Intro to NET Plus Flashcards
Chapter 1
Define Network
A group of computers and other devices (such as printers) that are connected by some type of transmission media.
What does HTTP stand for
Hypertext Transfer Protocol
What does HTTPS stand for
Hypertext Transfer Protocol Security
Why does HTTP has a S
HTTP receives an S because is layered on top of an encryption protocol, such as SSL and TLS
What is SSL
Secure Socket Layer
What is TLS
Transport Layer Security
What are examples of Client-Server
- Web Server
- Email Server
- FTP service
- Telnet Service
- Remote Desktop
- Remote application
What does SMTP stand for
Simple Mail Transfer Protocol
What does POP3 stand for
Post Office Protocol version 3
What does IMAP4 stand for
Internet Message Access Protocol version 4
What does FTP stand for
File Transfer Protocol
What does SFTP stand for
Secure File Transfer Protocol
What does RDP stand for
Remote Desktop Protocol
What does UC stand for
Unified Communication
What does VoIP stand for
Voice over Internet Protocol
What does VTC stand for
Video Teleconference
What does RTP stand for
Real-time Transport Protocol
What does QoS stand for
Quality of Service
What does NOS stand for
Network Operating Systems
What does P2P stand for
Peer to Peer
What does AD stand for and what is AD for
Active Directory and is a centralized directory database that contains information and security for the entire group of computers
What does AD DS stand for
Active Directory Domain Services
What does NIC stand for
Network Interface Card
What is a NODE
Any computer or device on a network that can be addressed on a local network
What is a host
Any computer on a network that hosts a resource such as an application or data
What does OSI stand for
Open System Interconnection
How many layer does the OSI have and what are those layers
There are 7 layers and are:
- 7 - Application Layer
- 6 - Presentation Layer
- 5 - Session Layer
- 4 - Transport Layer
- 3 - Network Layer
- 2 - Data Link Layer
- 1 - Physical Layer
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?
Internet Protocol (IP)
Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn’t support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol
False
User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).
False
Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets?
Internet Control Message Protocol (ICMP)
Which of the answers listed below refers to a protocol used for managing VoIP and VTC services?
H.323 port 1720
Which of the following answers refers to an SSL/TLS-based directory access protocol?
Lightweight Directory Access Protocol (LDAP)
LDAP is an example of
Directory Access Protocol
Which of the answers listed below refer to IMAP4? Chpt 1 pg.3
- Serves the same function as Post Office Protocol version 3 (POP3)
- Offers improved functionality in comparison to POP3
POP3 is used for? Chpt 1 pg 3
Email retrieval
What are the characteristics of Server Message Block (SMB)/ Common Internet File System (CIFS)? Chpt 2 pg. 66
- Provides shared access to files, directories, and devices
- Used mainly by computers running Microsoft Windows operating systems
Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? Chtp 2 pg. 66
Session Initiation Protocol (SIP)
Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? Chpt 2 pg. 66
Network Time Protocol (NTP)
A Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network is known as? Chpt 1 pg. 4
Remote Desktop Protocol (RDP)
A type of protocol used in network management systems for monitoring network-attached devices is called: Chpt 2 pg. 65
Simple Network Management Protocol (SNMP)
What is the name of a network protocol that secures web traffic via SSL/TLS encryption? Chpt 1 pg. 3
Hypertext Transfer Protocol Security (HTTPS)
Which protocol allows for retrieving contents of an Internet page from a web server? Chpt 1 pg.3
Hypertext Transfer Protocol (HTTP)
A network protocol providing an alternative solution to the manual allocation of IP addresses is known as? Chpt 2 pg. 53
Dynamic Host Configuration Protocol (DHCP)
Telnet: Chpt 1 pg.4
- Transmits data in an unencrypted form
- Does not provide authentication
- Enables remote login and command execution
What are the characteristic features of Trivial File Transport Protocol (TFTP)? Chpt 2 pg. Portal 69
- Provides no security features
