Intro to NET Plus Flashcards

Chapter 1

1
Q

Define Network

A

A group of computers and other devices (such as printers) that are connected by some type of transmission media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does HTTP stand for

A

Hypertext Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does HTTPS stand for

A

Hypertext Transfer Protocol Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why does HTTP has a S

A

HTTP receives an S because is layered on top of an encryption protocol, such as SSL and TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SSL

A

Secure Socket Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is TLS

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are examples of Client-Server

A
  • Web Server
  • Email Server
  • FTP service
  • Telnet Service
  • Remote Desktop
  • Remote application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does SMTP stand for

A

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does POP3 stand for

A

Post Office Protocol version 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does IMAP4 stand for

A

Internet Message Access Protocol version 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does FTP stand for

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does SFTP stand for

A

Secure File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does RDP stand for

A

Remote Desktop Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does UC stand for

A

Unified Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does VoIP stand for

A

Voice over Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does VTC stand for

A

Video Teleconference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does RTP stand for

A

Real-time Transport Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does QoS stand for

A

Quality of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does NOS stand for

A

Network Operating Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does P2P stand for

A

Peer to Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does AD stand for and what is AD for

A

Active Directory and is a centralized directory database that contains information and security for the entire group of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does AD DS stand for

A

Active Directory Domain Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does NIC stand for

A

Network Interface Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a NODE

A

Any computer or device on a network that can be addressed on a local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a host

A

Any computer on a network that hosts a resource such as an application or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does OSI stand for

A

Open System Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How many layer does the OSI have and what are those layers

A

There are 7 layers and are:

  • 7 - Application Layer
  • 6 - Presentation Layer
  • 5 - Session Layer
  • 4 - Transport Layer
  • 3 - Network Layer
  • 2 - Data Link Layer
  • 1 - Physical Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?

A

Internet Protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn’t support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets?

A

Internet Control Message Protocol (ICMP)

32
Q

Which of the answers listed below refers to a protocol used for managing VoIP and VTC services?

A

H.323 port 1720

33
Q

Which of the following answers refers to an SSL/TLS-based directory access protocol?

A

Lightweight Directory Access Protocol (LDAP)

34
Q

LDAP is an example of

A

Directory Access Protocol

35
Q

Which of the answers listed below refer to IMAP4? Chpt 1 pg.3

A
  • Serves the same function as Post Office Protocol version 3 (POP3)
  • Offers improved functionality in comparison to POP3
36
Q

POP3 is used for? Chpt 1 pg 3

A

Email retrieval

37
Q

What are the characteristics of Server Message Block (SMB)/ Common Internet File System (CIFS)? Chpt 2 pg. 66

A
  • Provides shared access to files, directories, and devices

- Used mainly by computers running Microsoft Windows operating systems

38
Q

Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? Chtp 2 pg. 66

A

Session Initiation Protocol (SIP)

39
Q

Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? Chpt 2 pg. 66

A

Network Time Protocol (NTP)

40
Q

A Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network is known as? Chpt 1 pg. 4

A

Remote Desktop Protocol (RDP)

41
Q

A type of protocol used in network management systems for monitoring network-attached devices is called: Chpt 2 pg. 65

A

Simple Network Management Protocol (SNMP)

42
Q

What is the name of a network protocol that secures web traffic via SSL/TLS encryption? Chpt 1 pg. 3

A

Hypertext Transfer Protocol Security (HTTPS)

43
Q

Which protocol allows for retrieving contents of an Internet page from a web server? Chpt 1 pg.3

A

Hypertext Transfer Protocol (HTTP)

44
Q

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as? Chpt 2 pg. 53

A

Dynamic Host Configuration Protocol (DHCP)

45
Q

Telnet: Chpt 1 pg.4

A
  • Transmits data in an unencrypted form
  • Does not provide authentication
  • Enables remote login and command execution
46
Q

What are the characteristic features of Trivial File Transport Protocol (TFTP)? Chpt 2 pg. Portal 69

A
  • Provides no security features

- A very basic form of file sharing protocol

47
Q

What is the function of File Transfer Protocol (FTP)? Chpt 1 pg. 4

A

File Exchange

48
Q

A network protocol that allows for secure file transfer over Secure Shell (SSH) is called? Chpt 1 pg. 4

A

Secure File Transfer Protocol (SFTP)

