The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a ( ) model architecture using separate control and data connections between the client

题目
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a ( ) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were (请作答此空) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.

A.command-line
B.graphical
C.automation
D.productivity

相似考题
更多“The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a ( ) model architecture using ”相关问题
  • 第1题:

    TCP/IP ( )layer protocols provide services to the application(请作答此空)running on a computer. The application layer does not define the application itself, but rather it defines( )that applications need--like the ability to transfer a file in the case of HTTP. In short, the application layer provides an( )between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP( )layer consists of two main protocol options--the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).

    A.hardware]
    B.software]
    C.packet
    D.equipment

    答案:B
    解析:
    TCP/IP传输层协议为运行在计算机上的应用软件提供服务。应用层没有定义应用本身,而是定义了应用需要的服务,例如采用HTTP可以传输文件。简而言之,应用层提供了运行在计算机上的软件与网络之间的接口。TCP/IP应用层包括了很多的协议,HTTP仅是其中之一。TCP/IP传输层主要由两个可选的协议组成——传输控制协议(TCP)和用户数据报协议(UDP)。

  • 第2题:

    Secure Shell (SSH) is a cryptographic network protocol for ( ) remote login and other secure network services over an(请作答此空)network.The standard( )port for SSH is 22. The best known example application is for remote login to computer systems by users.
    SSH provides a secure channel over an insecured network in a( ) architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
    The most visible application of the protocol is for access to shell accounts on( )operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.

    A.secure
    B.insecure
    C.internet
    D.internal

    答案:B
    解析:
    Secure Shell (SSH) is a cryptographic network protocol for secure remote login and other secure network services over an insecure network.The standard TCP port for SSH is 22. The best known example application is for remote login to computer systems by users.
    SSH provides a secure channel over an insecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
    The most visible application of the protocol is for access to shell accounts on Unix-like operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.

  • 第3题:

    The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a (请作答此空) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were ( ) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.

    A.browser-server
    B.user- server
    C.client-server
    D.business -customer

    答案:C
    解析:
    The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.FTP is built on a client-server model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were command-line programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in active or passive mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.

  • 第4题:

    下列网络中常用的名字缩写对应的中文解释错误的是()

    • A、WWW(World Wide Web):万维网
    • B、URL(Uinform Resource Locator):统一资源定位器
    • C、HTTP(Hypertext Transfer Protocol):超文本传输协议
    • D、FTP (File Transfer Protocol):快速传输协议
    • E、TCP(Transfer Control Protocol):传输控制协议

    正确答案:D

  • 第5题:

    FTP是指:()

    • A、File Transfer Protocol
    • B、Full Transfer Provider
    • C、File Transfer Provider
    • D、Full Text Protocol

    正确答案:A

  • 第6题:

    应用层中主要的协议是()。

    • A、远程登录协议(Telnet)
    • B、简单邮件传输协议(SMTP,Simple Mail Transfer Protocol)
    • C、文件传输协议(FTP,File Transport Protocol)
    • D、以上都是

    正确答案:D

  • 第7题:

    A customer has downloaded new firmware files for the IBM support Web Site. Which of the following is the correct method for updating the firmware for the QLogic Intelligent Passthru Module using the command line?()

    • A、Transfer the file to the FC module using FTP; use Telnet to the FC module to start the update
    • B、Use Telnet to the AMM to transfer the file using TFTP; start the update
    • C、Transfer the file to the FC module using Secure Copy Protocol (SCP);use Telnet to the FC module to start the update
    • D、Start the update and enter FC module IP address when prompted

    正确答案:A

  • 第8题:

    You have two portable computers that run Windows 7. The computers are not connected to a network. Thecomputers are configured as shown in the following table. Computer name Wireless adapter Networkadapter Bluetooth adapter Computer1 Wireless b/g 100/1000 Mbps Version 2.0 Computer2 Wireless a/b10/100 Mbps Version 1.0 You need to transfer a 1- gigabit file from Computer1 to Computer2.  What shouldyou do first?()

    • A、On Computer1, create a wireless ad hoc network.
    • B、On Computer2, configure the Bluetooth File Transfer Wizard to send files.
    • C、On Computer2, create a network profile to connect to a network named Homegroup.
    • D、On Computer1, configure the computer to be a member of a workgroup named Homegroup.

