Search Header Logo

CCST Application Transport - Chapter 15

Authored by Alicia Pierce

Computers

9th - 12th Grade

Used 2+ times

CCST Application Transport - Chapter 15
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol and port number are commonly associated with Secure Shell?

UDP 53

UDP, 25

TCP, 22

TCP, 23

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the application most often considered the secure replacement to telnet?

SCP

SSH

SFP

SPC

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which HTTP request is used to request data from the server?

RETRIEVE

HEAD

PUT

GET

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Linux CLI command can generate an SSH RSA keypair?

rsa-gen -key 256

ssh -key rasa

ssh-keygen -t rsa

scpkey -rsa

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which technologies are commonly used to display styled pages in a web browser?

(Select 2 Answers)

UDP

SSH

CSS

HTML

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

When using fixed-length fields, what type of pieces of information does a host need to interpret it?

Grammar

Dictionary

Interpreter

Codex

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which alternative to the File Transfer Protocol (FTP) doesn’t support authentication or encryption and is often used to load configuration into a networking device?

FTPS

SFTP

SCP

TFTP

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?