Chapter 7 TCP/IP Implementation Flashcards

1
Q

The DHCP Leases Process:

A
  • Discover- Once a node comes online and loads a simple version of TCP/IP and it’s ready to communicate with a DHCP server, it transmits a broadcast called a DHCP discover to the network’s broadcast address of 255.255.255.255 to see if any DHCP servers are online and then request an IP address.
  • Offer- DHCP servers that are online respond with a directed lease offer packet that contains an IP address that the node can lease.
  • Request- The node accepts the first offer it receives and returns a request to lease the IP address from the DHCP server.
  • Acknowledge- The DHCP server acknowledges the request from the node with a DHCP ACK, which has the IP address and settings required for the leasing time and starts the lease.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the predecessor of DHCP. It was developed to assign IP addresses to diskless workstations that had no way of storing their operating system.

A

BOOTP (the bootstrap protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

are lease assignments in DHCP that enable you to configure a permanent IP address for a particular client on the subnet. Reserved IP addresses differ from statically configured IP addresses; when there are any changes in network parameters on the DHCP server, IP addresses receive the changes when they renew their leases.

A

DHCP Reservations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a service that captures a BOOTP or DHCP broadcast and forwards it through the router as a unicast transmission to the DHCP server on another subnet. You must either have a DHCP server on each subnet and configure the router to forward the broadcasts, or configure one of these

A

DHCP Relay Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a service that enables a DHCP client device to configure itself automatically with an IP address in the range of 169.254.0.1 to 169.254.255.254, in case no DHCP servers respond to the client’s DHCP discover broadcast. APIPA addresses are not routable, so devices with APIPA addresses cannot communicate outside of the local subnet.

A

Automatic Private IP Addressing (APIPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

windows command that displays connection-specific DNS suffix, IP address, subnet mask, and default gateway information. /release forces the release of an IP address. /renew requests the renewal of an IP address.

A

Ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

command displays the status of currently active network interface devices on Linux and Unix. Iwconfig for wireless devices on Linux and Unix

A

Ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Enables you to configure and manage DHCP settings on the network interfaces of a computer. Supported on Linux and Unix.

A

Dhclient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ping command options:

A
  • Packet Size - by default, data packets are sent as re bytes. You can specify a larger size to response time. Example ping target [-1 size]
  • TTL- A value that determines how many hops an IP packet can traverse before being discarded. Example ping target [-i TTL]
  • Packet Count- Specifies the number of packets with which a remote host is pinged. Default is four packets. Example ping target [-n packet count]
  • Continuous ping- Pings the specified host until the command is interrupted by pressing Ctrl+C. Example ping target -t
  • IPv6- Ping using IPv6. Example ping target -6
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

As a security measure, some public Internet hosts and routers might be configured to block incoming packets that are generated by the ping command and is known as this.

A

ICMP Blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a number that represents a process running on a network. associated with OSI Layer 5, but in every packet, there will be both a source and destination one embedded in the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) header.

A

Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Port # and Protocol(s) for FTP Data File Transfer - Default Data

A

20 & TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port # and Protocol(s) for

A

21 & TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port # and Protocol(s) for SSH - Secure Shell & SFTP - Secure File Transfer Protocol

A

22 & TCP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Port # and Protocol(s) for Telnet

A

23 & TCP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port # and Protocol(s) for SMTP

A

25 & TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Port # and Protocol(s) for DNS

A

53 & TCP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Port # and Protocol(s) for BOOTPS - DHCP (BOOTP) server

A

67 & TCP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Port # and Protocol(s) for BOOTPC - DHCP (BOOTP) client

A

68 & TCP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Port # and Protocol(s) for TFTP

A

69 & UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Port # and Protocol(s) for HTTP

A

80 & TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Port # and Protocol(s) for POP3 - Post Office Protocol, version 3 (POP3)

A

110 & TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Port # and Protocol(s) for NTP - Network Time Protocol (NTP)

A

123 & UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Port # and Protocol(s) for IMAP - IMAP

A

143 & TCP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Port # and Protocol(s) for SNMP - Simple Network Management Protocol (SNMP)

A

161 & UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Port # and Protocol(s) for IRC - Internet Relay Chat (IRC)

A

194 & TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Port # and Protocol(s) for IDAP - Lightweight Directory Access Protocol (LDAP)

A

389 & TCP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Port # and Protocol(s) for HTTPS - HTTP-secure

