Browse Definitions :
Quiz

Quiz: Protocols

This week's quiz has a slightly different format. Your goal will be to match the correct protocol in the left-hand column with its description in the right-hand column.

How to take the quiz:
- After reading the question, click on the answer that you think iscorrect to go to the whatis.com definition. If the answer you ve chosenis correct, you will see the question text somewhere in the defintion.
OR
- After reading the question, write down the letter of your answerchoice on scrap paper. Check your answers by using the answer key at theend of the quiz.

a) Virtual Router Redundancy Protocol
b) Session Initiation Protocol
c) Voice over Internet Protocol
d) address resolution protocol
e) Internet Protocol
f) Common Management Information Protocol
g) Next Hop Resolution Protocol
h) Hypertext Transfer Protocol
i) Extended Simple Mail Transfer Protocol
j) Transmission Control Protocol
k) Link Control Protocol
l) Dynamic Host Configuration Protocol
m) file transfer protocol
n) Trivial File Transfer Protocol
o) Serial Line Internet Protocol
p) Simple Mail Transfer Protocol
q) Layer Two Tunneling Protocol
r) exterior gateway protocol
s) Lightweight Directory Access Protocol
t) Simple Network Management Protocol
u) Internet Open Trading Protocol
v) Server Message Block Protocol
w) anti-replay protocol
x) Internet Message Access Protocol
y) Border Gateway Protocol
z) Enhanced Interior Gateway Routing Protocol
1._____ This is a communications protocol that lets networkadministrators centrally manage and automate the assignment of InternetProtocol (IP) addresses in an organization's network.

2. _____This is an Internet Engineering Task Force (IETF)standard protocol for initiating an interactive user session that involvesmultimedia elements such as video, voice, chat, gaming, and virtual reality.

3._____ This extension of the Point-to-Point TunnelingProtocol is used by an Internet service provider to enable the operationof a virtual private network over the Internet.

4._____ This is a protocol used to exchange routinginformation between two gateway hosts (each with its own router) in a networkof autonomous systems.

5. _____This is a protocol that allows a computer sendingdata to another computer to learn the most direct route to the receivingcomputer.

6. _____This protocol is one of several standards proposedto ensure that manufacturers, distributors, retailers, and shoppers alluse a common method of exchanging data when doing business online.

7._____This is a standard protocol for accessing e-mailfrom your local server.

8._____ This protocol is used to keep track of the individualunits of data (called packets) that a message is divided into for efficientrouting through the Internet.

9._____This protocol ensures IP packet-level securityby making it impossible for a hacker to intercept message packets and insertchanged packets into the data stream between a source computer and a destinationcomputer.

10.____This is a network management protocol built onthe Open Systems Interconnection communication model.



SCROLL DOWN FOR ANSWER KEY

See the rest of our quiz topics

ANSWER KEY: 1L;2B;3Q;4R;5G;6U;7X;8J;9W;10F
Let us know how you did and suggest a topic for a future quiz! [email protected]

This was last updated in July 2008
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against ...

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close