Network+ IP Protocol questions
Border Gateway Protocol (BGP) falls into the category of: A: Hybrid routing protocols. B: Link-state routing protocols. C: Distance-vector routing protocols. D: Static routing protocols.
A: Hybrid routing protocols.
Examples of protocols used for implementing secure VPN tunnels include: (Select 3 answers): A: DTLS (Datagram Transport Layer Security). B: bcrypt C: SCP (Secure Copy protocol). D: IPsec (Internet Protocol Security). E: SSL/TLS (Secure Sockets Layer/ Transport Layer Security).
A: DTLS (Datagram Transport Layer Security). D: IPsec (Internet Protocol Security). E: SSL/TLS (Secure Sockets Layer/ Transport Layer Security).
Which of the following remote file-access protocols do not offer encryption? (Select 2 answers) A: FTP (File Transfer Protocol). B: FTPS (File Transfer Protocol with SSL/TLS). C: SCP (Secure Copy protocol). D: SFTP (Secure (SSH) File Transfer Protocol). E: TFTP (Trivial File Transfer Protocol).
A: FTP (File Transfer Protocol). E: TFTP (Trivial File Transfer Protocol).
Which of the IPv6 protocols listed below is used by networked nodes for locating routers? A: NDP B: NTP (Network Time protocol). C: NDR (Network Data Representation). D: NCP (Network Control Program).
A: NDP
Which of the answers listed below refer to IMAP4? (Select 2 answers) A: Offers improved functionality in comparison to POP3. B: Serves the same function as POP3. C: Enables sending email messages from client devices. D: Offers less functions than POP3 E: Enables email exchange between mail servers.
A: Offers improved functionality in comparison to POP3. B: Serves the same function as POP3.
What are the characteristic features of TFTP? (Select 2 answers): A: Provides no security features. B: Typically used for exchanging files over the internet. C: A very basic form of file sharing protocol. D: Provides authentication and encryption. E: Directory access protocol.
A: Provides no security features. C: A very basic form of file sharing protocol.
A Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network is known as: A: RDP (Remote Desktop Protocol). B: SSH (Secure Shell). C: VNC (Virtual Network Computing). D: Telnet
A: RDP (Remote Desktop Protocol)
Which of the following answers refers to a network protocol used in the most common types of spoofing attacks? A: SMTP (Simple Mail Transfer Protocol). B: RDP (Remote Desktop Protocol). C: SNMP (Simple Network Managment Protocol). D: Telnet
A: SMTP (Simple Mail Transfer Protocol)
The SMTP protocol is used for: (Select 2 answers): A: Sending email between mail servers. B: Name resolution. C: Serving of web pages. D: Retrieving email from mail servers. E: Sending email from a client device.
A: Sending email between mail servers. E: Sending email from a client device.
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? A: TCP/IP B: DNS (Domain name System). C: SQL D: DHCP (Dynamic Host Configuration Protocol).
B: DNS (Domain name System).
Which of the answers listed below refers to a protocol used for managing VoIP and VTC services? A: SMB (Server Message Block). B: H.323 C: SCP (Secure Copy protocol). D: IGP (Interior Gateway Protocol).
B: H.323
What is the name of a network protocol that secures web traffic via SSL/TLS encryption? A: SFTP (Secure (SSH) File Transfer Protocol). B: HTTPS (Hypertext Transfer Protocol Secure). C: FTPS (File Transfer Protocol with SSL/TLS). D: SNMP (Simple Network Managment Protocol).
B: HTTPS (Hypertext Transfer Protocol Secure).
Which of the protocols listed below enables remote access to another computer on the network via web browser? A: RDP ( Remote Desktop Protocol). B: HTTPS (Hypertext Transfer Protocol Secure). C: SSH ( Secure Shell). D: VNC (Virtual Network Computing).
B: HTTPS (Hypertext Transfer Protocol Secure).
Which network protocol enables detection of packet loss? A: SMB (Server Message Block). B: ICMP (Internet Control Message Protocol). C: ARP (Address resolution Protocol). D: SNTP (Simple Network Time Protocol).
B: ICMP (Internet Control Message Protocol).
