IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: Network FundamentalsWhich two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.)ITExamAnswers asked 2 years ago • Network FundamentalsWhich statements are correct concerning the role of the MTA in handling email? (Choose three.)ITExamAnswers asked 2 years ago • Network FundamentalsAs compared to SSH, what is the primary disadvantage of telnet?ITExamAnswers asked 2 years ago • Network FundamentalsWhich email components are used to forward mail between servers? (Choose two.)ITExamAnswers asked 2 years ago • Network FundamentalsWhich application layer protocols correctly match a corresponding function? (Choose two.)ITExamAnswers asked 2 years ago • Network FundamentalsWhat three protocols operate at the Application layer of the OSI model? (Choose three.)ITExamAnswers asked 2 years ago • Network FundamentalsWhat is the automated service that matches resource names with the required IP address?ITExamAnswers asked 2 years ago • Network FundamentalsWhat is the purpose of resource records in DNS?ITExamAnswers asked 2 years ago • Network FundamentalsA network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.)ITExamAnswers asked 2 years ago • Network FundamentalsWhat are two forms of application layer software? (Choose two.)ITExamAnswers asked 2 years ago • Network FundamentalsRefer to the exhibit. What is the destination port for the communication that is represented on line 5?ITExamAnswers asked 2 years ago • Network FundamentalsWhat is the proper order of the layers of the OSI model from the highest layer to the lowest layer?ITExamAnswers asked 2 years ago • Network FundamentalsWhat is the purpose of the TCP/IP Network Access layer?ITExamAnswers asked 2 years ago • Network FundamentalsDuring the encapsulation process, what occurs at the data link layer?ITExamAnswers asked 2 years ago • Network FundamentalsWhat can be identified by examining the network layer header?ITExamAnswers asked 2 years ago • Network Fundamentals