The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a ( ) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were (请作答此空) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.command-lineB.graphicalC.automationD.productivity

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a ( ) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were (请作答此空) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.

A.command-line
B.graphical
C.automation
D.productivity

参考解析

解析:The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.FTP is built on a client-server model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were command-line programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in active or passive mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.

相关考题:

TCP/IP(71)layer protocols provide services to the application(72)running on a computer. The application layer does not define the application itself, but rather it defines(73)that applications need--like the ability to transfer a file in the case of HTTP. In short, the application layer provides an(74)between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP(75)layer consists of two main protocol options--the Transmission Control Protocol(TCP) and the User Datagram Protocol(UDP).A.applicationB.transportC.linkD.network

在使用FTP工具向OMC服务器(Linux操作系统)中上传文件时,应选用『____』传送模式。(Using the FTP tool upload file to the OMC server (Linux operating system),the transfer mode should be used in『____』.)

● TCP/IP (71) layer protocols provide services to the application (72) running on a computer. The application layer does not define the application itself, but rather it defines (73) that applications need—like the ability to transfer a file in the case of HTTP. In short, the application layer provides an (74) between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP (75) layer consists of two main protocol options—the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).

Which protocol is used between the RAS and the authentication server in a narrowband network environment?() A.RADIUSB.PPPPAPC.MSCHAPD.PPPCHAP

TCP/IP ( )layer protocols provide services to the application(请作答此空)running on a computer. The application layer does not define the application itself, but rather it defines( )that applications need--like the ability to transfer a file in the case of HTTP. In short, the application layer provides an( )between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP( )layer consists of two main protocol options--the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).A.hardware]B.software]C.packetD.equipment

TCP/IP( )layer protocols provide services to the application( )running on a computer.The application layer does not define the application itself,but rather it defines( )that applications need--like the ability to transfer a file in the case of HTTP.In short,the application layer provides an( )between software running on a computer and the network itself.The TCP/IP application layer includes a relatively large number of protocols,with HTTP being only one of those.The TCP/IP(请作答此空)layer consists of two main protocol options--the Transmission Control Protocol(TCP)and the User Datagram Protocol(UDP).A.applicationB.sessionC.physicalD.transport

Secure Shell (SSH) is a cryptographic network protocol for ( ) remote login and other secure network services over an(请作答此空)network.The standard( )port for SSH is 22. The best known example application is for remote login to computer systems by users.SSH provides a secure channel over an insecured network in a( ) architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.The most visible application of the protocol is for access to shell accounts on( )operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.A.secureB.insecureC.internetD.internal

Secure Shell (SSH) is a cryptographic network protocol for ( ) remote login and other secure network services over an( )network.The standard( )port for SSH is 22. The best known example application is for remote login to computer systems by users.SSH provides a secure channel over an insecured network in a(请作答此空) architecture, connecting an SSH client application with an SSH server. Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.The most visible application of the protocol is for access to shell accounts on( )operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.A.client-serverB.browser-serverC.connectionlessD.P2P

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a (请作答此空) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were ( ) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.browser-serverB.user- serverC.client-serverD.business -customer

The Hypertext Transfer Protocol , the Web's (请作答此空) protocol , is at the heart of the Web. HTTP is implemented in two programs : a ( ) program and a server program . The client program and server program executing on different end systems , talk to each other by ( ) HTTP messages . HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients . when a user ( ) a web page , the browser sends http request messages for the objects in the page to the server . The server ( ) the requests and responds with http response messages that contain the objects .A.transport-layerB.application-layerC.network-layerD.link-layer

下列网络中常用的名字缩写对应的中文解释错误的是()A、WWW(World Wide Web):万维网B、URL(Uinform Resource Locator):统一资源定位器C、HTTP(Hypertext Transfer Protocol):超文本传输协议D、FTP (File Transfer Protocol):快速传输协议E、TCP(Transfer Control Protocol):传输控制协议

You are the network administrator for Company.  Your network is a native mode Windows 2000 domain consisting of 50 Windows 2000 Professional client computers and six Windows 2000 Server computers. There are no routers on the network. The client computers have been configured for dynamic IP address application. The network is configured as shown in the Network Diagram.   A user reports that she cannot connect to the server named ES1 from her client computer named Workstation5. When she attempts to browse //ES1 from the Run line she receives the message, “The network path was not found”. No other users are reporting problems connecting to ES1. From the user’s computer, you browse //192.168.72.6 from the Run line and successfully connect to the server. You run the ipconfig /all command. The relevant results are shown in the following table.  You want the user to be able to access resources on ES1 by using the computer name.  What should you do? ()A、On the Internet Protocol (TCP/IP) Properties, sheet, select the Obtain DNS server address      automatically option.B、On the Internet Protocol (TCP/IP) Properties, sheet, select the Obtain an IP address       automatically option. C、Configure the client computer with a default gateway of 192.168.0.1.D、Configure the client computer with a subnet mask of 255.255.0.0.E、Configure the client computer with a WINS server of 192.168.72.5.

