Network Protocols Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

POP3 is used for: Name resolution Sending email messages File exchange Email retrieval

(Post Office Protocol 3) Email retrieval

LDAP is an example of: Authentication protocol Address resolution protocol Directory access protocol File exchange protocol

Directory access protocol

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as: DNS SNMP NAT DHCP

Dynamic Host Configuration Protocol (DHCP)

Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? NTP VTP NNTP RTP

Network Time Protocol (NTP)

A Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network is known as: RDP SSH VNC Telnet

Remote Desktop Protocol (RDP)

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as: TFTP SSH Telnet RDP

(SSH)

Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets? CCMP RSTP ICMP SNMP

Internet Control Message Protocol (ICMP)

Which of the answers listed below refers to a network authentication protocol that provides the single sign-on functionality? RADIUS MS-CHAP Kerberos TACACS+

Kerberos. is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

Which network protocol enables encapsulation of PPP frames within 802.3 frames? FCoE PPPoE EAP IPsec

PPPoE

What are the characteristics of SMB/CIFS? (Select 2 answers) Used mainly by computers running Linux distributions Provides shared access to files, directories, and devices Used mainly by computers running Microsoft Windows operating systems. Enables voice and multimedia communications over IP networks

Server Message Block (SMB) 2,3

A non-proprietary alternative to Remote Desktop Protocol (RDP) that enables control over another computer on the network with the use of a graphical user interface is called: VTP VRF VTC VNC

Virtual Network Computing (VNC)

Which of the answers listed below refer to IMAP4? (Select 2 answers) Offers improved functionality in comparison to POP3 Serves the same function as POP3 Enables sending email messages from client devices Offers less functions than POP3 Enables email exchange between mail servers

1,2

What are the characteristic features of TFTP? (Select 2 answers) Provides no security features Typically used for exchanging files over the Internet A very basic form of file sharing protocol Provides authentication and encryption Directory access protocol

1,3

Examples of protocols used for implementing secure VPN tunnels include: (Select 3 answers) DTLS bcrypt SCP IPsec SSL/TLS

1,4,5 Datagram Transport Layer Security (DTLS) IP security (IPSec) Secure Sockets Layer (SSL) /Transport Layer Security (TLS)

Telnet: (Select 3 answers) Encrypts network connection Provides username & password authentication Transmits data in an unencrypted form Does not provide authentication Enables remote login and command execution

2,3,5

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? TCP/IP DNS SQL DHCP

Domain Name Server (DNS)

Which of the following remote file-access protocols do not offer encryption? (Select 2 answers) FTP FTPS SCP SFTP TFTP

FTP,TFTP

A network protocol that allows for secure file transfer over SSL is known as: TFTP SCP FTPS SFTP

FTPS

Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn't support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol. True False

False

What is the function of FTP? Mail services Serving of web pages Directory access File exchange

File exchange

Which of the answers listed below refers to a protocol used for managing VoIP and VTC services? SMB H.323 SCP IGP

H.323

Which protocol allows for retrieving contents of an Internet page from a web server? SNMP HTTP SMTP IMAP

HTTP

What is the name of a network protocol that secures web traffic via SSL/TLS encryption? SFTP HTTPS FTPS SNMP

HTTPS

Which of the protocols listed below enables remote access to another computer on the network via web browser? RDP HTTPS SSH VNC

HTTPS

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? UDP IP TCP NetBIOS

IP

Which network protocol enables detection of packet loss? SMB ICMP ARP SNTP

Internet Control Message Protocol (ICMP)

Which of the following answers refers to an SSL/TLS-based directory access protocol? H.323 PPTP Kerberos LDAPS

Lightweight Directory Access Protocol (LDAPS)

Which of the following protocols provide protection against switching loops? (Select 2 answers) RTP SRTP RDP STP RSTP

Rapid Spanning Tree Protocol (RSTP)

Which of the following protocols enables secure remote access to another computer on the network via command line? VNC Telnet SSH RDP

SHH

Which of the answers listed below refers to a secure replacement for Telnet? CHAP FTP SNMP SSH

Secure Shell (SSH)

Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? L2TP BGP RSTP SIP

Session Initiation Protocol (SIP)

A network protocol that allows for secure file transfer over Secure Shell (SSH) is called: TFTP SFTP Telnet FTPS

Simple File Transfer Protocol (SFTP)

Which of the following answers refers to a network protocol used in the most common types of spoofing attacks? SMTP RDP SNMP Telnet

Simple Mail Transfer Protocol (SMTP)

A type of protocol used in network management systems for monitoring network-attached devices is called: SMB NTP SNMP RDP

Simple Network Management Protocol (SNMP)

A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called: PEAP TKIP CCMP WPA2

Temporal Key Integrity Protocol is a security protocol used in the IEEE 802.11 wireless networking standard.

Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4. True False

True

The purpose of the Carrier Sense Multiple Access (CSMA) protocol is to verify the absence of other traffic on a shared medium before transmitting to prevent collisions and loss of data. True False

True

Which of the answers listed below refer(s) to PPP? (Select all that apply) A network protocol used for connecting devices on a WAN Transport layer (layer 4) protocol Enables encapsulation of IP traffic Used for establishing a direct connection between two networked devices Application layer (layer 7 protocol)

1,3,4 Point-to-Point Protocol (PPP)

The SMTP protocol is used for: (Select 2 answers) Sending email between mail servers Name resolution Serving web pages Retrieving email from mail servers Sending email from a client device

1,5

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). True False

False


Set pelajaran terkait

chapter 2: fluids, electrolytes, and acid-bases

View Set

Introduction to Management Information Systems (BADM 2301) Final Review

View Set

General Chemistry Chapter 1 Bowie State University

View Set

Adult Health 2 Peri-operative Care

View Set

House Taken Over (with "The Fall of the House of Usher")

View Set