Questions and Answers
Which protocol is commonly used for file transfer between systems?
FTP
Which protocol is used for encrypted communication link?
SSH
Which protocol is used for remote login to devices?
Telnet
Which protocol is commonly used for server to server email transfer?
Signup and view all the answers
Which protocol converts names to IP addresses?
Signup and view all the answers
Which protocol is used for automated configuration of IP address and other options?
Signup and view all the answers
Which protocol is commonly used for communication in the browser?
Signup and view all the answers
Which protocol is used to gather statistics from network devices?
Signup and view all the answers
Which protocol is commonly used for storing and retrieving information in a network directory?
Signup and view all the answers
Which protocol is used for sharing a desktop from a remote location?
Signup and view all the answers
Which protocol is connection-oriented and provides reliable delivery?
Signup and view all the answers
Which protocol is connectionless and provides unreliable delivery?
Signup and view all the answers
Which protocol is commonly used for real-time communication where data cannot be stopped and resent?
Signup and view all the answers
Which protocol prefers a 'return receipt' and is commonly used for secure communication?
Signup and view all the answers
Which protocol allows the sender to determine the amount of data transmitted and has no flow control?
Signup and view all the answers
What is the purpose of a port in IP communication?
Signup and view all the answers
Which range of port numbers is considered non-ephemeral (permanent)?
Signup and view all the answers
Which range of port numbers is considered ephemeral (temporary)?
Signup and view all the answers
What is the range of port numbers that TCP and UDP ports can be?
Signup and view all the answers
Which protocol commonly uses non-ephemeral (permanent) port numbers, but not always?
Signup and view all the answers
Match the following network protocols with their characteristics:
Signup and view all the answers
Match the following port types with their descriptions:
Signup and view all the answers
Match the following protocols with their usage:
Signup and view all the answers
Match the following terms with their definitions:
Signup and view all the answers
Match the following network protocols with their delivery characteristics:
Signup and view all the answers
Match the following port number ranges with their types:
Signup and view all the answers
Match the following protocols with their communication characteristics:
Signup and view all the answers
Match the following port types with their port number ranges:
Signup and view all the answers
Match the following protocols with their delivery methods:
Signup and view all the answers
Match the following network protocols with their usage scenarios:
Signup and view all the answers
Match the following protocols with their associated port numbers:
Signup and view all the answers
Match the following protocols with their port-based security implications:
Signup and view all the answers
Match the following protocols with their descriptions:
Signup and view all the answers
Match the following protocols with their associated functions:
Signup and view all the answers
Match the following protocols with their port numbers and descriptions:
Signup and view all the answers
Match the following protocols with their associated versions and port numbers:
Signup and view all the answers
Match the following protocols with their associated descriptions:
Signup and view all the answers
Match the following protocols with their associated features:
Signup and view all the answers
Match the following protocols with their associated port numbers and communication types:
Signup and view all the answers
Match the following protocols with their associated communication types and port numbers:
Signup and view all the answers