Network Protocols Quiz

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the bit length of an IPv4 address? A. 32 bits B. 48 bits C. 64 bits D. 128 bits

A. 32 bits

A network protocol used for synchronizing clocks over a computer network is called: A. NTP B. AFP C. SLP D. RTC

A. NTP

What are the characteristic features of TFTP? (Select all that apply) A. Provides no security features B. Typically used for exchanging files over the Internet C. A very basic form of file sharing protocol D. Frequently used for exchanging boot and configuration files on private LANs E. Provides authentication and encryption

A. Provides no security features C. A very basic form of file sharing protocol D. Frequently used for exchanging boot and configuration files on private LANs

A Microsoft-proprietary protocol providing a user with a graphical interface for connecting to another computer over a network is known as: A. RDP B. IPP C. RIP D. WAP

A. RDP

What is the common term for a group of protocols used to carry voice data over a packet-switched network? A. VoIP B. PSTN C. PBX D. POTS

A. VoIP

Which of the following are IPv6 loopback addresses? (Select 2 answers) A. 127.0.0.1 B. 0:0:0:0:0:0:0:1 C. 169.254/16 D. ::1 E. FE80::/64

B. 0:0:0:0:0:0:0:1 D. ::1

Which of the server types listed below is used to assign dynamic IP addresses to devices on a network? A. DNS server B. DHCP server C. FTP server D. WINS server

B. DHCP server

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as for example numerical IP addresses? A. TCP/IP B. DNS C. SQL D. DHCP

B. DNS

A protocol used for retrieving contents of an Internet page from a web server is called: A. SNMP B. HTTP C. SMTP D. IMAP

B. HTTP

A secure version of the HTTP protocol offering traffic encryption is known as: (Select all that apply) A. HSPA B. HTTP over SSL C. HSRP D. HTTP over TLS E. HTTPS

B. HTTP over SSL D. HTTP over TLS E. HTTPS

Examples of secure network protocols offering traffic encryption include: (Select 3 answers) A. FTP B. HTTPS C. Telnet D. HTTP E. IPsec F. SSH

B. HTTPS E. IPsec F. SSH

Which of the following answers refers to a protocol used for performing printing-related task on a network? A. PPP B. IPP C. NTP D. PPTP

B. IPP

Which of the following would be in use when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN? A. TCP/IP B. NetBIOS C. Telnet D. DNS

B. NetBIOS

Which of the network protocols listed below allows for creating encrypted links over unsecure public networks such as the Internet and sending regular traffic through those secure links? A. IPP B. PPTP C. RIP D. PPP

B. PPTP

What is the function of NNTP? A. Retrieval of email messages from a mail server B. Posting, distribution, and retrieval of newsgroup messages C. Synchronizing clocks over a computer network D. Translation of domain names into IP addresses

B. Posting, distribution, and retrieval of newsgroup messages

What is the function of POP3? A. Sending email messages between mail servers B. Retrieving email messages from a mail server C. Translating domain names into IP addresses D. File exchange

B. Retrieving email messages from a mail server

Which of the following answers refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers? A. Telnet B. SSH C. Bcrypt D. TFTP

B. SSH

A solution designed to strengthen existing WEP implementations without the requirement for replacement of legacy hardware is called: A. IPsec B. TKIP C. SSH D. HTTPS

B. TKIP

Which of the answers listed below refers to a suite of protocols used to enable Internet access on mobile devices? A. WPA B. WAP C. WEP D. WPS

B. WAP

Which of the following answers refers to a file sharing network protocol? A. RIP B. NNTP C. AFP D. SNMP

C. AFP

An IP address in range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service? A. SMTP B. DNS C. DHCP D. SNMP

C. DHCP

In order to be able to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request? A. ICS server B. Web server C. DNS server D. DHCP server

C. DNS server

LDAP is an example of: A. Authentication protocol B. Address resolution protocol C. Directory access protocol D. File exchange protocol

C. Directory access protocol

IPv6 addresses are expressed with the use of: A. Octagonal numbers B. Binary numbers C. Hexadecimal numbers D. Decimal numbers

C. Hexadecimal numbers

A type of network protocol used for exchanging information concerning the state of the IP network (e.g. testing the reachability of a remote host) is known as: A. CIFS B. IMAP C. ICMP D. PPTP

C. ICMP

Which of the following answers lists an example of a routing protocol? A. RDP B. CIFS C. RIP D. TKIP

C. RIP

IMAP4 is used for: A. Serving web pages B. Translating domain names into IP addresses C. Retrieving email messages from a mail server D. Sending email messages between servers

C. Retrieving email messages from a mail server

A protocol used in network management systems for monitoring network-attached devices is known as: A. SMTP B. ICMP C. SNMP D. IPsec

C. SNMP

What is the function of SMTP? A. File exchange B. Translating domain names into IP addresses C. Sending email messages between mail servers D. Serving web pages

C. Sending email messages between mail servers

An IPv6 address consists of: A. 32 bits B. 48 bits C. 64 bits D. 128 bits

D. 128 bits

A network protocol providing an alternative solution to the manual assignment of IP addresses is called: A. DNS B. SNMP C. NAT D. DHCP

D. DHCP

The FTP protocol is designed for: A. Sending email messages between servers B. Serving web pages C. Translating domain names into IP addresses D. File exchange

D. File exchange

Which of the protocols listed below is used by the PING utility? A. IPsec B. SNMP C. SSH D. ICMP

D. ICMP

Address Resolution Protocol (ARP) provides what kind of resolution? A. IPv6 to IPv4 B. MAC to IP C. Domain name to IP D. IP to MAC

D. IP to MAC

Which of the following answers refers to a protocol used for establishing a dedicated point-to-point link between two networked devices? A. IPP B. SLP C. NTP D. PPP

D. PPP

Which of the protocols listed below is used for automated discovery of networked services on Local Area Networks (LANs)? A. SMB B. AFP C. CIFS D. SLP

D. SLP

Which of the protocols listed below was designed as a secure replacement for Telnet? A. CHAP B. FTP C. SNMP D. SSH

D. SSH

Which of the answers listed below refers to an IPv4 loopback address? A. ::1 B. FE80::/64 C. 169.254./169 D. 0:0:0:0:0:0:0:1 E. 127.0.0.1

E. 127.0.0.1

Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn't support three-way handshake (thus it is also referred to as unreliable or best-effort protocol). True False

False

User Datagram Protocol (UDP) is a connection-oriented protocol that requires a set of initial steps in order to establish a connection (three-way handshake), supports retransmission of lost packets, flow control (managing the amount of data that is being sent), or sequencing (rearranging packets that arrived out of order). True False

False

A double colon in an IPv6 address indicates that part of the address containing only zeroes has been compressed to make the address shorter. True False

True

Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for providing shared access to files, directories, and devices. True False

True

Telnet does not offer encryption and sends passwords in cleartext. True False

True

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks. True False

True

The term Internet Protocol Security (IPsec) refers to a suite of protocols providing authentication and encryption features in order to ensure secure exchange of IP packets. True False

True


Kaugnay na mga set ng pag-aaral

Hazard Analysis and Critical Control Points (VPH 16-17)

View Set

scrum exam, Scrum 1, mlapshin.com scrum 1, Scrum 3, scrum 2

View Set

Chapter 11 - Disorders of White Blood Cells and Lymphoid Tissue

View Set

Chapter 5&6 Review Maternal Health

View Set

NUR 2144 Pharmacology II Chapter 30: Adrenergic Agonists

View Set

7. AMERICAN REVOLUTION: AMERICAN FRONTIER

View Set