export_week 2 Flashcards

1
Q

Please select all examples of systems using guided Meda
Fiber-Optic Internet

Cable television/internet

Human speech

Ethernet Home Networks

Signal flares

ADSL

802.11 Wifi Home Networks

A

Fiber-Optic Internet

Cable television/internet

Ethernet Home Networks

ADSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

At the transport layer, what is the payload?

A

application data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Place the following in the order of the OSI layering model.

Layer 7 - Layer 1

A
Physical Layer
 Link Layer
 Network Layer
 Transport Layer
 Session Layer
 Presentation Layer
 Application Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the Internet protocol stack, the_____is responsible for finding the destination IP address.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the Internet protocol stack, the is responsible for assembling user data to be sent.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To send information into the internet with your IP address listed as the sender IP, I would be

A

Spoofing my IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A third party intercepting a packing and downloading its information before sending it onward toward its destination is called

A

A packet Sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a architecture, one host is always on, and other hosts may connect and be handed off amongst themselves by this first host.

A

hybrid client-server/P2P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In a architecture, no one host is always on, but hosts may connect amongst themselves in an on-demand fashion.

A

peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following are application-layer protocols?(5)

A

Domain name Service DNS
File Transfer Protocol FTP

Secure Shell SSH

Post Office Protocol v3 POP3

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the internet, an application-level protocol implemeting web browsing would most likely utiliz e________ as its transport-layer protocol.

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A paired IP address and port number is called a

A

Socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What transport-layer services are provided by the base TCP protocol?

A

Connection-oriented Service
Reliable Data Transmission

Flow Control

Congestion Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the internet, an application-level protocol implemeting streaming video would most likely utilize as its transport-layer protocol.

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Signal attenuation is less of an issue in [ Select ] [“guided”, “unguided”] media than it is in [ Select ] [“unguided”, “guided”] media.

A

Guided

unguided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

__________ are designed to destroy files or cause a computer malfunction.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In the Internet protocol stack, the is responsible for process-to-process communication.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A program running on a host is called a

A

Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A pair of sockets is called a

A

Connection

20
Q

____________is designed to act like a server, and can distribute data from an infected computer to a remote host upon request.

21
Q

A third party intercepting a packing and downloading its information before sending it onward toward its destination is called

A

a packet sniffer

22
Q

When a packet is passed down to the next lower layer, it is _____________ into the lower-layer packet.

A

Encapsulated

23
Q

Merging multiple communication streams into the same media is called _________?

A

multiplexing

24
Q

The minimum necessary information for identifying a process on a remote host would be (check all that apply):

Local Socket Info
Local Port Number
Local Host IP
Remote Host IP
Gateway Router IP
Remote Port Number
A

Remote host IP

Remote Port Number

25
In a ________ architecture, one host is always on, and other hosts may connect and be continually serviced by this first host.
Client Server
26
What transport-layer services are provided by the base UDP protocol? (Check all that apply) ``` Congestion control Flow control Message security None of these services are provided by UDP Connection-oriented service Minimum bandwidth Jitter minimization ```
None 
27
What are some examples of guided media
Cups with a string connecting them, twisted pair copper wires, coaxial cables, waveguide cabling (fiber-optic)
28
What are some examples of unguided media
Human speech, broadcast wireless
29
What are the five layers in the Internet Protocol Stack?
``` Layer 1: Physical Layer Layer 2: Data-Link Layer Layer 3: Network Layer Layer 4: Transport Layer Layer 5: Application Layer ```
30
What are some responsibilities of the Application Layer?
Determine destination IP address Support network applications Decide which data which will transit the internet 
31
The ___________ layer manages communications from process to process
transport
32
are designed to destroy files and cause a computer to malfunction in some way. 
Viruses
33
is software that acts like a server. Once installed, a knowledgeable client can request and receive information from the infected host.
Spyware
34
______________is a group of computers all controlled for a common objective, possibly by an infection in the system, used cooperatively to process and/or send information in mass amounts (DDoS, distributed computing). 
botnet
35
An attack which attempts to make network resources unavailable to legitimate users by flooding a system with illegitimate traffic is called a _______________ attack.
Denial of Service 
36
If a botnet or another large group of hosts is used to execute this attack it is called a ______________attack
Distributed Denial of Service
37
Sending information into the network with false “Sender IP” information
IP Spoofing
38
– Used often for communication of hosted information on the internet (web pages)
HTTP
39
Used often for transfer of files without a web interface (uploading, etc)
FTP
40
Email protocols(3)
SMTP/IMAP/ | POP3
41
– Domain name resolution (from www.google.com to 173.194.33.176, etc)
DNS
42
Protocol ________ allows multiple protocols to work together.
interoperability
43
What are some applications which would have stringent data integrity requirements
File transfer, email, web services…
44
What are some applications which would have stringent bandwidth requirements
Video games, large databases, etc…
45
What are some applications which would have stringent timing requirements
Video games, VoIP, streaming video (any streaming service), etc… 
46
What are some applications which would have stringent security requirements
Email, payment services, identity services, etc…
47
What are some services the TCP protocol does not provide
Timing, Bandwidth, (additional answers possible)