NCTI 3-4

Ace your homework & exams now with Quizwiz!

What is the best description of the Internet protocol (IP) address prefix? It is the shorthand notation for the combined network and subnet mask. It is used to communicate directly with Layer 2 of the Open Systems Interconnection reference model (OSI/RM). It is similar to the prefixes in a telephone number. It is assigned by the Internet Corporation for Assigned Names and Numbers (ICANN).

It is the shorthand notation for the combined network and subnet mask.

The Open Systems Interconnection reference model (OSI/RM) Network Layer serves which primary purpose? It uses Layer 3 addresses to create multiple routed networks. It uses logical addresses to identify higher layer applications. It establishes, manages, and terminates sessions between applications. It builds frames that carry higher layer protocol data units (PDU) across network segments.

It uses Layer 3 addresses to create multiple routed networks.

Which one of the following protocols allows email clients to download their messages from an email server? Internet Mail Protocol (IMP). Post Office Protocol version 3 (POP3). Simple Mail Transfer Protocol (SMTP). Hypertext transfer protocol (HTTP).

Post Office Protocol version 3 (POP3).

The address 68.56.189.17 belongs to which Internet protocol (IP) class? Class B. Class D. Class A. Class C.

Class A.

Host names and uniform resource locators (URL) are resolved to Internet protocol (IP) addresses by which of the following applications? Dynamic Host Configuration Protocol (DHCP). Domain Name System (DNS). Hypertext Markup Language (HTML) protocol. Browsers.

Domain Name System (DNS).

All computers running on the transmission control protocol/Internet protocol (TCP/IP) suite have which of the following in common? Each octet of the Internet protocol (IP) address must contain at least one zero. All computers have the same Internet protocol (IP) address. Each computer has its own router assigned. Each computer is assigned its own Internet protocol (IP) address.

Each computer is assigned its own Internet protocol (IP) address.

Which represents the prefix bits for the subnet mask 255.255.0.0? /23. /16. /28. /11.

/16.

What type of delivery method uses an email server between the sender and the receiver of messages? Direct. Store-and-forward. Stateful. User Datagram Protocol (UDP).

Store-and-forward.

What happens when the browser application finishes downloading the files necessary to display a web page? The browser maintains a continuous connection with the server, while displaying the page's contents. The browser and server drop the connections, and the browser maintains the page and its elements in local memory. The browser and server drop all but the last connection, so the browser can quickly reload the page if needed. The server maintains the connection so the browser can quickly reload the page elements.

The browser and server drop the connections, and the browser maintains the page and its elements in local memory.

What happens to a datagram sent by a higher level protocol to a 127.x.y.z address? The datagram goes to all clients on the 127.x.y.z network. The datagram loops back inside the host and never leaves the network interface card (NIC). The datagram goes to all network hosts on the 127.x.y.z network. The datagram is used by network hosts for routing and termination instructions.

The datagram loops back inside the host and never leaves the network interface card (NIC).

What network information can be determined from a logical Internet protocol (IP) address? The broadcast portion and the local portion. The router portion and the switched portion. The network interface card (NIC) portion and the media access control (MAC) portion. The host portion and network portion.

The host portion and network portion.

A store-and-forward email system will not deliver messages until: No other messages are waiting to be delivered. The message receives the correct delivery priority. The host requests the information. The sender delivers a "send" message.

The host requests the information.

Which email protocol enables the messages to be viewed without first downloading them from the email server? Internet Message Access Protocol version 4 (IMAP4). Simple Mail Transfer Protocol (SMTP). Multipurpose Internet Mail Extensions (MIME). Post Office Protocol version 3 (POP3).

Internet Message Access Protocol version 4 (IMAP4).

Why is subnetting used? It simplifies Internet protocol (IP) address allocation throughout the network. It allows network administrators to use a single router in their network instead of multiple routers. It allows network administrators to break up a single network address into smaller network addresses. It multiplies the number of hosts on the network by 255.