    正确答案:A

  • 第9题:

    单选题
    When configuring more than one archival site, which statement is true?()
    A

    The system will first attempt the transfer using the URL configured last

    B

    The system will transfer the configuration to each archival site

    C

    The system will not transfer to a secondary site unless the previous site fails

    D

    The system will transfer using secure copy protocol (SCP) before attempting FTP


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Which protocol is used between the RAS and the authentication server in a narrowband network environment?()
    A

    RADIUS

    B

    PPPPAP

    C

    MSCHAP

    D

    PPPCHAP


    正确答案: D
    解析: 暂无解析

  • 第11题:

    名词解释题
    英译中:File transfer protocol(FTP)

    正确答案: 文件传输协议
    解析: 暂无解析

  • 第12题:

    名词解释题
    英译中:File Transfer Protocol

    正确答案: 文件传输协议
    解析: 暂无解析

  • 第13题:

    TCP/IP( )layer protocols provide services to the application( )running on a computer.The application layer does not define the application itself,but rather it defines( )that applications need--like the ability to transfer a file in the case of HTTP.In short,the application layer provides an( )between software running on a computer and the network itself.The TCP/IP application layer includes a relatively large number of protocols,with HTTP being only one of those.The TCP/IP(请作答此空)layer consists of two main protocol options--the Transmission Control Protocol(TCP)and the User Datagram Protocol(UDP).

    A.application
    B.session
    C.physical
    D.transport

    答案:D
    解析:
    TCP/IP传输层协议为运行在计算机上的应用软件提供服务。应用层没有定义应用本身,而是定义了应用需要的服务,例如采用HTTP可以传输文件。简而言之,应用层提供了运行在计算机上的软件与网络之间的接口。TCP/IP应用层包括了很多的协议,HTTP仅是其中之一。TCP/IP传输层主要由两个可选的协议组成——传输控制协议(TCP)和用户数据报协议(UDP)。

  • 第14题:

    Secure Shell (SSH) is a cryptographic network protocol for ( ) remote login and other secure network services over an( )network.The standard( )port for SSH is 22. The best known example application is for remote login to computer systems by users.
    SSH provides a secure channel over an insecured network in a(请作答此空) architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
    The most visible application of the protocol is for access to shell accounts on( )operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.

    A.client-server
    B.browser-server
    C.connectionless
    D.P2P

    答案:A
    解析:
    Secure Shell (SSH) is a cryptographic network protocol for secure remote login and other secure network services over an insecure network.The standard TCP port for SSH is 22. The best known example application is for remote login to computer systems by users.
    SSH provides a secure channel over an insecured network in a client-server architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.
    The most visible application of the protocol is for access to shell accounts on Unix-like operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.

  • 第15题:

    The Hypertext Transfer Protocol , the Web's (请作答此空) protocol , is at the heart of the Web. HTTP is implemented in two programs : a ( ) program and a server program . The client program and server program executing on different end systems , talk to each other by ( ) HTTP messages . HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients . when a user ( ) a web page , the browser sends http request messages for the objects in the page to the server . The server ( ) the requests and responds with http response messages that contain the objects .

