CCENT Concepts Pt. 5 Flashcards

1
Q

TCP/IP Transport Layer Feature -

Multiplexing using ports

A

Function that allows receiving hosts to
choose the correct application for
which the data is destined, based on
the port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP/IP Transport Layer Feature -

Error recovery

A

Process of numbering and
acknowledging data with Sequence
and Acknowledgement header fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCP/IP Transport Layer Feature -

Flow control using windowing

A

Process that uses window sizes to
protect buffer space and routing
devices.
page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP/IP Transport Layer Feature -
Connection establishment and
termination

A

Process used to initialize port
numbers and Sequence and
Acknowledgment fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TCP/IP Transport Layer Feature -
Ordered data transfer and data
segmentation

A

Continuous stream of bytes from an upper-layer
process that is “segment” for transmission and
delivered to upper-layer processes at the receiving
device, with the bytes in the same order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FTP Port Number

A

20 (data) & 21 (control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSH Port Number

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Telnet Port Number

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SMTP Port Number

A

25 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DNS Port Number

A

UDP, TCP 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DHCP Port Number

A

UDP 67,68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TFTP Port Number

A

UDP 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HTTP (WWW) Port Number

A

TCP 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

POP3 Port Number

A

TCP 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SNMP Port Number

A

UDP 161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSL Port Number

A

TCP 443

17
Q

RTP-based Voice (VoiP) and

Video

A

UDP, 16, 384 - 32, 767

18
Q

Connection-oriented protocol

A

A protocol that requires an exchange an exchange
of message before data transfer begins or that has
a required preestablished correlation between two
endpoints.

19
Q

Connectionless protocol

A

A protocol that does not require an
exchange of messages and that does
not require a preestablished correlation
between two endpoints.

20
Q

Low Delay

A

VoiP requires a very low delay between the sending phone and the receiving
phone - typically less than 200 milliseconds (.2 seconds). This is a much lower
delay than what is required by typical data applications.

21
Q

Low Jitter

A

Jitter is the variation in delay. VoiP requires very low jitter as well, whereas
data applications can tolerate much higher jitter. For example, the jitter for
consecutive VoIP packets should not exceed (.03 seconds), or the quality
degrades.

22
Q

Loss

A

if a VoIP packet is lost in transit because of errors of because a router doesn’t
have room to store the packet while waiting to send it, the VoIP packet is not
delivered across the network. Because of the delay and jitter issues, there is
no need to try to recover the lost packet. It would be useless by the time it was
recovered. Lost packets can sound like a break in the sound of the VoIP call.

23
Q

Denial of Service (DoS)

A

An attack whose purpose is to break things.

24
Q

Reconnaissance attack

A

The kind of attack may be disruptive as
a side effect, but its goal is gathering
information to perform an access
attack.

25
Q

Access attacks

A

An attempt to steal data, typically data
for some financial advantage, for a
competitive advantage with another
company, or even for international

26
Q

Common Security Issues in an

Enterprise

A
  • Access from the wireless LAN
  • Infected mobile laptops
  • Disgruntled employees
27
Q

anti-x

A

The term used by Cisco to refer to a
variety of security tools that help
prevent various attacks including
antivirus, anti-phishing, and anti-spam.