The Open Systems Interconnection reference model (OSI/RM) Network Layer serves which primary purpose? - correct answerIt uses Layer 3 addresses to create
... [Show More] multiple routed networks.
The address 68.56.189.17 belongs to which Internet protocol (IP) class? - correct answerClass A
What happens to a datagram sent by a higher level protocol to a 127.x.y.z address? - correct answerThe datagram loops back inside the host and never leaves the network interface card (NIC).
Which device evaluates and acts upon a packet's Internet protocol (IP) address? - correct answerRouter.
The Network Layer must do what to a received frame first, in order to determine the route over which it will forward the datagram to the next network? - correct answerDecapsulate the packet.
What network information can be determined from a logical Internet protocol (IP) address? - correct answerThe host portion and network portion.
The physical address of a device is processed by which layer of the Open Systems Interconnection reference model (OSI/RM)? - correct answerThe Physical Layer.
Which layer of the Open Systems Interconnection reference model (OSI/RM) would you suspect as being the problem when packets are arriving at the server but no information is being returned to the client? - correct answerThe Data Link Layer.
All computers running on the transmission control protocol/Internet protocol (TCP/IP) suite have which of the following in common? - correct answerEach computer is assigned its own Internet protocol (IP) address.
A repeater operates at which layer of the Open Systems Interconnection reference model (OSI/RM)? - correct answerThe Transport Layer.
Which Dynamic Host Configuration Protocol (DHCP) network address allocation mechanism assigns a host a temporary IP address? - correct answerDynamic
Which two choices are examples of trivial file transfer protocol (TFTP) use? (Choose two.) - correct answerDownload router upgrades. And
Software upgrades to IP telephones.
How does the Domain Name System (DNS) resolve fully qualified domain names (FQDN) to IP addresses? - correct answerBy looking up the names in an address mapping database.
Which TCP/IP application allows us to transfer files either within a browser or at the command line? - correct answerFile transfer protocol (FTP).
Which statement best describes Internet Message Access Protocol (IMAP)? - correct answerIMAP allows users to scan email headers and choose email messages to download from the email server.
To resolve fully qualified domain names (FQDN) to binary IP addresses, resolvers contact which type of TCP/IP application server? - correct answerDomain Name System (DNS).
Which protocol allows clients to locate and download IP addressing and configuration information on an automatically renewable (lease) basis? - correct answerDynamic Host Configuration Protocol (DHCP).
Which TCP/IP application allows a network user to remotely log on and manipulate a network device? - correct answerTelnet.
Which three of the following are Dynamic Host Configuration Protocol (DHCP) address allocation mechanisms? (Choose three.) - correct answerAutomatic, Dynamic, Manual
Internet email uses which two protocols? (Choose two.) - correct answerSimple Mail Transfer Protocol (SMTP). And Post Office Protocol version 3 (POP3).
If a Dynamic Host Configuration Protocol (DHCP) client fails to renew its lease at the 50-percent point, what happens next? - correct answerIt attempts to obtain a lease at 87.5-percent lease time.
Of the five trivial file transfer protocol (TFTP) packet types, which three choices below are TFTP packet types? (Choose three.) - correct answerRead request, Write request, Acknowledgement
If you want to locate a previously saved Uniform Resource Locator (URL) so that you can quickly return to it as needed, where on the browser toolbar would you look? - correct answerFavorites
What happens when the browser application finishes downloading the files necessary to display a web page? - correct answerThe browser and server drop the connections, and the browser maintains the page and its elements in memory.
Which best describes why an hypertext transfer protocol (HTTP) server can handle multiple simultaneous connections? - correct answerHTTP is stateless, which means the server has no knowledge of previous connections after they are dropped.
For what purpose would you choose to run the Telnet application? - correct answerTo configure a router
Which three of the following are common Telnet application uses? (Choose three.) - correct answerConnect to an online database, Connect remotely to run a specific application, Connect to a router for network information
Which file transfer protocol (FTP) command allows you to change directories within a file listing? - correct answerCD
For what application is file transfer protocol (FTP) an excellent choice? - correct answerTo download large files.
A file transfer protocol (FTP) server administrator can control server access in which three ways? (Choose three.) - correct answerMake only portions of the drive visible, Control read and write privileges, Limit file access
Which is the best reason to use the file transfer protocol (FTP) application? - correct answerWhen you need to pass large files over a slow connection
The file transfer protocol (FTP) server process can run as which two of the following? (Choose two.) - correct answerDaemon, Windows service
As a result of issuing the file transfer protocol (FTP) DIR command, each file listing entry begins with a "-"; what does the "-" indicate? - correct answerThe entries are files
Which two choices are TCP/IP email protocols? (Choose two.) - correct answerSimple Mail Transfer Protocol (SMTP). , Internet Message Access Protocol (IMAP).
