Introduction to Networks (version 6.00) – ITN Chapter 10 Exam Beta Answers 2018 100%

Last Updated on January 20, 2019 by Admin

Introduction to Networks (version 6.00) – ITN Chapter 10 Exam Beta Answers 2018 100%

Cisco CCNA 1 ITN v6.0 chapter 10 exam beta answers Routing and Switching (R&S) Introduction to Networks (ITN) (Version 6.00) collection year 2017, 2018 and 2019 Full 100%. CCNA 1 has been know as ITN. The following are the questions exam answers. Guarantee Passed 100%. CCNA 1 v6.0 chapter 10 exam beta answers has some new update from ITN version 6.0 without beta. You can review all chapter 10 exam beta answers. You will get passed scored 100% with this version 6.0. Good Luck for Cisco Netacad ITN v6.0 Exam or ITN Pilot version 6.0 !

This is the first release of this form for the CCNA R&S Introduction to Networks curriculum from Cisco Netacad.com. There are 18 items are available in ITN Chapter 10 Exam Beta. You will get only selected 18 items which are displayed in random sequence, while you take exam with Cisco Netacad.

  1. What is an example of network communication that uses the client-server model?

    • A user uses eMule to download a file that is shared by a friend after the file location is determined.
    • A workstation initiates an ARP to find the MAC address of a receiving host.
    • A user prints a document by using a printer that is attached to a workstation of a coworker.
    • A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.
      Explanation:

      When a user types a domain name of a website into the address bar of a web browser, a workstation needs to send a DNS request to the DNS server for the name resolution process. This request is a client/server model application. The eMule application is P2P. Sharing a printer on a workstation is a peer-to-peer network. Using ARP is just a broadcast message sent by a host.
  2. Which three statements describe a DHCP Discover message? (Choose three.)

    • The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF).
    • The destination IP address is 255.255.255.255.
    • The message comes from a server offering an IP address.
    • The message comes from a client seeking an IP address.
    • All hosts receive the message, but only a DHCP server replies.
    • Only the DHCP server receives the message.
      Explanation:

      When a host configured to use DHCP powers up on a network it sends a DHCPDISCOVER message. FF-FF-FF-FF-FF-FF is the L2 broadcast address. A DHCP server replies with a unicast DHCPOFFER message back to the host.
  3. Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.)

    • physical layer
    • session layer
    • transport layer
    • application layer
    • presentation layer
    • data link layer
      Explanation:

      The three upper layers of the OSI model, the session, presentation, and application layers, provide application services similar to those provided by the TCP/IP model application layer. Lower layers of the OSI model are more concerned with data flow.
  4. Which phrase describes an FTP daemon?

    • a diagnostic FTP program
    • a program that is running on an FTP server
    • a program that is running on an FTP client
    • an application that is used to request data from an FTP server
      Explanation:

      An FTP server runs an FTP daemon, which is a program that provides FTP services. End users who request services must run an FTP client program.
  5. What is true about the Server Message Block protocol?

    • Different SMB message types have a different format.
    • Clients establish a long term connection to servers.
    • SMB messages cannot authenticate a session.
    • SMB uses the FTP protocol for communication.
      Explanation:

      The Server Message Block protocol is a protocol for file, printer, and directory sharing. Clients establish a long term connection to servers and when the connection is active, the resources can be accessed. Every SMB message has the same format. The use of SMB differs from FTP mainly in the length of the sessions. SMB messages can authenticate sessions.
  6. What type of information is contained in a DNS MX record?

    • the FQDN of the alias used to identify a service
    • the IP address for an FQDN entry
    • the domain name mapped to mail exchange servers
    • the IP address of an authoritative name server
      Explanation:

      MX, or mail exchange messages, are used to map a domain name to several mail exchange servers that all belong to the same domain.
  7. Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?

    • internetwork
    • session
    • presentation
    • application
    • network access
      Explanation:

      The application layer of the TCP/IP model performs the functions of three layers of the OSI model – application, presentation, and session. The application layer of the TCP/IP model is the layer that provides the interface between the applications, is responsible for formatting, compressing, and encrypting data, and is used to create and maintain dialogs between source and destination applications.
  8. What are two characteristics of the application layer of the TCP/IP model? (Choose two.)

    • responsibility for logical addressing
    • responsibility for physical addressing
    • the creation and maintenance of dialogue between source and destination applications
    • closest to the end user
    • the establishing of window size
      Explanation:

      The application layer of the TCP/IP model is the layer that is closest to the end user, providing the interface between the applications. It is responsible for formatting, compressing, and encrypting data, and is used to create and maintain dialog between source and destination applications.
  9. A manufacturing company subscribes to certain hosted services from its ISP. The services that are required include hosted world wide web, file transfer, and e-mail. Which protocols represent these three key applications? (Choose three.)

