Chapter 5 quiz
Which three protocols operate at the application layer of the TCP/IP model? (Choose three.)
FTP POP3 DHCP
Which two protocols are used in the process of sending and receiving emails? (Choose two.)
POP SMTP
A network technician accesses a network device securely from a remote site.
SSH
What is the advantage of using SSH over Telnet?
SSH provides secure communications to access hosts.
Which two applications provide virtual terminal access to remote servers? (Choose two.)
SSH, Telnet
What action does a DNS server take if it does not have an entry for a requested URL?
The server checks with another DNS server to see if it has an entry.
What is a "best effort" protocol well suited for streaming audio and VoIP?
UDP
A user requests a website by typing in its name.
domain name system
A workstation gets its IP address automatically.
dynamic host configuration
A service that allows workers to send messages to each other over the Internet.
What type of server would use IMAP?
A user uploads new files to his or her website.
file transfer
Which communication tool allows multiple users to communicate with each other in real time by using a smartphone application or social media site?
instant messaging
What is used by TCP and UDP to track multiple individual conversations between clients and servers?
port numbers
A ________ is a host that runs software to provide information, such as web content, to other hosts.
server
At which layer of the TCP/IP model does TCP operate?
transport
At what layer of the OSI model are port numbers addressed?
transport
A user types in a URL and a page loads in the client browser.
web service