Networking Practice Questions Flashcards

1
Q

When using TCP, two hosts first establish a connection through a three-way handshake. This handshake process is established in the following order:

A

-The first host sends a SYN packet asking to create a new session.
-The receiving host replies with a SYN-ACK packet acknowledging that the session can be created.
-The first host replies with the ACK packet, which then opens the session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Each packet contains a packet header, which is a special label that defines the sender, receiver, and data chunk order.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A SYN packet and an ACK packet are part of the TCP three-way handshake process to establish a connection between two hosts.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information about how to deliver the packet is the IP protocol’s responsibility.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trivial File Transfer Protocol (TFTP) is a simple protocol for exchanging files between two TCP/IP machines. It is not contained in a packet’s header.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

User Datagram Protocol (UDP)

A

is a Transport layer protocol that uses a simple connectionless communication model with a minimal protocol mechanism. This makes it suitable for streaming video or sound. Guaranteed data delivery is not as important as fast transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Transport Layer Protocol (TCP)

A

is a Transport layer protocol that provides reliable, ordered, and error-checked data delivery. Guaranteed data delivery is more important than fast transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Internet Control Message Protocol (ICMP)

A

is an Internet layer protocol used by network devices, including routers, to send error messages and operational information. For example, ICMP may state that a service is unavailable or a host couldn’t be reached.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

File Transfer Protocol (FTP)

A

is an Application layer protocol used to transfer computer files between hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Domain Name System

A

(DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dynamic Host Configuration Protocol

A

(DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lightweight Directory Access Protocol

A

(LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Simple Network Management Protocol

A

(SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Clients use DHCP to request an IP address, and servers use DHCP to provide an IP address.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SNMP

A

is used to collect information about managed devices on IP networks. SNMP can also modify settings to change a network device’s behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

LDAP

A

is used to access and maintain distributed directory information services.

17
Q

DNS

A

associates readily recognizable domain names to numerical IP addresses.

18
Q

DHCP

A

is used by clients to request an IP address and by a server to offer an IP address.

19
Q

SMB

A

is used for shared access to files and miscellaneous communications between hosts on a network. This protocol also provides an authenticated inter-process communication mechanism.

20
Q

SSH

A

allows network services to communicate securely over an unsecure network (for example, secure remote login to computer systems by users).

21
Q

File Transfer Protocol (FTP)

A

It enables file transfers and supports user authentication

22
Q

Simple Network Management Protocol (SNMP)

A

is used to remotely monitor and manage network devices and hosts.

23
Q

Simple Mail Transfer Protocol (SMTP)

A

is used to transfer email message from email clients to email servers.

24
Q

Trivial File Transfer Protocol (TFTP)

A

also enables file transfer but does not support user authentication.

25
Q

Lightweight Directory Access Protocol (LDAP)

A

allows access to information about network resources stored in a directory server.

26
Q

Secure Shell (SSH)

A

allows users to securely access a remote computer system’s console prompt.

27
Q

IMAP

A

allows a mail server to keep a copy of a user’s messages on the server after they’re downloaded to the mail client.

28
Q

SMTP

A

allows a user to send email to a server, but it can’t be used to retrieve messages from the server.

29
Q

A POP3 server

A

is also used by a mail client to retrieve messages from a mail server, but it requires that the messages be deleted from the server after they’ve been downloaded.

30
Q

NTP

A

synchronizes all network computer clocks.

31
Q

Server Message Block (SMB)

A

is used by Windows systems to access shared resources over the network.

32
Q

Lightweight Directory Access Protocol (LDAP)

A

is used to access information stored in a server’s directory service.

33
Q

Remote Desktop Protocol (RDP)

A

is used to access remote systems’ desktops.

34
Q

Secure File Transfer Protocol (SFTP)

A

is used to securely transfer files between hosts.

35
Q

The Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user’s Windows computer is

A

Remote Desktop Protocol (RDP). By default, RDP uses port 3389.

36
Q

HTTP

A

uses port 80.

37
Q

HTTPS

A

uses port 443.

38
Q

IMAP

A

email clients use port 143.