1.
When accessing data, __________ has the fastest throughput
Correct Answer
B. RAM
Explanation
RAM (Random Access Memory) has the fastest throughput when accessing data. This is because RAM is a type of computer memory that allows data to be read from or written to quickly. Unlike other storage devices like flash drives, hard disk drives, and CD-ROMs, RAM does not have any moving parts, which allows it to access data much faster. Additionally, RAM is directly connected to the computer's processor, further enhancing its speed and efficiency in data access.
2.
Which of the protocols listed below is used for automated discovery of networked services on Local Area Networks (LANs)?
Correct Answer
D. SLP
Explanation
SLP (Service Location Protocol) is the correct answer because it is a protocol used for automated discovery of networked services on Local Area Networks (LANs). SLP allows devices to advertise their services and for clients to discover and connect to those services without manual configuration. It is commonly used in LAN environments to enable automatic discovery and configuration of network services such as printers, file servers, and other network resources.
3.
Which of the following answers refer(s) to file sharing network protocol(s)? (Select all that apply)
Correct Answer(s)
B. FTP
D. AFP
Explanation
FTP (File Transfer Protocol) and AFP (Apple Filing Protocol) are both file sharing network protocols. FTP is a standard network protocol used to transfer files from one host to another over a TCP-based network. It allows users to upload, download, and manage files on remote servers. AFP, on the other hand, is a proprietary network protocol developed by Apple Inc. It is used for sharing files and accessing network services on Apple devices. Both protocols enable users to share files over a network, making them the correct answers for this question.
4.
A network protocol providing an alternative solution to the manual assignment of IP addresses is called:
Correct Answer
D. DHCP
Explanation
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that provides an alternative solution to the manual assignment of IP addresses. DHCP allows network devices to automatically obtain IP addresses and other network configuration information from a DHCP server. This eliminates the need for manual configuration, making it easier to manage and maintain IP addresses within a network.
5.
LDAP is an example of:
Correct Answer
C. Directory access protocol
Explanation
LDAP stands for Lightweight Directory Access Protocol. It is a protocol used to access and manage information in a directory service, such as a database of users and resources. LDAP is specifically designed for directory services and provides a standardized way for clients to interact with directories. It allows for searching, adding, modifying, and deleting directory entries. Therefore, LDAP is an example of a directory access protocol.
6.
A protocol used in network management systems for monitoring network-attached devices is known as:
Correct Answer
C. SNMP
Explanation
SNMP stands for Simple Network Management Protocol. It is a protocol used in network management systems to monitor network-attached devices. SNMP allows network administrators to manage and monitor devices such as routers, switches, servers, and printers on a network. It provides a standardized way to collect and organize information about these devices, allowing for efficient network troubleshooting, performance monitoring, and configuration management.
7.
Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for providing shared access to files, directories, and devices.
Correct Answer
A. True
Explanation
Server Message Block (SMB) and Common Internet File System (CIFS) are indeed examples of network protocols used for providing shared access to files, directories, and devices. These protocols allow multiple users to access and share files over a network, making it easier for collaboration and file sharing in a networked environment.
8.
Examples of secure network protocols offering traffic encryption include: (Select 3 answers)
Correct Answer(s)
B. HTTPS
D. IPsec
F. SSH
Explanation
The three secure network protocols offering traffic encryption are HTTPS, IPsec, and SSH. HTTPS is used for secure communication over the internet and encrypts data sent between a web browser and a website. IPsec is a protocol suite that provides secure communication over IP networks by encrypting and authenticating IP packets. SSH (Secure Shell) is a network protocol that allows secure remote access and control of a computer. It provides encryption and authentication to ensure secure communication between two systems.
9.
Which of the following answers refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers?
Correct Answer
B. SSH
Explanation
SSH (Secure Shell) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers. It provides a secure way to access and manage remote systems, encrypting the data transmitted over the network to prevent unauthorized access or eavesdropping. Telnet, Bcrypt, and TFTP are not cryptographic network protocols and do not provide the same level of security as SSH.
10.
User Datagram Protocol (UDP) is a connection-oriented protocol that requires a set of initial steps in order to establish a connection (three-way handshake), supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order)
Correct Answer
B. False
Explanation
UDP is actually a connectionless protocol, not a connection-oriented protocol. Unlike connection-oriented protocols like TCP, UDP does not require a three-way handshake to establish a connection. It also does not support retransmission of lost packets, flow control, or sequencing. UDP is often used for applications that prioritize speed over reliability, such as streaming media or online gaming, where occasional packet loss is acceptable.