ITE PC v4.0

    Chapter 1 45Rainier Pimentel

    Application LayerProtocols

    HTTP and HTTPS HTTP - defines the rules for transferring information,

    files, and multimedia on web pages. Hypertext MarkupLanguage (HTML) is the language used within HTTP.

    HTTPS is the secured version of the HTTP application,which normally uses 128 bit SSL encryption to securethe information sent and received on a web page.

    These two protocols are used tocontrol the transfer of web

    resources from a web server toa client browser.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    46/74

    ITE PC v4.0

    Chapter 1 46Rainier Pimentel

    Which two protocols are used to control thetransfer of web resources from a web server to

    a client browser? (Choose two.)

    a. ASP

    b. FTP

    c. HTML

    d. HTTP

    e. HTTPS

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    47/74

    ITE PC v4.0

    Chapter 1 47Rainier Pimentel

    Which two protocols are used to control thetransfer of web resources from a web server to

    a client browser? (Choose two.)

    a. ASP

    b. FTP

    c. HTML

    d. HTTP

    e. HTTPS

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    48/74

    ITE PC v4.0

    Chapter 1 48Rainier Pimentel

    DHCP

    The Dynamic Host Configuration Protocol (DHCP)service enables devices on a network to obtain IPaddresses and other information from a DHCP server.

    DHCP allows a host to obtain an IP addressdynamically when it connects to the network. TheDHCP server is contacted and an address requested.The DHCP server chooses an address from a

    configured range of addresses called a pool andassigns ("leases") it to the host for a set period.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    49/74

    ITE PC v4.0

    Chapter 1 49Rainier Pimentel

    DHCP

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    50/74

    ITE PC v4.0

    Chapter 1 50Rainier Pimentel

    DHCP

    TheD

    HCP leasing process

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    51/74

    ITE PC v4.0

    Chapter 1 51Rainier Pimentel

    What is DNS?

    It is a database system that translates hostname to IPaddresses

    It is a protocol that operates at the Application layer ofthe OSI model

    It is used by the server to resolve names

    It is the automated service that matches resource

    names with the required IP address

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    52/74

    ITE PC v4.0

    Chapter 1 52Rainier Pimentel

    DNS

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    53/74

    ITE PC v4.0

    Chapter 1 53Rainier Pimentel

    DNS (Common Resource Records)

    Record Type Use

    A (host address)

    The A record maps a DNS host name to an IP

    address. This is the most common resource

    record type.

    CNAME (canonicalname)

    The CNAME record provides alternate names

    (or aliases) to hosts that already have an A

    record.

    MX (Mail Exchanger)The MX record identifies servers that can be

    used to deliver mail.

    NS (name server)

    The NS resource record identifies all name

    servers that can perform name resolution for thezone.

    PTR (pointer)

    In a reverse lookup zone, the PTR record maps

    an IP address to a host name (i.e. "points" to an

    A record).

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    54/74

    ITE PC v4.0

    Chapter 1 54Rainier Pimentel

    Email Services and POP3/SMTP

    Protocols POP3 (Post Office Protocol version 3) allows your

    computer to receive emails and SMTP means it cansend emails.

    POP3 allows users to pickup email across the network.

    SMTP (Simple Mail Transfer Protocol) delivers emailacross the network.

    email components are used to forward mail betweenservers.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    55/74

    ITE PC v4.0

    Chapter 1 55Rainier Pimentel

    MUA (Mail UserAgent)

    MUA is also called e-mail client

    MUA is the program that the user used to create emailmessages.

    To receive e-mail messages from an e-mail server, thee-mail client can use POP. Sending e-mail from either aclient or a server uses message formats and commandstrings defined by the SMTP protocol.

    MTA (Mail TransferAgent) receives email from theclient's MUA

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    56/74

    ITE PC v4.0

    Chapter 1 56Rainier Pimentel

    MDA (Mail Delivery Agent)

    A MDA is software that delivers e-mail messages rightafter they've been accepted on a server.

    MTA passes email to the MDA for final delivery.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    57/74

    ITE PC v4.0

    Chapter 1 57Rainier Pimentel

    MTA (Mail TransferAgent )

    The Mail Transfer Agent (MTA) process is used toforward e-mail.

    The MTA receives messages from the MUA or fromanother MTA on another e-mail server.

