Network Protocols

Ace your homework & exams now with Quizwiz!

A type of protocol used in network management systems for monitoring network-attached devices is known as: SMB NTP SNMP RDP

SNMP

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? TCP/IP DNS SQL DHCP

DNS

Which of the following answers refer to IMAP4? (Select 2 answers) - Offers improved functionality in comparison to POP3 - Serves the same function as POP3 - Enables sending email messages from client devices - Offers less functions than POP3 - Enables email exchange between mail servers

Offers improved functionality in comparison to POP3 Serves the same function as POP3

What are the characteristic features of TFTP? (Select 2 answers) - Provides no security features - Typically used for exchanging files over the Internet - A very basic form of file sharing protocol - Provides authentication and encryption - Directory access protocol

- Provides no security features - A very basic form of file sharing protocol

What are the characteristics of SMB/CIFS? (Select all that apply) - Used mainly by computers running Linux distributions - Provides shared access to files, directories, and devices - Used mainly by computers running Microsoft Windows operating systems - Enables voice and multimedia communications over IP networks

- Provides shared access to files, directories, and devices - Used mainly by computers running Microsoft Windows operating systems

Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol. True False

FALSE

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake, which is a set of initial steps required to establish network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). True False

FALSE

What is the name of a network protocol that secures web traffic via SSL/TLS encryption? SFTP HTTPS FTPS SNMP

HTTPS

Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? - NTP - VTP - NNTP - RTP

NTP

Which part of the IPsec protocol suite provides authentication and integrity? CRC AH SIEM AES

AH

A network protocol providing an alternative solution to the manual allocation of IP addresses is called: DNS SNMP NAT DHCP

DHCP

LDAP is an example of: - Authentication protocol - Address resolution protocol - Directory access protocol - File exchange protocol

Directory access protocol

Which part of IPsec provides authentication, integrity, and confidentiality? AES SHA AH ESP

ESP

POP3 is used for: - Name resolution - Sending email messages - File exchange - Email retrieval

Email retrieval

What is the function of FTP? Email service Directory access Serving of web pages File exchange

File exchange

Which of the following answers refers to a tunneling protocol? VRRP GRE RTSP BGP

GRE

Which network protocol enables retrieving contents of an Internet page from a web server? SNMP HTTP SMTP IMAP

HTTP

Which of the following answers refers to a protocol used by routers, hosts, and network devices to generate error messages and troubleshoot problems with delivery of IP packets? CCMP RSTP ICMP SNMP

ICMP

Which of the following answers refers to an SSL/TLS-based directory access protocol? H.323 PPTP Kerberos LDAPS

LDAPS

Telnet: (Select 3 answers) - Encrypts network connection - Provides username & password authentication - Transmits data in an unencrypted form - Does not provide authentication - Enables remote login and command execution

Provides username & password authentication Transmits data in an unencrypted form Enables remote login and command execution

Which of the following answers refers to a Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network? RDP SSH VNC Telnet

RDP

A network protocol for secure file transfer over Secure Shell (SSH) is called: TFTP SFTP Telnet FTPS

SFTP

Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? L2TP BGP RSTP SIP

SIP

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as: TFTP SSH Telnet RDP

SSH

Which of the answers listed below refers to a secure replacement for Telnet? CHAP FTP SNMP SSH

SSH

the SMTP protocol is used for: (Select 2 answers) - Sending email messages between mail servers -Name resolution services - Serving of web pages - Retrieving email messages from mail servers - Sending email messages from a client device

Sending email messages between mail servers - Sending email messages from a client device

An IPsec mode providing encryption only for the payload (the data part of the packet) is known as: Protected mode Tunnel mode Transport mode Safe mode

Transport mode

Which of the IPsec modes provides entire packet encryption? Tunnel Payload Transport Default

Tunnel


Related study sets

Passpoint Questions that are hard, weird, or specific

View Set

Coursera (Practice Quiz: Code Reviews)

View Set

CA LIFE STATE PRACTICE EXAM PT 2(FROM EXAM FX ONLINE TEST)

View Set

Chapter 8: Bureaucracy Definitions

View Set

Chapter 35: The Child with Neuromuscular or Muscular Dysfunction

View Set

Science Chapter 13 - Directed Reading

View Set

Chapter 15: Supply Chain Management

View Set

A and P 2 Chapter 19 Blood Vessels -- Long Term Regulation

View Set

IB Biology 1.1- Stem Cells Review

View Set