COMPTIA A+ Network Protocols

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following are IPv6 loopback addresses? (Select 2 answers)

0:0:0:0:0:0:0:1, ::1

Which of the following answers refers to a file sharing network protocol?

AFP

In order to be able to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?

DNS server

A type of network protocol used for exchanging information concerning the state of the IP network (e.g. testing the reachability of a remote host) is known as:

ICMP

Which of the protocols listed below is used by the PING utility?

ICMP

Address Resolution Protocol (ARP) provides what kind of resolution?

IP to MAC

What are the characteristic features of TFTP? (Select all that apply)

Provides no security features , A very basic form of file sharing protocol, Frequently used for exchanging boot and configuration files on private LANs

What is the function of SMTP?

Sending email messages between mail servers

Which of the answers listed below refers to an IPv4 loopback address?

127.0.0.1

An IPv6 address consists of how many bits?

128 bits

What is the bit length of an IPv4 address?

32 bits

A network protocol providing an alternative solution to the manual assignment of IP addresses is called:

DHCP

An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service?

DHCP

Which of the server types listed below is used to assign dynamic IP addresses to devices on a network?

DHCP server

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as for example numerical IP addresses?

DNS

LDAP is an example of:

Directory access protocol

(T or F) Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn't support three-way handshake (thus it is also referred to as unreliable or best-effort protocol).

False

(T or F) User Datagram Protocol (UDP) is a connection-oriented protocol that requires a set of initial steps in order to establish a connection (three-way handshake), supports retransmission of lost packets, flow control (managing the amount of data that is being sent), or sequencing (rearranging packets that arrived out of order)

False

The FTP protocol is designed for:

File exchange

A protocol used for retrieving contents of an Internet page from a web server is called:

HTTP

A secure version of the HTTP protocol offering traffic encryption is known as: (Select all that apply)

HTTP over SSL, HTTP over TLS, HTTPS

Examples of secure network protocols offering traffic encryption include: (Select 3 answers)

HTTPS, IPsec, SSH

IPv6 addresses are expressed with the use of:

Hexadecimal numbers

Which of the following answers refers to a protocol used for performing printing-related task on a network?

IPP

A network protocol used for synchronizing clocks over a computer network is called:

NTP

Which of the following would be in use when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN?

NetBIOS

Which of the following answers refers to a protocol used for establishing a dedicated point-to-point link between two networked devices?

PPP

Which of the network protocols listed below allows for creating encrypted links over unsecure public networks such as the Internet and sending regular traffic through those secure links?

PPTP

What is the function of NNTP?

Posting, distribution, and retrieval of newsgroup messages

A Microsoft-proprietary protocol providing a user with a graphical interface for connecting to another computer over a network is known as:

RDP

Which of the following answers lists an example of a routing protocol?

RIP

IMAP4 is used for:

Retrieving email messages from a mail server

What is the function of POP3?

Retrieving email messages from a mail server

Which of the protocols listed below is used for automated discovery of networked services on Local Area Networks (LANs)?

SLP

A protocol used in network management systems for monitoring network-attached devices is known as:

SNMP

Which of the following answers refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers?

SSH

Which of the protocols listed below was designed as a secure replacement for Telnet?

SSH

A solution designed to strengthen existing WEP implementations without the requirement for replacement of legacy hardware is called:

TKIP

(T or F) A double colon in an IPv6 address indicates that part of the address containing only zeroes has been compressed to make the address shorter.

True

(T or F) The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.

True

(T or F)Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for providing shared access to files, directories, and devices.

True

(T or F)Telnet does not offer encryption and sends passwords in cleartext.

True

(T or F)The term Internet Protocol Security (IPsec) refers to a suite of protocols providing authentication and encryption features in order to ensure secure exchange of IP packets.

True

What is the common term for a group of protocols used to carry voice data over a packet-switched network?

VoIP

Which of the answers listed below refers to a suite of protocols used to enable Internet access on mobile devices?

WAP


संबंधित स्टडी सेट्स

Lesson 11: NC Statutes & Regulations Pertinent to Life Insurance

View Set

YAL // Stay Fat for Sarah Byrnes - Study Guide.

View Set