    Based on the message header, it determines how amessage has to be forwarded to reach its destination. Ifthe mail is addressed to a user whose mailbox is on the

    local server, the mail is passed to the MDA. If the mailis for a user not on the local server, the MTA routes thee-mail to the MTA on the appropriate server.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    58/74

    ITE PC v4.0

    Chapter 1 58Rainier Pimentel

    MTA

    MTA passes email to the MDA for final delivery.

    MTA uses SMTP to route email between servers.

    MTA receives email from the client's MUA.

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    59/74

    ITE PC v4.0

    Chapter 1 59Rainier Pimentel

    Email Services (SMTP and POP)

    MTA and SMTP areemail components areused to forward mail

    between servers

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    60/74

    ITE PC v4.0

    Chapter 1 60Rainier Pimentel

    Email Services (SMTP and POP)

    1. MTA receives email

    from the client's MUA2. MTA passes email to

    the MDA for finaldelivery

    3. MTA uses SMTP toroute email between

    servers

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    61/74

    ITE PC v4.0

    Chapter 1 61Rainier Pimentel

    The process of sending mails

    between clients

    1. MUA

    2. SMTP3. MTA4. SMTP5. MTA6. MDA

    7. POP8. MUA

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    62/74

    ITE PC v4.0

    Chapter 1 62Rainier Pimentel

    Which email components are used to forwardmail between servers? (Choose two.)

    a. MDA

    b. IMAP

    c. MTA

    d. POP

    e. SMTP

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    63/74

    ITE PC v4.0

    Chapter 1 63Rainier Pimentel

    Which email components are used to forwardmail between servers? (Choose two.)

    a. MDA

    b. IMAP

    c. MTA

    d. POP

    e. SMTP

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    64/74

    ITE PC v4.0

    Chapter 1 64Rainier Pimentel

    Which statements are correct concerning therole of the MTA in handling email? (Choosethree.)

    a. routes email to the MDA on other servers

    b. receives email from the client's MUA

    c. receives email via the POP3 protocol

    d. passes email to the MDA for final delivery

    e. uses SMTP to route email between servers

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    65/74

    ITE PC v4.0

    Chapter 1 65Rainier Pimentel

    Which statements are correct concerning therole of the MTA in handling email? (Choosethree.)

    a. routes email to the MDA on other servers

    b. receives email from the client's MUA

    c. receives email via the POP3 protocol

    d. passes email to the MDA for final delivery

    e. uses SMTP to route email between servers

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    66/74

    ITE PC v4.0

    Chapter 1 66Rainier Pimentel

    Presentation Layer

    Presents data to the Application Layer

    Provides data translation, coding, and conversion functions

    Translates genericallyformatted data into its native format

    (EBCDIC to ASCII)

    Data compression, decompression, encryption, anddecryption

    Ex: PICT/TIFF/JPEG/MIDI/MPEG/QuickTime

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    67/74

    ITE PC v4.0

    Chapter 1 67Rainier Pimentel

    Port Numbers

    Application layer uses support from lower layer functionsto distinguish between connections to the service

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    68/74

    ITE PC v4.0

    Chapter 1 68Rainier Pimentel

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    69/74

    ITE PC v4.0

    Chapter 1 69Rainier Pimentel

    What is the destination port for thecommunication that is represented on line 82?

    a. 80

    b. 1261

    c. 15533

    d. 3912

    e. 65520

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    70/74

    ITE PC v4.0

    Chapter 1 70Rainier Pimentel

    What is the destination port for thecommunication that is represented on line 82?

    a. 80

    b. 1261

    c. 15533

    d. 3912

    e. 65520

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    71/74

    ITE PC v4.0

    Chapter 1 71Rainier Pimentel

    How does the application layer on a

    server usually process multiple clientrequest for services?

    a. ceases all connections to the service

    b. denies multiple connections to a single daemon

    c. suspends the current connection to allow the newconnection

    d. uses support from lower layer functions to distinguish

    between connections to the service

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    72/74

    ITE PC v4.0

    Chapter 1 72Rainier Pimentel

    How does the application layer on a

    server usually process multiple clientrequest for services?

    a. ceases all connections to the service

    b. denies multiple connections to a single daemon

    c. suspends the current connection to allow the newconnection

    d. uses support from lower layer functions to distinguish

    between connections to the service

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    73/74

    ITE PC v4.0

    Chapter 1 73Rainier Pimentel

  • 8/8/2019 CCNA 1 - Chapter 3 for Students

    74/74

    Summary