ncti 3 to 4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the decimal equivalent of the binary number 1010?

10

What is the binary equivalent of the decimal number 129?

10000001

Convert the decimal IP address 206.190.36.45 to a binary IP address.

11001110.10111110.00100100.00101101

What is the binary equivalent of the decimal number 254?

11111110

What is the binary equivalent of the subnet mask 255.248.0.0?

11111111.11111000.00000000.00000000

How many total bits does a Class B subnet allow us to borrow from the host portion?

14

Convert the binary IP address 10101111.11001100.00010110.01010101 to a decimal IP address

175.204.22.85

Using the default Class C subnet mask, 255.255.255.0, which two addresses will be able to communicate on the same network segment? (Choose two.)

192.200.129.18, 192.200.129.179

Using the subnet mask 255.255.255.248, which two addresses are on the same subnet? (Choose two.)

194.212.56.18, 194.212.56.20

Using the subnet mask 255.255.255.240, which two addresses are on the same subnet? (Choose two.)

200.193.15.61, 200.193.15.61

You need to integrate these six class C networks 201.36.35.0/24, 201.36.72.0/24, 201.36.78.0/24, 201.36.79.0/24, 201.36.80.0/24, and 201.36.141.0/24. Which of these networks would be in the classless interdomain routing (CIDR) network range 201.36.72.0/21?

201.36.72.0/24201.36.78.0/24201.36.79.0/24

Using the subnet mask 255.255.255.192, which sets of host addresses will be able to communicate on the same network segment?

210.68.165.65 to 210.68.165.120

Your customer owns a full Class C address, 220.14.56.0. They currently operate a flat network using the default Class C subnet mask, 255.255.255.0, and use a single router to connect to the Internet. What should the subnet mask number be changed to in order to segment their network into six subnets to better control broadcast traffic?

255.255.255.224

Which broadcast IP address limits packets to the local network segment only?

255.255.255.255

If we borrow 12 bits from a Class B address, how many usable subnets have we created?

4,096

In a Class B network, if you borrowed 9 bits, how many usable subnets would you create?

512

If we borrow 3 bits from a Class C network address, how many usable subnets have we created?

8

What is the decimal value of the binary number 1000?

8

Which Simple Network Management Protocol (SNMP) management mode allows us to change a device's characteristics and operating parameters?

Active management.

Which three of the following are devices manageable with simple network management protocol (SNMP)? (Choose three.)

Applications, Bridges. Routers.

Which three of the following are Dynamic Host Configuration Protocol (DHCP) address allocation mechanisms? (Choose three.)

Auto, Dynamic, Manual

Which is another name for the decimal number system?

Base 10

How does the Domain Name System (DNS) resolve fully qualified domain names (FQDN) to IP addresses?

By looking up the names in an address mapping database.

In which two ways does a Simple Network Management Protocol (SNMP) agent respond to the management station? (Choose two.)

By responding to the management station's requests for updated data, By trapping information that exceeds a set threshold and forwarding the data to the management station

Your network Help desk calls and asks you to help troubleshoot an email problem. Several users have complained that when they send email messages with attachments, the recipients reply that the attachments are unreadable. The message body is legible, however. You know that your users encode all attachments using Multipurpose Internet Mail Extension (MIME). Which is the best solution to this problem?

Contact the recipients, and have them use MIME to decode attachments.

To resolve fully qualified domain names (FQDN) to binary IP addresses, resolvers contact which type of TCP/IP application server?

DNS

Simple mail transfer protocol (SMTP) is which type of message delivery system?

Direct delivery

If the number of hosts per subnet exceeds 255, how might you solve for the subnet incremental range?

Divide the number of hosts by 256.

Network News Transfer Protocol (NNTP) allows TCP/IP users to perform which of the following?

Download news articles.

Which two choices are examples of trivial file transfer protocol (TFTP) use? (Choose two.)

Download router upgrade, Software update to IP telephones

Which Dynamic Host Configuration Protocol (DHCP) network address allocation mechanism assigns a host a temporary IP address?

Dynamic

Which protocol allows clients to locate and download IP addressing and configuration information on an automatically renewable (lease) basis?

Dynamic Host Configuration Protocol (DHCP)

In a subnetted Class B network, in what state will the host bits be on each subnet's broadcast address?

Each subnet's host bits are set to all 1s.

With the subnet mask 255.255.255.128, how frequently will the Class B subnets increment, and in which octet?

Every 128 hosts; third and fourth octets.

Which TCP/IP application allows us to transfer files either within a browser or at the command line?

FTTP

If you want to locate a previously saved Uniform Resource Locator (URL) so that you can quickly return to it as needed, where on the browser toolbar would you look?

Favorites

Which best describes why an hypertext transfer protocol (HTTP) server can handle multiple simultaneous connections?

HTTP is stateless, which means the server has no knowledge of previous connections after they are dropped.

A remote monitoring 2 (RMON2) probe can capture a network segment's performance statistics based on which two of the following? (Choose two.)

IP address., Application.

You are a networking consultant for a major telecommunications firm. They ask you to help them resolve a hacked email problem. It seems that someone is intercepting emails between district offices and inserting pornographic pictures in place of legitimate email attachments. How might you resolve this problem for them?

Implement Secure Multipurpose Internet Mail Extension (S/MIME) encoding on all outbound email attachments.

How does a router determine where to send packets addressed to hosts on remote networks?

It looks in its routing table for an entry for the destination network.

How does secure Multipurpose Internet Mail Extension (S/MIME) protect email from forgery and interception?

It uses digital signatures and public-key encryption techniques.

Which three of the following are network management model components for Simple Network Management Protocol (SNMP)? (Choose three.)

Managed devices., Network management station (NMS)., Network management protocol.

