Network Protocols Quiz
A network protocol providing an alternative solution to the manual allocation of IP addresses is known as:
DHCP
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?
DNS
Examples of protocols used for implementing secure VPN tunnels include
DTLS, IPsec, SSL/TLS
LDAP is an example of:
Directory access protocol
Which of the answers listed below refers to a type of routing protocol that determines the best route for data packets based on the lowest number of hops?
Distance-vector
POP3 is used for:
Email retrieval
Which of the answers listed below refers to a protocol used for managing VoIP and VTC services?
H.323
What is the name of a network protocol that secures web traffic via SSL/TLS encryption?
HTTPS
Which of the protocols listed below enables remote access to another computer on the network via web browser?
HTTPS
Border Gateway Protocol (BGP) falls into the category of:
Hybrid routing protocols
Which network protocol enables detection of packet loss?
ICMP
Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets?
ICMP
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?
IP
Which of the answers listed below refers to a network authentication protocol that provides the single sign-on functionality?
Kerberos
Which of the following answers refers to an SSL/TLS-based directory access protocol?
LDAPS
A type of routing protocol that calculates the best path between source and destination nodes based on a map of network connectivity between nodes is called:
Link-state
Which of the following answers refers to a link-state routing protocol?
OSPF
Which network protocol enables encapsulation of PPP frames within 802.3 frames?
PPPoE
A network protocol that allows for secure file transfer over Secure Shell (SSH) is called:
SFTP
A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called:
TKIP
Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn't support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol.
FALSE
User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).
FALSE
Which of the following remote file-access protocols do not offer encryption?
FTP AND TFTP
A network protocol that allows for secure file transfer over SSL is known as:
FTPS
What is the function of FTP?
File exchange
Which protocol allows for retrieving contents of an Internet page from a web server?
HTTP
An IPv6 protocol performing the function of IPv4's Address Resolution Protocol (ARP) is called:
NDP
An IPv6 protocol used by routers to advertise their presence on a network is known as:
NDP
Which IPv6 protocol is used by networked hosts to determine the link layer address of adjacent nodes?
NDP
Which of the IPv6 protocols listed below is used by networked nodes for locating routers?
NDP
Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network?
NTP
Which of the answers listed below refer(s) to PPP?
Network protocol used for connecting devices on a WAN, Enables encapsulation of IP traffic, AND Used for establishing a direct connection between two networked devices
Which of the answers listed below refer to IMAP4?
Offers improved functionality in comparison to POP3 AND Serves the same function as POP3
What are the characteristic features of TFTP?
Provides no security features AND A very basic form of file sharing protocol
What are the characteristics of SMB/CIFS?
Provides shared access to files, directories, and devices AND Used mainly by computers running Microsoft Windows operating systems
A Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network is known as:
RDP
Examples of distance-vector routing protocols include:
RIP AND EIGRP
Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services?
SIP
Which of the following answers refers to a network protocol used in the most common types of spoofing attacks?
SMTP
A type of protocol used in network management systems for monitoring network-attached devices is called:
SNMP
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:
SSH
Which of the answers listed below refers to a secure replacement for Telnet?
SSH
Which of the following protocols enables secure remote access to another computer on the network via command line?
SSH
Which of the following protocols provide protection against switching loops?
STP AND RSTP
The SMTP protocol is used for
Sending email between mail servers AND Sending email from a client device
A hybrid routing protocol combines the features of distance-vector and link-state routing protocols.
TRUE
Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4.
TRUE
The purpose of the Carrier Sense Multiple Access (CSMA) protocol is to verify the absence of other traffic on a shared medium before transmitting to prevent collisions and loss of data.
TRUE
Telnet
Transmits data in an unencrypted form, Does not provide authentication, AND Enables remote login and command execution
A non-proprietary alternative to RDP that enables control over another computer on the network with the use of a graphical user interface is called:
VNC