Chapter 6: Introduction to TCP/IP Flashcards

1
Q

FTP
Port #

A

20, 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SSH
Port #

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Telnet
Port #

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SMTP
Port #

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DNS
Port #

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DHCP
Port #

A

67, 68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TFTP
Port #

A

69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTTP
Port #

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

POP3
Port #

A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NetBIOS/ NetBT
Port #

A

137, 139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IMAP4
Port #

A

143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SNMP
Port #

A

161, 162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

LDAP
Port #

A

389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTPS
Port #

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SMB/ CIFS
Port #

A

445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RDP
Port #

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

____ lets you upload and download files, copy files, list and manipulate directories, and view file content. Username and passwords for login are sent in plain text.

A

FTP or File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

____ is a connection-oriented protocol that can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files.

A

SSH or Secure Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____ is a terminal emulation protocol that transmits data, including passwords, in plain text.

A

Telnet

20
Q

____ is the protocol used to send email from mail server to mail server as well as from a mail server to an email client.

A

SMTP or Simple Mail Transfer Protocol

21
Q

____ resolves hostnames to IP addresses. Through a ____ server, your computer resolve the URL to an IP address.

A

DNS or Domain Name System

22
Q

____ dynamically assigns IP addresses and other IP configuration information to network clients.

A

DHCP or Dynamic Host Configuration Protocol

23
Q

____ is FTP’s lighter-weight cousin, transferring files more simply and faster.

A

TFTP or Trivial File Transfer Protocol

24
Q

____ manages the communication between a web server and a client, and transmits information in plain text.

A

HTTP or Hypertext Transfer Protocol

25
Q

____ was the preferred protocol for downloading email.

A

POP3 or Post Office Protocol 3

26
Q

____ is an application programming interface (API) that allows computers to communicate with each other over the network. It works at Layer 5. Running it over TCP/IP is called ____.

A

NetBIOS, NetBT

27
Q

____ is a secure protocol designed to download email and it’s the client-side email management protocol of choice.

A

IMAP4 or Internet Message Access Protocol

28
Q

____ gathers and manages network performance information.

A

SNMP or Simple Network Management Protocol.

29
Q

____ is a directory services protocol based on the X.500 standard and is designed to access information stored in an information directory/database.

A

LDAP or Lightweight Directory Access Protocol

30
Q

To encrypt traffic between a web server and client securely, ____ can be used. Connections are secured using either SSL (Secure Sockets Layer) or TLS (Transport Layer Security).

A

HTTPS or Hypertext Transfer Protocol Secure

31
Q

____ is used to provide shared access to files, printers, and other network resources and is primarily implemented by Microsoft systems.

A

SMB or Server Message Block

32
Q

____ is a Microsoft-developed enhancement of the SMB protocol. It can be used to share files and printers between computers, regardless of the operating system that they run. It’s the default file and print sharing protocol in Windows.

A

CIFS or Common Internet File System

33
Q

____ allows users to connect to remote computers and run programs on them. When you use it, you see the desktop of the computer you’ve signed into on your screen.

A

RDP or Remote Desktop Protocol

34
Q

Class A private IP address range and default subnet mask:

A

10.0.0.0/8 - 10.255.255.255

255.0.0.0

35
Q

Class B private IP address range and default subnet mask:

A

172.16.0.0/12 - 172.31.255.255

255.240.0.0

36
Q

Class C private IP address range and default subnet mask:

A

192.168.0.0/16 - 192.168.255.255

255.255.0.0

37
Q

What is the APIPA address range and subnet mask:

A

169.254.0.0/16 - 169.254.255.255 (169.254.x.x)

255.255.0.0

38
Q

____ prevents email spam by using DNS TXT records to authenticate an email server based on its IP address.

A

SPF or Sender Policy Framework

39
Q

____ prevents email spam by using DNS TXT records and encryption through a public-private key pair to authenticate an email server with digital signatures.

A

DKIM or Domain Keys Identified Mail

40
Q

____ prevents email spam by using DNS TXT records by allowing a domain owner to decide how they want email from their domain to be handled if it fails either an SPF or a DKIM authentication.

A

DMARC or Domain-based Message Authentication, Reporting, and Conformance

41
Q

An IPv6 ___ address refers to one that has been assigned to multiple nodes.

A

anycast

42
Q

An IPv6 a/an ____ address is one used by multiple hosts, and is used to communicate to groups of computers.

A

multicast

43
Q

What is the IPv6 loopback address?

A

::1

44
Q

What is the IPv6 link local unicast range?

A

FE80::/10

45
Q

What is the IPv6 multicast range?

A

FF00::/8

46
Q

What is the IPv6 global unicast range for use on the Internet?

A

2000::/3