CCST Application Transport - Chapter 15

CCST Application Transport - Chapter 15

9th - 12th Grade

8 Qs

quiz-placeholder

Similar activities

Protokoły sieciowe

Protokoły sieciowe

9th Grade

13 Qs

Technical Terms - Internet (A-Z) - UDP

Technical Terms - Internet (A-Z) - UDP

12th Grade

10 Qs

PRETEST

PRETEST

11th Grade - University

10 Qs

Network TCP/IP Model Layers

Network TCP/IP Model Layers

10th Grade

10 Qs

Technical Terms - Internet (A-Z) - TCP

Technical Terms - Internet (A-Z) - TCP

12th Grade

10 Qs

Networks and Protocols Quiz

Networks and Protocols Quiz

12th Grade

10 Qs

Year 9 – Computing – Networking: Network Protocols 1 (TCP/IP

Year 9 – Computing – Networking: Network Protocols 1 (TCP/IP

9th Grade - University

11 Qs

SLR 3 - Networking part 3

SLR 3 - Networking part 3

9th - 12th Grade

10 Qs

CCST Application Transport - Chapter 15

CCST Application Transport - Chapter 15

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Alicia Pierce

Used 2+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol and port number are commonly associated with Secure Shell?

UDP 53

UDP, 25

TCP, 22

TCP, 23

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the application most often considered the secure replacement to telnet?

SCP

SSH

SFP

SPC

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which HTTP request is used to request data from the server?

RETRIEVE

HEAD

PUT

GET

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Linux CLI command can generate an SSH RSA keypair?

rsa-gen -key 256

ssh -key rasa

ssh-keygen -t rsa

scpkey -rsa

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which technologies are commonly used to display styled pages in a web browser?

(Select 2 Answers)

UDP

SSH

CSS

HTML

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

When using fixed-length fields, what type of pieces of information does a host need to interpret it?

Grammar

Dictionary

Interpreter

Codex

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which alternative to the File Transfer Protocol (FTP) doesn’t support authentication or encryption and is often used to load configuration into a networking device?

FTPS

SFTP

SCP

TFTP

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name of the most widely used SSH program on Microsoft Windows machines?

Powershell

Teraterm

PuTTY

Terminal