1.
The protocol developed by Netscape for transmitting private documents over the Internet is known as
Correct Answer
B. SSL
Explanation
SSL stands for Secure Socket Layer, which is a protocol developed by Netscape for transmitting private documents over the Internet. SSL provides encryption and authentication mechanisms to ensure the confidentiality and integrity of data transmitted between a web server and a client. It is widely used for securing sensitive information such as credit card numbers, login credentials, and personal data. SSL has been succeeded by Transport Layer Security (TLS), but the term SSL is still commonly used to refer to both protocols.
2.
Which of the following are key benefits of Web-based mail? (Select two.)
Correct Answer(s)
A. You can access your e-mail from anywhere in the world using a computer with a browser and an Internet connection.
D. You can use a third-party application, like Microsoft Outlook, to download your e-mail.
Explanation
The first key benefit of web-based mail is that you can access your e-mail from anywhere in the world using a computer with a browser and an Internet connection. This allows for flexibility and convenience as you can check your e-mail on the go or from different devices. The second benefit is that you can use a third-party application, like Microsoft Outlook, to download your e-mail. This gives users the option to manage their e-mail using a familiar and preferred interface, while still taking advantage of the accessibility and convenience of web-based mail.
3.
An SSL URL connection starts with which prefix?
Correct Answer
A. Https
Explanation
An SSL URL connection starts with the prefix "https" because "https" stands for Hypertext Transfer Protocol Secure, which is a secure version of the HTTP protocol. It uses encryption to ensure that the data transmitted between the client and the server is secure and cannot be intercepted or tampered with by unauthorized parties. The "https" prefix indicates that the connection is using SSL (Secure Sockets Layer) or its successor TLS (Transport Layer Security) to establish a secure connection.
4.
Which of the following protocols are used to receive e-mail from servers?(Select two.)
Correct Answer(s)
C. IMAP
D. POP
Explanation
IMAP (Internet Message Access Protocol) and POP (Post Office Protocol) are both used to receive email from servers. IMAP allows users to access their emails directly from the mail server, keeping the messages stored on the server even after they are downloaded to a device. This allows for easy access to emails from multiple devices. On the other hand, POP downloads emails from the server to the user's device and typically deletes them from the server. This protocol is commonly used when users only access their emails from a single device.
5.
What ports does FTP use? (Select two.)
Correct Answer(s)
B. 21
D. 20
Explanation
FTP (File Transfer Protocol) uses two ports: port 21 and port 20. Port 21 is used for the control connection, where commands and responses are exchanged between the FTP client and server. Port 20 is used for the data connection, where the actual file transfers occur. These two ports work together to facilitate the transfer of files between the client and server in an FTP session.
6.
Which statements about NETSTAT switches (in Windows) are true? (Select three.)
Correct Answer(s)
A. -a shows all used ports.
B. -o shows the process ID.
D. -n shows raw port numbers and IP addresses.
Explanation
The correct answer is -a shows all used ports, -o shows the process ID, and -n shows raw port numbers and IP addresses. The -a switch in NETSTAT displays all active TCP and UDP connections and the TCP and UDP ports on which the computer is listening. The -o switch shows the process ID associated with each connection. The -n switch displays addresses and port numbers in numerical form, rather than resolving them to host names and protocol names.
7.
Port 110 (POP) is what kind of port?
Correct Answer
A. Well-known
Explanation
Port 110 (POP) is classified as a well-known port. Well-known ports are those that have been assigned by the Internet Assigned Numbers Authority (IANA) and are commonly used by specific protocols. Port 110 is specifically designated for the Post Office Protocol (POP), which is used for retrieving email from a remote server. Well-known ports are typically associated with widely used services and are well-documented, making them easily recognizable and accessible.
8.
Which statements about SSH and Telnet are true? (Select two.)
Correct Answer(s)
A. SSH uses port 22 and Telnet uses port 23.
B. SSH is more secure than Telnet because it encrypts data.
Explanation
SSH uses port 22 and Telnet uses port 23. This is true and is a key difference between the two protocols. SSH is more secure than Telnet because it encrypts data. This is also true as Telnet sends data in plain text, making it vulnerable to eavesdropping and unauthorized access.
9.
For what is a Telnet client used?
Correct Answer
C. To issue commands to a remote server
Explanation
A Telnet client is used to issue commands to a remote server. Telnet is a network protocol that allows a user to establish a connection with a remote server and interact with it through a command-line interface. By using a Telnet client, users can remotely access and control servers, routers, and other network devices by sending commands to them. It provides a way to manage and administer remote systems without physically being present at the location of the server.
10.
For what is the NETSTAT utility used?
Correct Answer
B. To see the endpoints of your sessions
Explanation
The NETSTAT utility is used to see the endpoints of your sessions. It provides information about the active network connections on a computer, including the local and remote IP addresses, ports, and the status of the connection. This can be useful for troubleshooting network issues or monitoring network activity. It does not provide information about IP address and configuration details, issuing commands to a remote server, or the route an IP packet takes across multiple routers.