    A.transport-layer
    B.application-layer
    C.network-layer
    D.link-layer

    答案:B
    解析:
    Web的应用层协议是超文本传输协议,是web核心。HTTP在两类程序(客户端程序、服务器端程序)中执行。客户端程序、服务器端程序在不同的终端系统中执行,通过交换HTTP消息来进行交互。HTTP定义了Web客户端如何从服务器端请求Web页面以及服务器端如何传送Web页面到服务器。当用户请求一个web页面,浏览器发送页面对象的http请求给服务器。服务器接收请求并用包含对象的http消息进行响应。

  • 第16题:

    You are the network administrator for Company.  Your network is a native mode Windows 2000 domain consisting of 50 Windows 2000 Professional client computers and six Windows 2000 Server computers. There are no routers on the network. The client computers have been configured for dynamic IP address application. The network is configured as shown in the Network Diagram.   A user reports that she cannot connect to the server named ES1 from her client computer named Workstation5. When she attempts to browse //ES1 from the Run line she receives the message, “The network path was not found”. No other users are reporting problems connecting to ES1. From the user’s computer, you browse //192.168.72.6 from the Run line and successfully connect to the server. You run the ipconfig /all command. The relevant results are shown in the following table.  You want the user to be able to access resources on ES1 by using the computer name.  What should you do? ()

    • A、On the Internet Protocol (TCP/IP) Properties, sheet, select the Obtain DNS server address      automatically option.
    • B、On the Internet Protocol (TCP/IP) Properties, sheet, select the Obtain an IP address       automatically option. 
    • C、Configure the client computer with a default gateway of 192.168.0.1.
    • D、Configure the client computer with a subnet mask of 255.255.0.0.
    • E、Configure the client computer with a WINS server of 192.168.72.5.

    正确答案:B

  • 第17题:

    以下关于协议支持表述不正确的是()

    • A、Telnet,UDP
    • B、FTP(File Transfer Protocol),TCP
    • C、SMTP(Simple Mail Transfer Protocol),TCP
    • D、POP3(Post Office Protocol V3),TCP

    正确答案:A

  • 第18题:

    英译中:File transfer protocol(FTP)


    正确答案: 文件传输协议

  • 第19题:

    When configuring more than one archival site, which statement is true?()

    • A、The system will first attempt the transfer using the URL configured last
    • B、The system will transfer the configuration to each archival site
    • C、The system will not transfer to a secondary site unless the previous site fails
    • D、The system will transfer using secure copy protocol (SCP) before attempting FTP

    正确答案:C

  • 第20题:

    单选题
    Your network consists of an internal network and a perimeter network. On the internal network there is a server named Server1. On the perimeter network there is a server named Server2. All servers run Windows Server 2003 Service Pack 2 (SP2).  You schedule a task to transfers files from Server1 to Server2 by using FTP.You monitor the network traffic from Server1 to Server2 and notice that the user name and password used for the FTP transfer are sent as plain text. You need to ensure that all FTP traffic between Server1 and Server2 is encrypted.  What should you do?()
    A

    Implement IPSec.

    B

    Install a server certificate on Server1.

    C

    Install a server certificate on Server2.

    D

    Use the Encrypting File System on Server1.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Your company has 1,000 client computers. Each client computer has 1 GB of RAM. You are planning to deploy Windows 7 Enterprise.   You need to design a zero-touch deployment strategy to increase the number of client computers that can be imaged at one time.   What should you do?()
    A

    Increase the amount of RAM on the client computers.

    B

    Change from unicast to multicast deployment of images.

    C

    Change from multicast to unicast deployment of images.

    D

    Decrease the trivial file transfer protocol (TFTP) block size on the TFTP server.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    You have a computer named Computer1 that runs Windows 7. You need to ensure that Computer1 canconnect to File Transfer Protocol (FTP) servers only while it is connected to a private network.  What should you do?()
    A

    From Windows Firewall with Advanced Security, create a new rule.

    B

    From the local Group Policy, modify the application control policies.

    C

    From Windows Firewall, modify the Allowed Programs and Features list.

    D

    From Network and Sharing Center, modify the Advanced Sharing settings.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    FTP是指:()
    A

    File Transfer Protocol

    B

    Full Transfer Provider

    C

    File Transfer Provider

    D

    Full Text Protocol


    正确答案: B
    解析: 暂无解析