Questions
The following is a short list of review questions to help reinforce your learning and help you identify areas that may require some improvement:
- Which of the following protocols is used to download emails from an email server on a network?
A. SMTP
B. POP
C. IMAP
D. All of the above
- A network administrator is connected remotely to a router on the network. However, a hacker was able to capture the username and password used by the network administrator to log into the device. Which of the following protocols was most likely being used by the network administrator?
A. RDP
B. SSH
C. HTTP
D. Telnet
- A network administrator wants to securely upload files to a device over a network. However, the network administrator was able to connect to port 22 on the destination host. Which of the following protocols is being used by the network administrator?
A. FTPS
B. SSH
C. SFTP
D. HTTPS
- A network administrator...