14. (TCO 7) All of the following apply to ICMP Queries EXCEPT: (Points : 5) Host
ID: 3570721 • Letter: 1
Question
14. (TCO 7) All of the following apply to ICMP Queries EXCEPT: (Points : 5) Hosts send them to specific destinationsThey are separate from an IP datagram
They are used for diagnostic purposes
Destination replies are of the identical format as the original ICMP query Question 15.15. (TCO 7) All of the following are ICMP error-reporting messages EXCEPT: (Points : 5) Protocol mismatch error
Destination unreachable
Source quench
Redirect Question 16.16. (TCO 7) The numbers that identify the specific processes that generate and interpret the data sent via IP are called: (Points : 5) Process IDs
UDPs
Translators
Port addresses Question 17.17. (TCO 7) The three primary services provided by TCP to the application layer include all EXCEPT: (Points : 5) Stream delivery
Buffering
Segmentation
IP translation Question 18.18. (TCO 7) The TCP service that accounts for differing data rates between the source
and destination is: (Points : 5) Stream delivery
Buffering
Synchronization
Segmentation Question 19.19. (TCO 7) Which of the following protocols uses TCP port 443? (Points : 5) HTML
HTTPS
TFTP
Telnet Question 20.20. (TCO 6) A new PC has been added to the LAN. It has an IP address of 10.1.1.101 255.255.255.192, DNS of 10.2.2.250 and a gateway of 10.1.1.1. The user complains that he is not able to access the intranet. What is the most likely issue? (Points : 5) The DNS is not reachable because it is not on the local subnet
The PC is configured with an IP in a different subnet from the gateway
The PC is plugged into the wrong VLAN
The gateway has not authenticated the user correctly Question 21.21. (TCO 7) UDP is called a ________________transport protocol. (Points : 5) Connectionless, reliable
Connection-oriented, unreliable
Connectionless, unreliable
none of the above Question 22.22. (TCO 1) Which of the following is considered a disadvantage of a client/server network? (Points : 5) It is difficult to manage data storage and backups
It is the least secure network architecture
It requires dedicated management staff
User accounts are managed locally on each network computer Question 23.23. (TCO 3) Clients in Philadelphia area need to access content in a server located in the Boston area. The packets need to cross several hops to make it to the server. Which OSI layer governs the standards related to this requirement? (Points : 5) Application
Session
Transport
Network Question 24.24. (TOC 4) Which of the following could not be an Ethernet source address? (Points : 5) 8A-7B-6C-DE-10-00
8B-32-21-21-4D-34
EE-AA-C1-23-45-32
46-56-21-1A-DE-F4 Question 25.25. (TCO 5) The _____ coding scheme uses data patterns of size 2 and encodes the 2-bit patterns as one signal element belonging to a four-level signal. (Points : 5) 4B5B
2B1Q
MLT-3
none of the above 14. (TCO 7) All of the following apply to ICMP Queries EXCEPT: (Points : 5) Hosts send them to specific destinations
They are separate from an IP datagram
They are used for diagnostic purposes
Destination replies are of the identical format as the original ICMP query
Explanation / Answer
Answers:
14) They are separated from an IP datagram
15) Protocol mismatch error
16) Port Address
17) IP translation
18) Synchronization
19) HTTPS
20) The PC is configured with an IP in a different subnet from the gateway
21) Connectionless, unreliable
22) It is difficult to manage data storage and backups
23) Transport
24) 45-56-21-1A-DE-F4
25) 2B1Q
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.