In: Computer Science
1. FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this information for itself. What protocol does FTP rely on at the Transport layer of the TCP/IP model to ensure delivery is complete?
Group of answer choices
UDP
HTTP
SSH
TCP
2. Which of the following tools can be used to determine if a network cable is good? Choose all that apply.
Group of answer choices multiple choice
Cable tester
Crimper
Loopback plug
Network multimeter
3. A hub transmits all incoming messages to all of its ports except the port where the messages came in. A switch usually sends messages only to the destination computer. What information does a switch collect from messages crossing its interfaces so it knows where to send data in future transmissions?
Group of answer choices
IP address
MAC address
Port number
FQDN
4. Which two of the following hosts on a corporate intranet are on the same subnet?
Group of answer choices/
multiple choice
192.168.2.143 // 255.255.255.0
172.54.98.3 // 255.255.0.0
192.168.5.57 // 255.255.255.0
172.54.72.89 // 255.255.0.0
5. Your SOHO router has failed and you have installed a new router. The old router’s static IP address on the network is 192.168.0.1. The new router has a static IP address of 10.0.0.1. You go to a computer to configure the new router and enter 10.0.0.1 in the browser address box. The router does not respond. You open a command prompt window and try to ping the router, which does not work. Next, you verify that the router has connectivity and you see that its local connection light is blinking, indicating connectivity. What is the most likely problem and its best solution?
Group of answer choices
The computer you are using to configure the router has a corrupted TCP/IP configuration. Restart the computer.
The router is defective. Return it for a full refund.
The computer and the router are not in the same subnet. Release and renew the IP address of the computer.
The computer and the router are not in the same subnet. Change the subnet mask assigned to the computer.
Question 6
The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.
Group of answer choices
True
False
Question 7
You are configuring email on a customer’s computer. Which port should you configure for pop.companymail.com? For smtp.companymail.com?
Group of answer choices
143, 25
110, 143
110, 25
25, 110
Question 8
Your boss asks you to transmit a small file that includes sensitive personnel data to a server on the network. The server is running a Telnet server and an FTPS server. Why is it not a good idea to use Telnet to reach the remote computer?
Group of answer choices
Telnet transmissions are not encrypted.
Telnet is not reliable and the file might arrive corrupted.
FTP is faster than Telnet.
FTP running on the same computer as Telnet causes Telnet not to work.
Question 9
What two standards have been established for wiring twisted-pair cabling and RJ-45 connectors?
Group of answer choices
Multiple choice
T568A
T568B
TIA/EIA 586
T568C
Question 10
If you are experiencing issues reaching a target destination network, and you need to to display each hop to the destination, what command should you use?
Group of answer choices
ipconfig
ifconfig
tracert
nslookup
Question 11
A punchdown tool is used to wire twisted-pair cabling to a keystone jack.
Group of answer choices
True
False
Question 12
What type of network device keeps a table of the MAC addresses of the devices connected to it?
Group of answer choices
hub
router
NIC
switch
Question 13
What TCP port is utilized by an SSH server listening for connections?
Group of answer choices
20
21
22
23
Question 14
What two protocols are used to deliver mail messages?
Group of answer choices
multiple choice
POP3
SNMP
SMTP
IMAP4
Question 15
Your customer recently installed a new router in her dance studio, as shown in the diagram in Figure 8-56. She then ran Ethernet cables through the drop ceiling to computers in various offices. Without any further testing, which computers do you suspect are experiencing connection problems? Choose all that apply.
Group of answer choices
Computer A
Computer B
Computer C
None of the above
Question 16
Phone cords are a type of twisted-pair cable and use an RJ-45 connector.
Group of answer choices
True
False
Question 17
Which of the following is true about cable Internet?
Group of answer choices
you share the cable infrastructure with your neighbors
you need filters on every phone jack
fiber optic cabling is required
provides up to 2.3 Mbps of bandwidth
Question 18
What two terms describe the type of network cable that is used for connecting a computer to a switch or other network device?
Group of answer choices
MULTIPLE CHOICE
crossover cable
power over Ethernet cable
straight-through cable
patch cable
Question 19
What version of Ethernet utilizes a fiber-optic cable and has a transmission speed of 100 Mbps?
Group of answer choices
100BaseTX
100BaseFX
1000BaseFX
100BaseCX
Question 20
You’re setting up a secure email server on your local network that you want clients to be able to access from the Internet using IMAP4 and SMTP. Which ports should you open in your firewall?
Group of answer choices
25 and 143
587 and 993
80 and 443
25 and 110
1. TCP this is the protocol that ensures the transmission is 100% done.
2.Cable tested is a device which is used to check whether the connection is good or not.
3. MAC Address because switch is an intelligent device which only transmits the data for that computer where the data wants to send and the reason that switch send that data to that switch has a MAC address table where it store the MAC address of all computers so that for future transmission the data want to sent only that perticular computer only.
4. The two ip address are in intranet are 192.168.2.143 //255.255.255.0 and 192.168.5.57 //255.255.255.0 and the remain two are not because of the intranet content of ip range from 192.168.0.0 to 192.168.255.255 and for the 172 range from the 172.16.0.0 to 172.31.255.255 so the ip address remains two are not in private ip address which we give in our intranet address so. The two Ans are from 192.168 ranges.
5.The computer and the router are not in the same subnet. Release and renew the IP address of the computer. This is answer because router has static ip address and the computer has different ip address so they were not in same mask.
6.false because telnet protocol not use the encryption method when the data transmitting over the Internet for security it not provide any encryption when data sent it only in plain text.
7.110,25 Smtp and pop are the protocol that are used for sent and received that data and the port no of POP is 110 and Smtp has port no 25.
8. Telnet transmission are not encrypted and because of this reason it not provide the security to the sensetive data but in the case of FTPS server it use ssh which is more reliable secure and so it is better to use FTPS.
9.TIA/EIA 586 is the standard which is used for the connection of RJ-45 connector this is and standered code for data flow connection.
10.tracert is the command that is use for check the hop to destination it show all of hop which is reaching.
11.True the punch down tool is used for seating the wire in RJ-45 in there jack.
12. Switch this is device which has MAC address table which store that MAC addresses of all the computers for any kind of transmission switch use that MAC table.
13. 22 is port that use SSH remote login protocol which listening all connection.
14.POP3 and IMAP4 are the two protocol which use for receive mails.
15. There is no image provided
16. True because phone cords are use cat3 twisted pair of wires which is provide connection through RJ-45 connectors.
17.you need to filters on every phone jack this is true about cable which provide connectivity of Internet.
18.crossover cable and straight through cable are the two cable that is used when you have to connection with any networking devices and also with computer connection this two network cable connection is required.
19.100BASE-FX this fibre optic cable has capability to tanfer data with speed of 100mbps.
20.587 and 993 thus two are the ports have secured connection IMAP4 have 993 port number and SMTP has the secure port number 587.