Which two protocols deliver email directly to the email client? (Choose two.) - correct answerPost Office Protocol version 3 (POP3).
Internet Message Access Protocol version 4 (IMAP4).
Why does Simple Mail Transfer Protocol (SMTP) need additional protocols to carry non-text data as attachments? - correct answerSMTP only carries ASCII text characters.
Which two of the following are Multpurpose Internet Mail Extension (MIME)-supported data types? (Choose two.) - correct answerMoving Picture Experts Group (MPEG). , Graphics interchange format (GIF).
How does secure Multipurpose Internet Mail Extension (S/MIME) protect email from forgery and interception? - correct answerIt uses digital signatures and public-key encryption techniques.
Your network Help desk calls and asks you to help troubleshoot an email problem. Several users have complained that when they send email messages with attachments, the recipients reply that the attachments are unreadable. The message body is legible, however. You know that your users encode all attachments using Multipurpose Internet Mail Extension (MIME). Which is the best solution to this problem? - correct answerContact the recipients, and have them use MIME to decode attachments.
Which is a valid email address? - correct answerkdr@ncti.com
You are a networking consultant for a major telecommunications firm. They ask you to help them resolve a hacked email problem. It seems that someone is intercepting emails between district offices and inserting pornographic pictures in place of legitimate email attachments. How might you resolve this problem for them? - correct answerImplement Secure Multipurpose Internet Mail Extension (S/MIME) encoding on all outbound email attachments.
Which two of the following are examples of email programs? (Choose two.) - correct answerMicrosoft Outlook and UNIX Sendmail
Simple mail transfer protocol (SMTP) is which type of message delivery system? - correct answerDirect delivery
Remote monitoring (RMON) uses which devices, placed on remote network segments, to gather network information? - correct answerProbes.
In which two ways does a Simple Network Management Protocol (SNMP) agent respond to the management station? (Choose two.) - correct answerBy responding to the management station's requests for updated data
By trapping information that exceeds a set threshold and forwarding the data to the management station
Which two TCP/IP protocols are used for network management? (Choose two.) - correct answerRemote monitoring (RMON).
Simple Network Management Protocol (SNMP).
What results from trapping data with an Simple Network Management Protocol (SNMP) agent? - correct answerThe managed device alerts the management station of a threshold violation.
Which three of the following are devices manageable with simple network management protocol (SNMP)? (Choose three.) - correct answerApplications.
Bridges.
Routers.
Which Simple Network Management Protocol (SNMP) protocol data unit (PDU) notifies the management station of the occurrence of a significant event? - correct answerTrap
Which remote monitoring (RMON) group records and stores sample statistics for each monitored interface? - correct answerThe History Control Group.
Which three of the following are network management model components for Simple Network Management Protocol (SNMP)? (Choose three.) - correct answerManaged devices.
Network management station (NMS).
Network management protocol.
How does remote monitoring 2 (RMON2) differ from remote monitoring (RMON)? - correct answerRMON2 looks at Layer 3 traffic, while RMON only looks at Layers 1 and 2.
When a management station polls a device agent process to collect information, the network management system is operating in which Simple Network Management Protocol (SNMP) network management mode? - correct answerPassive.
Which three of the following are examples of Simple Network Management Protocol (SNMP) router management categories? (Choose three.) - correct answerConfiguration
Security
Performance
Which Simple Network Management Protocol (SNMP) management mode allows us to change a device's characteristics and operating parameters? - correct answerActive management.
Which Simple Network Management Protocol (SNMP) remote monitoring (RMON) extension prepares reports about a group of devices that head a measured parameter's statistical list? - correct answerThe Host Top N Group.
A remote monitoring 2 (RMON2) probe can capture a network segment's performance statistics based on which two of the following? (Choose two.) - correct answerIP address.
Application.
Which Simple Network Management Protocol (SNMP) sets object values on an agent with it's protocol data units (PDU)? - correct answerSetRequest
Simple Network Management Protocol (SNMP) gathers network information from what type of database? - correct answerManagement information base (MIB).
Network News Transfer Protocol (NNTP) allows TCP/IP users to perform which of the following? - correct answerDownload news articles.
Which name resolution technique dynamically resolves Windows host names to IP addresses? - correct answerWindows Internet Naming Service (WINS).
Which TCP/IP UNIX specific application would allow us to connect to a remote database over the network, but restrict database activity to the remote host? - correct answerRlogin.
