Practice Exam! Flashcards
Secure Shell (SSH) protocol runs on: A. TCP Port 21 B. UDP Port 22 C. TCP port 20 D. TCP port 22
D. TCP port 22.
Which of the following UDP ports is assigned to the Domain Name System (DNS)? A. 53 B. 67 C. 110 D. 389
A. 53
TCP port 25 is used by: A. SNMP B. Telnet C. FTP D. SMTP
D. SMTP (Simple Mail Transfer Protocol)
Secure File Transfer Protocol (SFTP) is an extension to the Secure Shell protocol (SSH) and runs by default on TCP port 22.
A. True
B. False
A. True
Unblocking TCP port 22 enables what type of traffic? (Select 2 answers) A. FTPS B. SSH C. SFTP D. FTP E. HTTP
B and C. SSH and SFTP.
The File Transfer Protocol (FTP) Control Connection for administering a session is established through: A. TCP Port 20 B. UDP Port 20 C. TCP port 21 D. UDP port 21
C. TCP Port 21.
Which port enables the FTP's Data Connection for sending file data? A. UDP Port 20 B. TCP Port 20 C. UDP Port 21 D. TCP Port 21
B. TCP Port 20
UDP port 69 is assigned to: A. TFTP B. SNMP C. DHCP D. LDAP
A. TFTP
Which of the TCP ports listed below is used by Telnet? A. 20 B. 21 C. 22 D. 23
D. 23
Dynamic Host Configuration Protocol (DHCP) runs on: (Select 2 answers) A. UDP port 53 B. UDP port 67 C. UDP port 68 D. UDP port 69 E. UDP port 161
B and C. UDP port 67 and UDP port 68.
TCP port 80 is assigned to:
A. Hypertext Transfer Protocol(HTTP)
B. Hyptertext Transfer Protocol over TLS/SSH (HTTPS)
C. Internet Message Access Protocol (IMAP)
D. Lightweight Directory Access Protocol (LDAP)
A. Http
Which of the following ports is used by HTTPS? A. TCP Port 80 B. TCP Port 443 C. UDP port 53 D. TCP port 143
B. TCP port 443
SNMP runs on UDP port: A. 123 B. 127 C. 143 D. 161
D. 161
A network technician uses Remote Desktop Protocol (RDP) client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection? A. TCP Port 1720 B. TCP port 636 C. TCP port 3389 D. TCP port 445
C. TCP port 3389
Network Time Protocol (NTP) runs on UDP port: A. 123 B. 110 C. 161 D. 137
A. 123
Which of the ports listed below are assigned to the Session Initiation Protocol (SIP)? (Select 2 answers) A. UDP port 67 B. TCP Port 5060 C. TCP port 389 D. TCP port 68 E. TCP port 5061 F. TCP port 3389
B and E. TCP port 5060 and TCP port 5061
Which of the following protocols runs on TCP port 445? A. HTTPS B. SMB/CIFS C. IMAP D. H.323
B. SMB/CIFS (Server Message Block / Common Internet File System)
Post Office Protocol v3 (POP3) uses: A. TCP Port 110 B. UDP port 123 C. TCP port 143 D. UDP port 161
A. TCP port 110
Which of the TCP port numbers listed below is assigned to the Internet Message Access Protocol (IMAP)? A. 143 B. 389 C. 443 D. 636
A. 143
TCP port 389 is the default network port for: A. RDP B. LDAP C. SMB D. LDAPs
B. LDAP (Lightweight Directory Access Protocol)
A network administrator wants to secure the existing access to a directory service with SSL/TLS encryption. Which of the following TCP ports needs to be opened to implement this change? A. 636 B. 389 C. 443 D. 1720
A. 636
TCP port 1720 is used by: A. H.323 B. SMB C. LDAPS D. SNMP
A. H.323
Which of the following reside at the physical layer of the OSI model? (Select 2 answers) A. IP Address B. Switch C. Bit D. Router E. Network Cabling F. Frame
C and E. Bit and Network Cabling
The application layer of the OSI model is also known as: A. Layer 1 B. Layer 3 C. Layer 6 D. Layer 7
D. Layer 7
What are the characteristic components of the OSI data link layer? (Select 3 answers) A. MAC Address B. Packet C. Switch D. Network Cabling E. Router F. Frame
A, C and F. MAC Address, Switch and Frame.