FTP是指:()A、File Transfer ProtocolB、Full Transfer ProviderC、File Transfer ProviderD、Full Text Protocol

以下关于协议支持表述不正确的是()A、Telnet,UDPB、FTP(File Transfer Protocol),TCPC、SMTP(Simple Mail Transfer Protocol),TCPD、POP3(Post Office Protocol V3),TCP

应用层中主要的协议是()。A、远程登录协议(Telnet)B、简单邮件传输协议(SMTP,Simple Mail Transfer Protocol)C、文件传输协议(FTP,File Transport Protocol)D、以上都是

英译中:File transfer protocol(FTP)

A customer has downloaded new firmware files for the IBM support Web Site. Which of the following is the correct method for updating the firmware for the QLogic Intelligent Passthru Module using the command line?()A、Transfer the file to the FC module using FTP; use Telnet to the FC module to start the updateB、Use Telnet to the AMM to transfer the file using TFTP; start the updateC、Transfer the file to the FC module using Secure Copy Protocol (SCP);use Telnet to the FC module to start the updateD、Start the update and enter FC module IP address when prompted

When configuring more than one archival site, which statement is true?()A、The system will first attempt the transfer using the URL configured lastB、The system will transfer the configuration to each archival siteC、The system will not transfer to a secondary site unless the previous site failsD、The system will transfer using secure copy protocol (SCP) before attempting FTP

You have two portable computers that run Windows 7. The computers are not connected to a network. Thecomputers are configured as shown in the following table. Computer name Wireless adapter Networkadapter Bluetooth adapter Computer1 Wireless b/g 100/1000 Mbps Version 2.0 Computer2 Wireless a/b10/100 Mbps Version 1.0 You need to transfer a 1- gigabit file from Computer1 to Computer2.  What shouldyou do first?()A、On Computer1, create a wireless ad hoc network.B、On Computer2, configure the Bluetooth File Transfer Wizard to send files.C、On Computer2, create a network profile to connect to a network named Homegroup.D、On Computer1, configure the computer to be a member of a workgroup named Homegroup.

单选题Your network consists of an internal network and a perimeter network. On the internal network there is a server named Server1. On the perimeter network there is a server named Server2. All servers run Windows Server 2003 Service Pack 2 (SP2).  You schedule a task to transfers files from Server1 to Server2 by using FTP.You monitor the network traffic from Server1 to Server2 and notice that the user name and password used for the FTP transfer are sent as plain text. You need to ensure that all FTP traffic between Server1 and Server2 is encrypted.  What should you do?()AImplement IPSec.BInstall a server certificate on Server1.CInstall a server certificate on Server2.DUse the Encrypting File System on Server1.

单选题When configuring more than one archival site, which statement is true?()AThe system will first attempt the transfer using the URL configured lastBThe system will transfer the configuration to each archival siteCThe system will not transfer to a secondary site unless the previous site failsDThe system will transfer using secure copy protocol (SCP) before attempting FTP

单选题Your company has 1,000 client computers. Each client computer has 1 GB of RAM. You are planning to deploy Windows 7 Enterprise.   You need to design a zero-touch deployment strategy to increase the number of client computers that can be imaged at one time.   What should you do?()AIncrease the amount of RAM on the client computers.BChange from unicast to multicast deployment of images.CChange from multicast to unicast deployment of images.DDecrease the trivial file transfer protocol (TFTP) block size on the TFTP server.

单选题Which protocol is used between the RAS and the authentication server in a narrowband network environment?()ARADIUSBPPPPAPCMSCHAPDPPPCHAP

单选题You have a computer named Computer1 that runs Windows 7. You need to ensure that Computer1 canconnect to File Transfer Protocol (FTP) servers only while it is connected to a private network.  What should you do?()AFrom Windows Firewall with Advanced Security, create a new rule.BFrom the local Group Policy, modify the application control policies.CFrom Windows Firewall, modify the Allowed Programs and Features list.DFrom Network and Sharing Center, modify the Advanced Sharing settings.

名词解释题英译中:File transfer protocol(FTP)

单选题FTP是指:()AFile Transfer ProtocolBFull Transfer ProviderCFile Transfer ProviderDFull Text Protocol

名词解释题英译中:File Transfer Protocol