Exam 7 Flashcards

1
Q

(327)What does intermittent mean?

A

Sometimes it happens, sometimes it doesn’t.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(328)What is another word for intermittent?

A

Flaky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(329)What does a successful ping prove?

A

All the pieces involved were working AT THAT MOMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(330)What does a failed ping prove?

A

ONE OR MORE pieces involved were not working at that moment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(331)What statistic does ping report?

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(332)Using ping to troubleshoot, conventional wisdom says you should ping what first?

A

yourself, using your host address`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(333)Using ping to troubleshoot, conventional wisdom says you should ping what second?

A

Yourself, using your LAN address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(334)Using ping to troubleshoot, conventional wisdom says you should ping what third?

A

Something else inside your LAN, typically your router or gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(335) Using ping to troubleshoot, conventional wisdom says you should ping what fourth?

A

something beyond your LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(336)What is localhost?

A

Localhost is the computer you are using

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(337)What is the IPv4 address of localhost?

A

127.0.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(338)What things does a successful ping to localhost prove?

A

Your network stack (software) is working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(339)How can you (the user) find your IP address?

A

Use ipconfig (or ifconfig)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(340)What things does a succsesful ping to your own LAN address prove?

A

1)Your network stack (software) is working 2) Your network card (hardware) is working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(341)What things does a successful ping to your neighbor prove?

A

1)Your network stack (software) is working 2) Your network card (hardware) is working 3) Your network connection (cable) is working 4) Your neighboring computer is working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(342)What is a smurf attack?

A

A broadcast ping with a fake source address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(343)What is a broadcast ping with a fake source address called?

A

A smurf attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What information can a broadcast ping provide?

A

IP address and latencies of all devices within your LAN?

19
Q

(345)What IP address is used for global broadcast?

A

255.255.255.255

20
Q

(346)What things does a successful ping to something beyond your LAN prove?

A

1)Your network stack (software) is working 2) Your network card (hardware) is working 3) Your network connection (cable) is working 4) Gateway router is working

21
Q

(347)What two things does traceroute report?

A

a)the list of routers between source and destination b) latency for each router.

22
Q

(348)What does TTL stand for?

A

Time to live

23
Q

(349)What is the purpose of TTL?

A

Prevent infinite loops

24
Q

(350)How does traceroute use TTL?

A

It sends packets with varying TTL counts. As each packet dies, its location of death is reported.

25
Q

(351)What does FTP stand for?

A

File transfer (or transport) protocol

26
Q

(352)Is FTP considered to be secure? Why?

A

No, traffic (data) is not encrypted.

27
Q

(353)Which is more secure, ssh or ftp?

A

SSH

28
Q

(354)Which is more widely available, ssh or ftp?

A

FTP

29
Q

(355)What port does FTP normally use?

A

21

30
Q

(356)Is telnet considered to be secure? Why?

A

No, traffic (data) is not encrypted

31
Q

(357)Is SSH considered to be secure? Why?

A

Yes, traffic (data) is encrypted

32
Q

(358)Which is more secure, ssh or telnet?

A

SSH

33
Q

(359)Which is more widely available, ssh or telnet?

A

Telnet

34
Q

(360)What port does telnet normally use?

A

23

35
Q

(361)What is telnetd?

A

telnet daemon

36
Q

(362)What is a daemon?

A

A daemon is a program that interacts with other programs instead of interacting with an end user

37
Q

(363)In a program name, what does the suffix “d” usually mean?

A

It usually means “daemon”

38
Q

(364)What port does SSH normally use?

A

22

39
Q

(365)What does SSH stand for?

A

secure shell

40
Q

(366)How does ssh establish a secure connection?

A

It uses a public-key system like RSA to create a shared secret.

41
Q

(367)Which is more current, nslookup or dig?

A

dig

42
Q

(368)What does deprecated mean?

A

being phased out

43
Q

(369)What does Wireshark do?

A

It captures and reports network traffic (data) as the traffic passes through an interface.

44
Q

(370)How does Wireshark get data?

A

It captures data that is passing through a nearby interface.