Verified 100% Correct
What are the primary requirements to connect to a transmission control protocol/Internet
protocol (TCP/IP) network? - ANSWER Unique pairs of Network Layer and Transport
Layer addresses and use of the TCP/IP protocol suite.
What type of delivery method uses an email server between the sender and the receiver
of messages? - ANSWER Store-and-forward.
Host names and uniform resource locators (URL) are resolved to Internet protocol (IP)
addresses by which of the following applications? - ANSWER Domain Name System
(DNS).
What happens when the browser application finishes downloading the files necessary to
display a web page? - ANSWER The browser and server drop the connections, and the
browser maintains the page and its elements in local memory.
Which email protocol enables the messages to be viewed without first downloading
them from the email server? - ANSWER Internet Message Access Protocol version 4
(IMAP4).
What type of server maintains an access log to assist with troubleshooting and tracking
down malicious users? - ANSWER A file transfer protocol (FTP) server.
A store-and-forward email system will not deliver messages until: - ANSWER The host
requests the information.
What is the binary equivalent of decimal 136? - ANSWER 10001000.
Convert the Internet protocol (IP) address 172.68.10.2 from decimal to binary: -
ANSWER 10101100.01000100.00001010.00000010.
Convert the binary Internet protocol (IP) address
01110011.11001000.00101100.00000010 to decimal: - ANSWER 115.200.44.2.
Which is the result of ANDing the Internet protocol (IP) address 23.176.224.18 with the
subnet mask 255.224.0.0? - ANSWER 23.160.0.0.
Which represents the prefix bits for the subnet mask 255.255.0.0? - ANSWER /16.
, If we borrow 3 bits from a Class C network address, how many useable subnets have
we created? - ANSWER 8.
What isolates an Internet protocol (IP) address's network portion from its host portion? -
ANSWER A network mask.
What is the best description of the Internet protocol (IP) address prefix? - ANSWER It is
the shorthand notation for the combined network and subnet mask.
In a net mask address, what identifies the network and host portions of the address? -
ANSWER The network portion of the net mask is set to all ones, and the host is set to
all zeros.
Why is subnetting used? - ANSWER It allows network administrators to break up a
single network address into smaller network addresses.
Which Internet protocol (IP) packet fragmentation header field specifies where the
fragment belongs in the original datagram? - ANSWER Fragment Offset.
Which is the Internet protocol (IP) header protocol number used to specify that the
packet's contents were created with transmission control protocol (TCP)? - ANSWER 6.
Which protocol allows a diskless workstation to contact a server and obtain an Internet
protocol (IP) address? - ANSWER Reverse address resolution protocol (RARP).
What provides user datagram protocol (UDP) with the ability to demultiplex data for an
application? - ANSWER A UDP destination port number.
Which user datagram protocol (UDP) port address do simple network management
protocol (SNMP) agents use to send and receive management requests? - ANSWER
161.
Which transmission control protocol (TCP) header control bit represents that the
message is initiating a connection? - ANSWER SYN.
Which of the following two ports are contained in the transmission control protocol
(TCP) header? - ANSWER Destination and source.
You know the logical address of an associate's computer on the company's local
network and you want to learn the media access control (MAC) address of your
associate's computer. Which of the following tools would you use? - ANSWER
Address resolution protocol (ARP).