A

443 & TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Port # and Protocol(s) for SMB - Server Message Block (SMB)

A

445 & TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Port # and Protocol(s) for LDAPS - Secure LDAP

A

636 & TCP, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Port # and Protocol(s) for h.323 - H.323 Call Setup

A

1720 & TCP

32
Q

Port # and Protocol(s) for RDP - Remote Desktop Protocol (RDP)

A

3389 & TCP, UDP

33
Q

Port # and Protocol(s) for SIP - Session Initiation Protocol (SIP) unencrypted signaling traffic

A

5060 & TCP, UDP

34
Q

Port # and Protocol(s) for SIP encrypted traffic

A

5061 & TCP, UDP

35
Q

For example, if your web server is installed on 193.44.234.3, the —- for the HTTP process would look like this 193.44.234.3:80.

A

Socket

36
Q

a unique name given to a node on a TCP/IP network.

A

Host Names

37
Q

a grouping of devices on the Internet or on another network based on the nature of their operations.

A

Domain Name

38
Q

a host name combined with the host’s domain name forms this

A

a host name combined with the host’s domain name forms

39
Q

a TCP/IP name resolution service that translates FQDNs into IP addresses.

A

Domain Name System (DNS)

40
Q

The DNS database is divided logically into a hierarchical grouping of domains. It is divided physically into files called this

A

Zones

41
Q

files that contains the actual IP-to-host name mappings for one or more domains.

A

Zone File

42
Q

can be entered into a DNS database either statically or dynamically

A

records

43
Q

DNS record is entered manually by an administrator and does not change unless the administrator manually updates it.

A

Static Record

44
Q

For example, if a client is using DHCP to get its IP address, each time it leases a new address, it can request an update of its DNS host record.

A

Dynamic Record

45
Q

DNS record that maps a host name to its IP address by using a 32-bit IPv4 address.

A

(A) Address

46
Q

DNS record that maps a host name to its IP address by using a 128-bit IPv6 address.

A

(AAAA) IPv6 address

47
Q

Maps multiple canonical names (aliases) to an A record

A

Canonical name (CNAME)

48
Q

Maps a domain name to a email server list

A

Mail Exchanger (MX)

49
Q

Maps an IP address to the host name for the purpose of reverse lookup

A

Pointer (PTR)

50
Q

The DNS Resolution Process: (7 Steps)

A
Step 1- Client Request
Step 2- Preferred DNS server
Step 3- Root name Server
Step 4- Top-level domain server
Step 5- Other domain servers
Step 6- Host name resolution
Step 7- Host address
51
Q

is a plaintext file configured on a client device containing a list of IP addresses and their associated host names, separated by at least once space.

A

HOSTS file

52
Q

this command determines the route data takes to get to a particular destination. Internet Control Message Protocol (ICMP) “Time Exceeded” messages are then sent back from the routers to the node running the command. Each time a packet is sent, the TTL value is reduced before the packet is forwarded, thus allowing TTL to count how many hops it is away from the destination. Traceroute is the Linux equivalent of the tracert command.

A

Tracert

53
Q

Tracert command options:
if you are having trouble resolving host names when using tracert, use this option to prevent tracert from trying to resolve host names. It also speeds up response time because it is not spending time resolving host names.

A

-d

54
Q

Tracert command options:
The default number of hops tracert will attempt to reach is 30. Using this option, you can specify more or fewer hops for it to check.

A

-h max_hops

55
Q

Tracert command options:

You can use thisoption to force the outgoing datagram to pass through a specific router.

A

-j host-list

56
Q

Tracert command options:
If many of your responses on the tracert are timing out, by using this option, you can increase the number of milliseconds to wait before continuing. If, after increasing the value, destinations are then reachable, you probably have a bandwidth issue to resolve.

A

-w timeout

57
Q

this command provides information about latency and packet loss on a network. combines the functionality of the ping and tracert commands. It is similar to tracert as it identifies the routers that are on the path. In the output, it also displays the path to the remote host over a maximum of 30 hops.

A

pathping command

58
Q

pathping options:

A
  • h maximum hops
  • i specifiy a source address
  • n specify that host name resolution can be skipped
59
Q

Querries DNS and displays the domain name or IP address mapping

A

nslookup

60
Q

Displays incoming and outgoing TCP network connections, routing tables, and connection statistics.

