Extra 2 Flashcards
Which of the following answers refers to a network protocol used in the most common types of spoofing attacks?
SMTP
A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called:
TKIP
Which of the answers listed below refers to a network authentication protocol that provides the single sign-on functionality?
Kerberos
A network protocol that allows for secure file transfer over SSL is known as:
FTPS
Which of the following remote file-access protocols do not offer encryption? (Select 2 answers)
FTP
TFTP
A non-proprietary alternative to RDP that enables control over another computer on the network with the use of a graphical user interface is called:
VNC
Examples of protocols used for implementing secure VPN tunnels include: (Select 3 answers)
DTLS
IPsec
SSL/TLS
Which network protocol enables detection of packet loss?
ICMP
Which network protocol enables encapsulation of PPP frames within 802.3 frames?
PPPoE
Which of the answers listed below refer(s) to PPP? (Select all that apply)
- Network protocol used for connecting devices on a WAN
- Enables encapsulation of IP traffic
- Used for establishing a direct connection between two networked devices
Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4.
True
Which of the IPv6 protocols listed below is used by networked nodes for locating routers?
NDP
An IPv6 protocol used by routers to advertise their presence on a network is known as:
NDP
Which IPv6 protocol is used by networked hosts to determine the link layer address of adjacent nodes?
NDP
An IPv6 protocol performing the function of IPv4’s Address Resolution Protocol (ARP) is called:
NDP
Border Gateway Protocol (BGP) falls into the category of:
Hybrid routing protocol
Which of the following answers refers to a link-state routing protocol?
OSPF
Examples of distance-vector routing protocols include: (Select 2 answers)
RIP
EIGRP
A hybrid routing protocol combines the features of distance-vector and link-state routing protocols.
True
A type of routing protocol that calculates the best path between source and destination nodes based on a map of network connectivity between nodes is called:
Link-state
Which of the answers listed below refers to a type of routing protocol that determines the best route for data packets based on the lowest number of hops?
Distance-vector
Which of the following protocols provide protection against switching loops? (Select 2 answers)
STP
RSTP
The purpose of the Carrier Sense Multiple Access (CSMA) protocol is to verify the absence of other traffic on a shared medium before transmitting to prevent collisions and loss of data.
True
The SMTP protocol is used for: (Select 2 answers)
Sending email from a client device
Sending email between mail servers
What are the characteristic features of TFTP? (Select 2 answers)
Provides no security features
A very basic form of file sharing protocol
Telnet: (Select 3 answers)
- Provides username & password authentication
- Transmits data in an unencrypted form
- Enables remote login and command execution
Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services?
SIP
What are the characteristics of SMB/CIFS? (Select 2 answers)
Provides shared access to files, directories, and devices
Used mainly by computers running Microsoft Windows operating systems
POP3 is used for:
Email retrieval
Which of the answers listed below refer to IMAP4? (Select 2 answers)
- Offers improved functionality in comparison to POP3
- Serves the same function as POP3
Which of the answers listed below refers to a protocol used for managing VoIP and VTC services?
H.323
The ATM PDU is the cell
OSI physical layer PDU is the bit
OSI data link layer PDU is the frame
OSI network layer PDU is the packet
OSI transport layer PDU is the segment
PDUs between OSI session and application layers are referred to simply as the data
A DSL connection is set up between a pair of modems on either end of a copper wire that is between the CPE and the digital subscriber line access multiplexer (DSLAM). A DSLAM is the device located at the provider’s CO that concentrates connections from multiple DSL subscribers.
The term last mile has been used quite a bit in the last few years with broadband-type connections. It basically means the same thing as local loop and defines the physical connection from the customer to the first aggregation device of the provider network.
Which of the answers listed below refer to the components that can be found at the OSI network layer? (Select 3 answers)
Router Network cabling IP address TCP/UDP protocol Switch Packet
Router
IP address
Packet
Which of the protocols listed below reside at the OSI transport layer? (Select 2 answers)
UDP SSL/TLS ICMP TCP ATM
UDP
TCP
Character encoding, data compression and encryption/decryption take place at the:
Presentation layer of the OSI model