Network Protocols Quiz
What is the bit length of an IPv4 address? A. 32 bits B. 48 bits C. 64 bits D. 128 bits
A. 32 bits
A network protocol used for synchronizing clocks over a computer network is called: A. NTP B. AFP C. SLP D. RTC
A. NTP
What are the characteristic features of TFTP? (Select all that apply) A. Provides no security features B. Typically used for exchanging files over the Internet C. A very basic form of file sharing protocol D. Frequently used for exchanging boot and configuration files on private LANs E. Provides authentication and encryption
A. Provides no security features C. A very basic form of file sharing protocol D. Frequently used for exchanging boot and configuration files on private LANs
A Microsoft-proprietary protocol providing a user with a graphical interface for connecting to another computer over a network is known as: A. RDP B. IPP C. RIP D. WAP
A. RDP
What is the common term for a group of protocols used to carry voice data over a packet-switched network? A. VoIP B. PSTN C. PBX D. POTS
A. VoIP
Which of the following are IPv6 loopback addresses? (Select 2 answers) A. 127.0.0.1 B. 0:0:0:0:0:0:0:1 C. 169.254/16 D. ::1 E. FE80::/64
B. 0:0:0:0:0:0:0:1 D. ::1
Which of the server types listed below is used to assign dynamic IP addresses to devices on a network? A. DNS server B. DHCP server C. FTP server D. WINS server
B. DHCP server
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as for example numerical IP addresses? A. TCP/IP B. DNS C. SQL D. DHCP
B. DNS
A protocol used for retrieving contents of an Internet page from a web server is called: A. SNMP B. HTTP C. SMTP D. IMAP
B. HTTP
A secure version of the HTTP protocol offering traffic encryption is known as: (Select all that apply) A. HSPA B. HTTP over SSL C. HSRP D. HTTP over TLS E. HTTPS
B. HTTP over SSL D. HTTP over TLS E. HTTPS
Examples of secure network protocols offering traffic encryption include: (Select 3 answers) A. FTP B. HTTPS C. Telnet D. HTTP E. IPsec F. SSH
B. HTTPS E. IPsec F. SSH
Which of the following answers refers to a protocol used for performing printing-related task on a network? A. PPP B. IPP C. NTP D. PPTP
B. IPP
Which of the following would be in use when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN? A. TCP/IP B. NetBIOS C. Telnet D. DNS
B. NetBIOS
Which of the network protocols listed below allows for creating encrypted links over unsecure public networks such as the Internet and sending regular traffic through those secure links? A. IPP B. PPTP C. RIP D. PPP
B. PPTP
What is the function of NNTP? A. Retrieval of email messages from a mail server B. Posting, distribution, and retrieval of newsgroup messages C. Synchronizing clocks over a computer network D. Translation of domain names into IP addresses
B. Posting, distribution, and retrieval of newsgroup messages
What is the function of POP3? A. Sending email messages between mail servers B. Retrieving email messages from a mail server C. Translating domain names into IP addresses D. File exchange
B. Retrieving email messages from a mail server
Which of the following answers refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers? A. Telnet B. SSH C. Bcrypt D. TFTP
B. SSH
A solution designed to strengthen existing WEP implementations without the requirement for replacement of legacy hardware is called: A. IPsec B. TKIP C. SSH D. HTTPS
B. TKIP
Which of the answers listed below refers to a suite of protocols used to enable Internet access on mobile devices? A. WPA B. WAP C. WEP D. WPS
B. WAP
Which of the following answers refers to a file sharing network protocol? A. RIP B. NNTP C. AFP D. SNMP
C. AFP
An IP address in range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service? A. SMTP B. DNS C. DHCP D. SNMP
C. DHCP
In order to be able to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request? A. ICS server B. Web server C. DNS server D. DHCP server
C. DNS server
LDAP is an example of: A. Authentication protocol B. Address resolution protocol C. Directory access protocol D. File exchange protocol
C. Directory access protocol
IPv6 addresses are expressed with the use of: A. Octagonal numbers B. Binary numbers C. Hexadecimal numbers D. Decimal numbers
C. Hexadecimal numbers
A type of network protocol used for exchanging information concerning the state of the IP network (e.g. testing the reachability of a remote host) is known as: A. CIFS B. IMAP C. ICMP D. PPTP
C. ICMP
Which of the following answers lists an example of a routing protocol? A. RDP B. CIFS C. RIP D. TKIP
C. RIP
IMAP4 is used for: A. Serving web pages B. Translating domain names into IP addresses C. Retrieving email messages from a mail server D. Sending email messages between servers
C. Retrieving email messages from a mail server
A protocol used in network management systems for monitoring network-attached devices is known as: A. SMTP B. ICMP C. SNMP D. IPsec
C. SNMP
What is the function of SMTP? A. File exchange B. Translating domain names into IP addresses C. Sending email messages between mail servers D. Serving web pages
C. Sending email messages between mail servers
An IPv6 address consists of: A. 32 bits B. 48 bits C. 64 bits D. 128 bits
D. 128 bits
A network protocol providing an alternative solution to the manual assignment of IP addresses is called: A. DNS B. SNMP C. NAT D. DHCP
D. DHCP
The FTP protocol is designed for: A. Sending email messages between servers B. Serving web pages C. Translating domain names into IP addresses D. File exchange
D. File exchange
Which of the protocols listed below is used by the PING utility? A. IPsec B. SNMP C. SSH D. ICMP
D. ICMP
Address Resolution Protocol (ARP) provides what kind of resolution? A. IPv6 to IPv4 B. MAC to IP C. Domain name to IP D. IP to MAC
D. IP to MAC
Which of the following answers refers to a protocol used for establishing a dedicated point-to-point link between two networked devices? A. IPP B. SLP C. NTP D. PPP
D. PPP
Which of the protocols listed below is used for automated discovery of networked services on Local Area Networks (LANs)? A. SMB B. AFP C. CIFS D. SLP
D. SLP
Which of the protocols listed below was designed as a secure replacement for Telnet? A. CHAP B. FTP C. SNMP D. SSH
D. SSH
Which of the answers listed below refers to an IPv4 loopback address? A. ::1 B. FE80::/64 C. 169.254./169 D. 0:0:0:0:0:0:0:1 E. 127.0.0.1
E. 127.0.0.1
Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn't support three-way handshake (thus it is also referred to as unreliable or best-effort protocol). True False
False
User Datagram Protocol (UDP) is a connection-oriented protocol that requires a set of initial steps in order to establish a connection (three-way handshake), supports retransmission of lost packets, flow control (managing the amount of data that is being sent), or sequencing (rearranging packets that arrived out of order). True False
False
A double colon in an IPv6 address indicates that part of the address containing only zeroes has been compressed to make the address shorter. True False
True
Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for providing shared access to files, directories, and devices. True False
True
Telnet does not offer encryption and sends passwords in cleartext. True False
True
The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks. True False
True
The term Internet Protocol Security (IPsec) refers to a suite of protocols providing authentication and encryption features in order to ensure secure exchange of IP packets. True False
True