100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Progression: Field Tech III - IV Conventional (NCTI) Questions & Answers (Scored A+)

Rating
-
Sold
-
Pages
44
Grade
A+
Uploaded on
11-11-2023
Written in
2023/2024

The Open Systems Interconnection reference model (OSI/RM) Network Layer serves which primary purpose? - ANSWER-It uses Layer 3 addresses to create multiple routed networks. The address 68.56.189.17 belongs to which Internet protocol (IP) class? - ANSWER-Class A What happens to a datagram sent by a higher level protocol to a 127.x.y.z address? - ANSWER-The datagram loops back inside the host and never leaves the network interface card (NIC). Which device evaluates and acts upon a packet's Internet protocol (IP) address? - ANSWER-Router. The Network Layer must do what to a received frame first, in order to determine the route over which it will forward the datagram to the next network? - ANSWER-Decapsulate the packet. What network information can be determined from a logical Internet protocol (IP) address? - ANSWER-The host portion and network portion. The physical address of a device is processed by which layer of the Open Systems Interconnection reference model (OSI/RM)? - ANSWER-The Physical Layer. Which layer of the Open Systems Interconnection reference model (OSI/RM) would you suspect as being the problem when packets are arriving at the server but no information is being returned to the client? - ANSWER-The Data Link Layer. All computers running on the transmission control protocol/Internet protocol (TCP/IP) suite have which of the following in common? - ANSWER-Each computer is assigned its own Internet protocol (IP) address. A repeater operates at which layer of the Open Systems Interconnection reference model (OSI/RM)? - ANSWER-The Transport Layer.

Show more Read less
Institution
Progression: Field Tech III - IV Conventional (NCT
Course
Progression: Field Tech III - IV Conventional (NCT











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Progression: Field Tech III - IV Conventional (NCT
Course
Progression: Field Tech III - IV Conventional (NCT

