CompTIA A+ Exam 220-1101 - Network Protocols Quiz Flashcards

1
Q

What is the function of FTP?

A

File exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Telnet:

(3 answers)

A

Provides username & password authentication

Transmits data in an unencrypted form

Enables remote login and command execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which refers to a secure replacement for Telnet?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The SMTP protocol is used for:

(2 answers)

A

Sending email messages between mail servers

Sending email messages from a client device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as:

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which network protocol enables retrieving contents of an Internet page from a web server?

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

POP3 protocol is used for:

A

Email retrieval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which is in use when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN?

A

NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks.

TRUE/ FALSE

A

TRUE

NetBT = resolves NetBIOS names to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which refers to IMAP4?

(2 answers)

A

Offers improved functionality in comparison to POP3

Serves the same function as POP3
[Email retrival]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A type of protocol used in network management systems for monitoring network-attached devices is called:

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Of the three existing versions of the Simple Network Management Protocol (SNMP), versions 1 and 2 (SNMPv1 and SNMPv2) offer authentication based on community strings sent in an UNENCRYPTED form (in cleartext).

SNMPv3 provides packet encryption, authentication, and hashing mechanisms that allow for checking whether data has changed in transit (i.e., data integrity).

TRUE / FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

LDAP is an example of:

A

Directory access protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the name of a network protocol that secures web traffic via SSL/TLS encryption?

A

HTTPS

17
Q

What are the characteristics of SMB/CIFS? (Select all that apply)

A

Provides shared access to files, directories, and devices

Used mainly by computers running Microsoft Windows operating systems

18
Q

Which of the following answers refers to a Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network?

A

RDP

19
Q

Transmission Control Protocol (TCP) is a connection-oriented protocol using a three-way handshake, which is a set of initial steps required to establish network connection.

TCP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).

TRUE / FALSE

A

TRUE

Reliable

20
Q

User Datagram Protocol (UDP) is an example of a connectionless protocol.

Because UDP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol.

TRUE / FALSE

A

TRUE

Unreliable

21
Q

Examples of connectionless protocols include:

(2 answers)

A

DHCP

TFTP

22
Q

Which refer to connection-oriented protocols?

(2 answers)

A

SSH

HTTPS

23
Q

Which refer to common applications that make use of TCP?

(3 answers)

A

File transfer

Email communication

Web browsing

24
Q

Which of the following answers refer(s) to common applications of UDP?

A

Video conferencing

Live streaming

Online gaming

Voice over IP (VoIP)