export_week 2 Flashcards

1
Q

Please select all examples of systems using guided Meda
Fiber-Optic Internet

Cable television/internet

Human speech

Ethernet Home Networks

Signal flares

ADSL

802.11 Wifi Home Networks

A

Fiber-Optic Internet

Cable television/internet

Ethernet Home Networks

ADSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

At the transport layer, what is the payload?

A

application data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Place the following in the order of the OSI layering model.

Layer 7 - Layer 1

A
Physical Layer
 Link Layer
 Network Layer
 Transport Layer
 Session Layer
 Presentation Layer
 Application Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the Internet protocol stack, the_____is responsible for finding the destination IP address.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the Internet protocol stack, the is responsible for assembling user data to be sent.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To send information into the internet with your IP address listed as the sender IP, I would be

A

Spoofing my IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A third party intercepting a packing and downloading its information before sending it onward toward its destination is called

A

A packet Sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a architecture, one host is always on, and other hosts may connect and be handed off amongst themselves by this first host.

A

hybrid client-server/P2P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In a architecture, no one host is always on, but hosts may connect amongst themselves in an on-demand fashion.

A

peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following are application-layer protocols?(5)

A

Domain name Service DNS
File Transfer Protocol FTP

Secure Shell SSH

Post Office Protocol v3 POP3

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the internet, an application-level protocol implemeting web browsing would most likely utiliz e________ as its transport-layer protocol.

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A paired IP address and port number is called a

A

Socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What transport-layer services are provided by the base TCP protocol?

A

Connection-oriented Service
Reliable Data Transmission

Flow Control

Congestion Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the internet, an application-level protocol implemeting streaming video would most likely utilize as its transport-layer protocol.

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Signal attenuation is less of an issue in [ Select ] [“guided”, “unguided”] media than it is in [ Select ] [“unguided”, “guided”] media.

A

Guided

unguided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__________ are designed to destroy files or cause a computer malfunction.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In the Internet protocol stack, the is responsible for process-to-process communication.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A program running on a host is called a

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A pair of sockets is called a

A

Connection

20
Q

____________is designed to act like a server, and can distribute data from an infected computer to a remote host upon request.

A

Spyware

21
Q

A third party intercepting a packing and downloading its information before sending it onward toward its destination is called

A

a packet sniffer

22
Q

When a packet is passed down to the next lower layer, it is _____________ into the lower-layer packet.

A

Encapsulated

23
Q

Merging multiple communication streams into the same media is called _________?

A

multiplexing

24
Q

The minimum necessary information for identifying a process on a remote host would be (check all that apply):

Local Socket Info
Local Port Number
Local Host IP
Remote Host IP
Gateway Router IP
Remote Port Number
A

Remote host IP

Remote Port Number

25
Q

In a ________ architecture, one host is always on, and other hosts may connect and be continually serviced by this first host.

A

Client Server

26
Q

What transport-layer services are provided by the base UDP protocol? (Check all that apply)

Congestion control
Flow control
Message security
None of these services are provided by UDP
Connection-oriented service
Minimum bandwidth
Jitter minimization
A

None

27
Q

What are some examples of guided media

A

Cups with a string connecting them, twisted pair copper wires, coaxial cables, waveguide cabling (fiber-optic)

28
Q

What are some examples of unguided media

A

Human speech, broadcast wireless

29
Q

What are the five layers in the Internet Protocol Stack?

A
Layer 1: Physical Layer
 Layer 2: Data-Link Layer 
 Layer 3: Network Layer 
 Layer 4: Transport Layer 
 Layer 5: Application Layer
30
Q

What are some responsibilities of the Application Layer?

A

Determine destination IP address Support network applications Decide which data which will transit the internet

31
Q

The ___________ layer manages communications from process to process

A

transport

32
Q

are designed to destroy files and cause a computer to malfunction in some way.

A

Viruses

33
Q

is software that acts like a server. Once installed, a knowledgeable client can request and receive information from the infected host.

A

Spyware

34
Q

______________is a group of computers all controlled for a common objective, possibly by an infection in the system, used cooperatively to process and/or send information in mass amounts (DDoS, distributed computing).

A

botnet

35
Q

An attack which attempts to make network resources unavailable to legitimate users by flooding a system with illegitimate traffic is called a _______________ attack.

A

Denial of Service

36
Q

If a botnet or another large group of hosts is used to execute this attack it is called a ______________attack

A

Distributed Denial of Service

37
Q

Sending information into the network with false “Sender IP” information

A

IP Spoofing

38
Q

– Used often for communication of hosted information on the internet (web pages)

A

HTTP

39
Q

Used often for transfer of files without a web interface (uploading, etc)

A

FTP

40
Q

Email protocols(3)

A

SMTP/IMAP/

POP3

41
Q

– Domain name resolution (from www.google.com to 173.194.33.176, etc)

A

DNS

42
Q

Protocol ________ allows multiple protocols to work together.

A

interoperability

43
Q

What are some applications which would have stringent data integrity requirements

A

File transfer, email, web services…

44
Q

What are some applications which would have stringent bandwidth requirements

A

Video games, large databases, etc…

45
Q

What are some applications which would have stringent timing requirements

A

Video games, VoIP, streaming video (any streaming service), etc…

46
Q

What are some applications which would have stringent security requirements

A

Email, payment services, identity services, etc…

47
Q

What are some services the TCP protocol does not provide

A

Timing, Bandwidth, (additional answers possible)