It allows network administrators to break up a single network address into smaller network addresses.

Which device evaluates and acts upon a packet's Internet protocol (IP) address? Bridge. Repeater. Router. Switch.

Router

What is the binary equivalent of decimal 136? 11001100. 10010001. 10001001. 10001000.

10001000

Convert the Internet protocol (IP) address 172.68.10.2 from decimal to binary: 00011100.00010001.01000010.11001110. 10000000.01010101.10100000.00000010. 00101110.10110000.11111100.11111111. 10101100.01000100.00001010.00000010.

10101100.01000100.00001010.00000010.

Convert the binary Internet protocol (IP) address 01110011.11001000.00101100.00000010 to decimal: 13.45.36.128. 115.200.44.2. 192.168.200.2. 100.10.120.3.

115.200.44.2.

Which is the result of ANDing the Internet protocol (IP) address 23.176.224.18 with the subnet mask 255.224.0.0? 23.160.0.0. 23.176.0.0. 23.176.224.0. 25.224.0.0.

23.160.0.0

If we borrow 3 bits from a Class C network address, how many useable subnets have we created? 32. 30. 6. 8.

8

On the file transfer protocol (FTP) server, what manages client requests for file retrieval or transmission? A daemon. An attribute. A management information base (MIB). A network administrator protocol.

A daemon.

What type of server maintains an access log to assist with troubleshooting and tracking down malicious users? A hypertext transfer protocol (HTTP) server. A daemon server. A file transfer protocol (FTP) server. A browser server.

A file transfer protocol (FTP) server.

What isolates an Internet protocol (IP) address's network portion from its host portion? A subnet mask. A host mask. An Internet protocol (IP) mask. A network mask.

A network mask.

The Network Layer must do what to a received frame first, in order to determine the route over which it will forward the datagram to the next network? Verify the checksum. Change the Internet protocol (IP) address. Encapsulate the packet. Decapsulate the packet.

Decapsulate the packet.

Hypertext transfer protocol (HTTP) is what type of protocol? Stateless. Connection-oriented. Connectionless. Stateful.

Stateless

The physical address of a device is processed by which layer of the Open Systems Interconnection reference model (OSI/RM)? The Transport Layer. The Presentation Layer. The Data Link Layer. The Network Layer.

The Data Link Layer.

Which layer of the Open Systems Interconnection reference model (OSI/RM) would you suspect as being the problem when packets are arriving at the server but no information is being returned to the client? The Application Layer. The Physical Layer. The Network Layer. The Transport Layer.

The Transport Layer.

A repeater operates at which layer of the Open Systems Interconnection reference model (OSI/RM)? The Network Layer. The Application Layer. The Physical Layer. The Data Link Layer.

The Physical Layer.

In a net mask address, what identifies the network and host portions of the address? The network portion of the net mask is set to 255, and the host is set to 192. The network portion of the net mask is set to all ones, and the host is set to all zeros. The network portion of the net mask is set to all zeros, and the host is set to all ones. The network portion of the net mask is set to all zeros, and the host is set to 255.

The network portion of the net mask is set to all ones, and the host is set to all zeros.

What are the primary requirements to connect to a transmission control protocol/Internet protocol (TCP/IP) network? Unique pairs of Physical Layer and Data Link Layer addresses and use of the TCP/IP protocol suite. Unique pairs of Internet protocol (IP) addresses and use of the TCP/IP protocol suite. Unique pairs of Network Layer and Transport Layer addresses and use of the TCP/IP protocol suite. Unique pairs of media access control (MAC) addresses and use of the TCP/IP protocol suite.

Unique pairs of Network Layer and Transport Layer addresses and use of the TCP/IP protocol suite.


Related study sets

Nat. Geo Chap. 3: The 13 Colonies

View Set

Philosophy of Science Final Exam

View Set

ECON 330 Money & Banking: Test 2

View Set