Intro to NET Plus Flashcards

Chapter 1

1
Q

Define Network

A

A group of computers and other devices (such as printers) that are connected by some type of transmission media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does HTTP stand for

A

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does HTTPS stand for

A

Hypertext Transfer Protocol Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why does HTTP has a S

A

HTTP receives an S because is layered on top of an encryption protocol, such as SSL and TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SSL

A

Secure Socket Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is TLS

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are examples of Client-Server

A
  • Web Server
  • Email Server
  • FTP service
  • Telnet Service
  • Remote Desktop
  • Remote application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does SMTP stand for

A

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does POP3 stand for

A

Post Office Protocol version 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does IMAP4 stand for

A

Internet Message Access Protocol version 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does FTP stand for

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does SFTP stand for

A

Secure File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does RDP stand for

A

Remote Desktop Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does UC stand for

A

Unified Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does VoIP stand for

A

Voice over Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does VTC stand for

A

Video Teleconference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does RTP stand for

A

Real-time Transport Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does QoS stand for

A

Quality of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does NOS stand for

A

Network Operating Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does P2P stand for

A

Peer to Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does AD stand for and what is AD for

A

Active Directory and is a centralized directory database that contains information and security for the entire group of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does AD DS stand for

A

Active Directory Domain Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does NIC stand for

A

Network Interface Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a NODE

A

Any computer or device on a network that can be addressed on a local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a host
Any computer on a network that hosts a resource such as an application or data
26
What does OSI stand for
Open System Interconnection
27
How many layer does the OSI have and what are those layers
There are 7 layers and are: - 7 - Application Layer - 6 - Presentation Layer - 5 - Session Layer - 4 - Transport Layer - 3 - Network Layer - 2 - Data Link Layer - 1 - Physical Layer
28
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?
Internet Protocol (IP)
29
Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn't support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol
False
30
User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).
False
31
Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets?
Internet Control Message Protocol (ICMP)
32
Which of the answers listed below refers to a protocol used for managing VoIP and VTC services?
H.323 port 1720
33
Which of the following answers refers to an SSL/TLS-based directory access protocol?
Lightweight Directory Access Protocol (LDAP)
34
LDAP is an example of
Directory Access Protocol
35
Which of the answers listed below refer to IMAP4? Chpt 1 pg.3
- Serves the same function as Post Office Protocol version 3 (POP3) - Offers improved functionality in comparison to POP3
36
POP3 is used for? Chpt 1 pg 3
Email retrieval
37
What are the characteristics of Server Message Block (SMB)/ Common Internet File System (CIFS)? Chpt 2 pg. 66
- Provides shared access to files, directories, and devices | - Used mainly by computers running Microsoft Windows operating systems
38
Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? Chtp 2 pg. 66
Session Initiation Protocol (SIP)
39
Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? Chpt 2 pg. 66
Network Time Protocol (NTP)
40
A Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network is known as? Chpt 1 pg. 4
Remote Desktop Protocol (RDP)
41
A type of protocol used in network management systems for monitoring network-attached devices is called: Chpt 2 pg. 65
Simple Network Management Protocol (SNMP)
42
What is the name of a network protocol that secures web traffic via SSL/TLS encryption? Chpt 1 pg. 3
Hypertext Transfer Protocol Security (HTTPS)
43
Which protocol allows for retrieving contents of an Internet page from a web server? Chpt 1 pg.3
