100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
NCTI FINAL EXAM Progression: Field Tech III - IV Conventional Study Questions and Answers Graded A $17.99   Add to cart

Exam (elaborations)

NCTI FINAL EXAM Progression: Field Tech III - IV Conventional Study Questions and Answers Graded A

 2 views  0 purchase
  • Course
  • Institution

NCTI FINAL EXAM Progression: Field Tech III - IV Conventional Study Questions and Answers Graded A

Preview 4 out of 54  pages

  • September 13, 2023
  • 54
  • 2023/2024
  • Exam (elaborations)
  • Unknown
avatar-seller
NCTI FINAL EXAM
Progression: Field Tech III - IV
Conventional Study Questions
and Answers Graded A 2023

The Open Systems Interconnection reference model (OSI/RM) Network Layer
serves which primary purpose? - It uses Layer 3 addresses to create multiple
routed networks.

The address 68.56.189.17 belongs to which Internet protocol (IP) class? -
Class A

What happens to a datagram sent by a higher level protocol to a 127.x.y.z
address? - The datagram loops back inside the host and never leaves the
network interface card (NIC).

Which device evaluates and acts upon a packet's Internet protocol (IP)
address? - Router.

The Network Layer must do what to a received frame first, in order to
determine the route over which it will forward the datagram to the next
network? - Decapsulate the packet.

What network information can be determined from a logical Internet
protocol (IP) address? - The host portion and network portion.

The physical address of a device is processed by which layer of the Open
Systems Interconnection reference model (OSI/RM)? - The Physical Layer.

Which layer of the Open Systems Interconnection reference model (OSI/RM)
would you suspect as being the problem when packets are arriving at the
server but no information is being returned to the client? - The Data Link
Layer.

All computers running on the transmission control protocol/Internet
protocol (TCP/IP) suite have which of the following in common? - Each
computer is assigned its own Internet protocol (IP) address.

A repeater operates at which layer of the Open Systems Interconnection
reference model (OSI/RM)? - The Transport Layer.

,Which Dynamic Host Configuration Protocol (DHCP) network address
allocation mechanism assigns a host a temporary IP address? - Dynamic

Which two choices are examples of trivial file transfer protocol (TFTP) use?
(Choose two.) - Download router upgrades. And
Software upgrades to IP telephones.

How does the Domain Name System (DNS) resolve fully qualified domain
names (FQDN) to IP addresses? - By looking up the names in an address
mapping database.

Which TCP/IP application allows us to transfer files either within a browser or
at the command line? - File transfer protocol (FTP).

Which statement best describes Internet Message Access Protocol (IMAP)? -
IMAP allows users to scan email headers and choose email messages to
download from the email server.

To resolve fully qualified domain names (FQDN) to binary IP addresses,
resolvers contact which type of TCP/IP application server? - Domain
Name System (DNS).

Which protocol allows clients to locate and download IP addressing and
configuration information on an automatically renewable (lease) basis? -
Dynamic Host Configuration Protocol (DHCP).

Which TCP/IP application allows a network user to remotely log on and
manipulate a network device? - Telnet.

Which three of the following are Dynamic Host Configuration Protocol (DHCP)
address allocation mechanisms? (Choose three.) - Automatic, Dynamic,
Manual

Internet email uses which two protocols? (Choose two.) - Simple Mail
Transfer Protocol (SMTP). And Post Office Protocol version 3 (POP3).

If a Dynamic Host Configuration Protocol (DHCP) client fails to renew its
lease at the 50-percent point, what happens next? - It attempts to obtain
a lease at 87.5-percent lease time.

Of the five trivial file transfer protocol (TFTP) packet types, which three
choices below are TFTP packet types? (Choose three.) - Read request, Write
request, Acknowledgement

If you want to locate a previously saved Uniform Resource Locator (URL) so
that you can quickly return to it as needed, where on the browser toolbar
would you look? - Favorites

,What happens when the browser application finishes downloading the files
necessary to display a web page? - The browser and server drop the
connections, and the browser maintains the page and its elements in
memory.

Which best describes why an hypertext transfer protocol (HTTP) server can
handle multiple simultaneous connections? - HTTP is stateless, which means
the server has no knowledge of previous connections after they are dropped.

For what purpose would you choose to run the Telnet application? - To
configure a router

Which three of the following are common Telnet application uses? (Choose
three.) - Connect to an online database, Connect remotely to run a specific
application, Connect to a router for network information

Which file transfer protocol (FTP) command allows you to change directories
within a file listing? - CD

For what application is file transfer protocol (FTP) an excellent choice? - To
download large files.

A file transfer protocol (FTP) server administrator can control server access
in which three ways? (Choose three.) - Make only portions of the drive
visible, Control read and write privileges, Limit file access

Which is the best reason to use the file transfer protocol (FTP) application? -
When you need to pass large files over a slow connection

The file transfer protocol (FTP) server process can run as which two of the
following? (Choose two.) - Daemon, Windows service

As a result of issuing the file transfer protocol (FTP) DIR command, each file
listing entry begins with a "-"; what does the "-" indicate? - The entries are
files

Which two choices are TCP/IP email protocols? (Choose two.) - Simple Mail
Transfer Protocol (SMTP). , Internet Message Access Protocol (IMAP).

Which two protocols deliver email directly to the email client? (Choose
two.) - Post Office Protocol version 3 (POP3).
Internet Message Access Protocol version 4 (IMAP4).

Why does Simple Mail Transfer Protocol (SMTP) need additional protocols to
carry non- text data as attachments? - SMTP only carries ASCII text
characters.

, Which two of the following are Multpurpose Internet Mail Extension (MIME)-
supported data types? (Choose two.) - Moving Picture Experts Group
(MPEG). , Graphics interchange format (GIF).

How does secure Multipurpose Internet Mail Extension (S/MIME) protect
email from forgery and interception? - It uses digital signatures and
public-key encryption techniques.

Your network Help desk calls and asks you to help troubleshoot an email
problem. Several users have complained that when they send email
messages with attachments, the recipients reply that the attachments are
unreadable. The message body is legible, however. You know that your
users encode all attachments using Multipurpose Internet Mail Extension
(MIME). Which is the best solution to this problem? - Contact the recipients,
and have them use MIME to decode attachments.

Which is a valid email address? - kdr@ncti.com

You are a networking consultant for a major telecommunications firm. They
ask you to help them resolve a hacked email problem. It seems that
someone is intercepting emails between district offices and inserting
pornographic pictures in place of legitimate email attachments. How might
you resolve this problem for them? - Implement Secure Multipurpose
Internet Mail Extension (S/MIME) encoding on all outbound email
attachments.

Which two of the following are examples of email programs? (Choose two.)
- Microsoft Outlook and UNIX Sendmail

Simple mail transfer protocol (SMTP) is which type of message delivery
system? - Direct delivery

Remote monitoring (RMON) uses which devices, placed on remote network
segments, to gather network information? - Probes.

In which two ways does a Simple Network Management Protocol (SNMP)
agent respond to the management station? (Choose two.) - By responding to
the management station's requests for updated data
By trapping information that exceeds a set threshold and forwarding the
data to the management station

Which two TCP/IP protocols are used for network management?
(Choose two.) - Remote monitoring (RMON).
Simple Network Management Protocol (SNMP).

What results from trapping data with an Simple Network Management
Protocol (SNMP) agent? - The managed device alerts the management
station of a threshold violation.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller maggieobita. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.99
  • (0)
  Add to cart