(NCTI) Progression: Field Tech III - IV
Conventional
The Open Systems Interconnection reference model (OSI/RM) Network Layer
serves which primary purpose? Correct Ans - It uses Layer 3
addresses to create multiple routed networks.
The address 68.56.189.17 belongs to which Internet protocol (IP) class?
Correct Ans - Class A
What happens to a datagram sent by a higher level protocol to a 127.x.y.z
address? Correct Ans - The datagram loops back inside the host and
never leaves the network interface card (NIC).
Which device evaluates and acts upon a packet's Internet protocol (IP)
address? Correct Ans - Router.
The Network Layer must do what to a received frame first, in order to
determine the route over which it will forward the datagram to the next
network? Correct Ans - Decapsulate the packet.
What network information can be determined from a logical Internet protocol
(IP) address? Correct Ans - The host portion and network portion.
The physical address of a device is processed by which layer of the Open
Systems Interconnection reference model (OSI/RM)? Correct Ans -
The Physical Layer.
Which layer of the Open Systems Interconnection reference model (OSI/RM)
would you suspect as being the problem when packets are arriving at the
server but no information is being returned to the client? Correct Ans -
The Data Link Layer.
All computers running on the transmission control protocol/Internet protocol
(TCP/IP) suite have which of the following in common? Correct Ans -
Each computer is assigned its own Internet protocol (IP) address.
,A repeater operates at which layer of the Open Systems Interconnection
reference model (OSI/RM)? Correct Ans - The Transport Layer.
Which Dynamic Host Configuration Protocol (DHCP) network address
allocation mechanism assigns a host a temporary IP address? Correct Ans
- Dynamic
Which two choices are examples of trivial file transfer protocol (TFTP) use?
(Choose two.) Correct Ans - Download router upgrades. And
Software upgrades to IP telephones.
How does the Domain Name System (DNS) resolve fully qualified domain
names (FQDN) to IP addresses? Correct Ans - By looking up the names
in an address mapping database.
Which TCP/IP application allows us to transfer files either within a browser
or at the command line? Correct Ans - File transfer protocol (FTP).
Which statement best describes Internet Message Access Protocol (IMAP)?
Correct Ans - IMAP allows users to scan email headers and choose email
messages to download from the email server.
To resolve fully qualified domain names (FQDN) to binary IP addresses,
resolvers contact which type of TCP/IP application server? Correct Ans -
Domain Name System (DNS).
Which protocol allows clients to locate and download IP addressing and
configuration information on an automatically renewable (lease) basis?
Correct Ans - Dynamic Host Configuration Protocol (DHCP).
Which TCP/IP application allows a network user to remotely log on and
manipulate a network device? Correct Ans - Telnet.
Which three of the following are Dynamic Host Configuration Protocol (DHCP)
address allocation mechanisms? (Choose three.) Correct Ans -
Automatic, Dynamic, Manual
,Internet email uses which two protocols? (Choose two.) Correct Ans -
Simple Mail Transfer Protocol (SMTP). And Post Office Protocol version 3
(POP3).
If a Dynamic Host Configuration Protocol (DHCP) client fails to renew its lease
at the 50-percent point, what happens next? Correct Ans - It attempts
to obtain a lease at 87.5-percent lease time.
Of the five trivial file transfer protocol (TFTP) packet types, which three
choices below are TFTP packet types? (Choose three.) Correct Ans -
Read request, Write request, Acknowledgement
If you want to locate a previously saved Uniform Resource Locator (URL) so
that you can quickly return to it as needed, where on the browser toolbar
would you look? Correct Ans - Favorites
What happens when the browser application finishes downloading the files
necessary to display a web page? Correct Ans - The browser and
server drop the connections, and the browser maintains the page and its
elements in memory.
Which best describes why an hypertext transfer protocol (HTTP) server can
handle multiple simultaneous connections? Correct Ans - HTTP is
stateless, which means the server has no knowledge of previous connections
after they are dropped.
For what purpose would you choose to run the Telnet application?
Correct Ans - To configure a router
Which three of the following are common Telnet application uses? (Choose
three.) Correct Ans - Connect to an online database, Connect remotely
to run a specific application, Connect to a router for network information
Which file transfer protocol (FTP) command allows you to change directories
within a file listing? Correct Ans - CD
For what application is file transfer protocol (FTP) an excellent choice?
Correct Ans - To download large files.
, A file transfer protocol (FTP) server administrator can control server access
in which three ways? (Choose three.) Correct Ans - Make only portions
of the drive visible, Control read and write privileges, Limit file access
Which is the best reason to use the file transfer protocol (FTP) application?
Correct Ans - When you need to pass large files over a slow connection
The file transfer protocol (FTP) server process can run as which two of the
following? (Choose two.) Correct Ans - Daemon, Windows service
As a result of issuing the file transfer protocol (FTP) DIR command, each file
listing entry begins with a "-"; what does the "-" indicate? Correct Ans -
The entries are files
Which two choices are TCP/IP email protocols? (Choose two.) Correct Ans
- Simple Mail Transfer Protocol (SMTP). , Internet Message Access Protocol
(IMAP).
Which two protocols deliver email directly to the email client? (Choose two.)
Correct Ans - Post Office Protocol version 3 (POP3).
Internet Message Access Protocol version 4 (IMAP4).
Why does Simple Mail Transfer Protocol (SMTP) need additional protocols to
carry non-text data as attachments? Correct Ans - SMTP only carries
ASCII text characters.
Which two of the following are Multpurpose Internet Mail Extension (MIME)-
supported data types? (Choose two.) Correct Ans - Moving Picture
Experts Group (MPEG). , Graphics interchange format (GIF).
How does secure Multipurpose Internet Mail Extension (S/MIME) protect
email from forgery and interception? Correct Ans - It uses digital
signatures and public-key encryption techniques.
Your network Help desk calls and asks you to help troubleshoot an email
problem. Several users have complained that when they send email messages
with attachments, the recipients reply that the attachments are unreadable.
The message body is legible, however. You know that your users encode all
attachments using Multipurpose Internet Mail Extension (MIME). Which is the
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Studyhall. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €19,46. Je zit daarna nergens aan vast.