Network Protocols
A type of protocol used in network management systems for monitoring network-attached devices is known as: SMB NTP SNMP RDP
SNMP
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? TCP/IP DNS SQL DHCP
DNS
Which of the following answers refer to IMAP4? (Select 2 answers) - Offers improved functionality in comparison to POP3 - Serves the same function as POP3 - Enables sending email messages from client devices - Offers less functions than POP3 - Enables email exchange between mail servers
Offers improved functionality in comparison to POP3 Serves the same function as POP3
What are the characteristic features of TFTP? (Select 2 answers) - Provides no security features - Typically used for exchanging files over the Internet - A very basic form of file sharing protocol - Provides authentication and encryption - Directory access protocol
- Provides no security features - A very basic form of file sharing protocol
What are the characteristics of SMB/CIFS? (Select all that apply) - Used mainly by computers running Linux distributions - Provides shared access to files, directories, and devices - Used mainly by computers running Microsoft Windows operating systems - Enables voice and multimedia communications over IP networks
- Provides shared access to files, directories, and devices - Used mainly by computers running Microsoft Windows operating systems
Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol. True False
FALSE
User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake, which is a set of initial steps required to establish network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). True False
FALSE
What is the name of a network protocol that secures web traffic via SSL/TLS encryption? SFTP HTTPS FTPS SNMP
HTTPS
Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? - NTP - VTP - NNTP - RTP
NTP
Which part of the IPsec protocol suite provides authentication and integrity? CRC AH SIEM AES
AH
A network protocol providing an alternative solution to the manual allocation of IP addresses is called: DNS SNMP NAT DHCP
DHCP
LDAP is an example of: - Authentication protocol - Address resolution protocol - Directory access protocol - File exchange protocol
Directory access protocol
Which part of IPsec provides authentication, integrity, and confidentiality? AES SHA AH ESP
ESP
POP3 is used for: - Name resolution - Sending email messages - File exchange - Email retrieval
Email retrieval
What is the function of FTP? Email service Directory access Serving of web pages File exchange
File exchange
Which of the following answers refers to a tunneling protocol? VRRP GRE RTSP BGP
GRE
Which network protocol enables retrieving contents of an Internet page from a web server? SNMP HTTP SMTP IMAP
HTTP
Which of the following answers refers to a protocol used by routers, hosts, and network devices to generate error messages and troubleshoot problems with delivery of IP packets? CCMP RSTP ICMP SNMP
ICMP
Which of the following answers refers to an SSL/TLS-based directory access protocol? H.323 PPTP Kerberos LDAPS
LDAPS
Telnet: (Select 3 answers) - Encrypts network connection - Provides username & password authentication - Transmits data in an unencrypted form - Does not provide authentication - Enables remote login and command execution
Provides username & password authentication Transmits data in an unencrypted form Enables remote login and command execution
Which of the following answers refers to a Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network? RDP SSH VNC Telnet
RDP
A network protocol for secure file transfer over Secure Shell (SSH) is called: TFTP SFTP Telnet FTPS
SFTP
Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? L2TP BGP RSTP SIP
SIP
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as: TFTP SSH Telnet RDP
SSH
Which of the answers listed below refers to a secure replacement for Telnet? CHAP FTP SNMP SSH
SSH
the SMTP protocol is used for: (Select 2 answers) - Sending email messages between mail servers -Name resolution services - Serving of web pages - Retrieving email messages from mail servers - Sending email messages from a client device
Sending email messages between mail servers - Sending email messages from a client device
An IPsec mode providing encryption only for the payload (the data part of the packet) is known as: Protected mode Tunnel mode Transport mode Safe mode
Transport mode
Which of the IPsec modes provides entire packet encryption? Tunnel Payload Transport Default
Tunnel