Network Protocols Quiz from Exam Compass
What refers to an IPv4 loopback address?
127.0.0.1
An IPv6 address consists of:
128 bits
What is the bit length of an IPv4 address?
32 bits
Which of the following are IPv6 loopback addresses? 2 answers
0:0:0:0:0:0:0:1 and ::1
Which of the following answers refers to a file sharing network protocol?
AFP
A network protocol providing an alternative solution to the manual assignment of IP addresses is called:
DHCP
An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service?
DHCP
Which of the server types listed below is used to assign dynamic IP addresses to devices on a network?
DHCP
What is a system containing mappings of domain names to various types of data, such as for example numerical IP addresses?
DNS (domain name system)
In order to be able to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?
DNS server
LDAP is an example of:
Directory access protocol
Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn't support three-way handshake (thus it is also referred to as unreliable or best-effort protocol). True or false
False
User Datagram Protocol (UDP) is a connection-oriented protocol that requires a set of initial steps in order to establish a connection (three-way handshake), supports retransmission of lost packets, flow control (managing the amount of data that is being sent), or sequencing (rearranging packets that arrived out of order). True or false
False
The FTP protocol is designed for:
File exchange
A protocol used for retrieving contents of an Internet page from a web server is called:
HTTP (hyper text transfer protocol)
Examples of secure network protocols offering traffic encryption include: (3 answers)
HTTPS (Hyper Text Transfer Protocol Secure) , SSH (secure socket shell), IPsec (internet protocol security)
A secure version of the HTTP protocol offering traffic encryption is known as: (2 answers)
HTTPS, HTTP over SSL (secure socket layer), HTTP over TLS (transport layer security)
IPv6 addresses are expressed with the use of:
Hexadecimal numbers
A type of network protocol used for exchanging information concerning the state of the IP network (e.g. testing the reachability of a remote host) is known as:
ICMP
Which of the protocols listed below is used by the PING utility?
ICMP
Address Resolution Protocol (ARP) provides what kind of resolution?
IP to MAC
What refers to a protocol used for performing printing-related task on a network?
IPP
A network protocol used for synchronizing clocks over a computer network is called:
NTP
Which of the following would be in use when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN?
NetBIOS
Which of the following answers refers to a protocol used for establishing a dedicated point-to-point link between two networked devices?
PPP
Which of the network protocols listed below allows for creating encrypted links over unsecure public networks such as the Internet and sending regular traffic through those secure links?
PPTP
What is the function of NNTP?
Posting, distribution, and retrieval of newsgroup messages
What are the characteristic features of TFTP? ( 3 answers)
Provides no security features, a very basic form of file sharing protocol, and frequently used for exchanging boot and configuration files on private LANS
A Microsoft-proprietary protocol providing a user with a graphical interface for connecting to another computer over a network is known as:
RDP (remote desktop protocol)
What is an example of a routing protocol?
RIP
IMAP4 (Internet Message Access Protocol) is used for:
Retrieving email messages from a mail server
What is the function of POP3?
Retrieving email messages from a mail server
Which of the protocols listed below is used for automated discovery of networked services on Local Area Networks (LANs)?
SLP
A protocol used in network management systems for monitoring network-attached devices is known as:
SNMP
Which of the following answers refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers?
SSH
Which of the protocols listed below was designed as a secure replacement for Telnet?
SSH
What is the function of SMTP (simple mail transfer protocol)?
Sending email messages between mail servers
A solution designed to strengthen existing WEP implementations without the requirement for replacement of legacy hardware is called:
TKIP
A double colon in an IPv6 address indicates that part of the address containing only zeroes has been compressed to make the address shorter. True or False
True
Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for providing shared access to files, directories, and devices. True or false
True
Telnet does not offer encryption and sends passwords in cleartext. True or false?
True
The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks. True or false
True
The term Internet Protocol Security (IPsec) refers to a suite of protocols providing authentication and encryption features in order to ensure secure exchange of IP packets. True or false
True
What is the common term for a group of protocols used to carry voice data over a packet-switched network?
VoIP
What refers to a suite of protocols used to enable Internet access on mobile devices?
WAP