Field Tech Progression III - IV

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which two of the following are considered reserved IP addresses? (Choose two.)

0.x.y.z 127.x.y.z

Using the subnet mask 255.255.255.192, which sets of host addresses will be able to communicate on the same network segment?

210.68.165.65 to 210.68.165.120

Using the default Class C subnet mask, 255.255.255.0, which two addresses will be able to communicate on the same network segment? (Choose two.)

192.200.129.179 192.200.129.18

Using the subnet mask 255.255.255.248, which two addresses are on the same subnet? (Choose two.)

194.212.56.20 194.212.56.18

You need to integrate these six class C networks 201.36.35.0/24, 201.36.72.0/24, 201.36.78.0/24, 201.36.79.0/24, 201.36.80.0/24, and 201.36.141.0/24. Which of these networks would be in the classless interdomain routing (CIDR) network range 201.36.72.0/21?

201.36.72.0/24 201.36.78.0/24 201.36.79.0/24

A Class C network address provides for how many network and host bits?

24 network, 8 hosts

A Class C address provides for a maximum of how many usable hosts?

254

Which three of the following are devices manageable with simple network management protocol (SNMP)? (Choose three.)

Applications. Bridges. Routers.

Which three of the following are Dynamic Host Configuration Protocol (DHCP) address allocation mechanisms? (Choose three.)

Automatic Dynamic Manual

If the number of hosts per subnet exceeds 255, how might you solve for the subnet incremental range?

Divide the number of subnets by 256.

To resolve fully qualified domain names (FQDN) to binary IP addresses, resolvers contact which type of TCP/IP application server?

Domain Name System (DNS).

Network News Transfer Protocol (NNTP) allows TCP/IP users to perform which of the following?

Download news articles.

Which two choices are examples of trivial file transfer protocol (TFTP) use? (Choose two.)

Download router upgrades. Software upgrades to IP telephones.

Which Dynamic Host Configuration Protocol (DHCP) network address allocation mechanism assigns a host a temporary IP address?

Dynamic

Which protocol allows clients to locate and download IP addressing and configuration information on an automatically renewable (lease) basis?

Dynamic Host Configuration Protocol (DHCP).

In a subnetted Class B network, in what state will the host bits be on each subnet's broadcast address?

Each subnet's host bits are set to all 1s.

Which statement best describes Internet Message Access Protocol (IMAP)?

IMAP allows users to scan email headers and choose email messages to download from the email server.

A remote monitoring 2 (RMON2) probe can capture a network segment's performance statistics based on which two of the following? (Choose two.)

IP address. Application.

You are a networking consultant for a major telecommunications firm. They ask you to help them resolve a hacked email problem. It seems that someone is intercepting emails between district offices and inserting pornographic pictures in place of legitimate email attachments. How might you resolve this problem for them?

Implement Secure Multipurpose Internet Mail Extension (S/MIME) encoding on all outbound email attachments.

Which TCP/IP Internetwork Layer provides troubleshooting utilities, such as ping and traceroute?

Internet Control Message Protocol (ICMP).

Which three of the following are included in the TCP/IP Internetwork Layer? (Choose three.)

Internet Group Management Protocol (IGMP). Internet protocol (IP). Address resolution protocol (ARP).

Which two protocols deliver email directly to the email client? (Choose two.)

Internet Message Access Protocol version 4 (IMAP4). Post Office Protocol version 3 (POP3).

If a Dynamic Host Configuration Protocol (DHCP) client fails to renew its lease at the 50-percent point, what happens next?

It attempts to obtain a lease at 87.5-percent lease time.

The Open Systems Interconnection Reference Model (OSI/RM) Data Link Layer serves which primary purpose?

It builds a flat network model with unroutable physical addresses.

Which is the primary purpose of the Open Systems Interconnection reference model (OSI/RM) Presentation Layer?

It defines the format in which Application Layer information is sent across the network.

