A+ Network Protocols
ipv4 loopback address
127.0.0.1
length of an ipv6 address
128 bits
length of an ipv4 address
32 bits
ipv6 loopback address
::1 0:0:0:0:0:0:0:1
file sharing network protocol
AFP (apple filing protocol)
network protocol providing an alternative solution to the manual assignment of IP addresses
DHCP (dynamic host configuration protocol)
server type used to assign dynamic IP addresses to devices on a network
DHCP (dynamic host configuration protocol)
system containing mappings of domain names to various types of data, such as numerical IP address
DNS
in order to be able to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. which server is used to handle this type of request?
DNS server
FTP protocol
File exchange
protocol for retrieving contents of an internet page from a web server
HTTP
secure version of HTTP protocol offering traffic encryption
HTTP over SSL HTTP over TLS HTTPS
examples of secure network protocols offering traffic encryption
HTTPS IPsec SSH
network protocol used for exchanging information concerning the state of the IP network
ICMP (internet control message protocol)
which protocol is used by PING
ICMP (internet control message protocol)
ARP (address resolution protocol) provides what kind of resolution?
IP to MAC
protocol used for performing printing-related tasks
IPP (internet printing protocol)
network protocol for synchronizing clocks over a computer network
NTP (network time protocol)
used when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN?
NetBIOS
protocol used for establishing a dedicated point-to-point link between two networked device
PPP (point-to-point protocol)
network protocol that allows for creating encrypted links over unsecure public networks such as the internet and sending regular traffic through those secure links
PPTP (point-to-point tunneling protocol)
a Microsoft-proprietary protocol providing a user with a graphical interface for connecting to another computer over a network is known as:
RDP (remote desktop protocol)
a routing protocol
RIP
protocols used for automated discovery of networked services on LANs
SLP (service location protocol)
protocol used in network management systems for monitoring network-attached devices
SNMP (simple network management protocol)
cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers
SSH
protocol designed as a secure replacement for Telnet
SSH
solution designed to strengthen existing WEP (wired equivalent privacy) without the requirement of legacy hardware
TKIP (temporal key integrity protocol)
suite of protocols used to enable internet access on mobile devices
WAP (wireless application protocol)
LDAP (lightweight directory access protocol) is an example of
directory access protocol
TCP (transmission control protocol) is an example of a connectionless protocol. TCP doesn't support three-way handshake true or false
false
UDP (user datagram protocol) is a connection-oriented protocol that requires a set of initial steps in order to establish a connection (three-way), supports retransmission of lost packets, flow control, or sequencing. true or false
false
function of NNTP (network news transfer protocol)
posting, distribution, and retrieval of newsgroup messages
what are the characteristic features of TFTP (trivial file transfer protocol)?
provides no security features very basic form of file sharing protocol frequently used for exchanging boot and config files on private LANs
IMAP4 is used for
retrieving email messages from a mail server
function of POP3
retrieving email messages from a mail server
SMTP
sending email messages between mail servers
IPsec (internet protocol security) refers to a suite of protocols providing authentication and encryption features in order to ensure secure exchange of IP packets true or flase
true
SMB (server message block) and CIFS (common internet file system) are examples of network protocols used for providing shared access to files, directories, and devices true or false
true
Telnet does not offer encryption and sends passwords in cleartext true or false
true
function of the NetBT protocol is to allow NetBIOS services to be used over tcp/ip networks. true or false
true