A

netstat

61
Q

Scans the network to discover hosts and services on the network and build a map of the network. Built into Linux and Unix. Have to download the utility for windows.

A

nmap

62
Q

the integrated management of IP address allocation, DNS, and DHCP services.

A

Internet Protocol Address Management (IPAM)

63
Q

a TCP/IP protocol that enables the transfer of files between a user’s workstation and a remote host. Characteristics include:
Works at the Application Layer (Layer7) of the OSI model and the Application Layer of the TCP/IP model.
TCP port 20 for data transfer
TCP port 21 for control commands

A

File Transfer Protocol (FTP)

64
Q

is a simple version of FTP that uses UDP as the transport protocol, and does not require logon to the remote host. It is commonly used for bootstrapping and loading applications and not for file transfer. FTP traffic is not encrypted and all transmissions are in clear text. User names, passwords, commands, and data can be read by anyone able to perform packet capture (sniffing) on the network.

A

Trivial File Transfer Protocol (TFTP)

65
Q

is an Internet protocol that synchronizes the clock times of devices in a network by exchanging time signals. Works at the Application Layer (Layer 7) of the OSI model. Uses UDP port number 123.

A

Network Time Protocol (NTP)

66
Q

is an Internet protocol that enables administrators to monitor and manage network devices and traffic. Works at the Application Layer (Layer 7) of the OSI model. uses ports 161 and 162 to collect information from and send configuration commands to networking devices such as routers, switches, servers, workstations, printers, and any other SNMP-enables devices. generally runs over UDP.

A

Simple Network Management Protocol (SNMP)

67
Q

a communications protocol for formatting and sending email messages from a client to a server or between servers. Works at the Application Layer (Layer 7) of the OSI model. Uses port 25 or 587 for standard communications and port 465 for encrypted communications. Runs on TCP.

A

Simple Mail Transfer Protocol (SMTP)

68
Q

a protocol used to retrieve email messages from a mailbox on a mail server. Characteristics include:
Works at the Application Layer (Layer 7) of the OSI model.
Uses TCP port 110 for regular transmissions and port 195 for encrypted transmissions.
Once the client retrieves and downloads the messages, the server deletes them unless the client configures options to leave the messages on the server.It is not the best email protocol to use when users need to access their email from multiple devices.

A

Post Office Protocol 3 (POP3)-

69
Q

is a protocol used for retrieving messages from a mail server. Works at the Application Layer (Layer 7) of the OSI model. Uses port 143 for regular transmissions and port 993 for encrypted transmissions.

A

Internet Message Access Protocol version 4 (IMAP4)

70
Q

is a network protocol that enables clients to interact with websites by allowing them to connect to and retrieve web pages from a server. Works at the Application Layer (Layer 7) of the OSI model. Uses port 80 for communications.

A

Hypertext Transfer Protocol (HTTP)

71
Q

is a secure version of HTTP that provides a secure connection between a web browser and a server. Runs at the Application Layer (Layer 7) of the OSI model. Uses port 443 and runs on TCP. uses the Transport Layer Security (TLS) security protocol to encrypt data.

A

HTTP Secure (HTTPS)

72
Q

a terminal emulation protocol. It works at the Application Layer (Layer 7) of the OSI model. Uses TCP Port 23. It is NOT a secure protocol, since it transmits in cleartext.

A

Telnet

73
Q

is a program that enables a user or an application to log on to another device over a network, execute commands, and manage files. Characteristics include:
Operates at the Application Layer (Layer 7) of the OSI model.
It uses port 22 and runs on TCP
Offers strong authentication methods, and ensures that communications are secure over insecure channels.
All traffic (including passwords) is encrypted to eliminate connection hijacking, eavesdropping, and other network-level attacks, such as IP source routing, IP spoofing, and DNS spoofing.
SSH2 includes a secure replacement for FTP called Secure File Transfer Protocol (SFTP)

A

Secure Shell (SSH)

74
Q

is a protocol that helps share resources such as files, printers, and serial ports among devices. Works at the Application Layer (Layer 7) of the OSI model. Uses port 445 and runs on TCP.

A

Server Message Block (SMB)

75
Q

is a proprietary protocol created by Microsoft for connecting to and managing devices that are not necessarily located at the same place as the administrator. It uses port 3389 and runs on TCP. Works at the Application Layer (Layer 7) of the OSI model.

A

Remote Desktop Protocol (RDP)