CompTIA Network+ Exam N10-007 Network Protocols Quiz

Ace your homework & exams now with Quizwiz!

A type of protocol used in network management systems for monitoring network-attached devices is called: • SMB • NTP • SNMP • RDP

SNMP

Which of the following answers refers to a link-state routing protocol? • BGP • EIGRP • RIP • OSPF

OSPF

Which of the answers listed below refer to IMAP4? (Select 2 answers) • Offers improved functionality in comparison to POP3 • Serves the same function as POP3 • Enables sending email messages from client devices • Offers less functions than POP3 • Enables email exchange between mail servers

Offers improved functionality in comparison to POP3, Serves the same function as POP3

Which network protocol enables encapsulation of PPP frames within 802.3 frames? • FCoE • PPPoE • EAP • IPsec

PPPoE

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as for example numerical IP addresses? • TCP/IP • DNS • SQL • DHCP

DNS

POP3 is used for: • Name resolution • Sending email messages • File exchange • Email retrieval

Email retrieval

Which of the following remote file-access protocols do not offer encryption? (Select 2 answers) • FTP • FTPS • SCP • SFTP • TFTP

FTP, TFTP

A network protocol that allows for secure file transfer over SSL is known as: • TFTP • SCP • FTPS • SFTP

FTPS

Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn't support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol. • True • False

False

Which protocol allows for retrieving contents of an Internet page from a web server? • SNMP • HTTP • SMTP • IMAP

HTTP

What is the name of a network protocol that secures web traffic via SSL/TLS encryption? • SFTP • HTTPS • FTPS • SNMP

HTTPS

Which of the protocols listed below enables remote access to another computer on the network via web browser? • RDP • HTTPS • SSH • VNC

HTTPS

Border Gateway Protocol (BGP) falls into the category of: • Hybrid routing protocols • Link-state routing protocols • Distance-vector routing protocols • Static routing protocols

Hybrid routing protocols

Which of the answers listed below refers to a network authentication protocol that provides the single sign-on functionality? • RADIUS • MS-CHAP • Kerberos • TACACS+

Kerberos

Which of the following answers refers to an SSL/TLS-based directory access protocol? • H.323 • PPTP • Kerberos • LDAPS

LDAPS

A type of routing protocol that calculates the best path between source and destination nodes based on a map of network connectivity between nodes is called: • Dynamic • Link-state • Static • Distance-vector

Link-state

An IPv6 protocol performing the function of IPv4's Address Resolution Protocol (ARP) is called: • NCP • NDP • NTP • NDR

NDP

An IPv6 protocol used by routers to advertise their presence on a network is known as: • NDR • NCP • NDP • NTP

NDP

Which IPv6 protocol is used by networked hosts to determine the link layer address of adjacent nodes? • NTP • NDR • NCP • NDP

NDP

Which of the IPv6 protocols listed below is used by networked nodes for locating routers? • NDP • NTP • NDR • NCP

NDP

Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? • NTP • VTP • NNTP • RTP

NTP

Which of the answers listed below refer(s) to PPP? (Select all that apply) • Network protocol used for connecting devices on a WAN • Transport layer (layer 4) protocol • Enables encapsulation of IP traffic • Used for establishing a direct connection between two networked devices • Application layer (layer 7 protocol)

Network protocol used for connecting devices on a WAN Enables encapsulation of IP traffic Used for establishing a direct connection between two networked devices

What are the characteristic features of TFTP? (Select 2 answers) • Provides no security features • Typically used for exchanging files over the Internet • A very basic form of file sharing protocol • Provides authentication and encryption • Directory access protocol

Provides no security features A very basic form of file sharing protocol

What are the characteristics of SMB/CIFS? (Select 2 answers) • Used mainly by computers running Linux distributions • Provides shared access to files, directories, and devices • Used mainly by computers running Microsoft Windows operating systems • Enables voice and multimedia communications over IP networks

Provides shared access to files, directories, and devices Used mainly by computers running Microsoft Windows operating systems

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as: • DNS • SNMP • NAT • DHCP

DHCP

Examples of protocols used for implementing secure VPN tunnels include: (Select 3 answers) • DTLS • bcrypt • SCP • IPsec • SSL/TLS

DTLS,IPSEC,SSL/TLS

LDAP is an example of: • Authentication protocol • Address resolution protocol • Directory access protocol • File exchange protocol

Directory access protocol

Which of the answers listed below refers to a type of routing protocol that determines the best route for data packets based on the lowest number of hops? • Hybrid • Link-state • Distance-vector • Dynamic

Distance-vector

Examples of distance-vector routing protocols include: (Select 2 answers) • EGP • OSPF • RIP • EIGRP • BGP

EIGRP, RIP

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). • True • False

False

What is the function of FTP? • Mail services • Serving of web pages • Directory access • File exchange

File exchange

Which of the answers listed below refers to a protocol used for managing VoIP and VTC services? • SMB • H.323 • SCP • IGP

H.323

Which network protocol enables detection of packet loss? • SMB • ICMP • ARP • SNTP

ICMP

Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets? • CCMP • RSTP • ICMP • SNMP

ICMP

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? • UDP • IP • TCP • NetBIOS

IP

A Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network is known as: • RDP • SSH • VNC • Telnet

RDP

A network protocol that allows for secure file transfer over Secure Shell (SSH) is called: • TFTP • SFTP • Telnet • FTPS

SFTP

Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? • L2TP • BGP • RSTP • SIP

SIP

Which of the following answers refers to a network protocol used in the most common types of spoofing attacks? • SMTP • RDP • SNMP • Telnet

SMTP

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as: • TFTP • SSH • Telnet • RDP

SSH

Which of the answers listed below refers to a secure replacement for Telnet? • CHAP • FTP • SNMP • SSH

SSH

Which of the following protocols enables secure remote access to another computer on the network via command line? • VNC • Telnet • SSH • RDP

SSH

Which of the following protocols provide protection against switching loops? (Select 2 answers) • RTP • SRTP • RDP • STP • RSTP

STP, RSTP

The SMTP protocol is used for: (Select 2 answers) • Sending email between mail servers • Name resolution • Serving of web pages • Retrieving email from mail servers • Sending email from a client device

Sending email between mail servers Sending email from a client device

A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called: • PEAP • TKIP • CCMP • WPA2

TKIP

Telnet: (Select 3 answers) • Encrypts network connection • Provides password authentication • Transmits data in an unencrypted form • Does not provide authentication • Enables remote login and command execution

Transmits data in an unencrypted form Does not provide authentication Enables remote login and command execution ( Your answer

A hybrid routing protocol combines the features of distance-vector and link-state routing protocols. • True • False

True

Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4. • True • False

True

The purpose of the Carrier Sense Multiple Access (CSMA) protocol is to verify the absence of other traffic on a shared medium before transmitting to prevent collisions and loss of data. • True • False

True

A non-proprietary alternative to RDP that enables control over another computer on the network with the use of a graphical user interface is called: • VTP • VRF • VTC • VNC

VNC


Related study sets

Oxygen binding by hemoglobin - analytical assignment BIO 1361: Cheek

View Set

writing fundamentals final review - Module 4 Exercises/Quiz

View Set

Safety and infection control - Client needs

View Set

Financial Management Of The Firm Chapter 9

View Set