Hypertext Transfer Protocol (HTTP)
44
A network protocol providing an alternative solution to the manual allocation of IP addresses is known as? Chpt 2 pg. 53
Dynamic Host Configuration Protocol (DHCP)
45
Telnet: Chpt 1 pg.4
- Transmits data in an unencrypted form - Does not provide authentication - Enables remote login and command execution
46
What are the characteristic features of Trivial File Transport Protocol (TFTP)? Chpt 2 pg. Portal 69
- Provides no security features | - A very basic form of file sharing protocol
47
What is the function of File Transfer Protocol (FTP)? Chpt 1 pg. 4
File Exchange
48
A network protocol that allows for secure file transfer over Secure Shell (SSH) is called? Chpt 1 pg. 4
Secure File Transfer Protocol (SFTP)
49
The Simple Mail Transfer Protocol (SMTP) protocol is used for? Chpt 1 pg. 3
- Sending email between mail servers | - Sending email from a client device
50
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? Chpt 2 pg. 59
Domain Name System or Domain Name Service (DNS)
51
Which of the answers listed below refers to a secure replacement for Telnet? Chpt 1 pg. 4
Secure Shell (SSH)
52
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as? Chpt 1 pg. 4
Secure Shell (SSH)
53
The purpose of the Carrier Sense Multiple Access (CSMA) protocol is to verify the absence of other traffic on a shared medium before transmitting to prevent collisions and loss of data? Chpt 4 pg. 186
True
54
Which of the following protocols provide protection against switching loops? Chpt 10 pg. 529
- Spanning Tree Protocol (STP) | - Rapid Spanning Tree Protocol (RSTP)
55
Which of the answers listed below refers to a type of routing protocol that determines the best route for data packets based on the lowest number of hops? Chpt 3 pg. 129
Distance-vector
56
A type of routing protocol that calculates the best path between source and destination nodes based on a map of network connectivity between nodes is called? Chpt 3 pg. 129
Link-state
57
A hybrid routing protocol combines the features of distance-vector and link-state routing protocols? Chpt 3 pg. 130
True
58
Examples of distance-vector routing protocols include? Chpt 3 pg. 130
- Routing Information Protocol (RIP) | - EIGRP
59
Which of the following answers refers to a link-state routing protocol? Chpt 3 pg. 131
Open Shortest Path First (OSPF)
60
Border Gateway Protocol (BGP) falls into the category of? Chpt 3 pg. 131
Hybrid routing protocol
61
An IPv6 protocol performing the function of IPv4's Address Resolution Protocol (ARP) is called? Chpt 3 pg. 140
Neighbor Discovery Protocol (NDP)
62
Which IPv6 protocol is used by networked hosts to determine the link layer address of adjacent nodes? Chpt 3 pg. 140
Neighbor Discovery Protocol (NDP)
63
An IPv6 protocol used by routers to advertise their presence on a network is known as? Chpt 3 pg. 140
Neighbor Discovery Protocol (NDP)
64
Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4? Chpt 3 pg. 69
True
65
Which of the answers listed below refer(s) to Point to Point Protocol (PPP)? Chpt 7 pg. 339
- Network protocol used for connecting devices on a WAN - Enables encapsulation of IP traffic - Used for establishing a direct connection between two networked devices
66
Which network protocol enables encapsulation of PPP frames within 802.3 frames? Chpt 7 pg. 339
Point to Point Protocol over Ethernet (PPPoE)
67
Which network protocol enables detection of packet loss? Chpt 3 pg. 119
Internet Control Message Protocol (ICMP)
68
Examples of protocols used for implementing secure VPN tunnels include? Chpt
- Secure Shell (SSH) / Transport Layer Security (TLS) - Internet Protocol Security (IPsec) - DTLS
69
Which of the following protocols enables secure remote access to another computer on the network via command line? Chpt 1 pg. 3
Secure Shell
70
A non-proprietary alternative to Remote Desktop Protocol (RDP) that enables control over another computer on the network with the use of a graphical user interface is called:
Virtual Network Connection (VNC)
71
Which of the protocols listed below enables remote access to another computer on the network via web browser? Chpt 1 pg 3
Hypertext Transfer Protocol Security (HTTPS)
72
Which of the following remote file-access protocols do not offer encryption? Chpt 1 pg.3
- File Transfer Protocol | - Trivial File Transfer Protocol
73
A network protocol that allows for secure file transfer over Secure Shell (SSL) is known as? Chpt 1 pg. 4
File Transfer Protocol Secured (FTPS)
74
Which of the answers listed below refers to a network authentication protocol that provides the single sign-on functionality? Chpt 7 pg. 363
Kerberos
75
A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called? Chpt 7 pg. 362
Temporal Key Integrity Protocol (TKIP)
76
Which of the following answers refers to a network protocol used in the most common types of spoofing attacks? Chpt 1 pg. 3
Simple Mail Transfer Protocol (SMTP)