The Open Systems Interconnection reference model (OSI/RM) Physical Layer serves which primary purpose?

It transmits data in the form of bits across the physical medium.

The Open Systems Interconnection Reference Model (OSI/RM) Network Layer serves which primary purpose?

It uses Layer 3 (Network Layer) addresses to create multiple routed networks.

How does secure Multipurpose Internet Mail Extension (S/MIME) protect email from forgery and interception?

It uses digital signatures and public-key encryption techniques.

Which open systems interconnection (OSI) model layer do routers support?

Layer 3, the Network Layer.

The Open Systems Interconnection Reference Model (OSI/RM) Application Layer serves which primary purpose?

It defines well known logical port addresses for communications between applications.

A file transfer protocol (FTP) server administrator can control server access in which three ways? (Choose three.)

Make only portions of the drive visible Control read and write privileges Limit file access

Which three of the following are network management model components for Simple Network Management Protocol (SNMP)? (Choose three.)

Managed devices. Network management station (NMS). Network management protocol.

Simple Network Management Protocol (SNMP) gathers network information from what type of database?

Management information base (MIB).

Which two of the following are Multpurpose Internet Mail Extension (MIME)-supported data types? (Choose two.)

Moving Picture Experts Group (MPEG). Graphics interchange format (GIF).

A Class D address is also known as which type of address?

Multicast

Which of the following is the primary purpose of the Open Systems Interconnection Reference Model (OSI/RM) Transport Layer?

It defines well known logical port addresses for communications between applications.

Which is the primary purpose of the Open Systems Interconnection reference model (OSI/RM) Session Layer?

It establishes, manages, and terminates dialogs between Presentation Layer entities.

How does a router determine where to send packets addressed to hosts on remote networks?

It looks in its routing table for an entry for the destination network.

Which TCP/IP protocol has us attach a remote device to the local file system by mounting it?

Network File System (NFS).

Which TCP/IP Application Layer protocol allows companies to publicly post information over the Internet?

Network News Transfer Protocol (NNTP)

Which TCP/IP application distributes news articles read from a central database?

Network News Transfer Protocol (NNTP).

Which device provides the connection point between a workstation or personal computer (PC) and the network?

Network interface card (NIC).

Which network device requires a device driver in order to connect hosts to the network segment?

Network interface card (NIC).

When a management station polls a device agent process to collect information, the network management system is operating in which Simple Network Management Protocol (SNMP) network management mode?

Passive.

Which three of the following are examples of Simple Network Management Protocol (SNMP) router management categories? (Choose three.)

Performance Configuration Security

The TCP/IP model Network Interface Layer maps to which Open Systems Interconnection reference model (OSI/RM) layer(s)? (Choose all that apply.)

Physical Layer Data Link Layer

Remote monitoring (RMON) uses which devices, placed on remote network segments, to gather network information?

Probes.

Which statement best describes proxy address resolution protocol (ARP)?

Proxy ARP allows a router to answer an ARP request on behalf of a remote host.

A host on the local IP network segment has data to send to another host, located on another IP network. The source host needs to resolve the destination host's IP address to a media access control (MAC) address. Which protocol might the gateway router run in order to answer the local host's address resolution protocol (ARP) request?

Proxy ARP.

Which two of the following are examples of email programs? (Choose two.)

UNIX Sendmail Microsoft Outlook

Which TCP/IP Transport Layer protocol provides an end-to-end, transaction-oriented, best-effort, connectionless service?

User datagram protocol (UDP).

Which IP packet frame field ensures that the gateways handling a datagram agree on the datagram's format?

Version.

Which is the best reason to use the file transfer protocol (FTP) application?

When you need to pass large files over a slow connection

Which name resolution technique dynamically resolves Windows host names to IP addresses?

Windows Internet Naming Service (WINS).

Convert the binary IP address 10101111.11001100.00010110.01010101 to a decimal IP address. 22

175.204.22.85

At what maximum distance would you have to add a repeater to a 10Base2 network segment to prevent signal degradation?

185 m

Which is the valid Class C IP address range?

192.000.001.hhh-223.255.254.hhh

Which is the valid Class A IP address range available to network hosts?

1.hhh.hhh.hhh-126.hhh.hhh.hhh

What is the decimal equivalent of the binary number 1010?

10

Which are considered private Internet protocol (IP) addresses? (Choose three.)

10.0.0.0 172.31.255.255 192.168.0.0

What is the binary equivalent of the decimal number 129?

10000001

Convert the decimal IP address 206.190.36.45 to a binary IP address.

11001110.10111110.00100100.00101101

What is the binary equivalent of the decimal number 254?

11111110

What is the binary equivalent of the subnet mask 255.248.0.0?

11111111.11111000.00000000.00000000

Which is the valid Class B IP address range?

128.001.hhh.hhh-191.254.hhh.hhh

How many total bits does a Class B subnet allow us to borrow from the host portion?

14

Which is a valid Class B network address?

151.129.89.76

Your customer owns a full Class C address, 220.14.56.0. They currently operate a flat network using the default Class C subnet mask, 255.255.255.0, and use a single router to connect to the Internet. What should the subnet mask number be changed to in order to segment their network into six subnets to better control broadcast traffic?

255.255.255.224.

Which broadcast IP address limits packets to the local network segment only?

255.255.255.255

How many fragments will the transmitting device have to create to match the datagram to the segment's 512 maximum transfer unit (MTU) size, having a 1,500-byte datagram, and a 20-byte IP header?

4

In a Class B network, if you borrowed 9 bits, how many usable subnets would you create?

512

On an IP network, all hosts must be able to handle a packet size of at least how many bytes?

576

If we borrow 3 bits from a Class C network address, how many usable subnets have we created?

8

What is the decimal value of the binary number 1000?

8

Which three of the following are functions of the TCP/IP Internetwork Layer? (Choose three.)

A global addressing structure Packet fragmentation Service type requests

What does the class network number 127.x.y.z designate?

A loopback address

The TCP/IP model Application Layer maps to which three Open Systems Interconnection reference model (OSI/RM) layers? (Choose three.)

Application Layer. Session Layer. Presentation Layer.

Which Simple Network Management Protocol (SNMP) management mode allows us to change a device's characteristics and operating parameters?

Active management.

A hub that repeats and regenerates signals is called which type of hub?

Active.

Telnet is a protocol in which TCP/IP layer?

Application

Which is another name for the decimal number system?

Base 10

Which is another name for the binary number system?

Base 2

Which three devices forward broadcast traffic? (Choose three.)

Bridge Switch Repeater

Which three of the following networking devices break up collisions? (Choose three.)

Bridge Switch Router

Which network device allows us to connect dissimilar network topologies?

Bridge.

Address resolution protocol (ARP) requests are sent as which type of Ethernet frame?

Broadcast

Bridges and OSI/RM Layer 2 switches filter traffic in which way?

By building physical address to port mappings and making forwarding decisions based on these mappings.

How does a diskless workstation identify itself when requesting an IP address using reverse address resolution protocol (RARP)?

By its media access control (MAC) address.

How does the Domain Name System (DNS) resolve fully qualified domain names (FQDN) to IP addresses?

By looking up the names in an address mapping database.

In which two ways does a Simple Network Management Protocol (SNMP) agent respond to the management station? (Choose two.)

By responding to the management station's requests for updated data By trapping information that exceeds a set threshold and forwarding the data to the management station

Simple mail transfer protocol (SMTP) is which type of message delivery system?

Direct delivery

Which IP packet bits does open shortest path first (OSPF) use to provide Type of Service (ToS) routing?

Delay, throughput, reliability, and cost (D-T-R-C) bits.

