Computer Networking Chapter 7

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

PTP can be deployed as a layer 3 protocol over IP. What is a limitation of this deployment?

It cannot achieve the same accuracy as layer 2 implementations.

It is incompatible with most network adapters.

It requires additional satellite synchronization.

It increases the network bandwidth usage significantly

It cannot achieve the same accuracy as layer 2 implementations.

2
New cards

What is established between a server and a client after successful authentication with TLS?

A public network

An encrypted tunnel

A data compression protocol

A direct physical connection

An encrypted tunnel

3
New cards

You are the network administrator for a small consulting firm. You've set up an NTP server to manage the time across all the machines in the network.

You have a computer that's experiencing a slight time drift of just a few seconds.

Which time correction should you use to fix the system's clock?

Slam

Slew

Skew

Jitter

Slew

4
New cards

What is it called when a system's clock begins to be off by a few seconds or even minutes?

Slew

Time drift

Dispersion

Slam

Time drift

5
New cards

You are setting up a secure website for your online store. You want to ensure that all data transmitted between your website and your customers is encrypted.

Which of the following steps is essential for you to achieve this?

Obtain and install a digital certificate.

Install a web analytics tool.

Increase your website's bandwidth.

Implement a CAPTCHA system on your website.

Obtain and install a digital certificate.

6
New cards

What can happen if a server or host is configured with the incorrect time?

It can lead to increased network speed

It will increase the security of network communications

It will automatically correct itself without NTP

It may not be able to access network services

It may not be able to access network services

7
New cards

What happens during a TLS handshake?

The server provides its digital certificate to the client for authentication.

The server and client agree on a data compression method.

The server's processing load is reduced.

The client and server negotiate network congestion management.

The server provides its digital certificate to the client for authentication.

8
New cards

What is the main advantage of Precision Time Protocol (PTP) over Network Time Protocol (NTP)?

PTP is easier to implement.

PTP supports more network services.

PTP provides nanosecond precision.

PTP uses less network bandwidth.

PTP provides nanosecond precision.

9
New cards

Which of the following time standards does NTP use?

EDT

PDT

CDT

UTC

UTC

10
New cards

What role does a grandmaster clock play in a PTP domain?

It acts as the primary backup time source.

It synchronizes directly with satellite clocks.

It is the authoritative time source.

It serves as the primary network router.

It is the authoritative time source.

11
New cards

What does the term "stateless protocol" imply about HTTP?

Each request from a client to a server is treated as a new request.

The server stores data in a centralized database for all requests.

The server retains information about client requests indefinitely.

The server requires authentication for every request.

Each request from a client to a server is treated as a new request.

12
New cards

Which TCP port does HTTPS encrypted traffic default to?

8080

80

21

443

443

13
New cards

Why is FTPES usually preferred over FTPS?

FTPES supports larger file transfers.

FTPES is faster than FTPS.

FTPES uses stronger encryption than FTPS.

FTPES is easier to configure with firewalls.

FTPES is easier to configure with firewalls.

14
New cards

What feature does version 2 of HTTP add to enhance its functionality?

More state-preserving features

Increased encryption

Improved FTP support

Faster email transmission

More state-preserving features

15
New cards

What is the primary function of a database?

To provision information in a format that can be read and updated

To serve as a graphical user interface for data management

To store data in a static format that cannot be updated

To encrypt data using transport layer security

To provision information in a format that can be read and updated

16
New cards

Which of the following is a limitation of active FTP mode regarding firewalls?

It only works with TCP port 22.

It encrypts the data transfer by default.

It can cause configuration problems due to unpredictable port usage.

It requires HTTPS for data transfer.

It can cause configuration problems due to unpredictable port usage.

17
New cards

Which operating system is typically used by NAS appliances?

iOS

Windows

MacOS

Linux-based

Linux-based

18
New cards

What is the purpose of using TLS transport encryption in databases?

