CompTIA Network+ Certification Exam N10-007 Practice Test 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? a. NTP (Network Time Protocol) b. VTP (VLAN Trunking Protocol) c. NNTP (Network News Transfer Protocol) d. RTP (Real-Time Transport Protocol)

a. NTP (Network Time Protocol)

Which of the answers listed below refer to IMAP4? (Select 2 answers) a. Offers improved functionality in comparison to POP3 b. Serves the same function as POP3 c. Enables sending email messages from client devices d. Offers less functions than POP3 e. Enables email exchange between mail servers

a. Offers improved functionality in comparison to POP3 b. Serves the same function as POP3

What are the characteristic features of TFTP? (Select 2 answers) a. Provides no security features b. Typically used for exchanging files over the Internet c. A very basic form of file sharing protocol d. Provides authentication and encryption e. Directory access protocol

a. Provides no security features c. A very basic form of file sharing protocol

A Microsoft-proprietary protocol providing a user with graphical interface for connecting to another networked host is known as: a. RDP (Remote Desktop Protocol) b. SSH (Secure Shell) c. Telnet d. RSH (Remote Shell)

a. RDP (Remote Desktop Protocol)

The SMTP protocol is used for: (Select 2 answers) a. Sending email between mail servers b. Name resolution c. Serving of web pages d. Retrieving email from mail servers e. Sending email from a client device

a. Sending email between mail servers e. Sending email from a client device

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? a. TCP/IP (Transmission Control Protocol/Internet Protocol) b. DNS (Domain Name Server/Service) c. SQL (Structured Query Language) d. DHCP (Dynamic Host Configuration Protocol)

b. DNS (Domain Name Server/Service)

Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn't support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol. a. True b. False

b. False

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). a. True b. False

b. False

Which of the answers listed below refers to a protocol used for managing VoIP and VTC services? a. SMB (Server Message Block) b. H.323 (Telecommunication Standardization Sector) c. SCP (Secure Copy Protocol) d. IGP (Interior Gateway Protocol)

b. H.323 (Telecommunication Standardization Sector)

Which protocol allows for retrieving contents of an Internet page from a web server? a. SNMP (Simple Network Management Protocol) b. HTTP (Hypertext Transfer Protocol) c. SMTP (Simple Mail Transfer Protocol) d. IMAP (Internet Message Access Protocol)

b. HTTP (Hypertext Transfer Protocol)

What is the name of a network protocol that secures web traffic via SSL/TLS encryption? a. SFTP (Secure File Transfer Protocol) b. HTTPS (Hypertext Transfer Protocol Secure) c. FTPS (File Transfer Protocol Secure) d. SNMP (Simple Network Management Protocol)

b. HTTPS (Hypertext Transfer Protocol Secure)

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? a. UDP (User Datagram Protocol) b. IP (Internet Protocol) c. TCP (Transmission Control Protocol) d. NetBIOS

b. IP (Internet Protocol)

What are the characteristics of SMB/CIFS? (Select 2 answers) a. Used mainly by computers running Linux distributions b. Provides shared access to files, directories, and devices c. Used mainly by computers running Microsoft Windows operating systems d. Enables voice and multimedia communications over IP networks

b. Provides shared access to files, directories, and devices c. Used mainly by computers running Microsoft Windows operating systems

Telnet: (Select 3 answers) a. Encrypts network connection b. Provides username & password authentication c. Transmits data in an unencrypted form d. Does not provide authentication e. Enables remote login and command execution

b. Provides username & password authentication c. Transmits data in an unencrypted form e. Enables remote login and command execution

A network protocol that allows for secure file transfer over Secure Shell (SSH) is called: a. TFTP (Trivial File Transfer Protocol) b. SFTP (Secure File Transfer Protocol - using SSH) c. Telnet d. FTPS (File Transfer Protocol Secure)

b. SFTP (Secure File Transfer Protocol - using SSH)

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as: a. TFTP (Trivial File Transfer Protocol) b. SSH (Secure Shell) c. Telnet d. RDP (Remote Desktop Protocol)

b. SSH (Secure Shell)

LDAP is an example of: a. Authentication protocol b. Address resolution protocol c. Directory access protocol d. File exchange protocol

c. Directory access protocol

Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets? a. CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) b. RSTP (Rapid Spanning Tree Protocol) c. ICMP (Internet Control Message Protocol) d. SNMP (Simple Network Management Protocol)

c. ICMP (Internet Control Message Protocol)

A type of protocol used in network management systems for monitoring network-attached devices is called: a. SMB (Server Message Block) b. NTP (Network Time Protocol) c. SNMP (Simple Network Management Protocol) d. RDP (Remote Desktop Protocol)

c. SNMP (Simple Network Management Protocol)

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as: a. DNS (Domain Name Server/Service) b. SNMP (Simple Network Management Protocol) c. NAT (Network Address Translation) d. DHCP (Dynamic Host Configuration Protocol)

d. DHCP (Dynamic Host Configuration Protocol)

POP3 is used for: a. Name resolution b. Sending email messages c. File exchange d. Email retrieval

d. Email retrieval

What is the function of FTP? a. Mail services b. Serving of web pages c. Directory access d. File exchange

d. File exchange

Which of the following answers refers to an SSL/TLS-based directory access protocol? a. H.323 (Telecommunication Standardization Sector) b. PPTP (Point-to-Point Tunneling Protocol) c. Kerberos d. LDAPS (Lightweight Directory Access Protocol)

d. LDAPS (Lightweight Directory Access Protocol)

Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? a. L2TP (Layer 2 Tunneling Protocol) b. BGP (Border Gateway Protocol) c. RSTP (Rapid Spanning Tree Protocol) d. SIP (Session Initiation Protocol)

d. SIP (Session Initiation Protocol)

Which of the answers listed below refers to a secure replacement for Telnet? a. CHAP (Challenge-Handshake Authentication Protocol) b. FTP (File Transfer Protocol) c. SNMP (Simple Network Management Protocol) d. SSH (Secure Shell)

d. SSH (Secure Shell)


Set pelajaran terkait

FTM Quotes, Major Commands, Code of Conduct, Airman's Creed, Air Force Song, Missions

View Set

Ch. 2 Screening and Early Detection

View Set

Survey of Accounting Chapter 8 Smartbook

View Set

Macro Chapter 15 Review Questions

View Set

Chapter 8 - Emergency Care, First Aid, and Disasters

View Set

Chapter 11: Pricing Strategies: Additional Consideration

View Set