    • FTP
    • HTTP
    • DNS
    • SNMP
    • DHCP
    • SMTP
      Explanation:

      The ISP uses the HTTP protocol in conjunction with hosting web pages, the FTP protocol with file transfers, and SMTP with e-mail. DNS is used to translate domain names to IP addresses. SNMP is used for network management traffic. DHCP ic commonly used to manage IP addressing.
  10. What are two characteristics of peer-to-peer networks? (Choose two.)

    • scalability
    • one way data flow
    • decentralized resources
    • centralized user accounts
    • resource sharing without a dedicated server
      Explanation:

      Peer-to-peer networks have decentralized resources because every computer can serve as both a server and a client. One computer might assume the role of server for one transaction while acting as a client for another transaction. Peer-to-peer networks can share resources among network devices without the use of a dedicated server.
  11. Why is DHCP preferred for use on large networks?

    • Large networks send more requests for domain to IP address resolution than do smaller networks.
    • DHCP uses a reliable transport layer protocol.
    • It prevents sharing of files that are copyrighted.
    • It is a more efficient way to manage IP addresses than static address assignment.
    • Hosts on large networks require more IP addressing configuration settings than hosts on small networks.
      Explanation:

      Static IP address assignment requires personnel to configure each network host with addresses manually. Large networks can change frequently and have many more hosts to configure than do small networks. DHCP provides a much more efficient means of configuring and managing IP addresses on large networks than does static address assignment.
  12. What is an advantage for small organizations of adopting IMAP instead of POP?

    • Messages are kept in the mail servers until they are manually deleted from the email client.
    • When the user connects to a POP server, copies of the messages are kept in the mail server for a short time, but IMAP keeps them for a long time.
    • IMAP sends and retrieves email, but POP only retrieves email.
    • POP only allows the client to store messages in a centralized way, while IMAP allows distributed storage.
      Explanation:

      IMAP and POP are protocols that are used to retrieve email messages. The advantage of using IMAP instead of POP is that when the user connects to an IMAP-capable server, copies of the messages are downloaded to the client application. IMAP then stores the email messages on the server until the user manually deletes those messages.
  13. Which application layer protocol uses message types such as GET, PUT, and POST?

    • DNS
    • DHCP
    • SMTP
    • HTTP
    • POP3
      Explanation:

      The GET command is a client request for data from a web server. A PUT command uploads resources and content, such as images, to a web server. A POST command uploads data files to a web server.
  14. Which protocol is used to view bank account transactions through a web browser?

    • DNS
    • FTP
    • HTTPS
    • SSH
      Explanation:

      HTTP and HTTPS are used to access web pages through the Internet. HTTPS is for secure communications such as when accessing bank records.
  15. Which protocol uses encryption?

    • DHCP
    • DNS
    • FTP
    • HTTPS
      Explanation:

      HTTPS uses Secure Socket Layer (SSL) to encrypt traffic accessed from a web server.
  16. Which type of server relies on record types such as A, NS, AAAA, and MX in order to provide services?

    • DNS
    • email
    • file
    • web
      Explanation:

      A DNS server stores records that are used to resolve IP addresses to host names. Some DNS record types include the following:

      • A – an end device IPv4 address
      • NS – an authoritative name server
      • AAAA – an end device IPv6 address
      • MX – a mail exchange record
  17. Which applications or services allow hosts to act as client and server at the same time?

    • client/server applications
    • email applications
    • P2P applications
    • authentication services
      Explanation:

      P2P applications allow the clients to behave as servers if needed. When using authentication services, email exchange, and client/server applications, one host acts as server and the other acts as client at all times.
  18. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

    Which PC or PCs are sending FTP packets to the server?

    Cisco ITN CCNA 1 v6.0 Chapter 10 Exam Beta Answer R&S 2018 2019 001

    Cisco ITN CCNA 1 v6.0 Chapter 10 Exam Beta Answer R&S 2018 2019 001

    • PC_3
    • PC_1
    • PC_2
    • PC_1 and PC_3
      Explanation:

      After you view the details of the packets that are being transferred between each PC and the server, you will see that the PC that is using a destination port number of 20 or 21 is the PC using the FTP service. PC_2 has an outbound port number of 21 to create an FTP control session with the server at 192.168.1.253.