Network Protocols

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the function of POP3? A. Email retrieval B. File exchange C. Directory access D. Name resolution

A. Email retrieval

Which of the following is a Microsoft-proprietary remote-access protocol providing users with a graphical interface that allows them to connect to another computer on a network? A. RDP B. SSH C. VNC D. Telnet

A. RDP

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks. True False

True

The SMTP protocol is used for: (Select 2 answers) A. Sending email messages between mail servers B. Providing name resolution services C. Serving of web pages D. Retrieving email messages from mail servers E. Sending email messages from a client device

A. Sending email messages between mail servers E. Sending email messages from a client device

Which of the following describes a system that maps domain names to various types of data, such as numerical IP addresses? A. TCP/IP B. DNS C. SQL D. DHCP

B. DNS

Which network protocol enables users to retrieve the contents of an Internet page from a web server? A. SNMP B. HTTP C. SMTP D. IMAP

B. HTTP

What is the name of a network protocol that secures web traffic via SSL/TLS encryption? A. SFTP B. HTTPS C. FTPS D. SNMP

B. HTTPS

Which of the following are characteristic features of SMB/CIFS? (Select 2 answers) A. Used mainly by computers running Linux distributions B. Provides shared access to files, directories, and devices C. Enables connectivity over SAN D. Used mainly by computers running Microsoft Windows operating systems E. Enables voice and multimedia communications over IP networks

B. Provides shared access to files, directories, and devices D. Used mainly by computers running Microsoft Windows operating systems

Telnet: (Select 3 answers) A. Encrypts network connection B. Provides username & password authentication C. Transmits data in an unencrypted form D. Does not provide authentication E. Enables remote login and command execution

B. Provides username & password authentication C. Transmits data in an unencrypted form E. Enables remote login and command execution

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as: A. TFTP B. SSH C. Telnet D. RDP

B. SSH

Which of the following is a file sharing network protocol? A. RDP B. SSH C. AFP D. SLP

C. AFP

LDAP is an example of a(n): A. Authentication protocol B. Address resolution protocol C. Directory access protocol D. File exchange protocol

C. Directory access protocol

Which of the following is used when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN? A. DNS B. TCP/IP C. NetBIOS D. DHCP

C. NetBIOS

IMAP is used for: A. Serving web pages B. Translating domain names into IP addresses C. Retrieving email messages from a mail server D. Sending email messages

C. Retrieving email messages from a mail server

A type of protocol used in network management systems to monitor network-attached devices is called: A. SMB B. NTP C. SNMP D. RDP

C. SNMP

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as: A. DNS B. SNMP C. NAT D. DHCP

D. DHCP

What is the function of FTP? A. Email service B. Directory access C. Serving of web pages D. File exchange

D. File exchange

Which of the following protocols permits automated discovery of networked services on Local Area Networks (LANs)? A. SMB B. AFP C. CIFS D. SLP

D. SLP

Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn't support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol. True False

False

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake, a set of initial steps required to establish a network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). True False

False


Conjuntos de estudio relacionados

Lung Volumes and Lung Capacities

View Set

Normal Female Pubertal Development

View Set

MGT 3400- Chapter 7- Learning Objective 7.4

View Set

Binary & Hexadecimal Conversions

View Set

Writing Chemical Formulas for Ionic Compounds

View Set

PrepU - Chapter 17: Preoperative Nursing Management

View Set

Chapter 8 Study Guide for AP Human Geography (Political Geography)

View Set