Simple Network Management Protocol (SNMP) gathers network information from what type of database?

Management information base (MIB).

Which two of the following are Multpurpose Internet Mail Extension (MIME)-supported data types? (Choose two.)

Moving Picture Experts Group (MPEG)., Graphics interchange format (GIF).

Which TCP/IP protocol has us attach a remote device to the local file system by mounting it?

Network File System (NFS).

Which TCP/IP application distributes news articles read from a central database?

Network News Transfer Protocol (NNTP).

Which two protocols deliver email directly to the email client? (Choose two.)

POP, IMAP

When a management station polls a device agent process to collect information, the network management system is operating in which Simple Network Management Protocol (SNMP) network management mode?

Passive

Which three of the following are examples of Simple Network Management Protocol (SNMP) router management categories? (Choose three.)

Performance, Configuration, Security

Remote monitoring (RMON) uses which devices, placed on remote network segments, to gather network information?

Probes.

Of the five trivial file transfer protocol (TFTP) packet types, which three choices below are TFTP packet types? (Choose three.)

Read, Write, Acknowledgment

Why did the Internet Engineering Task Force (IETF) design classless interdomain routing (CIDR)?

Reduced network bandwidth utilization., Conservation of available addresses.

Which two TCP/IP protocols are used for network management? (Choose two.)

Remote monitoring (RMON), Simple Network Management Protocol (SNMP).

Which TCP/IP application allows users to display locally a remote UNIX host's screen?

Rlogin

Internet email uses which two protocols? (Choose two.)

SMTP POP3

Why does Simple Mail Transfer Protocol (SMTP) need additional protocols to carry non-text data as attachments?

SMTP only carries ASCII text characters.

Which two choices are TCP/IP email protocols? (Choose two.)

SMTP, IMAP

Which statement best describes Internet Message Access Protocol (IMAP)?

Scan email headers and chose message to dl

Given the subnet mask 255.255.254.0, and considering the trick you learned for identifying subnet masking patterns, in which octet will the subnet wire addresses increment?

Second

Which Simple Network Management Protocol (SNMP) sets object values on an agent with it's protocol data units (PDU)?

SetRequest

Which TCP/IP application allows a network user to remotely log on and manipulate a network device?

Telnet

Which remote monitoring (RMON) group records and stores sample statistics for each monitored interface?

The History Control Group.

Which Simple Network Management Protocol (SNMP) remote monitoring (RMON) extension prepares reports about a group of devices that head a measured parameter's statistical list?

The Host Top N Group.

What happens when the browser application finishes downloading the files necessary to display a web page?

The browser and server drop the connections, and the browser maintains the page and its elements in memory.

When subnetting Class B addresses, what is the first subnet's wire address equal to?

The default network wire address.

In a set of subnet address ranges, which is the first wire address in the first subnet?

The default network's wire address.

As a result of issuing the file transfer protocol (FTP) DIR command, each file listing entry begins with a "-"; what does the "-" indicate?

The entries are files

A subnet's broadcast address has which portion's bits set to all ones?

The host portion.

What results from trapping data with an Simple Network Management Protocol (SNMP) agent?

The managed device alerts the management station of a threshold violation.

When written in binary, the first part of a subnetted Class B network's wire address will show which bit pattern?

The network portion set as the default Class B network portion, the subnet portion to all 0s, and the host portion to all 0s.

Given the IP address 67.89.124.189 and the subnet mask 255.224.0.0, which is the subnetted octet, and how frequently will it increment?

The second octet, by 32.

In order for a host to communicate on a subnetted network segment, which two portions of its IP address must match those of the subnet address? (Choose two.)

The subnet portion, The network portion

If a Class B address's subnet mask is 255.255.255.192, in which octet does the subnet portion increment?

Third and fourth.

Which two of the following are reasons why an organization would choose to subnet their network? (Choose two.)

To build a more scalable network, To conserve network addresses

For what purpose would you choose to run the Telnet application?

To configure a router.

For what application is file transfer protocol (FTP) an excellent choice?

To download large files.

When might you use the rlogin TCP/IP application?

To remotely connect one UNIX workstation to another.

Which is the best reason to use the file transfer protocol (FTP) application?

When you need to pass large files over a slow connection

Which name resolution technique dynamically resolves Windows host names to IP addresses?

Windows Internet Naming Service (WINS).

If a Dynamic Host Configuration Protocol (DHCP) client fails to renew its lease at the 50-percent point, what happens next?

attempts lease at 87.5

Which is another name for the binary number system?

base 2

Which file transfer protocol (FTP) command allows you to change directories within a file listing?

cd

The file transfer protocol (FTP) server process can run as which two of the following? (Choose two.)

daemon, windows service

Which three of the following are common Telnet application uses? (Choose three.)

online data base, remotely run specific app, router network info

Which two of the following are examples of email programs? (Choose two.)

outlook, unix samba

A file transfer protocol (FTP) server administrator can control server access in which three ways? (Choose three.)

portions of drive visible, read and write, limit file access

Which Simple Network Management Protocol (SNMP) protocol data unit (PDU) notifies the management station of the occurrence of a significant event?

trap


संबंधित स्टडी सेट्स

marketing test 3 ch 20, AGR 130- CHAP. 9, Mktg TB: Chap 16, Chapter 16 - Practice Problems, MKT 230 Chapter 14, MKTG 351 CHAPTER 15, chpt 13, chapter 11marketing, MKTG CH 12 TRUE OR FALSE, Marketing Study Questions, ch 13, Chapter 11, Marketing 351 O...

View Set

Lecture quiz peripheral nervous system

View Set

ap biology cell structure practice

View Set

Other Federal and State Regulations

View Set