Chapter 6 Flashcards

1
Q

(TCP/IP) stands for what. p157

A

Transmission Control Protocol/Internet Protocol (TCP/IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(DoD) stands for what. p157

A

Department of Defense (DoD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(IETF) stands for what. p157

A

Internet Engineering Task Force (IETF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(NCP) stands for what. 157

A

Network Control Protocol (NCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The DoD model is basically a condensed version of the OSI model—it’s composed of four, instead of seven, layers: p158

A

Process/Application layer
Host-to-Host layer
Internet layer
Network Access layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When the different protocols in the IP stack are discussed, the layers of the OSI and DoD models are what. p158

A

interchangeable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To integrate the various activities and duties spanning the focus of the OSI’s corresponding top three layers. p158

A

Process/Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Parallels the functions of the OSI’s Transport layer, defining protocols for setting up the level of transmission service for applications. p159

A

Host-to-Host layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Corresponds to the OSI’s Network layer, designating the protocols relating to the logical transmission of packets over the entire network. p159

A

Internet layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Monitors the data exchange between the host and the network.

A

Network Access layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Telnet? p160

A

Telnet is the chameleon of protocols—its specialty is terminal emulation. It allows a user on a remote client machine, called the Telnet client, to access the resources of another machine, the Telnet server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is the protocol that actually lets you transfer files across an IP network, and it can accomplish this between any two machines using it. p160

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is used when you need to transfer files over an encrypted connection. It uses an SSH session more on this later which encrypts the connection. P161

A

Secure File Transfer Protocol (SFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is the stripped-down, stock version of FTP, but it’s the protocol of choice if you know exactly what you want and where to find it. It doesn’t give you the abundance of functions that FTP does, though. p161

A

Trivial File Transfer Protocol (TFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Once a message has been sent to a destination, the message is spooled to a device—usually a disk. The server software at the destination posts a vigil, regularly checking the queue for messages. p162

A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Basically, how this protocol works is when a client device connects to a POP3 server, messages addressed to that client are released for downloading. p162

A

Post Office Protocol (POP)

17
Q

makes it so you get control over how you download your mail, with it, you also gain some much-needed security. It lets you peek at the message header or download just a part of a message.p162

A

Internet Message Access Protocol, Version 4 (IMAP4)

18
Q

Is a proprietary protocol developed by Microsoft. It allows you to connect to another computer and run programs. p162

A

Remote Desktop Protocol (RDP)

19
Q

Are cryptographic protocols that come in really handy for enabling secure online data-transfer activities like browsing the Web, instant messaging, internet faxing, and so on. p163

A

Transport Layer Security (TLS)

20
Q

Is a hugely popular signaling protocol used to construct and deconstruct multimedia communication sessions for many things like voice and video calls, video conferencing, streaming multimedia distribution, instant messaging, presence information, and online games over the Internet. p163

A

SIP (VoIP)

21
Q

Describes a packet-formatting standard for delivering audio and video over the Internet. Although initially designed as a multicast protocol, it’s now used for unicast applications too. p163

A

RTP (VoIP)

22
Q

Collects and manipulates valuable network information. It gathers data by polling the devices on the network from a management station at fixed or random intervals, requiring them to disclose certain information. p163

A

Simple Network Management Protocol (SNMP)

23
Q

When all is well, SNMP receives something called a what? p163

A

baseline

24
Q

These network watchdogs are called _____ and when aberrations occur, agents send an alert called a _____ to the management station. p163

A

agents

trap

25
Q

sets up a secure Telnet session over a standard TCP/IP connection and is employed for doing things like logging into other systems, running programs on remote systems, and moving files from one system to another.p164

A

Secure Shell (SSH)

26
Q

Allowed a host to retrieve a large amount of data at once.p163

A

GETBULK

27
Q

It’s used to manage communications between web browsers and web servers and opens the right resource when you click a link, wherever that resource may actually reside.p164

A

Hypertext Transfer Protocol (HTTP)

28
Q

t’s a secure version of HTTP that arms you with a whole bunch of security tools for keeping transactions between a web browser and a server secure. p164

A

Hypertext Transfer Protocol Secure (HTTPS)

29
Q

Both _______and ______ is used to encrypt packets over your intranet and the internet. p164

A

SSH (port 22)

HTTPS (port 443)

30
Q

Works in conjunction with other synchronization utilities to ensure all computers on a given network agree on the time. p164

A

Network Time Protocol (NTP)

31
Q

Transferring data, usernames and passwords get sent right along with the file request in the clear for all to see with no encryption. p165

A

Secure Copy Protocol (SCP)

32
Q

This protocol standardizes how you access directories, and its first and second inceptions are described in RFCs 1487 and 1777, respectively. p165

A

Lightweight Directory Access Protocol (LDAP)

33
Q

What is Internet Group Management Protocol (IGMP) p165

A

is the TCP/IP protocol used for managing IP multicast sessions. It accomplishes this by sending out unique IGMP messages over the network to reveal the multicast-group landscape and to find out which hosts belong to which multicast group.