Chapter 6 & 7 Flashcards

1
Q

What kind of message architecture supports all TCP/IP application layer protocols and services?

a. Client/server
b. peer-to-peer
c. request/reply
d. push-pull

A

c. request/reply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When the TCP/IP host that initiats contact with another TCP/IP host nearly always makes requests, and the contacted host invariably reponds to those requests, what kind of relationship exists between those host for that service?

a. Client/server
b. peer-to-peer
c. request/reply
d. push-pull

A

a. client/server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When a TCP/IP host can initiate contact with another TCP/IP host to make a request for service, but the other host can turn around and do the same thing, what kind of relationship exsits between those hosts for that service?

a. Client/server
b. peer-to-peer
c. request/reply
d. push-pull

A

b. peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When two servers want to exchange data, and the sending host originates the transfer of data to the receiver, what is this kind of transfer operation called?

a. pull
b. push
c. push-pull
d. store and forward

A

b. push

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When two servers can exchange data, and the sender initiates transfer to the receiver once data changes occur, but the receiver periodically initiates transfers, what is this kind of transfer called?

a. pull
b. push
c. push-pull
d. store and forward

A

c. push-pull

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which two advantages are derived immediately when replicating data across multiple servers?

a. backup and recovery
b. availability
c. redundancy
d. robustness

A

b. availability

d. robustness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which form of FTP client operates as a popular, standalone software application?

a. command-line FTP program
c. embedded FTP code
c. Web-based FTP access
d. graphical FTP program

A

d. graphical FTP program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which software component on an FTP server handles incoming user commands?

a. command interpreter
b. protocol interpreter
c. runtime library
d. user interface

A

b. protocol interpreter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Telnet supports only unidirectional, byte-oriented communications. True or false?

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Telnet passes account names and passwords in clear text from the local host to the remote host. True or False?

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following statements best describes the sender-SMTP process?

a. sends reply codes, including responses to codes and mail messages sent
b. forwards e-mail messages from one server to another
c. sends mail commands and mail messages
d. tracks delivery and reception of all mail messages sent.

A

c. sends mail commands and mail messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following statements best describes the receiver-SMTP process?

a. sends responses to all mail messages received.
b. sends reply codes, including responses to codes and mail messages sent.
c. forwards e-mail messages from one server to another
d. sends mail commands and mail messages

A

b. sends reply codes, including responses to codes and mail messages sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A store and forward email system stores all inbound messages destined for local clients and forwards all inbound messages destined for clients on other email servers. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The generic named used to identify a Web resource is a:

a. Uniform Resource locator (URL)
b. Uniform Resource Name (URN)
c. Uniform Resource Identifier(URI)
d. Universal Naming convention(UNC)

A

c. Uniform Resource Identifier (URI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The abbreviation for the secure implementation of HTTP is called:

a. SHTTP
b. HTTPS
c. SSL
d. SSH

A

b. HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following ongoing connections does FTP maintain during an active session? (Choose all that apply)

a. session connection
b. client connection
c. command connection (port 21)
d. server connection
e. data connection (port 20)

A

c. command connection

e. data connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following basic TCP/IP services responds to a service request with an arbitrary stream of characters?

a. Finger
b. echo
c. chargen
d. QOD
e. whois

A

c. chargen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following basic TCP/IP services can provide information about registered domain names?

a. Finger
b. echo
c. chargen
d. QOD
e. whois

A

e. Whois

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following basic TCP?IP utilities is not included in Simple TCP/IP Services in windows 2000 and Windows XP?

a. Echo
b. Chargen
c. QOD
d. Whois

A

a. echo

b. chargen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why is Finger so soldom available to users of most internet servers?

a. It’s no longer needed
b. it’s no longer popular
c. it proved to be vulnerable to security exploits
d. The term has an unpleasant connotation under some circumstances

A

c. it proved to be vulnerable to security exploits

21
Q

RPC provides a standard mechanism to create custom distributed applications over TCP/IP. True/False?

A

True

22
Q

An SNMP agent must be present on a host or device for it to report to a remote management console. True or false?

A

True

23
Q

NetBIOS over TCP/IP is required on any networks that include versions of Windows older than Windows 2000, no matter what protocols are in use. True or False?

A

false

24
Q

Which of the following statements best explains the importance of data offset values when decoding Application layer protocols?

a. Those values pinpoint the location of key fields, such as application layer header information.
b. Those values allow the contents of the payload to be inspected at will.
c. Those values determine where key fields start and stop
d. Those values determine how the Application layer payload should be interpreted.

A

c. Those values determine where key fields start and stop

25
Q

File with information on DNS root servers, that should be pre-loaded on any DNS server.

A

named.root

26
Q

What method of name resolution was used on the internet prior to the introduction of DNS?

a. dynamic name resolution
b. static name resolution
c. active name resolution
d. passive name resolution

A

b. static name resolution

27
Q

What is the name of the file that contains name-to-IP address mapping information for Windows and Linux?

a. LMHOSTS
b. ZONEINFO
c. ROOT.dns
d. HOSTS

A

d. Hosts

28
Q

What is the name of the most widely used DNS server implementation on the internet today?

a. EasyDNS
b. BIND
c. WinDNS
d. JEEVES

A

b. BIND (berkeley INternet Name Domain)

29
Q

Which of the following characterize valid aspects of DNS? (choose all that apply)

a. local control over domain name database segments
b. designation of optional primary name servers and mandatory secondary name servers
c. data from all database segments, available everywhere
d. highly robust and available database information
e. requires implementation of a relational database management system, such as oracle or sybase

A

a. local control over domain name database segments
c. data from all database segments, available everywhere
d. highly robust and available database information

30
Q

in the domain name hierarchy, all domains meet at the root. True or false?

A

True

31
Q

Top-level domain names include two- and three-letter country codes, as well as organizational codes, such as .com, .edu, and .org. True or false?

A

true

32
Q

What is the process whereby a DNS server higher in the domain name hierarchy confers responsibility for portions of the global DNS database to DNS servers lower in its hierarchy?

a. subordination of authority
b. database consolidation
c. delegation of authority
d. database segmentation

A

c. delegation of authority

33
Q

Which DNS resource records allow use of the FQDNs for domain names? (choose all the apply)

a. A
b. SOA
c. PTR
d. MX
e. all of the above

A

a. A

c. PTR

34
Q

Which DNS resource record is used to create aliases for domain names?

a. A
b. SOA.
c. PTR
d. MX
e. CNAME

A

e. CNAME

35
Q

Which DNS resource record appears at the beginning of every DNS file?

a. A
b. SOA.
c. PTR
d. MX
e. CNAME

A

b. SOA

36
Q

Which DNS resource record enable inverse lookups (also known as revers DNS lookups)?

a. A
b. SOA.
c. PTR
d. MX
e. CNAME

A

c. PTR

37
Q

Which DNS resource record maps domain names to IP addresses?

a. A
b. SOA.
c. PTR
d. MX
e. CNAME

A

a. A

38
Q

Any type of DNS server also can be a caching-only server. True of False?

A

True

39
Q

What is the minimum and maximum number of primary database servers allowed in any single DNS database zone?

a. 1
b. 2
c. 4
d. 8
e. 16

A

a. 1

40
Q

It is mandatory to have one or more secondary DNS servers for any DNS database zone. True or False?

A

true

41
Q

What size or type of organizations are likely to benefit from a caching-only DNS server? (choose all that apply)

a. small
b. medium
c. large
d. service provider

A

c. large

d. service provider

42
Q

What kinds of data are most likely to show up in a response to a DNS query of any kind?

a. address forwarding instructions
b. DNS resource records
c. address impersonation alerts
d. error messages

A

b. DNS resource records

d. error messages

43
Q

Which of the following query sequences represents a typical DNS lookup?

a. iterative, then recursive
b. recursive, then iterative
c. static then dynamic
d. dynamic, then static

A

b. recursive, then iterative

44
Q

Why do “all DNS queries end at the root?”

a. The root maintains a copy of the global DNS database
b. The root can access any and all authoritative name servers for any database segment
c. Any DNS server can access the root at any time
d. Multiple root servers prevent the root of domain name hierarchy from becoming bogged down with requests

A

b. the root can access any and all authoritative name servers for any database segment

45
Q

When using NSLOOKUP, an authoritative response is:

a. explicitly labeled as such
b. available only if the authoritative name server is explicitly targeted for lookup
c. available only by request, using the ‘a option
d. implied by the absence of “non-authoritative response” in the reply.

A

d. implied by the absence of “non-authoritative response” in the reply

46
Q

It is necessary to add resource records for the DNS root servers to the cache of any DNS server during initial configuration and setup. True of false?

A

true

47
Q

One common name for presenting a false IP address or domain name when attempting illicit system entry or communications is;

a. IP masquerading
b. IP impersonation
c. IP spoofing
d. False IP credentials

A

c. IP spoofing

48
Q

Because it is a predefined domain name and address pair, it is not necessary to create DNS files for the localhost and the loopback addresses 127.0.0.0 and 127.0.0.1. True of false

A

True