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? A:UDP (User Datagram protocol). B: IP (Internet Protocol) C: TCP (Transmission Control Protocol) D: NetBIOS
B: IP (Internet Protocol)
A type of routing protocol that calculates the best path between source and destination nodes based on a map of network connectivity between nodes is called: A: Dynamic. B: Link-state C: Static D: Distance-vector
B: Link-state
An IPv6 protocol performing the function of IPv4's Address Resolution Protocol (ARP) is called: A: NCP (Network Control Program). B: NDP (Neighbor Discovery Protocol). C: NTP (Network Time protocol). D: NDR (Network Data Representation).
B: NDP (Neighbor Discovery Protocol).
Which network protocol enables encapsulation of PPP frames within 802.3 frames? A: FCoE (Fibre Channel over Ethernet). B: PPPoE (Point-to-Point Protocol over Ethernet). C: EAP (Extensible Authentication Protocol). D: IPsec (Internet Protocol Security).
B: PPPoE (Point-to-Point Protocol over Ethernet).
What are the characteristics of SMB/CIFS? (Select 2 answers) A: Used mainly by computers running Linux distributions. B: Provides shared access to files, directories, and devices. C: Used mainly by computers running Microsoft Windows OS. D: Enables voice and multimedia communication over IP networks.
B: Provides shared access to files, directories, and devices. C: Used mainly by computers running Microsoft Windows OS
A network protocol that allows for secure file transfer over Secure Shell (SSH) is called: a: TFTP. (Trivial File Transfer Protocol). B: SFTP. (Secure (SSH) File Transfer Protocol). C: Telnet D: FTPS (File Transfer Protocol with SSL/TLS).
B: SFTP (Secure (SSH) File Transfer Protocol).
A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called: A: PEAP (Protected Extensible Authentication Protocol). B: TKIP (Temporal Key Integrity Protocol). C: CCMP D: WPA2 (WI-FI Protected Access)
B: TKIP (Temporal Key Integrity Protocol)
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as? A:TFTP (Trivial File Transfer Protocol). B:SSH (Secure Shell). C:Telnet. D: RDP (Remote Desktop Protocol).
B:SSH (Secure Shell).
LDAP is an example of: A: Authentication protocol B: Address resolution protocol C: Directory Access Protocol D: File Exchange Protocol
C: Directory Access Protocol
Which of the answers listed below refers to a type of routing protocol that determines the best route for data packets based on the lowest number of hops? A: Hybrid B: Link-state C: Distance-vector D: Dynamic
C: Distance-vector
A network protocol that allows for secure file transfer over SSL is known as: A: TFTP (Trivial File Transfer Protocol). B: SCP (Secure Copy protocol). C: FTPS (File Transfer Protocol with SSL/TLS). D: SFTP (Secure (SSH) File Transfer Protocol).
C: FTPS (File Transfer Protocol with SSL/TLS).
Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets? A: CCMP B: RSTP (Rapid Spanning Tree Protocol). C: ICMP (Internet Control Message Protocol). D: SNMP (Simple Network Managment Protocol).
C: ICMP (Internet Control Message Protocol).
Which of the answers listed below refers to a network authentication protocol that provides the single sign-on functionality? A: RADIUS B: MS-CHAP C: Kerberos D: TACACS+
C: Kerberos
An IPv6 protocol used by routers to advertise their presence on a network is known as: A: NDR (Network Data Representation). B: NCP (Network Control Program). C: NDP (Neighbor Discovery Protocol). D: NTP (Network Time protocol).
C: NDP (Neighbor Discovery Protocol).
Examples of distance-vector routing protocols include: (Select 2 answers). A: EGP (Exterior Gateway Protocol). B: OSPF (Open Shortest Path First). C: RIP (Routing Information protocol). D: EIGRP (Enhanced Interior Gateway Routing Protocol). E: BGP (Border Gateway protocol).
C: RIP (Routing Information protocol). D: EIGRP (Enhanced Interior Gateway Routing Protocol).
A type of protocol used in network management systems for monitoring network-attached devices is called: A: SMB (Server Message Block). B: NTP (Network Time protocol). C: SNMP (Simple Network Managment Protocol). D: RDP (Remote Desktop Protocol).
C: SNMP (Simple Network Managment Protocol).
