Computer Science > EXAM > NCTI 2020 Progression: Field Tech III - IV Final Exam | Q & A (Complete Solutions) (All)
NCTI 2020 Progression: Field Tech III - IV Final Exam | Q & A (Complete Solutions) The open system interconnection reference model (OSI/R<) Network layer serves which primary function? It uses laye ... r 3 addresses to create multiple routed networks The address 68.56.189.17 belongs to which internet protocol IP class? Class A What happens to a datagram sent by a higher level protocol to a 127.x.y.z address? The datagram loops back inside the host and never leaves the network interface card (NIC) Which device evaluates and acts upon a packet's internal protocol (IP) address? Router The network layer must do what to a received frame, in order to determine the route over which it will forward the datagram to the next network? Decapsulate the packet What network information can be determined from a logical internet protocol (IP) address? The host portion and network portion the physical address of a device is processed by which layer of the open systems interconnection reference model (OSI/RM)? The data link layer Which layer of the open system interconnection reference modle (OSI/RM) would you suspect as being the problem when packets arriving at the server but no information is being returned to the client? The transport layer All computers running on the transmission control protocol/internet protocol (TCP/IP) suite have which of the following in common? Each computer is assigned its own internet protocol (IP) address A repeater operates at which layer of the open systems interconnection reference model (OSI/RM)? The physical layer. Which of the following protocols allows email clients to download their messages from an email server? Post office protocol version 3 (POP3) Hypertext transfer protocol (HTTP) is what type of protocol? Stateless On the file transfer protocol (FTP) server, what manages client requests for file retrieval or transmission? A daemon What are the primary requirements to connect a transmission control protocol/ internet protocol (TCP/IP) network? Unique pairs of network layer and transport layer addresses and use of the TCP/IP protocol suit. What type of delivery method uses an email server between the sender and the receiver of messages? Store-and-forward Host names and uniform resource locators (URL) are resolved to internet protocol (IP) addresses by which of the following? Domain Name System (DNS) What happens when the browser application finishes the downloading the files necessary to display a web page? The browser server drop the connections, and the browser maintains th epage and its elements in local memory. Which email protocol enables the messages to be viewed without first downloading them from the email server? Internet Message AccessPprotocol version 4 (IMAP4) What type of server maintains an access log to assist with troubleshooting and tracking down malicious users? File transfer Protocol Server (FTP) A store and forward email system will not deliver messages until The host requests the information What is the binary equivalent of decimal 136? 10001000 Convert the internet protocol (IP) address 172.68.10.2 from decimal to binary. 10101100.01000100.00001010.000000010 Convert the binary internet protocol (IP) address 01110011.11001000.00101100.00000010 to decimal. 115.200.44.2 Which is the result of ANDing the internet protocol (IP) address 23.176.224.18 with the subnet mask 255.224.0.0? 23.160.0.0 Which represents the prefix bits for the subnet mask 255.255.0.0 /16 if we borrow 3 bits from a class C network address, how many usable subnets have we created? 8 What isolates an internet protocol (IP) address's network portion from its host portion? A network mask What is the best description if the internet protocol (IP) address prefix? It is the shorthand notation for the combined network and subnet mask. In a network mask address, what identifies the network and host portions of the address? The network portion of the net mask is set to all ones, and the host is set to all zeros Why is sub-netting used? It allows network administrators to break up a single network address into smaller network addresses. Which internet protocol (IP) packet fragmentation header field specifies where the fragment belongs in the original data gram? Fragment offset Which is the internet protocol (IP) header protocol number used to specify that the packets contents were created with transmission control protocol (TCP)? 6 Which protocol allows a disk-less workstation to contact a sever and obtain an internet protocol address? Revers address resolution protocol (RARP) What provides user data gram protocol (UDP) with the ability to demultiplex data for an application? A UDP destination port number Which user datagram protocol (UDP) port address enables connection to a device running secure shell? 