100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Progression: Field Tech IV – V Study Guide Questions With Complete Solutions

Rating
-
Sold
-
Pages
40
Grade
A+
Uploaded on
26-07-2025
Written in
2024/2025

Progression: Field Tech IV – V Study Guide Questions With Complete Solutions

Institution
Ncti Field Tech
Course
Ncti field tech

Content preview

Progression: Field Tech IV – V Study Guide Questions With
Complete Solutions

_____ is a simple file transfer protocol used to transport data
packets over UDP. Correct Answers Trivial File Transfer
Protocol (TFTP)

________ allows network administrators to break up a single
network address into smaller network addresses, creating router-
connected network segments, all with their own unique network
address space. Correct Answers Subnetting

________ is an application that manages Internet resources and
transmits them in response to requests from Web browsers.
Correct Answers HTTP server

21. Which tagging method supports thousands of VLANs?
Correct Answers 802.1Q

A bridge provides three important functions: Correct Answers
Forwarding—If the frame's destination address is on a different
segment than its source, the bridge sends the frame only to the
port connected to that segment.
Filtering—If the incoming frame is destined for a device on the
same physical port where the frame was generated, the bridge
does not forward the frame out any other ports because all nodes
on the originating segment have already received the frame.
Learning—The bridge automatically builds and maintains its
own bridge table, by noting the source MAC addresses of
incoming frames. If a frame is addressed to a destination not yet

,recorded in the table, the bridge broadcasts the frame to all
ports.

A Class 5 office connects individual subscribers to the telephone
network and is also referred to as: Correct Answers End Office
Central Office
Local Office

A dedicated CO circuit that links two points is referred to as a:
Correct Answers Tie Line

A frame relay network uses fewer lines to connect 10 locations
than a T1 mesh, and is therefore more cost effective. True or
False? Correct Answers True

A line that goes from a customer's site through a CO to a remote
CO in another part of the country is known as a: Correct
Answers FX line

A network OS (NOS) Correct Answers also called a
client/server OS, provides centralized control of all network
resources. A network administrator can decide what each user
may see and do on the network. By far, the most common NOS
packages are Microsoft and UNIX/Linux servers.

A NIC is a device used for: Correct Answers Signaling

A permanent virtual circuit (PVC) Correct Answers behaves
like a dedicated connection between source and destination
endpoints. A PVC will always follow the same physical path
between two endpoints.

,A Ping command uses which ICMP message types? (Choose
two.) Correct Answers Echo Request
Echo Reply

A sound card is what general type of computer component?
Correct Answers Input/output

A switched virtual circuit (SVC) Correct Answers is analogous
to a public switched telephone network (PSTN). The end
devices establish a connection on demand, and disconnect when
communications cease. Each SVC may travel a different
physical path.

A transmitter includes the following components: Correct
Answers Encoder that converts the input data signal into digital
electrical pulses.
Light source that converts the digital electrical signal to light
pulses.
Connector that couples the light source to the fiber through
which the light rays travel.

According to 10BaseT wiring rules, what is the maximum
segment length without a repeater? Correct Answers 100 m

According to the North American Numbering Plan (NANP),
what does the "803" in 803-550-0000 represent? Correct
Answers Number Plan Area

, Acknowledgment (ACK) Correct Answers Devices send ACK
packets in response to correctly received DATA packets. ACK
packets use an opcode=4.

Admission control protocols, authentication mechanisms, and
_______ are three ways communication networks provide
admission control. Correct Answers Access Control Lists
(ACLs)

After entering "arp" into the MS-DOS command line, which of
the following switches would display the ARP cache? Correct
Answers -a or -g

An Application Layer process needs to transmit data with as
little overhead as possible. The application protocol provides
error detection and recovery if the data is lost. What Transport
Layer protocol should this process use? Correct Answers User
Datagram Protocol

An Application Layer utility transmits network administration
and control messages between nodes. It must not use any more
of the network's bandwidth than absolutely necessary. If
messages are corrupted or lost, the utility handles
retransmission, so it doesn't need this service from the lower
layers. This application should use the services of: Correct
Answers UDP

An Ethernet LAN that uses UTP cabling and a hub as the
physical medium is referred to as which of the following?
Correct Answers Star

Written for

Institution
Ncti field tech
Course
Ncti field tech

Document information

Uploaded on
July 26, 2025
Number of pages
40
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Classroom NURSING
View profile
Follow You need to be logged in order to follow users or courses
Sold
4811
Member since
3 year
Number of followers
3227
Documents
54598
Last sold
13 hours ago
NURSING

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Read more Read less
4.0

1176 reviews

5
622
4
214
3
192
2
39
1
109

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions