CompTIA review1 Flashcards

1
Q

Provides a graphical user interface to a remote user,

A

RDP–3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

used in Voice over IP to initiate a telephone service request,

A

SIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Provides connection oriented data file transfer,

A

FTP–21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Predecessor to DHCP that provided IP addresses automatically,

A

BOOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Provides for connectionless data file transfer,

A

TFTP–69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Provides the ability to remotely monitor and manage network devices,

A

SNMP–161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Provides for retrieval of email using an always connected session,

A

IMAP4–143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Provides for transfer of email between email servers,

A

SMTP–25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

requires a login to a secure access to a website,

A

HTTPS–443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provides for an email client to access email remotely as prompted by the user,

A

POP3–110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provides secure connection to be able to manage remote devices,

A

SSH–22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Provides for improved streaming audio/video delivery over the internet,

A

RTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Manages multicast groups,

A

IGMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Provides for clock synchronization across a domain,

A

NTP–123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Older method of accessing remote devices, has no security built in,

A

Telnet–23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authentication and encryption process for retrieving web pages securely,

17
Q

Provides access to files through a web browser,

18
Q

Maps an IP address to a MAC Address,

19
Q

When a packet reaches a point where no futher routing is possible the packet is dropped and a message is returned–protocol,

20
Q

The correct OSI layer for the IP Protocol,

21
Q

Which IEEE standards covers VLANs,

22
Q

What is the meaning of VTP,

A

VLAN Trunk Protocol–reduces administration in a switched network

23
Q

What security technique would prevent users from using FTP

A

Port filtering

24
Q

BRI–Basic Rate Interface,

A

ISDN connection consisting of 2 64K bearer channels and one 16K data channel
Integrated Services for Digital Networks

25
Describe a MAC Address,
Factory assigned hardware burned into device. Hexidecimal numbers containing values 0-9 and A-F. may have dashes or colons
26
What is the method used to designate SONET fiber optic speed rating
OC--Optical carrier
27
What is the maximum geographic range of an 802.11g antenna,
100 meters
28
What technology is defined in the IEEE 802.16 specification,
WiMAX
29
In the 2.4 GHz frequency band, how many unlicensed channesl are available for used in wireless networking,
11
30
What OSI layer has the primary responsibility for routing
Network
31
In the US--how many channels are available in the 2.4 GHz band for use of 802.11 devices,
11
32
What IEEE specifications are capable of operating at 11Mbps
802.11a; 802.11b and 802.11g