Network Protocol Quiz Flashcards

1
Q

What is the function of FTP (File Transfer Protocol)?

A

File Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:

A

SSH (Secure Shell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network protocol for secure file transfer over Secure Shell (SSH) is called:

A

SFTP (Secure File Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Telnet: (Select 3 answers)

A

Provides username & password authentication
Transmits data in an unencrypted form
Enables remote login and command execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The SMTP Protocol is used for: (Select 2 answers)

A

Sending email messages between mail servers
Sending email messages from a client device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

A

DNS (Domain Name Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network protocol providing an alternative solution to the manual allocation of IP addresses is called:

A

DHCP (Dynamic Host Configuration Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the characteristic features of TFTP? (Select 2 answers)

A

Provides no security features
A very basic form of file sharing protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which network protocol enables retrieving contents of an Internet page from a web server?

A

HTTP (Hypertext Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

POP3 is used for:

A

Email retrieval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the answers below refers to a network protocol used for synchronizing clocks for a computer network?

A

NTP (Network Time Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following answers refer to IMAP4? (Select 2 answers)

A

Offers improved functionality in comparison to POP3
Serves the same function as POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A type of protocol used in network management systems for monitoring network-attached devices is known as:

A

SNMP (Simple Network Management Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LDAP (Lightweight Directory Access Protocol) is an example of:

A

Directory access protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the name of a network protocol that secures web traffic via SSL/TLS encryption?

A

HTTPS (Hypertext Transfer Protocol Secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the characteristics for SMB/CIFS? (Select all that apply)

A

Provides shared access to files, directories, and devices
Used mainly by computers running Microsoft Windows operating systems

17
Q

Which of the following answers refers to an SSL/TLS-based directory access protocol?

A

LDAPS (Lightweight Directory Access Protocol)

18
Q

Which of the following answers refers to a Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network?

A

RDP (Remote Desktop Protocol)

19
Q

Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing or instant messaging services?

A

SIP (Session Initiation Protocol)

20
Q

Which of the answers listed below refers to a secure replacement for Telnet?

A

SSH (Secure Shell)

21
Q

Which of the following answers refers to a protocol used by routers, hosts, and network devices to generate error messages and troubleshoot problems with delivery of IP packets?

A

ICMP (Internet Control Message Protocol)

22
Q

Which of the following answers refers to a tunneling protocol?

A

GRE (Generic Routing Encapsulation)

23
Q

Which part of the IPsec protocol suite provides authentication and integrity?

A

AH (Authentication Header)

24
Q

Which part of IPsec provides authentication, integrity, and confidentiality?

A

ESP (Encapsulating Security Payload)

25
Q

Which of the IPsec modes provides entire packet encryption?

A

Tunnel

26
Q

An IPsec mode providing encryption only for the payload (the data part of the packet) is known as:

A

Transport Mode

27
Q

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake, which is a set of initial steps required to establish network connection. UDP support retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets taht arrived out of order.

A

False

28
Q

Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol.

A

False