Lesson 4 - Test Flashcards

1
Q

True or false. UDP traffic accepts the loss of some data.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What port is used by Kerberos?

A

88

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following protocols is considered connection-oriented?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What port is used by RDS?

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port is used by LDAP?

A

389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is used to resolve an IP address to a MAC address?

A

ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of traffic commonly uses UDP?

A

Streaming video Voice over IP Streaming audio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a DoD model, also known as a TCP/IP model, a TCP or UDP header is added to a message at different layers. Which of the following information is added to the source and destination port fields of the TCP header?

A

Source and destination port numbers identifying the upper layer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You work as an intern at uCertify Inc. Your company uses the Microsoft Outlook application as its email client. You need to explore the process of sending an email via SMTP as it is a part of your training. Choose and reorder the steps that complete the process of sending an email.

A
  1. When the SMTP server receives the data from the client, it recognizes the destination port 25 as SMTP.
  2. It then forwards the data to the service handling SMTP.
  3. The server sends back an acknowledgement to the computer using port 49152 to confirm the email was received.
  4. When the computer receives the packet with port 49152, it sends it to the Microsoft Outlook application.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Match the protocols to their port numbers.

A

FTP: 20, 21

Telnet: 23

HTTP: 80

Secure HTTPS: 443

POP: 110

SMTP: 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sally and Bob are the two users on the Internet. Sally wants to download a video file from Bob’s computer. Select the flags which will be used by them while establishing session using the TCP Handshake process and downloading the file.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following layers of the OSI model defines the functions of TCP and UDP?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following uses port 110 as a well-known port?

A

POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following layers of the OSI reference model contains TCP?

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is one way to protect data from unauthorized network clients prior to transferring it across the Internet?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Match TCP utilities with their descriptions

A

getmac: Displays the NIC’s MAC address
netstat: Displays a list of a computer’s active incoming and outgoing connections
ifconfig: Displays the host’s IP addressing information
telnet: Allows you to communicate with another computer on the network remotely
mtr: Combines the functionality of ping and traceroute

17
Q

Match TCP ports with their services

A

SMTP: 26

SFTP: 116

POP3: 110

Telnet: 23

NNTP: 119

FTP (data channel): 20

18
Q

Match UDP port numbers to their services

A

LDAP: 389

SSH and SCP: 22

DNS name queries: 53

SNMP: 161

IMAP: 143

FTPS (data channel): 989