Chapter 8: TCP/IP Applications Flashcards

1
Q

What are the three steps of the TCP three-way handshake?

A
  1. SYN segment, client to server
  2. SYN, ACK segment, server to client
  3. ACK segment, client to server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are five important protocols that use User Datagram Protocol (UDP) in their sessions?

A

DNS (Domain Name System)

DHCP (Dynamic Host Configuration Protocol)

NTP (Network Time Protocol)

SNTP (Simple Network Time Protocol)

TFTP (Trivail File Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Domain Name System (DNS) protocol do?

A

It enables the use of domain names associated with IP addresses for devices connected to IP networks, such as the Internet and private intranets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do Network Time Protocol (NTP) and Simple Network Time Protocol (SNTP) do?

A

They use UDP to synchronize the clocks of devices on a network.

If a device requires NTP/SNTP, then enter the IP address for an NTP/SNTP server onto that device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does NTP (Network Time Protocol) operate in a hierarchical fashion?

A

Using clock strata. Stratum 0 it the highest and stratum 15 is the lowest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Trivial File Transfer Protocol (TFTP) do?

A

It enables you to transfer files from one machine to another using UDP, but lacks data protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the typical scenario for using TFTP (Trivial File Transfer Protocol)?

A

The typical scenario for using TFTP is updating software and configurations on routers, switches, VoIP phones, and other devices on a LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Internet Control Message Protocol (ICMP) do?

A

It works at Layer 3 to handle low-level tasks such as the ping utility sending a single ICMP message called an “echo request” to an IP address you specify.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does Internet Group Management Protocol (IGMP) do?

A

It enables routers to communicate with hosts and switches to determine a “group” membership for IP multicast addresses (Class D range).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define: Well Known Ports

Number Range: _______

A

Ports reserved for specific TCP/IP applications.

0 - 1,023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define: Registered Ports

Number Range: _________

A

Ports that less common TCP/IP applications can register for with IANA.

Anyone can use these port numbers for their servers or for ephemeral numbers on clients.

1,024 - 49,151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define: Dynamic, Ephemeral, or Private Ports

Number Range: ________

A

Ports that are pseudo-randomly generated for a client computer’s application use.

49,152 - 65,535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ____ or ____ are terms for the session information (a combination of the IP address, port number, and Layer 4 protocol - TCP or UDP) held in memory on a single computer.

A

socket or endpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are socket pairs or endpoints?

A

Terms for the session information held in memory on two computers about the same connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the netstat command utility do on Windows and macOS?

A

Lists the endpoints of your computer’s communication partners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the netstat -n switch do?

A

It instructs netstat to show port numbers and IP addresses.

netstat -n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the netstat -a switch do?

A

It tells netstat to show all used ports, including “listening” ports not engaged in active communications.

netstat -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the netstat -o switch do?

A

It tells netstat to show the process ID.

netstat -o

19
Q

Define: Listening Port/ Open Port

A

A socket that is prepared to respond to any traffic destined for that socket’s port number.

Every serving application has a listening port.

20
Q

What is a process ID (PID)?

A

Every running program on your computer gets a process ID (PID), a number used by the operating system to track all the running programs.

21
Q

What does the netstat -b switch do?

A

It tells netstat to give the name of the running program behind the PID (process ID).

netstat -anob

22
Q

What does the Telnet protocol do?

A

It enables command-line remote access to another computer. The sent data is not encrypted.

23
Q

What does the Secure Shell (SSH) protocol do?

A

It enables remote access via terminal emulation to a remote computer. Both the login and data transmittal are encrypted.

24
Q

What does the Simple Mail Transfer Protocol (SMTP) do?

A

It sends e-mail from clients and between e-mail servers.

25
Q

What does Post Office Protocol version 3 (POP3) do?

A

It retrieves e-mail from e-mail servers.

26
Q

What does Internet Message Access Protocol version 4 (IMAP4) do?

A

It retrieves e-mail from an e-mail server and enables synchronization of mail among many devices.

It also supports folders that you can place on the IMAP4 server to organize your e-mail.

27
Q

What do relational databases do?

A

They store records in tables and those tables can refer to the data in other tables to enable users to mine rich information from that database.

28
Q

What is Structured Query Language (SQL) used for?

A

Accessing databases.

29
Q

What does the File Transfer Protocol (FTP) do?

A

It transfers files on the Internet, but does not use encryption by default and sends login information in cleartext.

30
Q

What is Hypertext Transfer Protocol (HTTP)?

A

It is the underlying protocol used by Web servers.

HTTP defines the commands that browsers (and other software) use to ask Web servers for things and how the server will format what it sends back to the browser.

31
Q

What does Hypertext Transfer Protocol Secure (HTTPS) do?

A

It enables secure connections between clients and servers by using Transport Layer Security (TLS).

32
Q

The latest version of Secure Sockets Layer (SSL), ____ uses encryption to set up a secure private connection.

A

TLS or Transport Layer Security

33
Q

FTP
Port #

A

TCP Ports: 20/21 (active), 21 (passive)

34
Q

SSH
Port #

A

TCP Port: 22

35
Q

Telnet
Port #

A

TCP Port: 23

36
Q

SMTP
Port #

A

TCP Port: 25

37
Q

DNS
Port #

A

UDP Port: 53

38
Q

DHCP
Port #

A

UDP Port: 67 (server), 68 (client)

39
Q

TFTP
Port #

A

UDP Port: 69

40
Q

HTTP
Port #

A

TCP Port: 80

41
Q

POP3
Port #

A

TCP Port: 110

42
Q

NTP/SNTP
Port #

A

UDP Port: 123

43
Q

IMAP4
Port #

A

TCP Port: 143

44
Q

HTTPS
Port #

A

TCP Port: 443