Which TCP/IP protocol has us attach a remote device to the local file system by mounting it? - correct answerNetwork File System (NFS).
Which TCP/IP application allows users to display locally a remote UNIX host's screen? - correct answerRlogin
When might you use the rlogin TCP/IP application? - correct answerTo remotely connect one UNIX workstation to another.
Which TCP/IP application distributes news articles read from a central database? - correct answerNetwork News Transfer Protocol (NNTP).
Which one of the following protocols allows email clients to download their messages from an email server? - correct answerPost Office Protocol version 3 (POP3).
Hypertext transfer protocol (HTTP) is what type of protocol? - correct answerStateless.
On the file transfer protocol (FTP) server, what manages client requests for file retrieval or transmission? - correct answerA daemon.
What are the primary requirements to connect to a transmission control protocol/Internet protocol (TCP/IP) network? - correct answerUnique pairs of Network Layer and Transport Layer addresses and use of the TCP/IP protocol suite.
What type of delivery method uses an email server between the sender and the receiver of messages? - correct answerStore-and-forward.
Host names and uniform resource locators (URL) are resolved to Internet protocol (IP) addresses by which of the following applications? - correct answerDomain Name System (DNS).
What happens when the browser application finishes downloading the files necessary to display a web page? - correct answerThe browser and server drop the connections, and the browser maintains the page and its elements in local memory.
Which email protocol enables the messages to be viewed without first downloading them from the email server? - correct answerInternet Message Access Protocol version 4 (IMAP4).
What type of server maintains an access log to assist with troubleshooting and tracking down malicious users? - correct answerA file transfer protocol (FTP) server.
A store-and-forward email system will not deliver messages until: - correct answerThe host requests the information.
What is the binary equivalent of the decimal number 129? - correct answer10000001
Convert the decimal IP address 206.190.36.45 to a binary IP address. - correct answer11001110.10111110.00100100.00101101
Convert the binary IP address 10101111.11001100.00010110.01010101 to a decimal IP address. - correct answer175.204.22.85
Which is another name for the binary number system? - correct answerBase 2
Which is another name for the decimal number system? - correct answerBase 10
What is the binary equivalent of the decimal number 254? - correct answer11111110
What is the decimal equivalent of the binary number 1010? - correct answer10
What is the decimal value of the binary number 1000? - correct answer8
If we borrow 3 bits from a Class C network address, how many usable subnets have we created? - correct answer8
If we borrow 12 bits from a Class B address, how many usable subnets have we created? - correct answer4,096
Which two of the following are reasons why an organization would choose to subnet their network? (Choose two.) - correct answerTo build a more scalable network
To conserve network addresses
Which broadcast IP address limits packets to the local network segment only? - correct answer255.255.255.255
A subnet's broadcast address has which portion's bits set to all ones? - correct answerThe host portion.
What is the binary equivalent of the subnet mask 255.248.0.0? - correct answer11111111.11111000.00000000.00000000
Using the default Class C subnet mask, 255.255.255.0, which two addresses will be able to communicate on the same network segment? (Choose two.) - correct answer192.200.129.179
192.200.129.18
Using the subnet mask 255.255.255.248, which two addresses are on the same subnet? (Choose two.) - correct answer194.212.56.20
194.212.56.18
Using the subnet mask 255.255.255.192, which sets of host addresses will be able to communicate on the same network segment? - correct answer210.68.165.65 to 210.68.165.120
Your customer owns a full Class C address, 220.14.56.0. They currently operate a flat network using the default Class C subnet mask, 255.255.255.0, and use a single router to connect to the Internet. What should the subnet mask number be changed to in order to segment their network into six subnets to better control broadcast traffic? - correct answer255.255.255.224.
Using the subnet mask 255.255.255.240, which two addresses are on the same subnet? (Choose two.) - correct answer200.193.15.49
200.193.15.61
In order for a host to communicate on a subnetted network segment, which two portions of its IP address must match those of the subnet address? (Choose two.) - correct answerThe network portion
The subnet portion
In a set of subnet address ranges, which is the first wire address in the first subnet? - correct answerThe default network's wire address.
In a Class B network, if you borrowed 9 bits, how many usable subnets would you create? - correct answer512
When subnetting Class B addresses, what is the first subnet's wire address equal to? - correct answerThe default network wire address.
In a subnetted Class B network, in what state will the host bits be on each subnet's broadcast address? - correct answerEach subnet's host bits are set to all 1s.
If the number of hosts per subnet exceeds 255, how might you solve for the subnet incremental range? - correct answerDivide the number of hosts by 256.
If a Class B address's subnet mask is 255.255.254.0, in which octet does our subnet portion increment? - correct answerThird [Show Less]