100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
NCTI FINAL EXAM Progression: Field Tech III - IV Conventional Study Questions and Answers Graded A €16,50   In winkelwagen

Tentamen (uitwerkingen)

NCTI FINAL EXAM Progression: Field Tech III - IV Conventional Study Questions and Answers Graded A

 1 keer bekeken  0 keer verkocht

NCTI FINAL EXAM Progression: Field Tech III - IV Conventional Study Questions and Answers Graded A

Voorbeeld 4 van de 42  pagina's

  • 12 september 2023
  • 42
  • 2023/2024
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
Alle documenten voor dit vak (428)
avatar-seller
atiexpert
1




The Open Systems Interconnection reference model (OSI/RM) Network Layer serves
which primary purpose? - It uses Layer 3 addresses to create multiple routed networks.

The address 68.56.189.17 belongs to which Internet protocol (IP) class? - Class A

What happens to a datagram sent by a higher level protocol to a 127.x.y.z address? -
The datagram loops back inside the host and never leaves the network interface card
(NIC).

Which device evaluates and acts upon a packet's Internet protocol (IP) address? -
Router.

The Network Layer must do what to a received frame first, in order to determine the
route over which it will forward the datagram to the next network? - Decapsulate the
packet.

What network information can be determined from a logical Internet protocol (IP)
address? - The host portion and network portion.

The physical address of a device is processed by which layer of the Open Systems
Interconnection reference model (OSI/RM)? - The Physical Layer.

Which layer of the Open Systems Interconnection reference model (OSI/RM) would you
suspect as being the problem when packets are arriving at the server but no information
is being returned to the client? - The Data Link Layer.

All computers running on the transmission control protocol/Internet protocol (TCP/IP)
suite have which of the following in common? - Each computer is assigned its own
Internet protocol (IP) address.

A repeater operates at which layer of the Open Systems Interconnection reference
model (OSI/RM)? - The Transport Layer.

, 2


Which Dynamic Host Configuration Protocol (DHCP) network address allocation
mechanism assigns a host a temporary IP address? - Dynamic

Which two choices are examples of trivial file transfer protocol (TFTP) use? (Choose
two.) - Download router upgrades. And
Software upgrades to IP telephones.

How does the Domain Name System (DNS) resolve fully qualified domain names
(FQDN) to IP addresses? - By looking up the names in an address mapping database.

Which TCP/IP application allows us to transfer files either within a browser or at the
command line? - File transfer protocol (FTP).

Which statement best describes Internet Message Access Protocol (IMAP)? - IMAP
allows users to scan email headers and choose email messages to download from the
email server.

To resolve fully qualified domain names (FQDN) to binary IP addresses, resolvers
contact which type of TCP/IP application server? - Domain Name System (DNS).

Which protocol allows clients to locate and download IP addressing and configuration
information on an automatically renewable (lease) basis? - Dynamic Host Configuration
Protocol (DHCP).

Which TCP/IP application allows a network user to remotely log on and manipulate a
network device? - Telnet.

Which three of the following are Dynamic Host Configuration Protocol (DHCP) address
allocation mechanisms? (Choose three.) - Automatic, Dynamic, Manual

Internet email uses which two protocols? (Choose two.) - Simple Mail Transfer Protocol
(SMTP). And Post Office Protocol version 3 (POP3).

If a Dynamic Host Configuration Protocol (DHCP) client fails to renew its lease at the
50-percent point, what happens next? - It attempts to obtain a lease at 87.5-percent
lease time.

Of the five trivial file transfer protocol (TFTP) packet types, which three choices below
are TFTP packet types? (Choose three.) - Read request, Write request,
Acknowledgement

If you want to locate a previously saved Uniform Resource Locator (URL) so that you
can quickly return to it as needed, where on the browser toolbar would you look? -
Favorites

, 3


What happens when the browser application finishes downloading the files necessary to
display a web page? - The browser and server drop the connections, and the browser
maintains the page and its elements in memory.

Which best describes why an hypertext transfer protocol (HTTP) server can handle
multiple simultaneous connections? - HTTP is stateless, which means the server has no
knowledge of previous connections after they are dropped.

For what purpose would you choose to run the Telnet application? - To configure a
router

Which three of the following are common Telnet application uses? (Choose three.) -
Connect to an online database, Connect remotely to run a specific application, Connect
to a router for network information

Which file transfer protocol (FTP) command allows you to change directories within a
file listing? - CD

For what application is file transfer protocol (FTP) an excellent choice? - To download
large files.

A file transfer protocol (FTP) server administrator can control server access in which
three ways? (Choose three.) - Make only portions of the drive visible, Control read and
write privileges, Limit file access

Which is the best reason to use the file transfer protocol (FTP) application? - When you
need to pass large files over a slow connection

The file transfer protocol (FTP) server process can run as which two of the following?
(Choose two.) - Daemon, Windows service

As a result of issuing the file transfer protocol (FTP) DIR command, each file listing
entry begins with a "-"; what does the "-" indicate? - The entries are files

Which two choices are TCP/IP email protocols? (Choose two.) - Simple Mail Transfer
Protocol (SMTP). , Internet Message Access Protocol (IMAP).

Which two protocols deliver email directly to the email client? (Choose two.) - Post
Office Protocol version 3 (POP3).
Internet Message Access Protocol version 4 (IMAP4).

Why does Simple Mail Transfer Protocol (SMTP) need additional protocols to carry non-
text data as attachments? - SMTP only carries ASCII text characters.

, 4


Which two of the following are Multpurpose Internet Mail Extension (MIME)-supported
data types? (Choose two.) - Moving Picture Experts Group (MPEG). , Graphics
interchange format (GIF).

How does secure Multipurpose Internet Mail Extension (S/MIME) protect email from
forgery and interception? - It uses digital signatures and public-key encryption
techniques.

Your network Help desk calls and asks you to help troubleshoot an email problem.
Several users have complained that when they send email messages with attachments,
the recipients reply that the attachments are unreadable. The message body is legible,
however. You know that your users encode all attachments using Multipurpose Internet
Mail Extension (MIME). Which is the best solution to this problem? - Contact the
recipients, and have them use MIME to decode attachments.

Which is a valid email address? - kdr@ncti.com

You are a networking consultant for a major telecommunications firm. They ask you to
help them resolve a hacked email problem. It seems that someone is intercepting
emails between district offices and inserting pornographic pictures in place of legitimate
email attachments. How might you resolve this problem for them? - Implement Secure
Multipurpose Internet Mail Extension (S/MIME) encoding on all outbound email
attachments.

Which two of the following are examples of email programs? (Choose two.) - Microsoft
Outlook and UNIX Sendmail

Simple mail transfer protocol (SMTP) is which type of message delivery system? -
Direct delivery

Remote monitoring (RMON) uses which devices, placed on remote network segments,
to gather network information? - Probes.

In which two ways does a Simple Network Management Protocol (SNMP) agent
respond to the management station? (Choose two.) - By responding to the management
station's requests for updated data
By trapping information that exceeds a set threshold and forwarding the data to the
management station

Which two TCP/IP protocols are used for network management? (Choose two.) -
Remote monitoring (RMON).
Simple Network Management Protocol (SNMP).

What results from trapping data with an Simple Network Management Protocol (SNMP)
agent? - The managed device alerts the management station of a threshold violation.

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper atiexpert. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €16,50. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 67096 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€16,50
  • (0)
  Kopen