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as: A. TFTP B. SSH C. Telent D. RDP
B. SSH
Which of the answers listed below refers to a secure replacement for Telnet? A. CHAP B. FTP C. SNMP D. SSH
D. SSH (Secure Shell)
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? A. TCP/IP B. DNS C. SQL D. DHCP
B. DNS (Domain Name System)
The SMTP protocol is used for: (Select 2 answers) A. Sending Email between mail servers B. Name Resolution C. Serving of web pages D. Retrieving email from mail servers E. Sending email from a client device.
A. and E. Sending email between mail servers and sending email from a client server.
A network protocol that allows for secure file transfer over Secure Shell (SSH) is called: A. TFTP B. SFTP C. Telnet D. FTPS
B. SFTP (Secure File Transfer Protocol)
What is the function of FTP? A. Mailing Services B. Serving of Web Pages C. Directory Access D. File Exchange
D. File Exchange
What are the characteristic features of TFTP? (Select 2 answers)
A. Provides no security features
B. Typically used for exchanging files over the internet.
C. A very basic form of file sharing protocol.
D. Provides authentication and encryption
E. Directory Access Protocol
A and B. Provides no security features. Typically used for exchanging files over the internet.
Telnet: (Select 3 answers)
A. Encrypts network connections
B. Provides username and Password Authentication.
C. Transmit data in an unencrypted form.
D. Does not provide authentication.
E. Enables remote login and command execution
B, C, and E. Provides username and password authentication, Transmit data in an unencrypted form and enables remote login and command execution.
A network protocol providing an alternative solution to the manual allocation of IP addresses is known as: A. DNS B. SNMP C. NAT D. DHCP
D. DHCP (Dynamic Host Configuration Protocol)
Which protocol allows for retrieving contents of an Internet page from a web server? A. SNMP B. HTTP C. SMTP D. IMAP
B. HTTP (Hypertext Transfer Protocol)
What is the name of a network protocol that secures web traffic via SSL/TLS encryption? A. SFTP B. HTTPS C. FTPS D. SNMP
B. HTTPS (Hypertext Transfer Protocol Secure)
A type of protocol used in network management systems for monitoring network-attached devices is called: A. SMB B. NTP C. SNMP D. RDP
C. SNMP (Simple Network Management Protocol)
A Microsoft-proprietary protocol providing a user with graphical interface for connecting to another networked host is known as: A. RDP B. SSH C. Telnet D. RSH
A. RDP (Remote Desktop Protocol)
Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? A. NTP B. VTP C. NNTP D. RTP
A. NTP (Network Time Protocol)
Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? A. L2TP B. BGP C. RSTP D. SIP
D. SIP (Session Initiation Protocol)
What are the characteristics of SMB/CIFS? (Select 2 answers)
A. User mainly by computer running linux distributions.
B. Provides shared access to files, directories, and devices.
C. Used mainly by computers running Microsoft windows operating system.
D. Enables voice and multimedia communications over IP networks
B and C. Provides shared access to files, directories, and devices. Used mainly by computers running Microsoft Operating System.
POP3 is used for: A. Name Resolution B. Sending Email Messages C. File Exchange D. Email Retrieval
D. Email Retrieval
Which of the answers listed below refer to IMAP4? (Select 2 answers)
A. Offers improved functionality in comparison to POP3.
B. Serves the same function as POP3.
C. Enables sending email messages from client devices.
D. Offers less functions than POP3.
E. Enables email exchanges between mail servers.
A and B. Offers improved functionality in comparison to POP3. Serves the same function as POP3.
LDAP is an example of: A. Authentication Protocol. B. Address Resolution Protocol. C. Directory Access Protocol. D. File Exchange Protocol.
