Practice Test 1 Flashcards

1
Q

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:

  • TFTP
  • SSH
  • Telnet
  • RDP
A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refers to a secure replacement for Telnet?

  • CHAP
  • FTP
  • SNMP
  • SSH
A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

  • TCP/IP
  • DNS
  • SQL
  • DHCP
A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The SMTP protocol is used for: (Select 2 answers)

  • Sending email between mail servers
  • Name resolution
  • Serving of web pages
  • Retrieving email from mail servers
  • Sending email from a client device
A
  1. Sending email between mail servers.

2. Sending email from a client device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network protocol that allows for secure file transfer over Secure Shell (SSH) is called:

  • TFTP
  • SFTP
  • Telnet
  • FTPS
A

SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the function of FTP?

  • Mail Services
  • Serving of web pages
  • Directory access
  • File exchange
A

File Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the characteristic features of TFTP? (Select 2 answers)

  • Provides no security features
  • Typically used for exchanging files over the internet
  • A very basic form of file sharing protocol
  • Provides authentication and encryption
  • Directory access protocol
A
  1. Provides no security features

2. A very basic form of file sharing protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Telnet: (Select 3 answers)

  • Encrypts network connection
  • Provides username & password authentication
  • Transmits data in an unencrypted form
  • Does not provide authentication
  • Enables remote login and command execution
A
  1. Provides username & password authentication
  2. Transmits data in an unencrypted form
  3. Enables remote login and command execution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as:

  • DNS
  • SNMP
  • NAT
  • DHCP
A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which protocol allows for retrieving contents of an Internet page from a web server?

  • SNMP
  • HTTP
  • SMTP
  • IMAP
A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the name of a network protocol that secures web traffic via SSL/TLS encryption?

  • SFTP
  • HTTPS
  • FTPS
  • SNMP
A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of protocol used in network management systems for monitoring network-attached devices is called:

  • SMB
  • NTP
  • SNMP
  • RDP
A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A Microsoft-proprietary protocol providing a user with graphical interface for connecting to another networked host is known as:

  • RDP
  • SSH
  • Telnet
  • rsh
A

RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network?

  • NTP
  • VTP
  • NNTP
  • RTP
A

NTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services?

  • L2TP
  • BGP
  • RSTP
  • SIP
A

SIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the characteristics of SMB/CIFS? (Select 2 answers)

  • Used mainly by computers running Linux distributions
  • Provides shared access to files, directories, and devices
  • Used mainly by computers running Microsoft Windows operating systems
  • Enables voice and multimedia communications over IP networks
A
  1. Provides shared access to files, directories, and devices

2. Used mainly by computers running Microsoft Windows operating systems

17
Q

POP3 is used for:

  • Name resolution
  • Sending email messages
  • File exchange
  • Email retrieval
A

Email retrieval

18
Q

Which of the answers listed below refer to IMAP4? (Select 2 answers)

  • Offers improved functionality in comparison to POP3
  • Serves the same function as POP3
  • Enables sending email messages from client devices
  • Offers less functions than POP3
  • Enables email exchange between mail servers
A
  1. Offers improved functionality in comparison to POP3

2. Serves the same function as POP3

19
Q

LDAP is an example of:

  • Authentication protocol
  • Address resolution protocol
  • Directory access protocol
  • File exchange protocol
A

Directory access protocol

20
Q

Which of the following answers refers to an SSL/TLS-based directory access protocol?

  • H.323
  • PPTP
  • Kerberos
  • LDAPS
A

LDAPS

21
Q

Which of the answers listed below refers to a protocol used for managing VoIP and VTC services?

  • SMB
  • H.323
  • SCP
  • IGP
A

H.323

22
Q

Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets?

  • CCMP
  • RSTP
  • ICMP
  • SNMP
A

ICMP

23
Q

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order).

  • True
  • False
A

False

24
Q

Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn’t support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol.

  • True
  • False
A

False

25
Q

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?

  • UDP
  • IP
  • TCP
  • NetBIOS
A

IP