Document information

Uploaded on
November 11, 2023
Number of pages
44
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Progression: Field Tech III - IV Conventional ( NCTI) Questions & Answers (Scored A+)
The Open Systems Interconnection reference model (OSI/RM) Network Layer serves which primary purpose? - ANSWER-It uses Layer 3 addresses to create multiple routed networks.
The address 68.56.189.17 belongs to which Internet protocol (IP) class? - ANSWER-
Class A
What happens to a datagram sent by a higher level protocol to a 127.x.y.z address? - ANSWER-The datagram loops back inside the host and never leaves the network interface card (NIC).
Which device evaluates and acts upon a packet's Internet protocol (IP) address? - ANSWER-Router.
The Network Layer must do what to a received frame first, in order to determine the route over which it will forward the datagram to the next network? - ANSWER-
Decapsulate the packet.
What network information can be determined from a logical Internet protocol (IP) address? - ANSWER-The host portion and network portion.
The physical address of a device is processed by which layer of the Open Systems Interconnection reference model (OSI/RM)? - ANSWER-The Physical Layer.
Which layer of the Open Systems Interconnection reference model (OSI/RM) would you
suspect as being the problem when packets are arriving at the server but no information
is being returned to the client? - ANSWER-The Data Link Layer.
All computers running on the transmission control protocol/Internet protocol (TCP/IP) suite have which of the following in common? - ANSWER-Each computer is assigned its
own Internet protocol (IP) address.
A repeater operates at which layer of the Open Systems Interconnection reference model (OSI/RM)? - ANSWER-The Transport Layer. Which Dynamic Host Configuration Protocol (DHCP) network address allocation mechanism assigns a host a temporary IP address? - ANSWER-Dynamic
Which two choices are examples of trivial file transfer protocol (TFTP) use? (Choose two.) - ANSWER-Download router upgrades. And
Software upgrades to IP telephones.
How does the Domain Name System (DNS) resolve fully qualified domain names (FQDN) to IP addresses? - ANSWER-By looking up the names in an address mapping database.
Which TCP/IP application allows us to transfer files either within a browser or at the command line? - ANSWER-File transfer protocol (FTP).
Which statement best describes Internet Message Access Protocol (IMAP)? - ANSWER-IMAP allows users to scan email headers and choose email messages to download from the email server.
To resolve fully qualified domain names (FQDN) to binary IP addresses, resolvers contact which type of TCP/IP application server? - ANSWER-Domain Name System (DNS).
Which protocol allows clients to locate and download IP addressing and configuration information on an automatically renewable (lease) basis? - ANSWER-Dynamic Host Configuration Protocol (DHCP).
Which TCP/IP application allows a network user to remotely log on and manipulate a network device? - ANSWER-Telnet.
Which three of the following are Dynamic Host Configuration Protocol (DHCP) address allocation mechanisms? (Choose three.) - ANSWER-Automatic, Dynamic, Manual
Internet email uses which two protocols? (Choose two.) - ANSWER-Simple Mail Transfer Protocol (SMTP). And Post Office Protocol version 3 (POP3).
If a Dynamic Host Configuration Protocol (DHCP) client fails to renew its lease at the 50-percent point, what happens next? - ANSWER-It attempts to obtain a lease at 87.5-
percent lease time.
Of the five trivial file transfer protocol (TFTP) packet types, which three choices below are TFTP packet types? (Choose three.) - ANSWER-Read request, Write request, Acknowledgement
If you want to locate a previously saved Uniform Resource Locator (URL) so that you can quickly return to it as needed, where on the browser toolbar would you look? - ANSWER-Favorites What happens when the browser application finishes downloading the files necessary to
display a web page? - ANSWER-The browser and server drop the connections, and the
browser maintains the page and its elements in memory.
Which best describes why an hypertext transfer protocol (HTTP) server can handle multiple simultaneous connections? - ANSWER-HTTP is stateless, which means the server has no knowledge of previous connections after they are dropped.
For what purpose would you choose to run the Telnet application? - ANSWER-To configure a router
Which three of the following are common Telnet application uses? (Choose three.) - ANSWER-Connect to an online database, Connect remotely to run a specific application, Connect to a router for network information
Which file transfer protocol (FTP) command allows you to change directories within a file listing? - ANSWER-CD
For what application is file transfer protocol (FTP) an excellent choice? - ANSWER-To download large files.
A file transfer protocol (FTP) server administrator can control server access in which three ways? (Choose three.) - ANSWER-Make only portions of the drive visible, Control read and write privileges, Limit file access
Which is the best reason to use the file transfer protocol (FTP) application? - ANSWER-
When you need to pass large files over a slow connection
The file transfer protocol (FTP) server process can run as which two of the following? (Choose two.) - ANSWER-Daemon, Windows service
As a result of issuing the file transfer protocol (FTP) DIR command, each file listing entry begins with a "-"; what does the "-" indicate? - ANSWER-The entries are files
Which two choices are TCP/IP email protocols? (Choose two.) - ANSWER-Simple Mail Transfer Protocol (SMTP). , Internet Message Access Protocol (IMAP).
Which two protocols deliver email directly to the email client? (Choose two.) - ANSWER-Post Office Protocol version 3 (POP3).
Internet Message Access Protocol version 4 (IMAP4).
Why does Simple Mail Transfer Protocol (SMTP) need additional protocols to carry non-
text data as attachments? - ANSWER-SMTP only carries ASCII text characters. Which two of the following are Multpurpose Internet Mail Extension (MIME)-supported data types? (Choose two.) - ANSWER-Moving Picture Experts Group (MPEG). , Graphics interchange format (GIF).
How does secure Multipurpose Internet Mail Extension (S/MIME) protect email from forgery and interception? - ANSWER-It uses digital signatures and public-key encryption techniques.
Your network Help desk calls and asks you to help troubleshoot an email problem. Several users have complained that when they send email messages with attachments,
the recipients reply that the attachments are unreadable. The message body is legible, however. You know that your users encode all attachments using Multipurpose Internet Mail Extension (MIME). Which is the best solution to this problem? - ANSWER-Contact the recipients, and have them use MIME to decode attachments.
Which is a valid email address? -
You are a networking consultant for a major telecommunications firm. They ask you to help them resolve a hacked email problem. It seems that someone is intercepting emails between district offices and inserting pornographic pictures in place of legitimate email attachments. How might you resolve this problem for them? - ANSWER-
Implement Secure Multipurpose Internet Mail Extension (S/MIME) encoding on all outbound email attachments.
Which two of the following are examples of email programs? (Choose two.) - ANSWER-
Microsoft Outlook and UNIX Sendmail
Simple mail transfer protocol (SMTP) is which type of message delivery system? - ANSWER-Direct delivery
Remote monitoring (RMON) uses which devices, placed on remote network segments, to gather network information? - ANSWER-Probes.
In which two ways does a Simple Network Management Protocol (SNMP) agent respond to the management station? (Choose two.) - ANSWER-By responding to the management station's requests for updated data
By trapping information that exceeds a set threshold and forwarding the data to the management station
Which two TCP/IP protocols are used for network management? (Choose two.) - ANSWER-Remote monitoring (RMON).
Simple Network Management Protocol (SNMP).
What results from trapping data with an Simple Network Management Protocol (SNMP) agent? - ANSWER-The managed device alerts the management station of a threshold violation.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
papersmaster01 Howard Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
280
Member since
2 year
Number of followers
106
Documents
14075
Last sold
2 days ago
PAPERSMASTER01

On this page you will find documents , package deals, flashcards offered by seller PAPERSMASTER01.With our documents on your side you"ll be well equipped to tackle you exams and achieve the grades you need.

3.9

71 reviews

5
22
4
33
3
9
2
3
1
4

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions