NCTI 3-4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The file transfer protocol (FTP) server process can run as which two of the following?

Daemon Windows Service

What must the Network Layer do to a received frame first in order to determine the route over which it will forward the datagram to the next network?

Decapsulate the packet.

Simple mail transfer protocol (SMTP) is which type of message delivery system?

Direct Delivery

To resolve fully qualified domain names (FQDN) to binary IP addresses, resolvers contact which type of TCP/IP application server?

Domain Name System (DNS)

Network News Transfer Protocol (NNTP) allows TCP/IP users to perform which of the following?

Download news articles.

Which two choices are examples of trivial file transfer protocol (TFTP) use?

Download router upgrades. Software upgrades to IP telephones.

Which Dynamic Host Configuration Protocol (DHCP) network address allocation mechanism assigns a host a temporary IP address?

Dynamic

Which protocol allows clients to locate and download IP addressing and configuration information on an automatically renewable (lease) basis?

Dynamic Host Configuration Protocol (DHCP)

If you want to locate a previously saved Uniform Resource Locator (URL) so that you can quickly return to it as needed, where on the browser toolbar would you look?

Favorites

Which TCP/IP application allows us to transfer files either within a browser or at the command line?

File Transfer Protocol (FTP)

Which best describes why an hypertext transfer protocol (HTTP) server can handle multiple simultaneous connections?

HTTP is stateless, which means the server has no knowledge of previous connections after they are dropped.

Which statement best describes Internet Message Access Protocol (IMAP)?

IMAP allows users to scan email headers and choose email messages to download from the email server.

A remote monitoring 2 (RMON2) probe can capture a network segment's performance statistics based on which two of the following?

IP Address Application

You are a networking consultant for a major telecommunications firm. They ask you to help them resolve a hacked email problem. It seems that someone is intercepting emails between district offices and inserting pornographic pictures in place of legitimate email attachments. How might you resolve this problem for them?

Implement Secure Multipurpose Internet Mail Extension (S/MIME) encoding on all outbound email attachments.

Which TCP/IP Internetwork Layer provides troubleshooting utilities, such as ping and traceroute?

Internet Control Message Protocol (ICMP).

Which three of the following are included in the TCP/IP Internetwork Layer?

Internet Group Management Protocol (IGMP). Internet protocol (IP). Address resolution protocol (ARP).

If a Dynamic Host Configuration Protocol (DHCP) client fails to renew its lease at the 50-percent point, what happens next?

It attempts to obtain a lease at 87.5-percent lease time.

The Open Systems Interconnection Reference Model (OSI/RM) Data Link Layer serves which primary purpose?

It builds a flat network model with unroutable physical addresses.

Which is the primary purpose of the Open Systems Interconnection reference model (OSI/RM) Presentation Layer?

It defines the format in which Application Layer information is sent across the network.

Which of the following is the primary purpose of the Open Systems Interconnection Reference Model (OSI/RM) Transport Layer?

It defines well known logical port addresses for communications between applications.

Which is the primary purpose of the Open Systems Interconnection reference model (OSI/RM) Session Layer?

It establishes, manages, and terminates dialogs between Presentation Layer entities.

The Open Systems Interconnection Reference Model (OSI/RM) Application Layer serves which primary purpose?

It provides the user interface to the system.

The Open Systems Interconnection reference model (OSI/RM) Physical Layer serves which primary purpose?

It transmits data in the form of bits across the physical medium.

The Open Systems Interconnection Reference Model (OSI/RM) Network Layer serves which primary purpose?

It uses Layer 3 (Network Layer) addresses to create multiple routed networks.

How does secure Multipurpose Internet Mail Extension (S/MIME) protect email from forgery and interception?

It uses digital signatures and public-key encryption techniques.

Which open systems interconnection (OSI) model layer do routers support?

Layer 3 - the Network Layer

A file transfer protocol (FTP) server administrator can control server access in which three ways?

Make only portions of the drive visible Control read and write privileges Limit file access

Which three of the following are network management model components for Simple Network Management Protocol (SNMP)?

Managed devices Network management station (NMS) Network management protocol

Simple Network Management Protocol (SNMP) gathers network information from what type of database?

Management Information Base (MIB)

Which two of the following are examples of email programs?

Microsoft Outlook UNIX Sendmail

Which two of the following are Multpurpose Internet Mail Extension (MIME)-supported data types?

Moving Picture Experts Group (MPEG) Graphics interchange format (GIF

A Class D address is also known as which type of address?

Multicast

Which TCP/IP protocol has us attach a remote device to the local file system by mounting it?

Network File System (NFS)

Which device provides the connection point between a workstation or personal computer (PC) and the network?

Network Interface Card (NIC)

Which network device requires a device driver in order to connect hosts to the network segment?

Network Interface Card (NIC)

Which TCP/IP Application Layer protocol allows companies to publicly post information over the Internet?

Network News Transfer Protocol (NNTP)

Which TCP/IP application distributes news articles read from a central database?

Network News Transfer Protocol (NNTP)

When a management station polls a device agent process to collect information, the network management system is operating in which Simple Network Management Protocol (SNMP) network management mode?

Passive

Which three of the following are examples of Simple Network Management Protocol (SNMP) router management categories?

Performance Configuration Security

The TCP/IP model Network Interface Layer maps to which Open Systems Interconnection reference model (OSI/RM) layer(s)?

Physical and Data Link Layers

Which two protocols deliver email directly to the email client?

Post Office Protocol version 3 (POP3) Internet Message Access Protocol version 4 (IMAP4)

Remote monitoring (RMON) uses which devices, placed on remote network segments, to gather network information?

Probes

How does remote monitoring 2 (RMON2) differ from remote monitoring (RMON)?

RMON2 looks at Layer 3 traffic, while RMON only looks at Layers 1 and 2.

Of the five trivial file transfer protocol (TFTP) packet types, which three choices below are TFTP packet types?

Read request Write request Acknowledgment

Which two TCP/IP protocols are used for network management?

Remote monitoring (RMON) Simple Network Management Protocol (SNMP)

Which TCP/IP UNIX specific application would allow us to connect to a remote database over the network, but restrict database activity to the remote host?

Rlogin

Which TCP/IP application allows users to display locally a remote UNIX host's screen?

Rlogin

Which network device allows communication between separate IP networks?

Router

Which network device can isolate broadcast traffic to the local network segment?

Router

Which three of the following networking devices break up collisions?

Router Switch Bridge

Why does Simple Mail Transfer Protocol (SMTP) need additional protocols to carry non-text data as attachments?

SMTP only carries ASCII text characters.

Which Simple Network Management Protocol (SNMP) sets object values on an agent with it's protocol data units (PDU)?

SetRequest

Which two choices are TCP/IP email protocols?

Simple Mail Transfer Protocol (SMTP) Internet Message Access Protocol (IMAP).

Internet email uses which two protocols?

Simple Mail Transfer Protocol (SMTP) Post Office Protocol version 3 (POP3).

Hubs connect network hosts in which configuration?

Star

Which OSI/RM Data Link Layer 2 device creates multiple network segments, each offering the full network bandwidth?

Switch

Which three devices forward broadcast traffic?

Switch Bridge Repeater

Which TCP/IP application allows a network user to remotely log on and manipulate a network device?

Telnet

Which remote monitoring (RMON) group records and stores sample statistics for each monitored interface?

The History Control Group.

Which Simple Network Management Protocol (SNMP) remote monitoring (RMON) extension prepares reports about a group of devices that head a measured parameter's statistical list?

The Host Top N Group

Which of the following best describes an email message's communication flow through the TCP/IP model layers?

The Transport Layer breaks the data stream into pieces, which it passes to the Internetwork Layer. The Internetwork Layer adds the source and destination Internet protocol (IP) addresses and forwards the packets to the Network Interface Layer. The Network Interface Layer builds frames, and converts them to bits for transport across the physical network.

What happens when the browser application finishes downloading the files necessary to display a web page?

The browser and server drop the connections, and the browser maintains the page and its elements in memory.

As a result of issuing the file transfer protocol (FTP) DIR command, each file listing entry begins with a "-"; what does the "-" indicate?

The entries are files

Which two statements are true concerning IP addressing?

The host portion should not be all 1s. The network portion bits should not be all 0s.

What results from trapping data with an Simple Network Management Protocol (SNMP) agent?

The managed device alerts the management station of a threshold violation.

The Internet Assigned Numbers Authority (IANA) recommends organizations use private IP addresses under which condition?

The network uses gateways, routers, or firewalls to act on the network host's behalf.

