Question

In: Computer Science

1. FTP requires confirmation that a file was successfully transmitted to a client, but it has...

1. FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this information for itself. What protocol does FTP rely on at the Transport layer of the TCP/IP model to ensure delivery is complete?

Group of answer choices

UDP

HTTP

SSH

TCP

2. Which of the following tools can be used to determine if a network cable is good? Choose all that apply.

Group of answer choices multiple choice

Cable tester

Crimper

Loopback plug

Network multimeter

3. A hub transmits all incoming messages to all of its ports except the port where the messages came in. A switch usually sends messages only to the destination computer. What information does a switch collect from messages crossing its interfaces so it knows where to send data in future transmissions?

Group of answer choices

IP address

MAC address

Port number

FQDN

4. Which two of the following hosts on a corporate intranet are on the same subnet?

Group of answer choices/

multiple choice

192.168.2.143 // 255.255.255.0

172.54.98.3 // 255.255.0.0

192.168.5.57 // 255.255.255.0

172.54.72.89 // 255.255.0.0

5. Your SOHO router has failed and you have installed a new router. The old router’s static IP address on the network is 192.168.0.1. The new router has a static IP address of 10.0.0.1. You go to a computer to configure the new router and enter 10.0.0.1 in the browser address box. The router does not respond. You open a command prompt window and try to ping the router, which does not work. Next, you verify that the router has connectivity and you see that its local connection light is blinking, indicating connectivity. What is the most likely problem and its best solution?

Group of answer choices

The computer you are using to configure the router has a corrupted TCP/IP configuration. Restart the computer.

The router is defective. Return it for a full refund.

The computer and the router are not in the same subnet. Release and renew the IP address of the computer.

The computer and the router are not in the same subnet. Change the subnet mask assigned to the computer.

Question 6

The Telnet protocol encrypts transmitted data, which therefore cannot be read by others on the network.

Group of answer choices

True

False

Question 7

You are configuring email on a customer’s computer. Which port should you configure for pop.companymail.com? For smtp.companymail.com?

Group of answer choices

143, 25

110, 143

110, 25

25, 110

Question 8

Your boss asks you to transmit a small file that includes sensitive personnel data to a server on the network. The server is running a Telnet server and an FTPS server. Why is it not a good idea to use Telnet to reach the remote computer?

Group of answer choices

Telnet transmissions are not encrypted.

Telnet is not reliable and the file might arrive corrupted.

FTP is faster than Telnet.

FTP running on the same computer as Telnet causes Telnet not to work.

Question 9

What two standards have been established for wiring twisted-pair cabling and RJ-45 connectors?

Group of answer choices

Multiple choice

T568A

T568B

TIA/EIA 586

T568C

Question 10

If you are experiencing issues reaching a target destination network, and you need to to display each hop to the destination, what command should you use?

Group of answer choices

ipconfig

ifconfig

tracert

nslookup

Question 11

A punchdown tool is used to wire twisted-pair cabling to a keystone jack.

Group of answer choices

True

False

Question 12

What type of network device keeps a table of the MAC addresses of the devices connected to it?

Group of answer choices

hub

router

NIC

switch

Question 13

What TCP port is utilized by an SSH server listening for connections?

Group of answer choices

20

21

22

23

Question 14

What two protocols are used to deliver mail messages?

Group of answer choices

multiple choice

POP3

SNMP

SMTP

IMAP4

Question 15

Your customer recently installed a new router in her dance studio, as shown in the diagram in Figure 8-56. She then ran Ethernet cables through the drop ceiling to computers in various offices. Without any further testing, which computers do you suspect are experiencing connection problems? Choose all that apply.

Group of answer choices

Computer A

Computer B

Computer C

None of the above

Question 16

Phone cords are a type of twisted-pair cable and use an RJ-45 connector.

Group of answer choices

True

False

Question 17

Which of the following is true about cable Internet?

Group of answer choices

you share the cable infrastructure with your neighbors

you need filters on every phone jack

fiber optic cabling is required

provides up to 2.3 Mbps of bandwidth

Question 18

What two terms describe the type of network cable that is used for connecting a computer to a switch or other network device?

Group of answer choices

MULTIPLE CHOICE

crossover cable

power over Ethernet cable

straight-through cable

patch cable

Question 19

What version of Ethernet utilizes a fiber-optic cable and has a transmission speed of 100 Mbps?

Group of answer choices

100BaseTX

100BaseFX

1000BaseFX

100BaseCX

Question 20

You’re setting up a secure email server on your local network that you want clients to be able to access from the Internet using IMAP4 and SMTP. Which ports should you open in your firewall?

Group of answer choices

25 and 143

587 and 993

80 and 443

25 and 110

Solutions

Expert Solution

1. TCP this is the protocol that ensures the transmission is 100% done.

2.Cable tested is a device which is used to check whether the connection is good or not.

3. MAC Address because switch is an intelligent device which only transmits the data for that computer where the data wants to send and the reason that switch send that data to that switch has a MAC address table where it store the MAC address of all computers so that for future transmission the data want to sent only that perticular computer only.

4. The two ip address are in intranet are 192.168.2.143 //255.255.255.0 and 192.168.5.57 //255.255.255.0 and the remain two are not because of the intranet content of ip range from 192.168.0.0 to 192.168.255.255 and for the 172 range from the 172.16.0.0 to 172.31.255.255 so the ip address remains two are not in private ip address which we give in our intranet address so. The two Ans are from 192.168 ranges.