22 Which transmission control protocol (TCP) header control bit represents that the message is initiating a connection? SYN Which of the following two ports are combined in the transmission control protocol (TCP) header? destination and source You know the logical address of an associates computer on the company's local network and you want to learn the media access control (MAC) address of your associates computer. Which of the following tools could you use? Address resolution protocol (ARP) What is the primary difference between transmission control protocol (TCP) and user datagram protocol (UDP)? TCP messages are tracked to ensure they are recieved; UDP messages are sent without tracking. The five stages of (1) obtaining logical addresses, (2) obtaining physical addresses, (3) establishing a connection between applications, (4) the transfer of information, (5) the termination of the connection are necessary to accomplish what? The transfer of information across a transmission control protocol/internet protocol (TCP/IP) network Where does the Domain Name System (DNS) namespace begin? Root Domains The maximum Domain Name System (DNS) domain name length is how many bytes? 255 Zones maintain domain name information in which record type? Resource records When Dynamic Host Configuration Protocol (DHCP) carries vendor specific options, what tells the client the vendor specific format? Codes 128-256 At which point in the Dynamic Host Configuration Protocol (DHCP) lease dos the client first attempt to renew its lease? 50% Which is the correct destination of a user datagram protocol (UDP) port number for a DHCPDISCOVER message? 67 When network address translation (NAT) uses IP (internet protocol) address translation, it assigns external address to internal devices in which way? it assigns the internal address to one of a pool of external addresses Which statement best describes network address translation (NAT) masquerading? it hides all internal addresses behind one external address What does the Domain Name Systems (DNS) allow users to do? Distinguish between two similar names For Dynamic Host Configuration Protocol (DHCP) , what are the hosts requesting and supplying the configuration parameters called? The client request parameters and the server provides the parameters A router makes its packet forwarding decision based on what information? The routers routing table On which network type is a static route best used? stub routing Which network address represents a default route? 0.0.0.0/0. Which router protocol type shares routing information within the autonomous system (AS)? Interior Gateway Protocol (IGP). Distance Vector Algorithms (DVA) operate in which manner? They advertise their routing tables directly to directly connected neighbor routers. What can cause routing loops in the flat router architecture? The router receives data packets before it receives routing information, causing the router to generate additional address request messages for routing information What are routers that belong to the same autonomous system (AS) called? Interior neighbors What is a benefit of using static routes? No bandwidth usage passing updates between routers. Why are routers known as neighbors or peers? because they exchange routing information When using multipath routing and multiple routes are available for a single destination address, how does the router make the route section? it selects the route with the highest precedence. Which of the following is a characteristic of static routing? Static systems do not operate well in an environment of rapid growth or change. When a client connects to a web browser, the first action is typically media access control (MAC) address resolution. Under what circumstance may address resolution be bypassed? When the client has recently made a request to the same server Which hypertext transfer protocol (HTTP) message request from the client allows it to obtain additional information regarding options and requirements without initiating any actions on the part of the server? Options What are some of the issues that can arise when making a file available for transfer to other users? Data type, file structure, and transmission mode. What are the common file extensions used to transfer image data in file transfer protocol (FTP)? Bitmap (.BMP), graphics interchange format (GIF), and joint photography experts group (.JPG or .JPEG) What is the name of the protocol by which management information for a network element can be inspected or altered by a management station? Simple network management protocol (SNMP) Why does simple network management protocol (SNMP) use unsolicited messages (traps) from the network elements to poll for appropriate information? Using traps is consistent with the goal of simplicity and minimizing the amount of traffic generated by the network management function What does the packet based multimedia communications systems, covered by the H.323, cover? realtime audio, video, and data communications over internet protocol (IP) packet networks Which version of the packet based multimedia communications system, covered be the H.323 standard, was the first to standardize requirements for communications between a pc based telephone and a telephone on the switched circuit network (SCN) of the public telephone system? version 2 [Show More]
Last updated: 8 months ago
Preview 4 out of 11 pages
Loading document previews ...
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Apr 21, 2025
Number of pages
11
Written in
All
This document has been written for:
Uploaded
Apr 21, 2025
Downloads
0
Views
18
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·