C. Directory Access Protocol. LDAP = (Lightweight Directory Access Protocol)
Which of the following answers refers to an SSL/TLS-based directory access protocol? A. H.323 B. PPTP C. Kerberos D. LDAPS
D. LDAPS
Which of the answers listed below refers to a protocol used for managing VoIP and VTC services? A. SMB B. H.323 C. SCP D. IGP
B. H.323
Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets? A. CCMP B. RSTP C. ICMP D. SNMP
C. ICMP (Internet Control Message Protocol)
User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports re-transmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).
A. True
B. False
B. False
Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn’t support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol.
A. True
B. False
B. False
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? A. UDP B. IP C. TCP D. NetBIOS
B. IP (Internet Protocol)
Layer 5 of the OSI model is also referred to as: A. Session Layer B. Application Layer C. Transport Layer D. Presentation Layer
A. Session Layer
Which of the answers listed below refer to the components that can be found at the OSI network layer? (Select 3 answers) A. Router B. Networking Cabling C. IP Address D. TCP/UDP Protocol E. Switch F. Packet
A. C. and F. Router, IP Address, and Packet.
The term "Presentation layer" refers to: A. Layer 7 of the OSI Layer B. Layer 5 of the OSI Layer C. Layer 6 of the OSI Layer D. Layer 4 of the OSI Layer
C. Layer 6 of the OSI Model.
Layer 2 of the OSI model is known as: A. Transport Layer B. Network Layer C. Data Link layer D. Physical Layer
C. Data Link Layer
Which of the following terms refers to the OSI network layer? A. Layer 2 B. Layer 5 C. Layer 3 D. Layer 4
C. Layer 3
Which of the protocols listed below reside at the OSI transport layer? (Select 2 answers) A. UDP B. SSL/TLS C. ICMP D. TCP E. ATM
A. and D. UDP and TCP
Which OSI layer assumes the responsibility for managing network connections between applications? A.Network Layer B. Data Link Layer C. Application Layer D. Session Layer
D. Session Layer
Physical layer of the OSI model is also known as: A. Layer 2 B. Layer 7 C. Layer 1 D. Layer 4
C. Layer 1
Layer 4 of the OSI model is also referred to as: A. Network Layer B. Data LInk Layer C. Session Layer D. Transport Layer
D. Transport Layer
Character encoding, data compression and encryption/decryption take place at the: A. Application Layer of the OSI Model. B. Presentation Layer of the OSI Model. C. Session Layer of the OSI Model. D. Transport Layer of the OSI Model.
B. Presentation Layer of the OSI Model.
Which of the following protocols reside at the application layer of the OSI model? (Select 3 answers) A. ATM B. HTTP C. FTP D. IP E. SMTP F. TCP/UDP
B. C. and E. HTTP, FTP, and SMTP.
In computer networking, the term “Collision” refers to a situation in which two or more demands are made simultaneously on an equipment that can handle only one request at any given moment.
A. True
B. False
A. True
A network segment utilizing only this type of device is the most prone to network performance degradation due to large number of network collisions. A. Bridge B. Hub C. Switch D. Router
B. Hub
Which device improves network performance by dividing a given network segment into separate collision domains? A. Hub B. Repeater C. Switch D. Router
C. Switch
Which of the devices listed below is used for separating broadcast domains? A. Router B. Switch C. Repeater D. Hub
A. Router
The purpose of the Carrier Sense Multiple Access (CSMA) protocol is to verify the absence of other traffic on a shared medium before transmitting to prevent collisions and loss of data.
A. True
B. False
A. True
Which of the following allows for verifying the absence of traffic on a shared transmission medium in 802.3 networks? A. CDMA B. CSMA/CA C. CWDM D. CSMA/CD
D. CSMA/CD (Carrier-sense multiple access with collision detection)
A solution that allows to control access to a shared transmission medium in 802.11 networks is known as: A. CWDM B. CSMA/CD C. CDMA D. CSMA/CA
D. CSMA/CA (Carrier-sense multiple access with collision avoidance)
In telecommunications, Protocol Data Unit (PDU) is a term used for describing a specific unit of data passed across a network.
A. True
B. False
A. True