Which of the following protocols enables secure remote access to another computer on the network via command line? A: VNC (Virtual Network Computing). B: Telnet C: SSH (Secure Shell). D: RDP (Remote Desktop Protocol).
C: SSH (Secure Shell)
Telnet: (Select 3 answers): A: Encrypts network connection. B: Provides password authentication. C: Transmits data in an encrypted form. D: Does not provide authentication. E: Enables remote login and command execution.
C: Transmits data in an encrypted form. D: Does not provide authentication. E: Enables remote login and command execution.
A network protocol providing an alternative solution to the manual allocation of IP addresses is known as: A: DNS B: SNMP (Simple Network Managment Protocol). C: NAT D: DHCP
D: DHCP
POP3 is used for: A: Name resolution B: Sending email messages C: File exchange D: Email retrieval
D: Email retrieval
What is the function of FTP? A: Mail services. B: Serving of web pages. C: Directory access. D: File exchange.
D: File exchange
Which IPv6 protocol is used by networked hosts to determine the link layer address of adjacent nodes? A: NTP (Network Time protocol). B: NDR (Network Data Representation). C: NCP (Network Control Program). D: NDP (Neighbor Discovery Protocol).
D: NDP (Neighbor Discovery Protocol).
Which of the following answers refers to a link-state routing protocol? A: BGP (Border Gateway protocol). B: EIGRP (Enhanced Interior Gateway Routing Protocol). C: RIP (Routing Information protocol). D: OSPF (Open Shortest Path First).
D: OSPF (Open Shortest Path First).
Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? A: L2TP (Layer 2 Tunneling Protocol). B: BGP (Border Gateway Protocol). C: RSTP (Rapid Spanning Tree Protocol). D: SIP (Session Initiation Protocol).
D: SIP (Session Initiation Protocol).
Which of the answers listed below refers to a secure replacement for Telnet? A: CHAP (Challenge-Handshake Authentication Protocol). B: FTP (File Transfer Protocol). C: SNMP (Simple Network Managment Protocol). D: SSH (Secure Shell).
D: SSH (Secure Shell)
Which of the following protocols provide protection against switching loops? (Select 2 answers): A: RTP (Real-time Transport Protocol). B: SRTP (Secure Real-time Transport Protocol). C: RDP (Remote Desktop Protocol). D: STP (Spanning Tree Protocol). E: RSTP (Rapid Spanning Tree Protocol).
D: STP (Spanning Tree Protocol). E: RSTP (Rapid Spanning Tree Protocol).
A non-proprietary alternative to RDP that enables control over another computer on the network with the use of a graphical user interface is called: A: VTP (VLAN Trunking Protocol). B: VRF (Virtual Routing and Forwarding). C: VTC (Video Teleconferencing). D: VNC (Virtual Network Computing).
D: VNC (Virtual Network Computing).
Which of the following answers refers to an SSL/TLS-based directory access protocol? A: H.323 B: PPTP (Point-to-Point Tunneling Protocol). C: Kerberos D: LDAPS (Lightweight Directory Access Protocol over SSL).
D:LDAPS (Lightweight Directory Access Protocol over SSL).
Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn't support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol. True or False?
False
User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). True or False?
False
Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4. True or False?
True
The purpose of the Carrier Sense Multiple Access (CSMA) protocol is to verify the absence of other traffic on a shared medium before transmitting to prevent collisions and loss of data. True or False?
True
Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? A: NTP (Network Time protocol). B: VTP (VLAN Trunking Protocol). C: NNTP (Network News Transfer Protocol). D: RTP (Real-time Transport Protocol).
A: NTP (Network Time protocol).
Which of the answers listed below refer(s) to PPP? (Select all that apply): A: Network protocol used for connecting devices on a WAN. B: Transport layer (layer4) protocol. C: Enables encapsulation of IP traffic. D: Used for establishing a direct connection between two networked devices. E: Application layer (Layer 7) protocol.
A: Network protocol used for connecting devices on a WAN. C: Enables encapsulation of IP traffic. D: Used for establishing a direct connection between two networked devices.
Which protocol allows for retrieving contents of an Internet page from a web server? A: SNMP B: HTTP C: SMTP (Simple Mail Transfer Protocol). D: IMAP
B: HTTP
A hybrid routing protocol combines the features of distance-vector and link-state routing protocols. True or False?
True