Network Protocols Flashcards

1
Q

What is the function of FTP?

A

File exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as

A

SSH (Secure Shell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Telnet does the following:

A

Transmits data in an unencrypted form.

Enables remote login and command execution.

Provides username & password authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What refers to a secure replacement for Telnet?

A

SSH (Secure Shell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The SMTP protocol is used for

A

Sending email messages from a client device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

A

DNS (Domain name server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as

A

DHCP (Dynamic Host Configuration Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which network protocol enables retrieving contents of an Internet page from a web server?

A

HTTP (Hypertext Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

POP3 protocol is used for

A

Email retrieval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is in use when a WINS server tries to resolve a host name into an IP address on a Windows-based LAN?

A

NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks - (T/F?)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following answers refer to IMAP4?

A

Offers improved functionality in comparison to POP3.

Serves the same function as POP3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A type of protocol used in network management systems for monitoring network-attached devices is called

A

Simple Network Management Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or false - Of the three existing versions of the Simple Network Management Protocol (SNMP), versions 1 and 2 (SNMPv1 and SNMPv2) offer authentication based on community strings sent in an unencrypted form (in cleartext). SNMPv3 provides packet encryption, authentication, and hashing mechanisms that allow for checking whether data has changed in transit (i.e., data integrity).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

LDAP (Lightweight Directory Access Protocol) is an example of

A

Directory access protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the name of a network protocol that secures web traffic via SSL/TLS encryption?

A

HTTPS (Hypertext Transfer Protocol Secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the characteristics of SMB/CIFS? (Server Message Block/Common Internet File System)

A

Provides shared access to files, directories, and devices.

Used mainly by computers running Microsoft Windows operating systems.

18
Q

Which of the following answers refers to a Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network?

A

RDP (Remote Desktop Protocol)

19
Q

True or False: Transmission Control Protocol (TCP) is a connection-oriented protocol using a three-way handshake, which is a set of initial steps required to establish network connection. TCP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).

20
Q

True or False: User Datagram Protocol (UDP) is an example of a connectionless protocol. Because UDP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol.

21
Q

True or False: User Datagram Protocol (UDP) is an example of a connectionless protocol. Because UDP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol.

22
Q

True or False: User Datagram Protocol (UDP) is an example of a connectionless protocol. Because UDP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol.

23
Q

Examples of connectionless protocols

A

DHCP - Dynamic Host Configuration Protocol
TFTP - Trivial File Transfer Protocol

24
Q

Which of the following answers refer to connection-oriented protocols? (Select 2 answers)

A

SSH - (Secure Shell)
HTTPS - (Hypertext Transfer Protocol Secure)

25
Q

Which of the answers listed below refer to common applications that make use of TCP? (Select 3 answers)

A

File transfer
Email communication
Web browsing

26
Q

Which of the following answers refer(s) to common applications of UDP? (All that applies, select)

A

Video conferencing
Live streaming
Online gaming
Voice over IP (VoIP)

27
Q

PAN (Personal Area Network)

A

Small network used for communication between personal devices, typically within in a range of a few meters.

28
Q

LAN (Local Area Network)

A

It is a network type that covers a small geographic area.

29
Q

MAN (Metropolitan Area)

A

A network hope that spans a large geographic area, often a country, or even global connections.

30
Q

Switches

A

A switch sends transmissions from one port only to the destination port.

31
Q

Hub

A

A hub sends transmissions from one port to every other port.

32
Q

SDN (Software-Defined Networking)

A

Modern approach to managing computer networks that separates the control plane from the data plane.

33
Q

2.4 GHz Frequency

A

Primary radio frequency band used in SOHO wireless networks, used for data transmission, the band defines 14 channels.

34
Q

5GHz Frequency

A

Wireless frequency that is used for WiFi and offers faster speeds than 2.4 GHz but with a shorter range.

40 different channels

35
Q

802.11

A

A set of standards for wireless local area networks (WLANs), developed and maintained by a working group IEEE.

36
Q

Long-range fixed wireless

A

Refers to long-range WiFi networks, Omni-directional antennas send and receive signals from a 360 degree angle.

37
Q

Licensed

A

Requiring a specific permit to operate at higher power levels; governed by FCC

38
Q

Unlicensed

A

Lower power limits

39
Q

NFC (Near Field Communication)

A

Allows wireless devices to communicate with other wireless devices within a range of

40
Q

RFID (Radio Frequency Identification)

A

A technology in which digital data, burned into labels or tags, is emitted as RF waves that can be received by nearby readers.

42
Q

MAC (