- A very basic form of file sharing protocol
What is the function of File Transfer Protocol (FTP)? Chpt 1 pg. 4
File Exchange
A network protocol that allows for secure file transfer over Secure Shell (SSH) is called? Chpt 1 pg. 4
Secure File Transfer Protocol (SFTP)
The Simple Mail Transfer Protocol (SMTP) protocol is used for? Chpt 1 pg. 3
- Sending email between mail servers
- Sending email from a client device
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? Chpt 2 pg. 59
Domain Name System or Domain Name Service (DNS)
Which of the answers listed below refers to a secure replacement for Telnet? Chpt 1 pg. 4
Secure Shell (SSH)
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as? Chpt 1 pg. 4
Secure Shell (SSH)
The purpose of the Carrier Sense Multiple Access (CSMA) protocol is to verify the absence of other traffic on a shared medium before transmitting to prevent collisions and loss of data? Chpt 4 pg. 186
True
Which of the following protocols provide protection against switching loops? Chpt 10 pg. 529
- Spanning Tree Protocol (STP)
- Rapid Spanning Tree Protocol (RSTP)
Which of the answers listed below refers to a type of routing protocol that determines the best route for data packets based on the lowest number of hops? Chpt 3 pg. 129
Distance-vector
A type of routing protocol that calculates the best path between source and destination nodes based on a map of network connectivity between nodes is called? Chpt 3 pg. 129
Link-state
A hybrid routing protocol combines the features of distance-vector and link-state routing protocols? Chpt 3 pg. 130
True
Examples of distance-vector routing protocols include? Chpt 3 pg. 130
- Routing Information Protocol (RIP)
- EIGRP
Which of the following answers refers to a link-state routing protocol? Chpt 3 pg. 131
Open Shortest Path First (OSPF)
Border Gateway Protocol (BGP) falls into the category of? Chpt 3 pg. 131
Hybrid routing protocol
An IPv6 protocol performing the function of IPv4’s Address Resolution Protocol (ARP) is called? Chpt 3 pg. 140
Neighbor Discovery Protocol (NDP)
Which IPv6 protocol is used by networked hosts to determine the link layer address of adjacent nodes? Chpt 3 pg. 140
Neighbor Discovery Protocol (NDP)
An IPv6 protocol used by routers to advertise their presence on a network is known as? Chpt 3 pg. 140
Neighbor Discovery Protocol (NDP)
Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4? Chpt 3 pg. 69
True
Which of the answers listed below refer(s) to Point to Point Protocol (PPP)? Chpt 7 pg. 339
- Network protocol used for connecting devices on a WAN
- Enables encapsulation of IP traffic
- Used for establishing a direct connection between two networked devices
Which network protocol enables encapsulation of PPP frames within 802.3 frames? Chpt 7 pg. 339
Point to Point Protocol over Ethernet (PPPoE)
Which network protocol enables detection of packet loss? Chpt 3 pg. 119
Internet Control Message Protocol (ICMP)
Examples of protocols used for implementing secure VPN tunnels include? Chpt
- Secure Shell (SSH) / Transport Layer Security (TLS)
- Internet Protocol Security (IPsec)
- DTLS
Which of the following protocols enables secure remote access to another computer on the network via command line? Chpt 1 pg. 3
Secure Shell
A non-proprietary alternative to Remote Desktop Protocol (RDP) that enables control over another computer on the network with the use of a graphical user interface is called:
Virtual Network Connection (VNC)
Which of the protocols listed below enables remote access to another computer on the network via web browser? Chpt 1 pg 3
Hypertext Transfer Protocol Security (HTTPS)
Which of the following remote file-access protocols do not offer encryption? Chpt 1 pg.3
- File Transfer Protocol
- Trivial File Transfer Protocol
A network protocol that allows for secure file transfer over Secure Shell (SSL) is known as? Chpt 1 pg. 4
File Transfer Protocol Secured (FTPS)
Which of the answers listed below refers to a network authentication protocol that provides the single sign-on functionality? Chpt 7 pg. 363
Kerberos
A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called? Chpt 7 pg. 362
Temporal Key Integrity Protocol (TKIP)
Which of the following answers refers to a network protocol used in the most common types of spoofing attacks? Chpt 1 pg. 3
Simple Mail Transfer Protocol (SMTP)