ncti 3 to 4
What is the decimal equivalent of the binary number 1010?
10
What is the binary equivalent of the decimal number 129?
10000001
Convert the decimal IP address 206.190.36.45 to a binary IP address.
11001110.10111110.00100100.00101101
What is the binary equivalent of the decimal number 254?
11111110
What is the binary equivalent of the subnet mask 255.248.0.0?
11111111.11111000.00000000.00000000
How many total bits does a Class B subnet allow us to borrow from the host portion?
14
Convert the binary IP address 10101111.11001100.00010110.01010101 to a decimal IP address
175.204.22.85
Using the default Class C subnet mask, 255.255.255.0, which two addresses will be able to communicate on the same network segment? (Choose two.)
192.200.129.18, 192.200.129.179
Using the subnet mask 255.255.255.248, which two addresses are on the same subnet? (Choose two.)
194.212.56.18, 194.212.56.20
Using the subnet mask 255.255.255.240, which two addresses are on the same subnet? (Choose two.)
200.193.15.61, 200.193.15.61
You need to integrate these six class C networks 201.36.35.0/24, 201.36.72.0/24, 201.36.78.0/24, 201.36.79.0/24, 201.36.80.0/24, and 201.36.141.0/24. Which of these networks would be in the classless interdomain routing (CIDR) network range 201.36.72.0/21?
201.36.72.0/24201.36.78.0/24201.36.79.0/24
Using the subnet mask 255.255.255.192, which sets of host addresses will be able to communicate on the same network segment?
210.68.165.65 to 210.68.165.120
Your customer owns a full Class C address, 220.14.56.0. They currently operate a flat network using the default Class C subnet mask, 255.255.255.0, and use a single router to connect to the Internet. What should the subnet mask number be changed to in order to segment their network into six subnets to better control broadcast traffic?
255.255.255.224
Which broadcast IP address limits packets to the local network segment only?
255.255.255.255
If we borrow 12 bits from a Class B address, how many usable subnets have we created?
4,096
In a Class B network, if you borrowed 9 bits, how many usable subnets would you create?
512
If we borrow 3 bits from a Class C network address, how many usable subnets have we created?
8
What is the decimal value of the binary number 1000?
8
Which Simple Network Management Protocol (SNMP) management mode allows us to change a device's characteristics and operating parameters?
Active management.
Which three of the following are devices manageable with simple network management protocol (SNMP)? (Choose three.)
Applications, Bridges. Routers.
Which three of the following are Dynamic Host Configuration Protocol (DHCP) address allocation mechanisms? (Choose three.)
Auto, Dynamic, Manual
Which is another name for the decimal number system?
Base 10
How does the Domain Name System (DNS) resolve fully qualified domain names (FQDN) to IP addresses?
By looking up the names in an address mapping database.
In which two ways does a Simple Network Management Protocol (SNMP) agent respond to the management station? (Choose two.)
By responding to the management station's requests for updated data, By trapping information that exceeds a set threshold and forwarding the data to the management station
Your network Help desk calls and asks you to help troubleshoot an email problem. Several users have complained that when they send email messages with attachments, the recipients reply that the attachments are unreadable. The message body is legible, however. You know that your users encode all attachments using Multipurpose Internet Mail Extension (MIME). Which is the best solution to this problem?
Contact the recipients, and have them use MIME to decode attachments.
To resolve fully qualified domain names (FQDN) to binary IP addresses, resolvers contact which type of TCP/IP application server?
DNS
Simple mail transfer protocol (SMTP) is which type of message delivery system?
Direct delivery
If the number of hosts per subnet exceeds 255, how might you solve for the subnet incremental range?
Divide the number of hosts by 256.
Network News Transfer Protocol (NNTP) allows TCP/IP users to perform which of the following?
Download news articles.
Which two choices are examples of trivial file transfer protocol (TFTP) use? (Choose two.)
Download router upgrade, Software update to IP telephones
Which Dynamic Host Configuration Protocol (DHCP) network address allocation mechanism assigns a host a temporary IP address?
Dynamic
Which protocol allows clients to locate and download IP addressing and configuration information on an automatically renewable (lease) basis?
Dynamic Host Configuration Protocol (DHCP)
In a subnetted Class B network, in what state will the host bits be on each subnet's broadcast address?
Each subnet's host bits are set to all 1s.
With the subnet mask 255.255.255.128, how frequently will the Class B subnets increment, and in which octet?
Every 128 hosts; third and fourth octets.
Which TCP/IP application allows us to transfer files either within a browser or at the command line?
FTTP
If you want to locate a previously saved Uniform Resource Locator (URL) so that you can quickly return to it as needed, where on the browser toolbar would you look?
Favorites
Which best describes why an hypertext transfer protocol (HTTP) server can handle multiple simultaneous connections?
HTTP is stateless, which means the server has no knowledge of previous connections after they are dropped.
A remote monitoring 2 (RMON2) probe can capture a network segment's performance statistics based on which two of the following? (Choose two.)
IP address., Application.
You are a networking consultant for a major telecommunications firm. They ask you to help them resolve a hacked email problem. It seems that someone is intercepting emails between district offices and inserting pornographic pictures in place of legitimate email attachments. How might you resolve this problem for them?
Implement Secure Multipurpose Internet Mail Extension (S/MIME) encoding on all outbound email attachments.
How does a router determine where to send packets addressed to hosts on remote networks?
It looks in its routing table for an entry for the destination network.