49
Q

The Simple Mail Transfer Protocol (SMTP) protocol is used for? Chpt 1 pg. 3

A
  • Sending email between mail servers

- Sending email from a client device

50
Q

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? Chpt 2 pg. 59

A

Domain Name System or Domain Name Service (DNS)

51
Q

Which of the answers listed below refers to a secure replacement for Telnet? Chpt 1 pg. 4

A

Secure Shell (SSH)

52
Q

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as? Chpt 1 pg. 4

A

Secure Shell (SSH)

53
Q

The purpose of the Carrier Sense Multiple Access (CSMA) protocol is to verify the absence of other traffic on a shared medium before transmitting to prevent collisions and loss of data? Chpt 4 pg. 186

A

True

54
Q

Which of the following protocols provide protection against switching loops? Chpt 10 pg. 529

A
  • Spanning Tree Protocol (STP)

- Rapid Spanning Tree Protocol (RSTP)

55
Q

Which of the answers listed below refers to a type of routing protocol that determines the best route for data packets based on the lowest number of hops? Chpt 3 pg. 129

A

Distance-vector

56
Q

A type of routing protocol that calculates the best path between source and destination nodes based on a map of network connectivity between nodes is called? Chpt 3 pg. 129

A

Link-state

57
Q

A hybrid routing protocol combines the features of distance-vector and link-state routing protocols? Chpt 3 pg. 130

A

True

58
Q

Examples of distance-vector routing protocols include? Chpt 3 pg. 130

A
  • Routing Information Protocol (RIP)

- EIGRP

59
Q

Which of the following answers refers to a link-state routing protocol? Chpt 3 pg. 131

A

Open Shortest Path First (OSPF)

60
Q

Border Gateway Protocol (BGP) falls into the category of? Chpt 3 pg. 131

A

Hybrid routing protocol

61
Q

An IPv6 protocol performing the function of IPv4’s Address Resolution Protocol (ARP) is called? Chpt 3 pg. 140

A

Neighbor Discovery Protocol (NDP)

62
Q

Which IPv6 protocol is used by networked hosts to determine the link layer address of adjacent nodes? Chpt 3 pg. 140

A

Neighbor Discovery Protocol (NDP)

63
Q

An IPv6 protocol used by routers to advertise their presence on a network is known as? Chpt 3 pg. 140

A

Neighbor Discovery Protocol (NDP)

64
Q

Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4? Chpt 3 pg. 69

A

True

65
Q

Which of the answers listed below refer(s) to Point to Point Protocol (PPP)? Chpt 7 pg. 339

A
  • Network protocol used for connecting devices on a WAN
  • Enables encapsulation of IP traffic
  • Used for establishing a direct connection between two networked devices
66
Q

Which network protocol enables encapsulation of PPP frames within 802.3 frames? Chpt 7 pg. 339

A

Point to Point Protocol over Ethernet (PPPoE)

67
Q

Which network protocol enables detection of packet loss? Chpt 3 pg. 119

A

Internet Control Message Protocol (ICMP)

68
Q

Examples of protocols used for implementing secure VPN tunnels include? Chpt

A
  • Secure Shell (SSH) / Transport Layer Security (TLS)
  • Internet Protocol Security (IPsec)
  • DTLS
69
Q

Which of the following protocols enables secure remote access to another computer on the network via command line? Chpt 1 pg. 3

A

Secure Shell

70
Q

A non-proprietary alternative to Remote Desktop Protocol (RDP) that enables control over another computer on the network with the use of a graphical user interface is called:

A

Virtual Network Connection (VNC)

71
Q

Which of the protocols listed below enables remote access to another computer on the network via web browser? Chpt 1 pg 3

A

Hypertext Transfer Protocol Security (HTTPS)

72
Q

Which of the following remote file-access protocols do not offer encryption? Chpt 1 pg.3

A
  • File Transfer Protocol

- Trivial File Transfer Protocol

73
Q

A network protocol that allows for secure file transfer over Secure Shell (SSL) is known as? Chpt 1 pg. 4

A

File Transfer Protocol Secured (FTPS)

74
Q

Which of the answers listed below refers to a network authentication protocol that provides the single sign-on functionality? Chpt 7 pg. 363

A

Kerberos

75
Q

A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called? Chpt 7 pg. 362

A

Temporal Key Integrity Protocol (TKIP)

76
Q

Which of the following answers refers to a network protocol used in the most common types of spoofing attacks? Chpt 1 pg. 3

A

Simple Mail Transfer Protocol (SMTP)