PROTOCOLS Flashcards

1
Q

. With TCP, a data session is established through a three-step process.
This is known as a three-way _____.

A
  1. This is known as a three-way handshake.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What FTP command uploads multiple files to the remote host?
A
  1. The mput command uploads multiple files to the remote host in FTP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. The SSH protocol is a more secure alternative to what protocol?
A
  1. SSH is a more secure alternative to Telnet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which is defined in RFC 791, is the protocol used to transport data from
one node on a network to another. IP is connectionless, which means that it
doesn’t guarantee the delivery of data; it simply makes its best effort to do so.

A

Internet Protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IP operates at the ____ layer of the OSI model.

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____is defined in RFC 793, is a connection-oriented protocol and the transport protocol. Being connection-oriented means that _____ establishes a mutually acknowledged session between two hosts before communication takes place. provides reliability to IP communications. Specifically, it adds features such as flow control, sequencing, and error detection and correction.

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP operates at the ____ layer of the OSI model.

A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is defined in RFC 768, is the brother of TCP. Like TCP, ____ is the transport protocol, but the big difference is that ____ does not guarantee delivery like TCP does.

A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

provides for the uploading and downloading of files from a remote host running _____ server software. As well as uploading
and downloading files, it enables you to view the contents of folders on an ___ server and rename and delete files and directories if you have the necessary permissions

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

based on
Secure Shell (SSH) technology, provides robust authentication between
sender and receiver. It also provides encryption capabilities, which means that
even if packets are copied from the network, their contents remain hidden
from prying eyes.

A

Secure File Transfer Protocol (SFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

which layer of the OSI model does TFTP operate?

A

application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which layer of the OSI model does UDP operate?

A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

which layer of the OSI model does TCP operate?

A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is defined in RFC 821, is a protocol that defines how mail messages are sent between hosts. Uses TCP connections to guarantee
error-free delivery of messages.

A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

can be used to both send and receive mail

A

SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

defined in RFC 2068, is the protocol that enables text, graphics, multimedia, and other material to be downloaded from an HTTP
server. HTTP defines what actions can be requested by clients and how servers should answer those requests.

A

Hypertext Transfer Protocol (HTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

defined in RFC 854, is a virtual terminal protocol. It enables
sessions to be opened on a remote host, and then commands can be executed
on that remote host.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

___ is used to access UNIX and Linux systems.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a secure alternative to Telnet. It provides security by encrypting
data as it travels between systems. This makes it difficult for hackers using
packet sniffers and other traffic-detection systems. It also provides more
robust authentication systems than Telnet

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

a protocol that works with the IP layer
to provide error checking and reporting functionality. In effect, it is a
tool that IP uses in its quest to provide best-effort delivery.

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

is defined in RFC 826, is responsible for resolving IP addresses to Media Access Control (MAC) addresses. When a system attempts to contact another host, IP first determines whether the other host is on the same network it is on by looking at the IP address. If IP determines that the destina-
tion is on the local network, it consults the ____ cache to see whether it has a
corresponding entry. The ARP cache is a table on the local system that stores
mappings between data link layer addresses (the MAC address or physical address) and network layer addresses (IP addresses).

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

performs the same function as
ARP, but in reverse. In other words, it resolves MAC addresses to IP address-
es. ____ makes it possible for applications or systems to learn their own IP
address from a router or Domain Name Service (DNS) server. Such a resolu-
tion is useful for tasks such as performing reverse lookups in DNS. It is
defined in RFC 903.

A

Reverse Address Resolution Protocol (RARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

defined in RFC 958, is the part of the TCP/IP protocol suite
that facilitates the communication of time between systems. The idea is that
one system configured as a time provider transmits time information to other
systems that can be both time receivers and time providers for other systems.

A

Network Time Protocol (NTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

a protocol that provides a mech-
anism to access and query directory services systems. In the context of the
Network+ exam, these directory services systems are most likely to be Novell
Directory Services (NDS) and Microsoft’s Active Directory

A

Lightweight Directory Access Protocol

LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

the protocol within the TCP/IP
protocol suite that manages multicast groups. It enables, for example, one
computer on the Internet to target content to a specific group of computers
that will receive content from the sending system. This is in contrast to uni-
cast messaging, in which data is sent to a single computer or network device
and not to a group, or a broadcast message goes to all systems.

