Network Protocol quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is an IPv4 loopback address?

127.0.0.1

What is the bit length of an IPv4 address?

32 bits

A MULTIMETER tool is used for testing power supply voltage output

A CABLE TESTER tool is used for verifying correct electrical connections of wires in a cable

A LOOPBACK PLUG is used on the connector pins on the NIC's port to test it in troubleshooting.

A PUNCHDOWN TOOL is used for attaching wires to a patch panel

A Hub has a disadvantage in that any incoming signal on any of its ports is re-created and sent out on any connected ports, which in turn, forces all the connected devices to share the total amount of available bandwith.

A Switch refers to a data link layer (Layer 2) device designed to forward data packets between Local Area Network (LAN) segments.

A CRIMPER tool is used for attaching a RJ-45 connector to a twisted pair Ethernet cable

A WIRE STRIPPER is a tool used for removing electrical insulation cover from electrical wires

The function of NNTP is to facilitate the posting, distribution, and retrieval of newsgroup messages.

A network protocol used for synching clocks over a computer network is called NTP

A Firewall is software or hardware that checks information coming from the Internet and depending on the applied configuration settings either blocks it or allows it to pass through

A patch panel device consists of multiple computer ports arranged in rows used for the purpose of cable management

A Router is a device designed to filter and transfer IP packets between dissimilar types of computer networks

An Access Point (AP) is an infrastructure device designed for connecting wireless/wired client devices to a network

A Repeater is a type of network device that amplifies received signal so it can be transmitted over greater distance without loss in quality

An Extender refers to a network device that allows to overcome limitations related to the max allowable cable segment length

A Wireless bridge device is the most convenient for interconnecting two or more physically separated network segments

An analog modem device allows for establishing a communication channel over a PSTN

AFP is a file sharing protocol

DHCP server is used to assign dynamic IP addresses to devices on the network

What is it called when a system containing mappings of domain names to various types of data, such as numerical IP addresses?

DNS

In order to be able to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. What server handles this type of request?

DNS server

A protocol used for retrieving contents of an Internet page from a web server is called

HTTP

A secure version of the HTTP protocol offering traffic encryption is known as

HTTP over SSL HTTP over TLS HTTPS

Examples of secure network protocols offering traffic encryption include

HTTPS IPsec SSH

Address Resolution Protocol (ARP) provides what kind of resolution?

IP to MAC

PPTP protocol is used for performing printing-related task on a network?

IPP

Internet Protocol Security (IPsec) refers to a suite of protocols providing authentication and encryption features in order to secure exchange of IP packets.

LDAP is an example of Directory access protocol

NETWORK DEVICES AND TOOLS QUIZ

NETWORK DEVICES AND TOOLS QUIZ

EPP is a computer technology that enables sending data over wiring used for transmission of electrical power

PoE refers to a solution that allows for carrying both data electrical power over a single twisted-pair Ethernet cable

A microsoft propriety protocol providing a user with a graphical interface for connecting to another computer over a network is known as:

RDP

Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for providing shared access to files, directories and devices.

SLP protocol is used for automated discovery of networked services on Local Area Networks (LANs)

What is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers?

SSH

What protocol was designed as a secure replacement for Telnet?

SSH

What was designed as a secure replacement for Telnet?

SSH

Telnet does not offer encryption and sends passwords in cleartext

Secure network protocols offering traffic encryption include HTTPS, IPsec,m and SSH

What is the function of SMTP?

Sending email messages between mail servers

A solution designed to strengthen existing WEP implementations without the requirement for replacement of legacy hardware is called

TKIP

PPP protocol is used for establishing a dedicated point to point link between two networked devices

The PPTP network protocol allows for creating encrypted links over unsecure public networks such as the Internet and sending regular traffic through those secure links.

NetBIOS is used when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.

The ICMP protocol is used by the PING utility

The network protocol used for exchanging information concerning the state of the IP network (e.g. testing the reach ability of a remote host) is known as ICMP.

RIP is Routing Information Protocol

The oldest routing protocol that is still widely used, RIP is a distance-vector protocol that uses hop count as its routing metric and allows up to only 15 hops. It is considered an IGP. Compared with other, more modern, routing protocols, RIP is slower and less secure.

VoIP is the common term for a group of protocols used to carry voice data over a packet-switched network

WAP is a suite of protocols used to enable Internet access on mobile devices

SNMP (Simple Network Management Protocol)

a protocol used in network management systems for monitoring network-attached devices

The FTP protocol is designed for

file exchange

IPv6 addresses are expressed with the use of

hexadecimal numbers

Characteristic features of TFTP include

provides no security features a very basic form of file sharing protocol Frequently used for exchanging boot and configuration files on private LANs

IMAP4 is used for

retrieving email messages from a mail server

What is the function of POP3?

retrieving email messages from a mail server

A double colon in an IPv6 address indicates that part of he address containing only zeros has been compressed to make the address shorter

true

Telnet does not offer encryption and sends passwords in cleartext

true


संबंधित स्टडी सेट्स

Combo with "Chapter 48 Assessment and Management of Patients With Hepatic Disorders" and 1 other

View Set

Interior Design Final Review Questions

View Set

Sinners in the Hands of an Angry God

View Set

Principles of Marketing 2 (After Midterm)

View Set

Ch. 05: Introduction to Qualitative Research, Ch. 6: Qualitative Approaches to Research, Ch. 7: Appraising Qualitative Research, Ch. 8: Introduction to Quantitative Research

View Set

Psychology Chapter 7 Inquisitive

View Set