1.
_________ is the older version of two protocols that automatically assign IPs to clients that connect to a network.
Explanation
Bootstrap Protocol
2.
_________converts domain names to IP addresses.
Explanation
Domain Name Services
3.
Name the four layers of the TCP/IP suite.
Explanation
The TCP/IP suite consists of four layers: the Application layer, which provides services to the user applications; the Transport layer, which ensures reliable delivery of data between hosts; the Internet layer, which handles the addressing and routing of data packets across networks; and the Link layer, which deals with the physical transmission of data over the network medium. These four layers work together to enable communication between devices in a TCP/IP network.
4.
_________automatically synchronizes clocks.
Explanation
Network Time Protocol
5.
_________gathers statistics from network devices such as uptime/performance.
Explanation
Simple Network Management Protocol
6.
Which version of SNMP implemented traffic encryption capabilities? Answer in v# format.
Explanation
SNMP version 3 implemented traffic encryption capabilities.
7.
_________allows you to login to remote devices but the communication is unencrypted.
Explanation
Telnet is a protocol that enables users to remotely log in to devices, but it does not provide encryption for the communication. This means that any data transmitted during the Telnet session, including login credentials and sensitive information, can be intercepted and read by unauthorized individuals. As a result, Telnet is considered insecure and is not recommended for use in environments where data confidentiality is important.
8.
_________allows you to login to remote devices but the communication is encrypted..
Explanation
Secure Shell
9.
_________ is a protocol for transferring files that has full-featured functionality (List, add, delete, etc.) and requires user credentials.
Explanation
File Transfer Protocol
10.
_________ is a protocol for transferring files that is simple and has no authentication.
Explanation
TFTP (Trivial File Transfer Protocol) is a protocol used for transferring files that is simple and does not require authentication. It is commonly used for transferring configuration files and firmware to network devices. TFTP does not provide any security features like encryption or user authentication, making it suitable for simple file transfers in non-sensitive environments.
11.
_________ is used for transferring email between servers.
Explanation
Simple Mail Transfer Protocol
12.
_________ receives mail and is designed for intermittent connectivity.
Explanation
Post Office Protocol 3
13.
_________ is a mail protocol that keeps "state" (Read, replied, deleted, etc.).
Explanation
IMAP4 is a mail protocol that keeps "state" of emails, meaning it tracks whether an email has been read, replied to, deleted, etc. Unlike POP3, which only downloads emails to a device without keeping track of their status, IMAP4 allows users to access their emails from multiple devices while maintaining the same state across all devices. This means that if an email is marked as read on one device, it will also be marked as read on all other devices connected to the same email account.
14.
_________ is the most common protocol for web browsing.
Explanation
Hypertext Transfer Protocol
15.
_________ is the secure version of the most common protocol for web browsing, encrypting traffic through TLS/SSL.
Explanation
HTTPS is the secure version of the most common protocol for web browsing. It encrypts traffic through TLS/SSL, ensuring that the data transmitted between a user's browser and a website is secure and protected from unauthorized access or tampering. This added layer of security is particularly important when sensitive information, such as passwords or credit card details, is being transmitted over the internet. By using HTTPS, websites can provide a safer browsing experience for their users and protect their data from potential threats.
16.
_________ was an encryption protocol created by Netscape. It has been replaced by _________.
Explanation
Secure Socket Layer, Transport Layer security
17.
_________ is a VoIP signalling protocol that builds and tears down media calls.
Explanation
Session Initiation Protocol
18.
_________ carries the media stream of a VoIP media stream.
Explanation
Real-Time Transport Protocol