Which file transfer protocol (FTP) command allows you to change directories within a file listing?

CD

Transmission control protocol (TCP) includes which three types of mechanisms to ensure reliable data transmission? (Choose three.)

Checksum Acknowledgements Sequence number

Which three of the following are common Telnet application uses? (Choose three.)

Connect to an online database Connect remotely to run a specific application Connect to a router for network information

Your network Help desk calls and asks you to help troubleshoot an email problem. Several users have complained that when they send email messages with attachments, the recipients reply that the attachments are unreadable. The message body is legible, however. You know that your users encode all attachments using Multipurpose Internet Mail Extension (MIME). Which is the best solution to this problem?

Contact the recipients, and have them use MIME to decode attachments.

The file transfer protocol (FTP) server process can run as which two of the following? (Choose two.)

Daemon Windows service

Internet protocol (IP) provides which three of the following services to transmission control protocol (TCP)? (Choose three.)

Datagram routing. Time-to-live (TTL). Differentiated Services Code Point (DSCP).

What must the Network Layer do to a received frame first in order to determine the route over which it will forward the datagram to the next network?

Decapsulate the packet.

With the subnet mask 255.255.255.128, how frequently will the Class B subnets increment, and in which octet?

Every 128 hosts; third and fourth octets.

If you want to locate a previously saved Uniform Resource Locator (URL) so that you can quickly return to it as needed, where on the browser toolbar would you look?

Favorites

Which TCP/IP application allows us to transfer files either within a browser or at the command line?

File transfer protocol (FTP).

Which best describes why an hypertext transfer protocol (HTTP) server can handle multiple simultaneous connections?

HTTP is stateless, which means the server has no knowledge of previous connections after they are dropped.

How does remote monitoring 2 (RMON2) differ from remote monitoring (RMON)?

RMON2 looks at Layer 3 traffic, while RMON only looks at Layers 1 and 2.

Of the five trivial file transfer protocol (TFTP) packet types, which three choices below are TFTP packet types? (Choose three.)

Read request Write request Acknowledgment

Which two of the following result from implementing classless interdomain routing (CIDR)? (Choose two.)

Reduced network bandwidth utilization. Conservation of available addresses.

Which two TCP/IP protocols are used for network management? (Choose two.)

Remote monitoring (RMON). Simple Network Management Protocol (SNMP).

Which IP protocol allows a diskless workstation to contact a server and obtain an IP address?

Reverse address resolution protocol (RARP).

Which TCP/IP application allows users to display locally a remote UNIX host's screen?

Rlogin

Which TCP/IP UNIX specific application would allow us to connect to a remote database over the network, but restrict database activity to the remote host?

Rlogin.

Which network device allows communication between separate IP networks?

Router.

Which network device can isolate broadcast traffic to the local network segment?

Router.

What happens when the browser application finishes downloading the files necessary to display a web page?

The browser and server drop the connections, and the browser maintains the page and its elements in memory.

Why does Simple Mail Transfer Protocol (SMTP) need additional protocols to carry non-text data as attachments?

SMTP only carries ASCII text characters.

Given the subnet mask 255.255.254.0, and considering the trick you learned for identifying subnet masking patterns, in which octet will the subnet wire addresses increment?

Second

Which Simple Network Management Protocol (SNMP) sets object values on an agent with it's protocol data units (PDU)?

SetRequest

Which two choices are TCP/IP email protocols? (Choose two.)

Simple Mail Transfer Protocol (SMTP). Internet Message Access Protocol (IMAP).

Internet email uses which two protocols? (Choose two.)

Simple Mail Transfer Protocol (SMTP). Post Office Protocol version 3 (POP3).

Hubs connect network hosts in which configuration?

Star

Which OSI/RM Data Link Layer 2 device creates multiple network segments, each offering the full network bandwidth?

Switch

Which TCP/IP application allows a network user to remotely log on and manipulate a network device?

Telnet.