In which three ways do organizations benefit from using private IP addresses?

They gain more network design flexibility with a large address range. They prevent Internet address clashes when obtaining only a small range of Internet Corporation for Assigned Names and Numbers (ICANN) assigned addresses. They conserve public IP addresses when uniqueness is not required.

For what purpose would you choose to run the Telnet application?

To configure a router

For what application is file transfer protocol (FTP) an excellent choice?

To download large files.

When might you use the rlogin TCP/IP application?

To remotely connect one UNIX workstation to another.

Which Simple Network Management Protocol (SNMP) protocol data unit (PDU) notifies the management station of the occurrence of a significant event?

Trap

Which TCP/IP Transport Layer protocol provides an end-to-end, transaction-oriented, best-effort, connectionless service?

User datagram protocol (UDP).

Which is the best reason to use the file transfer protocol (FTP) application?

When you need to pass large files over a slow connection

Which name resolution technique dynamically resolves Windows host names to IP addresses?

Windows Internet Naming Service (WINS).

Which is a valid email address?

[email protected]

Which two of the following are considered reserved IP addresses?

0.x.y.z and 127.x.y.z

Which is the valid Class A IP address range available to network hosts?

1.hhh.hhh.hhh-126.hhh.hhh.hhh

Which are considered private Internet protocol (IP) addresses?

10.0.0.0 172.31.255.255 192.168.0.0

Which is the valid Class B IP address range?

128.001.hhh.hhh-191.254.hhh.hhh

Which is a valid Class B network address?

151.129.89.76

At what maximum distance would you have to add a repeater to a 10Base2 network segment to prevent signal degradation?

185 m

Which is the valid Class C IP address range?

192.000.001.hhh-223.255.254.hhh

A Class C network address provides for how many network and host bits?

24 network, 8 hosts

A Class C address provides for a maximum of how many usable hosts?

254

Which three of the following are functions of the TCP/IP Internetwork Layer?

A global addressing structure Packet fragmentation Service type request

What does the class network number 127.x.y.z designate?

A loopback address

A hub that repeats and regenerates signals is called which type of hub?

Active

Which Simple Network Management Protocol (SNMP) management mode allows us to change a device's characteristics and operating parameters?

Active management

Telnet is a protocol in which TCP/IP layer?

Application Layer

The TCP/IP model Application Layer maps to which three Open Systems Interconnection reference model (OSI/RM) layers?

Application Layer. Session Layer. Presentation Layer.

Which three of the following are devices manageable with simple network management protocol (SNMP)?

Applications. Bridges. Routers.

Which three of the following are Dynamic Host Configuration Protocol (DHCP) address allocation mechanisms?

Automatic Dynamic Manual

Which network device allows us to connect dissimilar network topologies?

Bridge

Bridges and OSI/RM Layer 2 switches filter traffic in which way?

By building physical address to port mappings and making forwarding decisions based on these mappings.

How does the Domain Name System (DNS) resolve fully qualified domain names (FQDN) to IP addresses?

By looking up the names in an address mapping database.

In which two ways does a Simple Network Management Protocol (SNMP) agent respond to the management station?

By responding to the management station's requests for updated data By trapping information that exceeds a set threshold and forwarding the data to the management station

Which file transfer protocol (FTP) command allows you to change directories within a file listing?

CD

Transmission control protocol (TCP) includes which three types of mechanisms to ensure reliable data transmission?

Checksum Acknowledgements Sequence number

Which three of the following are common Telnet application uses?

Connect to an online database Connect remotely to run a specific application Connect to a router for network information

Your network Help desk calls and asks you to help troubleshoot an email problem. Several users have complained that when they send email messages with attachments, the recipients reply that the attachments are unreadable. The message body is legible, however. You know that your users encode all attachments using Multipurpose Internet Mail Extension (MIME). Which is the best solution to this problem?

Contact the recipients, and have them use MIME to decode attachments.


संबंधित स्टडी सेट्स

Ciccarelli Psychology, Chapter 6 Study Plan

View Set

8.1.2 Quiz: What is Personal Property

View Set

Health, Wellness, and Illness - Functional Ability - Concept (HESI)

View Set

ТАБЛИЦА СЛОВООБРАЗОВАНИЯ (F)

View Set

career exploration and research quiz

View Set

health Chapt 4 Common Reproductive Issues (NCLEX QUESTION)

View Set