CPE-PC 321 Lec 2 Flashcards
What is TCP/IP?
a. A software program for networking
b. A communication protocol used for data transmission over networks
c. A firewall configuration method
d. A cybersecurity framework
b. A communication protocol used for data transmission over networks
TCP/IP (Transmission Control Protocol/Internet Protocol) is the fundamental protocol stack for network communication.
What are the four layers of the TCP/IP model?
a. Physical, Data Link, Network, Transport
b. Application, Transport, Internet, Network
c. Session, Presentation, Application, Network
d. Physical, Network, Transport, Application
b. Application, Transport, Internet, Network
TCP/IP consists of these four layers to handle different aspects of data transmission.
What is the function of the Transport layer in TCP/IP?
a. Routes packets between networks
b. Converts data into binary
c. Ensures end-to-end communication and error checking
d. Encrypts all network traffic
c. Ensures end-to-end communication and error checking
The Transport layer handles segmentation, sequencing, and error recovery.
What is the difference between TCP and UDP?
a. TCP is faster, while UDP is reliable
b. TCP is connection-oriented, while UDP is connectionless
c. TCP is used only for web browsing, while UDP is used for emails
d. TCP encrypts data, while UDP does not
b. TCP is connection-oriented, while UDP is connectionless
TCP ensures reliable communication, while UDP prioritizes speed over reliability.
hat is the purpose of a TCP three-way handshake?
a. To encrypt network traffic
b. To initiate and establish a TCP connection
c. To transfer files securely
d. To prevent malware infections
b. To initiate and establish a TCP connection
The three-way handshake (SYN, SYN-ACK, ACK) ensures both devices are ready to communicate.
Which of the following is a well-known TCP port?
a. 22
b. 143
c. 443
d. All of the above
d. All of the above
Port 22 (SSH), Port 143 (IMAP), and Port 443 (HTTPS) are all well-known TCP ports.
What is the purpose of a subnet mask?
a. To encrypt data packets
b. To define the network and host portions of an IP address
c. To convert IP addresses to domain names
d. To prevent unauthorized access
b. To define the network and host portions of an IP address
Subnet masks help differentiate network addresses from host addresses.
What does CIDR stand for?
a. Classless Inter-Domain Routing
b. Computer Internet Data Relay
c. Cyber Intrusion Detection Report
d. Communication Internet Data Rule
a. Classless Inter-Domain Routing
CIDR improves IP address allocation efficiency.
What is the purpose of ICMP?
a. To transfer email messages
b. To control multimedia streaming
c. To send error messages and operational information
d. To encrypt network traffic
c. To send error messages and operational information
ICMP (Internet Control Message Protocol) is used for diagnostics like ping and traceroute.
What is a default gateway?
a. A server that encrypts network traffic
b. A router that connects a local network to other networks
c. A backup connection in case of failure
d. A firewall configuration method
b. A router that connects a local network to other networks
The default gateway is used to send traffic outside a local network.
What is an IPv6 address composed of?
a. 16 bits
b. 32 bits
c. 64 bits
d. 128 bits
d. 128 bits
IPv6 addresses are 128-bit long and provide a vastly larger address space than IPv4.
What is the primary benefit of IPv6 over IPv4?
a. Faster internet speed
b. More available addresses
c. Improved DNS resolution
d. Better firewall security
b. More available addresses
IPv6 expands the number of available IP addresses significantly.
What is NAT (Network Address Translation)?
a. A method for converting private IP addresses to public IP addresses
b. A type of firewall rule
c. A process that encrypts network packets
d. A security vulnerability
a. A method for converting private IP addresses to public IP addresses
NAT allows multiple devices on a private network to share a single public IP address.
What is the function of the netstat command?
a. To show active network connections
b. To encrypt data
c. To change an IP address
d. To filter network traffic
a. To show active network connections
The netstat command displays network connections, routing tables, and statistics.
What is the purpose of DNS?
a. To assign MAC addresses to devices
b. To map domain names to IP addresses
c. To prevent unauthorized access
d. To encrypt email traffic
b. To map domain names to IP addresses
DNS (Domain Name System) resolves human-readable domain names into IP addresses.
What does the ping command do?
a. Measures round-trip time of packets to a destination
b. Encrypts network traffic
c. Converts domain names to IP addresses
d. Displays open ports on a system
a. Measures round-trip time of packets to a destination
ping is used to check network connectivity and measure response times.
Which protocol is used for secure file transfers?
a. HTTP
b. FTP
c. SFTP
d. SMTP
c. SFTP
SFTP (Secure File Transfer Protocol) encrypts file transfers over SSH.
What is a DHCP server responsible for?
a. Encrypting network traffic
b. Assigning dynamic IP addresses to devices
c. Managing firewall rules
d. Blocking unauthorized access
b. Assigning dynamic IP addresses to devices
DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices.
Which layer of the TCP/IP model does HTTP operate on?
a. Network
b. Transport
c. Internet
d. Application
d. Application
HTTP (Hypertext Transfer Protocol) is an Application Layer protocol.
Which command is used to display the IP configuration of a system?
a. netstat
b. ping
c. ipconfig (Windows) / ifconfig (Linux)
d. tracert
c. ipconfig (Windows) / ifconfig (Linux)
These commands display IP addresses and network configurations.