100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

NCTI 3 to 4 Exam Study Guide Questions And Answers Verified 100% Correct

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
16-09-2025
Written in
2025/2026

NCTI 3 to 4 Exam Study Guide Questions And Answers Verified 100% Correct What are the primary requirements to connect to a transmission control protocol/Internet protocol (TCP/IP) network? - ANSWER Unique pairs of Network Layer and Transport Layer addresses and use of the TCP/IP protocol suite. What type of delivery method uses an email server between the sender and the receiver of messages? - ANSWER Store-and-forward. Host names and uniform resource locators (URL) are resolved to Internet protocol (IP) addresses by which of the following applications? - ANSWER Domain Name System (DNS). What happens when the browser application finishes downloading the files necessary to display a web page? - ANSWER The browser and server drop the connections, and the browser maintains the page and its elements in local memory. Which email protocol enables the messages to be viewed without first downloading them from the email server? - ANSWER Internet Message Access Protocol version 4 (IMAP4). What type of server maintains an access log to assist with troubleshooting and tracking down malicious users? - ANSWER A file transfer protocol (FTP) server. A store-and-forward email system will not deliver messages until: - ANSWER The host requests the information. What is the binary equivalent of decimal 136? - ANSWER . Convert the Internet protocol (IP) address 172.68.10.2 from decimal to binary: - ANSWER .... Convert the binary Internet protocol (IP) address ... to decimal: - ANSWER 115.200.44.2. Which is the result of ANDing the Internet protocol (IP) address 23.176.224.18 with the subnet mask 255.224.0.0? - ANSWER 23.160.0.0. Which represents the prefix bits for the subnet mask 255.255.0.0? - ANSWER /16. If we borrow 3 bits from a Class C network address, how many useable subnets have we created? - ANSWER 8. What isolates an Internet protocol (IP) address's network portion from its host portion? - ANSWER A network mask. What is the best description of the Internet protocol (IP) address prefix? - ANSWER It is the shorthand notation for the combined network and subnet mask. In a net mask address, what identifies the network and host portions of the address? - ANSWER The network portion of the net mask is set to all ones, and the host is set to all zeros. Why is subnetting used? - ANSWER It allows network administrators to break up a single network address into smaller network addresses. Which Internet protocol (IP) packet fragmentation header field specifies where the fragment belongs in the original datagram? - ANSWER Fragment Offset. Which is the Internet protocol (IP) header protocol number used to specify that the packet's contents were created with transmission control protocol (TCP)? - ANSWER 6. Which protocol allows a diskless workstation to contact a server and obtain an Internet protocol (IP) address? - ANSWER Reverse address resolution protocol (RARP). What provides user datagram protocol (UDP) with the ability to demultiplex data for an application? - ANSWER A UDP destination port number. Which user datagram protocol (UDP) port address do simple network management protocol (SNMP) agents use to send and receive management requests? - ANSWER 161. Which transmission control protocol (TCP) header control bit represents that the message is initiating a connection? - ANSWER SYN. Which of the following two ports are contained in the transmission control protocol (TCP) header? - ANSWER Destination and source. You know the logical address of an associate's computer on the company's local network and you want to learn the media access control (MAC) address of your associate's computer. Which of the following tools would you use? - ANSWER Address resolution protocol (ARP). What is the primary difference between transmission control protocol (TCP) and user datagram protocol (UDP)? - ANSWER TCP messages are tracked to ensure they are received; UDP messages are sent without tracking. The five steps of (1) obtaining logical addresses, (2) obtaining physical addresses, (3) establishing a connection between applications, (4) the transfer of information, and (5) the termination of the connection are necessary to accomplish what? - ANSWER The transfer of information across a transmission control protocol/Internet protocol (TCP/IP) network. Where does the Domain Name System (DNS) namespace begin? - ANSWER Root domains. The maximum Domain Name System (DNS) domain name length is how many bytes? - ANSWER 255. Zones maintain domain name information in which record types? - ANSWER Resource records. Which of the following Dynamic Host Configuration Protocol (DHCP) codes carries vendor-specific options in a private network? - ANSWER Codes 128-256. At which point in the Dynamic Host Configuration Protocol (DHCP) lease period does the client first attempt to renew its lease? - ANSWER At 50% of the original lease time. What is the correct destination of a user datagram protocol (UDP) port number for a DHCPDISCOVER message? - ANSWER 67. When network address translation (NAT) uses IP (Internet protocol) address translation, it assigns external addresses to internal devices in which way? - ANSWER It assigns the internal address to one of a pool of external addresses. Which statement best describes network address translation (NAT) masquerading? - ANSWER It hides all internal addresses behind one external address. What does the Domain Name System (DNS) allow users to do? - ANSWER Distinguish between two similar names. What is the Dynamic Host Configuration Protocol (DHCP) client/server components? - ANSWER The client requests parameters and the server provides the parameters. A router makes its packet forwarding decision based on what information? - ANSWER