How does secure Multipurpose Internet Mail Extension (S/MIME) protect email from forgery and interception?
It uses digital signatures and public-key encryption techniques.
Which three of the following are network management model components for Simple Network Management Protocol (SNMP)? (Choose three.)
Managed devices., Network management station (NMS)., Network management protocol.
Simple Network Management Protocol (SNMP) gathers network information from what type of database?
Management information base (MIB).
Which two of the following are Multpurpose Internet Mail Extension (MIME)-supported data types? (Choose two.)
Moving Picture Experts Group (MPEG)., Graphics interchange format (GIF).
Which TCP/IP protocol has us attach a remote device to the local file system by mounting it?
Network File System (NFS).
Which TCP/IP application distributes news articles read from a central database?
Network News Transfer Protocol (NNTP).
Which two protocols deliver email directly to the email client? (Choose two.)
POP, IMAP
When a management station polls a device agent process to collect information, the network management system is operating in which Simple Network Management Protocol (SNMP) network management mode?
Passive
Which three of the following are examples of Simple Network Management Protocol (SNMP) router management categories? (Choose three.)
Performance, Configuration, Security
Remote monitoring (RMON) uses which devices, placed on remote network segments, to gather network information?
Probes.
Of the five trivial file transfer protocol (TFTP) packet types, which three choices below are TFTP packet types? (Choose three.)
Read, Write, Acknowledgment
Why did the Internet Engineering Task Force (IETF) design classless interdomain routing (CIDR)?
Reduced network bandwidth utilization., Conservation of available addresses.
Which two TCP/IP protocols are used for network management? (Choose two.)
Remote monitoring (RMON), Simple Network Management Protocol (SNMP).
Which TCP/IP application allows users to display locally a remote UNIX host's screen?
Rlogin
Internet email uses which two protocols? (Choose two.)
SMTP POP3
Why does Simple Mail Transfer Protocol (SMTP) need additional protocols to carry non-text data as attachments?
SMTP only carries ASCII text characters.
Which two choices are TCP/IP email protocols? (Choose two.)
SMTP, IMAP
Which statement best describes Internet Message Access Protocol (IMAP)?
Scan email headers and chose message to dl
Given the subnet mask 255.255.254.0, and considering the trick you learned for identifying subnet masking patterns, in which octet will the subnet wire addresses increment?
Second
Which Simple Network Management Protocol (SNMP) sets object values on an agent with it's protocol data units (PDU)?
SetRequest
Which TCP/IP application allows a network user to remotely log on and manipulate a network device?
Telnet
Which remote monitoring (RMON) group records and stores sample statistics for each monitored interface?
The History Control Group.
Which Simple Network Management Protocol (SNMP) remote monitoring (RMON) extension prepares reports about a group of devices that head a measured parameter's statistical list?
The Host Top N Group.
What happens when the browser application finishes downloading the files necessary to display a web page?
The browser and server drop the connections, and the browser maintains the page and its elements in memory.
When subnetting Class B addresses, what is the first subnet's wire address equal to?
The default network wire address.
In a set of subnet address ranges, which is the first wire address in the first subnet?
The default network's wire address.
As a result of issuing the file transfer protocol (FTP) DIR command, each file listing entry begins with a "-"; what does the "-" indicate?
The entries are files
A subnet's broadcast address has which portion's bits set to all ones?
The host portion.
What results from trapping data with an Simple Network Management Protocol (SNMP) agent?
The managed device alerts the management station of a threshold violation.
When written in binary, the first part of a subnetted Class B network's wire address will show which bit pattern?
The network portion set as the default Class B network portion, the subnet portion to all 0s, and the host portion to all 0s.
Given the IP address 67.89.124.189 and the subnet mask 255.224.0.0, which is the subnetted octet, and how frequently will it increment?
The second octet, by 32.
In order for a host to communicate on a subnetted network segment, which two portions of its IP address must match those of the subnet address? (Choose two.)
The subnet portion, The network portion
If a Class B address's subnet mask is 255.255.255.192, in which octet does the subnet portion increment?
Third and fourth.
Which two of the following are reasons why an organization would choose to subnet their network? (Choose two.)
To build a more scalable network, To conserve network addresses
For what purpose would you choose to run the Telnet application?
To configure a router.
For what application is file transfer protocol (FTP) an excellent choice?
To download large files.
When might you use the rlogin TCP/IP application?
To remotely connect one UNIX workstation to another.
Which is the best reason to use the file transfer protocol (FTP) application?
When you need to pass large files over a slow connection
Which name resolution technique dynamically resolves Windows host names to IP addresses?
Windows Internet Naming Service (WINS).
If a Dynamic Host Configuration Protocol (DHCP) client fails to renew its lease at the 50-percent point, what happens next?
attempts lease at 87.5
Which is another name for the binary number system?
base 2
Which file transfer protocol (FTP) command allows you to change directories within a file listing?
cd
The file transfer protocol (FTP) server process can run as which two of the following? (Choose two.)
daemon, windows service
Which three of the following are common Telnet application uses? (Choose three.)
online data base, remotely run specific app, router network info
Which two of the following are examples of email programs? (Choose two.)
outlook, unix samba
A file transfer protocol (FTP) server administrator can control server access in which three ways? (Choose three.)
portions of drive visible, read and write, limit file access
Which Simple Network Management Protocol (SNMP) protocol data unit (PDU) notifies the management station of the occurrence of a significant event?
trap