Network Protocols Quiz

Ace your homework & exams now with Quizwiz!

What is the function of POP3? Email retrieval File exchange Directory access Name resolution

Email retrieval In computing, the Post Office Protocol is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. POP version 3 is the version in common use.

Which of the following is a file sharing network protocol? RDP SSH AFP SLP

AFP The Apple Filing Protocol, formerly AppleTalk Filing Protocol, is a proprietary network protocol, and part of the Apple File Service, that offers file services for macOS and the classic Mac OS. In Mac OS 9 and earlier, AFP was the primary protocol for file services.

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as: DNS SNMP NAT DHCP

DHCP The Dynamic Host Configuration Protocol is a network management protocol used on Internet Protocol local area networks. A DHCP server must be present on the network.

Which of the following describes a system that maps domain names to various types of data, such as numerical IP addresses? TCP/IP DNS SQL DHCP

DNS The Domain Name System is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Port: 53

LDAP is an example of a(n): Authentication protocol Address resolution protocol Directory access protocol File exchange protocol

Directory access protocol The Lightweight Directory Access Protocol is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network. Standard port: 389, 636 (LDAPS)

Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn't support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol. True False

False

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake, a set of initial steps required to establish a network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). True False

False

What is the function of FTP? Email service Directory access Serving of web pages File exchange

File exchange The File Transfer Protocol is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client-server model architecture using separate control and data connections between the client and the server.

Which network protocol enables users to retrieve the contents of an Internet page from a web server? SNMP HTTP SMTP IMAP

HTTP The Hypertext Transfer Protocol is an application layer protocol for distributed, collaborative, hypermedia information systems. Port: 80

What is the name of a network protocol that secures web traffic via SSL/TLS encryption? SFTP HTTPS FTPS SNMP

HTTPS Hypertext Transfer Protocol Secure is an extension of the Hypertext Transfer Protocol. It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security or, formerly, Secure Sockets Layer. Port: 443

Which of the following is used when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN? DNS TCP/IP NetBIOS DHCP

NetBIOS NetBIOS is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, NetBIOS is not a networking protocol.

Which of the following are characteristic features of SMB/CIFS? (Select 2 answers) - Used mainly by computers running Linux distributions - Provides shared access to files, directories, and devices - Enables connectivity over SAN - Used mainly by computers running Microsoft Windows operating systems - Enables voice and multimedia communications over IP networks

Provides shared access to files, directories, and devices Used mainly by computers running Microsoft Windows operating systems CIFS stands for Common Internet File System. CIFS is a dialect of SMB. That is, CIFS is a particular implementation of the Server Message Block protocol, created by Microsoft. Allows communication for shared access to files, printers, and serial ports between nodes on a network. It also provides an authenticated inter-process communication mechanism.

Telnet: (Select 3 answers) - Encrypts network connection - Provides username & password authentication - Transmits data in an unencrypted form - Does not provide authentication - Enables remote login and command execution

Provides username & password authentication Transmits data in an unencrypted form Enables remote login and command execution

Which of the following is a Microsoft-proprietary remote-access protocol providing users with a graphical interface that allows them to connect to another computer on a network? RDP SSH VNC Telnet

RDP Remote Desktop Protocol is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software.

IMAP is used for: - Serving web pages - Translating domain names into IP addresses - Retrieving email messages from a mail server - Sending email messages

Retrieving email messages from a mail server In computing, the Internet Message Access Protocol is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. IMAP is defined by RFC 3501.

Which of the following protocols permits automated discovery of networked services on Local Area Networks (LANs)? SMB AFP CIFS SLP

SLP The Service Location Protocol (SLP, srvloc) is a service discovery protocol that allows computers and other devices to find services in a local area network without prior configuration. SLP has been designed to scale from small, unmanaged networks to large enterprise networks.

A type of protocol used in network management systems to monitor network-attached devices is called: SMB NTP SNMP RDP

SNMP Simple Network Management Protocol is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. Port(s): 161, 162 (Trap) OSI layer: Application RFC(s): 3411-3418

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as: TFTP SSH Telnet RDP

SSH SSH or Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.

The SMTP protocol is used for: (Select 2 answers) - Sending email messages between mail servers - Providing name resolution services - Serving of web pages - Retrieving email messages from mail servers - Sending email messages from a client device

Sending email messages between mail servers Sending email messages from a client device The Simple Mail Transfer Protocol is an internet standard communication protocol for electronic mail transmission. Mail servers and other message transfer agents use SMTP to send and receive mail messages.

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks. True False

True NetBIOS over TCP/IP is a networking protocol that allows legacy computer applications relying on the NetBIOS API to be used on modern TCP/IP networks. NetBIOS was developed in the early 1980s, targeting very small networks.


Related study sets

AP Human Geography: Urban Geography Vocabulary

View Set

CIS 282 Fall 2022 - Final Studyguide

View Set

Home Owners Course Pre-test (Clearpoint) March 2022

View Set

Unit 2: Nature vs. Nurture Study Guide

View Set