Which remote monitoring (RMON) group records and stores sample statistics for each monitored interface?

The History Control Group.

Which Simple Network Management Protocol (SNMP) remote monitoring (RMON) extension prepares reports about a group of devices that head a measured parameter's statistical list?

The Host Top N Group.

Which best describes IP's use of the time-to-live (TTL) field?

The TTL specifies the time a datagram is allowed to remain on the network.

Which of the following best describes an email message's communication flow through the TCP/IP model layers?

The Transport Layer breaks the data stream into pieces, which it passes to the Internetwork Layer. The Internetwork Layer adds the source and destination Internet protocol (IP) addresses and forwards the packets to the Network Interface Layer. The Network Interface Layer builds frames, and converts them to bits for transport across the physical network.

When subnetting Class B addresses, what is the first subnet's wire address equal to?

The default network wire address.

In a set of subnet address ranges, which is the first wire address in the first subnet?

The default network's wire address.

When subnetting Class A addresses, which two of the following is the first subnet's wire address equal to? (Choose two.)

The default wire address. Netid.0.0.0.

As a result of issuing the file transfer protocol (FTP) DIR command, each file listing entry begins with a "-"; what does the "-" indicate?

The entries are files

What results from trapping data with an Simple Network Management Protocol (SNMP) agent?

The managed device alerts the management station of a threshold violation.

Which two statements are true concerning IP addressing? (Choose two.)

The network portion bits should not be all 0s. The host portion should not be all 1s.

When written in binary, the first part of a subnetted Class B network's wire address will show which bit pattern?

The network portion set as the default Class B network portion, the subnet portion to all 0s, and the host portion to all 0s.

The Internet Assigned Numbers Authority (IANA) recommends organizations use private IP addresses under which condition?

The network uses gateways, routers, or firewalls to act on the network host's behalf.

Given the IP address 67.89.124.189 and the subnet mask 255.224.0.0, which is the subnetted octet, and how frequently will it increment?

The second octet, by 32.

In order for a host to communicate on a subnetted network segment, which two portions of its IP address must match those of the subnet address? (Choose two.)

The subnet portion The network portion

What happens to a datagram marked as "do not fragment" if it must be transmitted across a network segment with a maximum transmission unit field (MTU) smaller than the datagram?

The transmitting network device will drop the datagram, and notify the source.

In which three ways do organizations benefit from using private IP addresses? (Choose three.)

They gain more network design flexibility with a large address range. They prevent Internet address clashes when obtaining only a small range of Internet Corporation for Assigned Names and Numbers (ICANN) assigned addresses. They conserve public IP addresses when uniqueness is not required.

If a Class B address's subnet mask is 255.255.254.0, in which octet does our subnet portion increment?

Third

If a Class B address's subnet mask is 255.255.255.192, in which octet does the subnet portion increment?

Third and fourth.

Which two of the following are reasons why an organization would choose to subnet their network? (Choose two.)

To build a more scalable network To conserve network addresses

For what purpose would you choose to run the Telnet application?

To configure a router.

For what application is file transfer protocol (FTP) an excellent choice?

To download large files.

Why did the Internet Engineering Task Force (IETF) design classless interdomain routing (CIDR)?

To reduce routing table entries.

When might you use the rlogin TCP/IP application?

To remotely connect one UNIX workstation to another.

Which Simple Network Management Protocol (SNMP) protocol data unit (PDU) notifies the management station of the occurrence of a significant event?

Trap

Which is a valid email address?

[email protected]


संबंधित स्टडी सेट्स

ATI PHARM Made Easy 4.0: Reproductive and Genitourinary Systems

View Set

The Art of Public Speaking CH. 18

View Set

Developmental Psychopathology Final

View Set

Chapter 5 Accounting: Purchasing Inventory

View Set

GCSE biology animal and plant cells

View Set

Ch 4 Understanding Change in Aging Research

View Set