5.The computer and the router are not in the same subnet. Release and renew the IP address of the computer. This is answer because router has static ip address and the computer has different ip address so they were not in same mask.

6.false because telnet protocol not use the encryption method when the data transmitting over the Internet for security it not provide any encryption when data sent it only in plain text.

7.110,25 Smtp and pop are the protocol that are used for sent and received that data and the port no of POP is 110 and Smtp has port no 25.

8. Telnet transmission are not encrypted and because of this reason it not provide the security to the sensetive data but in the case of FTPS server it use ssh which is more reliable secure and so it is better to use FTPS.

9.TIA/EIA 586 is the standard which is used for the connection of RJ-45 connector this is and standered code for data flow connection.

10.tracert is the command that is use for check the hop to destination it show all of hop which is reaching.

11.True the punch down tool is used for seating the wire in RJ-45 in there jack.

12. Switch this is device which has MAC address table which store that MAC addresses of all the computers for any kind of transmission switch use that MAC table.

13. 22 is port that use SSH remote login protocol which listening all connection.

14.POP3 and IMAP4 are the two protocol which use for receive mails.

15. There is no image provided

16. True because phone cords are use cat3 twisted pair of wires which is provide connection through RJ-45 connectors.

17.you need to filters on every phone jack this is true about cable which provide connectivity of Internet.

18.crossover cable and straight through cable are the two cable that is used when you have to connection with any networking devices and also with computer connection this two network cable connection is required.

19.100BASE-FX this fibre optic cable has capability to tanfer data with speed of 100mbps.

20.587 and 993 thus two are the ports have secured connection IMAP4 have 993 port number and SMTP has the secure port number 587.


Related Solutions

in Java - implement ftp-server and ftp-client. ftp-server Logging into ftp-server from ftp-client The ftp-server is...
in Java - implement ftp-server and ftp-client. ftp-server Logging into ftp-server from ftp-client The ftp-server is an interactive, command-line program that creates a server socket, and waits for connections. Once connected, the ftp-client can send and receive files with ftp-server until ftp-client logs out. Sending and receiving files The commands sent from the ftp-client to the ftp-server must recognize and handle are these: rename- the ftp-server responds to this command by renaming the named file in its current directory to...
Which FTP command allows you to retrieve a file from within an FTP session? 39. Company...
Which FTP command allows you to retrieve a file from within an FTP session? 39. Company X requests an Internet address from the ICANN. Company X will require 129 nodes to be connected to the network across 14 locations (separate physical networks). What type of address will most likely be issued by the ICANN? How will this address be subnetted to allow for the 14 physical networks to exist? What is the total number of nodes that can be individually...
Critique how FTP solves the problem of file transfer – what is good? What is bad?...
Critique how FTP solves the problem of file transfer – what is good? What is bad? What is weird?
Discuss FTP(File Transfer Protocol), including all relevant terms in your explanation.
Discuss FTP(File Transfer Protocol), including all relevant terms in your explanation.
A client with Guillain-Barre syndrome has paralysis of the extremities and requires mechanical ventilation, the client...
A client with Guillain-Barre syndrome has paralysis of the extremities and requires mechanical ventilation, the client is not blinking. what itervention shour the nurse take? A.Assess signs of intracranial pressure B.Arouse client to stimuli blinking C.Encourage fluids D.Protect cornea with lubricant and eye shield
#1 Developing accounting standards is challenging and requires coordinated efforts among various parties to successfully execute....
#1 Developing accounting standards is challenging and requires coordinated efforts among various parties to successfully execute. If you were given complete authority in this matter, how would you propose that GAAP should be developed and enforced? What process would you put in place to protect all parties that are impacted ?
Question: Confirmation number Customer Name Recorded balance $ confirmed by customer 1 Representative Corporation $5,000 Confirmation...
Question: Confirmation number Customer Name Recorded balance $ confirmed by customer 1 Representative Corporation $5,000 Confirmation not recieved 2 Illustration LLC $8,000 $8,000 3 Selection Partnership $10,000 $9,800 4 Specimen Inc. (a related party) $2,000,000 $1,950,000 Q4-ii. On the basis of the accounts receivable confirmation results received (as presented above), what are the conclusions for each of the sample items selected? Confirmation Number Evaluation of Results: (A)Fail/Exception; (B)Pass/No Exception; or (C) Cannot be Determined [Put only 1 letter below] 1...
A client hired you to file an individual tax return. The client is a divorced single...
A client hired you to file an individual tax return. The client is a divorced single custodial parent with two children. The client claims they are entitled to the dependency deduction for the children. The ex-spouse of your client contends it is their right to claim the dependency deduction for the children on their tax returns. Explain in detail which one has the right to claim the dependency deduction for the children relying on the applicable income tax laws. Communicate...
• Describe the below Terms: 1. FTP 2. SMTP 3. DNS
• Describe the below Terms: 1. FTP 2. SMTP 3. DNS
Highlight each of the potential or actual breaches of confidentiality. 1. 1Leaving a client/ family file...
Highlight each of the potential or actual breaches of confidentiality. 1. 1Leaving a client/ family file on the desk in the entrance to the centre. 2. Telling a client’s/ child’s mother over the telephone that their husband has been to visit. 3. Showing another client/ family a confidential file. 4. Sharing a telephone number for a client/ child with their grandmother. 5. Discussing a client/ child’s parents and their impending divorce with your team leader. 6. Leaving a learning story...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT