Chapter 7: Introduction to TCP/IP Flashcards

1
Q

What networking protocol is used by the Internet and the vast majority of business and home networks?

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocol

A

Comon set of rules that govern communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCP/IP isn’t just a protocol, it’s _____

A

A collection of different protocols that work together to delivery connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP/IP stands for

A

Transmission Control Protocol / Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the four layers of the Department of Defense (DoD) networking model?

A

Process / Application

Host-to-Host

Internet

Network Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What model does the TCP/IP protocol suite use?

A

DoD networking model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Telnet, FTP, LPD, SNMP, TFTP, SMTP, NFS and HTTP are all examples of TCP/IP protocols at the DoD’s ____ layer.

A

Process / Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP and UDP are both TCP/IP protocols located at the DoD’s ____ layer

A

Host-to-Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ICMP, ARP, RARP, and IP are all protocols o TCP/IP, located on the DoD’s ____ layer

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ethernet, Fast Ethernet, Token Ring, and FDDI are all TCP/IP protocols locaed on the DoD’s ____ layer

A

Network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTP

A

Hypertext Transfer Protocol

Sites on the Process/Application level of the DoD model

Manages communication between a web server and a client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FTP

A

File Transfer Protocol

Sits on the Process/Application level of the DoD

Allows for the transfer of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SMTP

A

Simple Mail Transfer Protocol

Sits at the Process/Application level of the DoD model

Prococol used to send email messages.

Referred to as a push protocol because it’s only designed to send.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

POP3

A

Post office protocol 3

Sits at the Process/Application level of the DoD model

Used to download email from a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

UDP

A

User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RDP

A

Remote Desktop Protocol

Sits at the Process/Application level of the DoD model

Used to connect to remote computers and run programs on them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DHCP

A

Dynamic Host Configuration Protocol

Sits at the Process/Application level of the DoD model.

Dynamically assigns IP addresses and other IP configuration informaion to network clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DNS

A

Domain Name System

Sits on the DoD’s Process/Application level.

Resolves hostnames to IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

HTTPS

A

Hypertext Transfer Protocol Secure

Sits on the Process/Application level of the DoD model

Securely encrypts traffic between a web server and a client. Secured using either SSL or TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IMAP

A

Internet Message Access Protocol

Sits on the process / application level of the DoD model

Used to allow for the management of email on a remote server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

LDAP

A

Lighweight Directory Access Protocol

Sits on the Process/Application level of the DoD model

Provides centralized access to authentication, contact information, client lists, and configuration data for a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

SFTP

A

Secure File Transfer Protocol

Sits at the Process/Application level of the DoD model

FTP, but encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

SMB

A

Server Message Block

Sits at the Process/Application level of the DoD model

Microsoft-developed protocol. Used to provide shared access to files, printers, and other network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SNMP

A

Simple Network Management Protocol

Sits at the Process/Application level of the DoD model

Data from network equipment like routers and switches regarding the operation of those devices. This data is sent using SNMP protocol

SNMP servers can collect the data and allow you to analyze it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

SSH

A

Secure Shell

Sits at the Process/Application level of the DoD model

A secure version of Telnet, which allows remote logins at the commandline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Telnet

A

Sits at the Process/Application level of the DoD model

Remote access via command line to another PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Two TCP/IP protocols that sit at the host-to-host level of the DoD model

A

TCP

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Major difference between TCP and UDP

A

TCP gaurantees packet delivery through the use of a “virtual circuit” and data acknowledgements.

UDP does not. It’s a stream of packets that are or are not received correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Is TCP connectionless or connection-oriented

A

Connection Oriented

32
Q

Is UDP conectionless or connection oriented?

A

Connectionless

33
Q

Why does TCP and UDP use port numbers?

A

This enables a server to differentiate requests among different users.

It also signals the requested protocol to be used

34
Q

What is the range of ports available to TCP and UDP traffic?

A

0 to 65,535

That’s 65,536 ports

35
Q

Which range of ports is considered ‘well-known’

A

0-1023

36
Q

Which range of ports is considered ‘registered ports”

A

1024 - 49151

37
Q

FTP

Which protocol?

Which port number?

A

TCP

20 or 21

38
Q

SSH

Which protocol?

Which port number?

A

TCP

22

39
Q

Telnet

Which protocol?

Which port number?

A

TCP

23

40
Q

SMTP

Which protocol?

Which port number?

A

TCP

25

41
Q

DNS

Which protocol?

Which port number?

A

TCP or UDP

53

42
Q

HTTP

Which protocol?

Which port number?

A

TCP

80

43
Q

DHCP

Which protocol?

Which port number?

A

UDP

67 or 68

44
Q

POP3

Which protocol?

Which port number?

A

TCP

110

45
Q

IMAP4

Which protocol?

Which port number?

A

TCP

143

46
Q

SNMP

Which protocol?

Which port number?

A

UDP

161

47
Q

LDAP

Which protocol?

Which port number?

A

TCP

389

48
Q

HTTPS

Which protocol?

Which port number?

A

TCP

443

49
Q

SMB

Which protocol?

Which port number?

A

TCP

445

50
Q

RDP

Which protocol?

Which port number?

A

TCP

3389

51
Q

There is only one TCP/IP protocol at the Internet layer of the DoD model. What is it?

A

IP

Internet Protocol

52
Q

What is the IP protocol responsible for?

A

Managing logical network addresses and getting data from point A to point B.

53
Q

Within IP there are three support protocols known as

A

ICMP

ARP

RARP

54
Q

ICMP

A

Internet Control Messaging Protocol

Responsible for delivering error messages.

Ping uses ICMP

55
Q

ARP

A

Address Resolution Protocol

Resolves logical IP addresses to physical MAC addresses.

This is how network clients find a neighboring client’s MAC address.

56
Q

RARP

A

Reverse ARP

Resolves MAC addresses to IP addresses.

Allows you to find an IP address if you just have a MAC address.

57
Q

Host

A

Any device on a network with an IP address

58
Q

The format used to express IP addresses

A

Dotted-decimal notation

59
Q

How many bits is an IPv4 address?

A

32 Bits

60
Q

An IP address is said to be _____, as opposed to flat because _____

A

Hierarchical

…because the numbers at the beginning of the address identify groups of computers that belong to the same network.

61
Q

Octet

A

An 8-bit section of an IP

An IP has four octets

62
Q

Each IP address is made of two components, the _____ and ____

A

Network ID

Host ID

63
Q

Which part of an IP is the network ID and which is the host ID?

A

This is determined by the subnet mask. Different hosts will use different parts of the IP address, depending on the subnet mask.

64
Q

Neither the network ID nor the host ID can be set to ____

A

All zeros or all ones.

That would mean that portion of the IP address would be blank

A network ID of all 0s indicates “this network”

A host ID of all 1s is a broadcast address.

65
Q

What information does a DHCP server typically provide clients that connect?

A

IP adress

Subnet mask

Defaut gateway (the “door” to the outside world)

DNS server address

66
Q

When a client configured to get its network configuraiton via DHCP boots up, how does it request that a DHCP server provide it with its network configuration?

A

It sends a broadcast on the network called a DHCP DISCOVER, requesting a DHCP server.

The server responds to hte request and fulfills it by returning configuraiton information.

67
Q

Static IP Addressing

A

When an administrator assigns a device its IP address.

68
Q

Why do local networks use private IPs?

A

The original conception of the Internet was for all devices to have their own, public IP; but we can’t possibly do this as we’re out of public IPs.

Instead we use private IP ranges for private networks. The entire network will share one IP.

69
Q

NAT

A

Network Address Translation

NAT runs on a router and handles the translation from a private, nonroutable IP address to a public IP address.

70
Q

Class A address range reserved from private use.

A

10.0.0.0 - 10.255.255.255

Subnet Mask: 255.0.0.0

16.7 million hosts

71
Q

Class B address range reserved for private use.

A

172.16.0.0 - 172.31.255.255

Subnet Mask: 255.255.0.0

1 million hosts

72
Q

Class C address range reserved for private use

A

192.168.0.0 -192.168.255.255

Subnet Mask: 255.255.255.0

65,536 hosts

73
Q

APIPA

A

Automatic Private IP Addressing

TCP/IP standard used to automatically configure IP based hosts that are unable to reach a DHCP server.

This is that 169.254.x.x address you see when not connect to a network.

Subnet mask: 255.255.0.0

74
Q

IPv6 create what sized IP addresses?

A

128 bit

75
Q

Instead of dotted-decimal notation, IPv6 uses ____

A

Hexadecimal notation

76
Q
A