To improve the graphical user interface

To increase data storage capacity

To secure data transmission over the network

To synchronize data between servers

To secure data transmission over the network

19
New cards

In the context of FTP over Explicit TLS (FTPES), which command is used to encrypt the data connection for actual file transfers after upgrading an unsecure connection to a secure one?

PASV

SSH

AUTH TLS

PROT

PROT

20
New cards

Why is SMB1 now disabled by default on current Windows versions?

It does not support printing services.

It is too slow.

It has very serious security vulnerabilities.

It does not support encryption.

It has very serious security vulnerabilities.

21
New cards

Which protocol is typically used for copy or backup operations on a NAS appliance?

SNMP

SMB or FTP

HTTP

SMTP

SMB or FTP

22
New cards

What does a client use to identify the resource it wants to request from an HTTP server?

Port number

Uniform Resource Locator (URL)

IP address

MAC address

Uniform Resource Locator (URL)

23
New cards

What is the primary purpose of the File Transfer Protocol (FTP)?

To stream video content

To encrypt web traffic

To send email messages

To transfer files between a client and server

To transfer files between a client and server

24
New cards

Why might TFTP not be suitable for transferring large files?

It encrypts the data, causing overhead.

It requires manual confirmation for each packet.

It operates over UDP, which does not guarantee delivery.

It only works within local networks.

It operates over UDP, which does not guarantee delivery.

25
New cards

Which version of SMB supports message encryption?

All versions

SMB3

SMB2

SMB1

SMB3

26
New cards

What is a key advantage of using VoIP technology over traditional PSTN lines?

Limited call routing options

Ability to transmit voice over IP networks

Higher call costs

Requirement for separate voice and data channels

Ability to transmit voice over IP networks

27
New cards

How do VoIP phones use VLAN tagging?

To prioritize video traffic over voice traffic

To ensure that voice and data traffic are combined on the same network

To disable all data traffic except for VoIP communication

To ensure that SIP control and RTP media protocols are segregated from normal data traffic

To ensure that SIP control and RTP media protocols are segregated from normal data traffic

28
New cards

How do VoIP phones distinguish data traffic from voice traffic?

By using digital certificates for voice traffic only

By configuring separate VLAN IDs for data and voice traffic

By using separate physical links for each type of traffic

By prioritizing voice traffic over data traffic using PoE

By configuring separate VLAN IDs for data and voice traffic

29
New cards

What is a significant difference between a TDM PBX and a VoIP PBX?

A TDM PBX can only support voice mail, while a VoIP PBX cannot.

A TDM PBX is supplied as vendor-specific hardware, while a VoIP PBX can be implemented as software.

A VoIP PBX requires a separate data channel for each call, while a TDM PBX does not.

A TDM PBX uses the Internet for all calls, while a VoIP PBX uses the PSTN.

A TDM PBX is supplied as vendor-specific hardware, while a VoIP PBX can be implemented as software.

30
New cards

What is one of the primary purposes of the Internet Message Access Protocol (IMAP)?

To connect to web servers

To encrypt email messages

To deliver email to hosts that are permanently available

To manage a mailbox on a server

To manage a mailbox on a server

31
New cards

What is the purpose of the STARTTLS command in SMTP?

To create a new email account

To upgrade an existing unsecure connection to use TLS

To encrypt the entire email message content

To downgrade the connection to an unsecure state

To upgrade an existing unsecure connection to use TLS

32
New cards

What does SMTP use to discover the IP address of the recipient's SMTP server?

The domain name part of the recipient's email address

The sender's IP address

The recipient's physical address

The recipient's email password

The domain name part of the recipient's email address

33
New cards

In a Windows environment, which protocol is typically used to access Microsoft Exchange mailboxes?

SMTP

IMAP

MAPI

HTTPS

MAPI

34
New cards

What is the purpose of using a tel: URI scheme in SIP systems?

To encrypt voice communications

To compress audio data for transmission

To dial a landline or cell phone

To assign unique identifiers to devices

To dial a landline or cell phone

35
New cards

Which of the following is a unique identifier used by SIP endpoints?

MAC address

SIP URI

IP address

DNS name

SIP URI