A

Internet Group Management Protocol

IGMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

a security protocol designed to ensure privacy between communicating client/server applications. When a server and client communicate, it ensures that no one can eavesdrop and intercept or otherwise tamper with the data message. it is the successor
to SSL.

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

is an application layer protocol designed to establish and maintain multimedia sessions, such as Internet telephony calls. This
means that it can create communication sessions for such features as audio/videoconferencing, online gaming, and person-to-person conversations over the Internet.

A

Session Initiation Protocol (SIP)

28
Q

At wich layer of the OSI model does SIP operate?

A

application

29
Q

the Internet-standard protocol
for the transport of real-time data, including audio and video. it can use
either TCP or UDP as a transport mechanism. However, UDP is used more
often because applications using this are less sensitive to packet loss but typi-
cally are sensitive to delays. UDP, then, is a faster protocol because packet
delivery is not guaranteed. It is often used with VoIP. VoIP data packets
live in these packets, which are inside UDP-IP packets.

A

The Real-time Transport Protocol (RTP)

30
Q

Remember that ____ is used to transport real-time data and is often used with VoIP

A

RTP

31
Q

Which layer of the OSI model does IP operate?

A

Network

32
Q

Which layer of the OSI model does TCP operate?

A

Transport

33
Q

Which layer of the OSI model does UDP operate?

A

Transport

34
Q

Which layer of the OSI model does FTP operate?

A

Application

35
Q

Which layer of the OSI model does SFTP operate?

A

Application

36
Q

Which layer of the OSI model does TFTP operate?

A

application

37
Q

Which layer of the OSI model does SMTP operate?

A

application

38
Q

Which layer of the OSI model does HTTP operate?

A

application

39
Q

Which layer of the OSI model does HTTPS operate?

A

application

40
Q

Which layer of the OSI model does POP3/ IMAPv4 operate?

A

application

41
Q

Which layer of the OSI model does Telnet operate?

A

application

42
Q

Which layer of the OSI model does SSH operate?

A

application

43
Q

Which layer of the OSI model does ICMP operate?

A

Network

44
Q

Which layer of the OSI model does ARP operate?

A

data link

45
Q

Which layer of the OSI model does RARP operate?

A

data link

46
Q

Which layer of the OSI model does NTP operate?

A

application

47
Q

Which layer of the OSI model does NNTP operate?

A

application

48
Q

Which layer of the OSI model does SCP operate?

A

application

49
Q

Which layer of the OSI model does LDAP operate?

A

application

50
Q

Which layer of the OSI model does IGMP operate?

A

network

51
Q

Which layer of the OSI model does TLS operate?

A

application

52
Q

Which layer of the OSI model does SIP operate?

A

application

53
Q

Which layer of the OSI model does RTP operate?

A

application

54
Q

The internet standard protocol for transferring real time data

A

RTP- Real time Transport protocol

55
Q

An application layer protocol designed to establish and maintain multimedia sessions such as internet telephony calls

A

SIP

56
Q

A security protocol designed
to ensure privacy between
communicating client/server
applications

A

Transport Layer

Security

57
Q

Provides a mechanism for systems within the same multicast group to register and communicate with each other

A

IGMP- Internet Group Management Protocol

58
Q

Accesses and queries directory
services systems such as
Novell Directory Services and
Microsoft Active Directory.

A

LDAP- Lightweight directory access protocol

59
Q

Enables files to be copied securely between two systems. Uses SSH technology to
provide encryption services

A

SCP- secure copy protocol

60
Q

Facilitates the access and
downloading of messages
from newsgroup servers.

A

NNTP- network news transport protocol

61
Q

Communicates time
synchronization information
between devices

A

NTP- Network Time protocol

62
Q

Used on IP-based networks
for error reporting, flow
control, and route testing

A

ICMP- Internet Control Message Protocol

63
Q

Enable secure sessions to be opened on remote hosts

A

SSH- Secure SHell

64
Q

Enables sessions to be opened on remote hosts

A

Telnet

65
Q

A connectionless protocol
used to move data around
a network.

A

Internet Protocol