Network Protocols
What is the function of POP3? A. Email retrieval B. File exchange C. Directory access D. Name resolution
A. Email retrieval
Which of the following is a Microsoft-proprietary remote-access protocol providing users with a graphical interface that allows them to connect to another computer on a network? A. RDP B. SSH C. VNC D. Telnet
A. RDP
The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks. True False
True
The SMTP protocol is used for: (Select 2 answers) A. Sending email messages between mail servers B. Providing name resolution services C. Serving of web pages D. Retrieving email messages from mail servers E. Sending email messages from a client device
A. Sending email messages between mail servers E. Sending email messages from a client device
Which of the following describes a system that maps domain names to various types of data, such as numerical IP addresses? A. TCP/IP B. DNS C. SQL D. DHCP
B. DNS
Which network protocol enables users to retrieve the contents of an Internet page from a web server? A. SNMP B. HTTP C. SMTP D. IMAP
B. HTTP
What is the name of a network protocol that secures web traffic via SSL/TLS encryption? A. SFTP B. HTTPS C. FTPS D. SNMP
B. HTTPS
Which of the following are characteristic features of SMB/CIFS? (Select 2 answers) A. Used mainly by computers running Linux distributions B. Provides shared access to files, directories, and devices C. Enables connectivity over SAN D. Used mainly by computers running Microsoft Windows operating systems E. Enables voice and multimedia communications over IP networks
B. Provides shared access to files, directories, and devices D. Used mainly by computers running Microsoft Windows operating systems
Telnet: (Select 3 answers) A. Encrypts network connection B. Provides username & password authentication C. Transmits data in an unencrypted form D. Does not provide authentication E. Enables remote login and command execution
B. Provides username & password authentication C. Transmits data in an unencrypted form E. Enables remote login and command execution
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as: A. TFTP B. SSH C. Telnet D. RDP
B. SSH
Which of the following is a file sharing network protocol? A. RDP B. SSH C. AFP D. SLP
C. AFP
LDAP is an example of a(n): A. Authentication protocol B. Address resolution protocol C. Directory access protocol D. File exchange protocol
C. Directory access protocol
Which of the following is used when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN? A. DNS B. TCP/IP C. NetBIOS D. DHCP
C. NetBIOS
IMAP is used for: A. Serving web pages B. Translating domain names into IP addresses C. Retrieving email messages from a mail server D. Sending email messages
C. Retrieving email messages from a mail server
A type of protocol used in network management systems to monitor network-attached devices is called: A. SMB B. NTP C. SNMP D. RDP
C. SNMP
A network protocol providing an alternative solution to the manual allocation of IP addresses is known as: A. DNS B. SNMP C. NAT D. DHCP
D. DHCP
What is the function of FTP? A. Email service B. Directory access C. Serving of web pages D. File exchange
D. File exchange
Which of the following protocols permits automated discovery of networked services on Local Area Networks (LANs)? A. SMB B. AFP C. CIFS D. SLP
D. SLP
Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn't support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol. True False
False
User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake, a set of initial steps required to establish a network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). True False
False