Front | Back |
The function of the NetBT protocol is to allow NetBIOS services to be used over TCP/IP networks
|
True
|
What protocol is used for automated discovery of networked services on Local Area Networks (LANs)?
|
SLP
|
What refers to file sharing network protocols?
|
|
A network protocol providing an alternate solution to the manual assignment of IP addresses is called
|
DHCP
|
LDAP is an example of:
|
Directory access protocol
|
A protocol used in network management systems for monitoring network-attached devices is known as:
|
SNMP
|
Server Message Block (SMB) and Common Internet File System (CIFS) are examples of network protocols used for providing shared access to files, directories, and devices
|
True
|
Examples of secure network protocols offering traffic encryption include:
|
|
What refers to a cryptographic network protocol for secure data communication, remote command-line login, remote command execution and other secure network services between two networked computers?
|
SSH
|
What protocol was designed as a secure replacement for Telnet?
|
SSH
|
Transmission Control Protocol (TCP) is an example of a connectionless protocol. TCP doesn't support three-way handshake (thus it is also referred to as unreliable or best-effort protocol).
|
False
|
User Datagram Protocol (UDP) is a connection-oriented protocol that requires a set of intial steps in order to establish connection (three-way handshake), supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packet that arrived out of order).
|
False
|
What are the characteristic features of the IEEE 802.11a wireless standard amendment?
|
|
What are the characteristic features of the IEEE 802.11b wireless standard amendment?
|
|
What are the characteristic features of IEEE 802.11g wireless standard amendment?
|
|