Show more Read less
Institution
NCTI 3 To 4
Course
NCTI 3 to 4









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
NCTI 3 to 4
Course
NCTI 3 to 4

Document information

Uploaded on
September 16, 2025
Number of pages
11
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

NCTI 3 to 4 Exam Study Guide Questions And Answers
Verified 100% Correct

What are the primary requirements to connect to a transmission control protocol/Internet
protocol (TCP/IP) network? - ANSWER Unique pairs of Network Layer and Transport
Layer addresses and use of the TCP/IP protocol suite.

What type of delivery method uses an email server between the sender and the receiver
of messages? - ANSWER Store-and-forward.

Host names and uniform resource locators (URL) are resolved to Internet protocol (IP)
addresses by which of the following applications? - ANSWER Domain Name System
(DNS).

What happens when the browser application finishes downloading the files necessary to
display a web page? - ANSWER The browser and server drop the connections, and the
browser maintains the page and its elements in local memory.

Which email protocol enables the messages to be viewed without first downloading
them from the email server? - ANSWER Internet Message Access Protocol version 4
(IMAP4).

What type of server maintains an access log to assist with troubleshooting and tracking
down malicious users? - ANSWER A file transfer protocol (FTP) server.

A store-and-forward email system will not deliver messages until: - ANSWER The host
requests the information.

What is the binary equivalent of decimal 136? - ANSWER 10001000.

Convert the Internet protocol (IP) address 172.68.10.2 from decimal to binary: -
ANSWER 10101100.01000100.00001010.00000010.

Convert the binary Internet protocol (IP) address
01110011.11001000.00101100.00000010 to decimal: - ANSWER 115.200.44.2.

Which is the result of ANDing the Internet protocol (IP) address 23.176.224.18 with the
subnet mask 255.224.0.0? - ANSWER 23.160.0.0.

Which represents the prefix bits for the subnet mask 255.255.0.0? - ANSWER /16.

, If we borrow 3 bits from a Class C network address, how many useable subnets have
we created? - ANSWER 8.

What isolates an Internet protocol (IP) address's network portion from its host portion? -
ANSWER A network mask.

What is the best description of the Internet protocol (IP) address prefix? - ANSWER It is
the shorthand notation for the combined network and subnet mask.

In a net mask address, what identifies the network and host portions of the address? -
ANSWER The network portion of the net mask is set to all ones, and the host is set to
all zeros.

Why is subnetting used? - ANSWER It allows network administrators to break up a
single network address into smaller network addresses.

Which Internet protocol (IP) packet fragmentation header field specifies where the
fragment belongs in the original datagram? - ANSWER Fragment Offset.

Which is the Internet protocol (IP) header protocol number used to specify that the
packet's contents were created with transmission control protocol (TCP)? - ANSWER 6.

Which protocol allows a diskless workstation to contact a server and obtain an Internet
protocol (IP) address? - ANSWER Reverse address resolution protocol (RARP).

What provides user datagram protocol (UDP) with the ability to demultiplex data for an
application? - ANSWER A UDP destination port number.

Which user datagram protocol (UDP) port address do simple network management
protocol (SNMP) agents use to send and receive management requests? - ANSWER
161.

Which transmission control protocol (TCP) header control bit represents that the
message is initiating a connection? - ANSWER SYN.

Which of the following two ports are contained in the transmission control protocol
(TCP) header? - ANSWER Destination and source.

You know the logical address of an associate's computer on the company's local
network and you want to learn the media access control (MAC) address of your
associate's computer. Which of the following tools would you use? - ANSWER
Address resolution protocol (ARP).
$11.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
TopGradeGuru
1.5
(2)

Also available in package deal

Thumbnail
Package deal
NCTI 2-5 EXAM BUNDLE QUESTIONS AND ANSWERS VERIFIED 100% CORRECT
-
3 2025
$ 40.17 More info

Get to know the seller

Seller avatar
TopGradeGuru Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
10
Member since
1 year
Number of followers
0
Documents
2429
Last sold
1 month ago
GRADEHUB

We provide access to a wide range of professionally curated exams for students and educators. It offers high-quality, up-to-date assessment materials tailored to various subjects and academic levels. With instant downloads and affordable pricing, it's the go-to resource for exam preparation and academic success.

1.5

2 reviews

5
0
4
0
3
0
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions