Network Protocols Quiz from Exam Compass

¡Supera tus tareas y exámenes ahora con Quizwiz!

What refers to an IPv4 loopback address?

127.0.0.1

An IPv6 address consists of:

128 bits

What is the bit length of an IPv4 address?

32 bits

Which of the following are IPv6 loopback addresses? 2 answers

0:0:0:0:0:0:0:1 and ::1

Which of the following answers refers to a file sharing network protocol?

AFP

A network protocol providing an alternative solution to the manual assignment of IP addresses is called:

DHCP

An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service?

DHCP

Which of the server types listed below is used to assign dynamic IP addresses to devices on a network?

DHCP

What is a system containing mappings of domain names to various types of data, such as for example numerical IP addresses?

DNS (domain name system)

In order to be able to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?

DNS server

LDAP is an example of:

Directory access protocol

Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn't support three-way handshake (thus it is also referred to as unreliable or best-effort protocol). True or false

False

User Datagram Protocol (UDP) is a connection-oriented protocol that requires a set of initial steps in order to establish a connection (three-way handshake), supports retransmission of lost packets, flow control (managing the amount of data that is being sent), or sequencing (rearranging packets that arrived out of order). True or false

False

The FTP protocol is designed for:

File exchange

A protocol used for retrieving contents of an Internet page from a web server is called:

HTTP (hyper text transfer protocol)

Examples of secure network protocols offering traffic encryption include: (3 answers)

HTTPS (Hyper Text Transfer Protocol Secure) , SSH (secure socket shell), IPsec (internet protocol security)

A secure version of the HTTP protocol offering traffic encryption is known as: (2 answers)

HTTPS, HTTP over SSL (secure socket layer), HTTP over TLS (transport layer security)

IPv6 addresses are expressed with the use of:

Hexadecimal numbers

A type of network protocol used for exchanging information concerning the state of the IP network (e.g. testing the reachability of a remote host) is known as:

ICMP

Which of the protocols listed below is used by the PING utility?

ICMP

Address Resolution Protocol (ARP) provides what kind of resolution?

IP to MAC

What refers to a protocol used for performing printing-related task on a network?

IPP

A network protocol used for synchronizing clocks over a computer network is called:

NTP

Which of the following would be in use when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN?

NetBIOS

Which of the following answers refers to a protocol used for establishing a dedicated point-to-point link between two networked devices?

PPP

Which of the network protocols listed below allows for creating encrypted links over unsecure public networks such as the Internet and sending regular traffic through those secure links?

PPTP

What is the function of NNTP?

Posting, distribution, and retrieval of newsgroup messages

What are the characteristic features of TFTP? ( 3 answers)

Provides no security features, a very basic form of file sharing protocol, and frequently used for exchanging boot and configuration files on private LANS

A Microsoft-proprietary protocol providing a user with a graphical interface for connecting to another computer over a network is known as:

RDP (remote desktop protocol)

What is an example of a routing protocol?

RIP

IMAP4 (Internet Message Access Protocol) is used for:

Retrieving email messages from a mail server

What is the function of POP3?

Retrieving email messages from a mail server

Which of the protocols listed below is used for automated discovery of networked services on Local Area Networks (LANs)?

SLP

A protocol used in network management systems for monitoring network-attached devices is known as:

SNMP

Which of the following answers refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers?

SSH

Which of the protocols listed below was designed as a secure replacement for Telnet?

SSH

What is the function of SMTP (simple mail transfer protocol)?

Sending email messages between mail servers

A solution designed to strengthen existing WEP implementations without the requirement for replacement of legacy hardware is called:

TKIP

A double colon in an IPv6 address indicates that part of the address containing only zeroes has been compressed to make the address shorter. True or False

True

Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for providing shared access to files, directories, and devices. True or false

True

Telnet does not offer encryption and sends passwords in cleartext. True or false?

True

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks. True or false

True

The term Internet Protocol Security (IPsec) refers to a suite of protocols providing authentication and encryption features in order to ensure secure exchange of IP packets. True or false

True

What is the common term for a group of protocols used to carry voice data over a packet-switched network?

VoIP

What refers to a suite of protocols used to enable Internet access on mobile devices?

WAP


Conjuntos de estudio relacionados

Chapter 11 Important Concepts and Key Terms

View Set

HURM 4650 Compensation Exam 2 Ch 7,8,9,10

View Set

Micro Economics Morey second midterm

View Set

Pharmacology Prep U Chapter 8 Anti-Infective Agents

View Set