Introduction to TCP/IP Flashcards

1
Q

This suite was designed and implemented by the Department of Defense (DoD)to ensure and preserve data integrity as well as maintain communications in the event of catastrophic war.

A

Transmission Control Protocol/Internet Protocol (TCP/IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This can be a secure, dependable and resilient one.

A

Transmission Control Protocol/Internet Protocol (TCP/IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When was TCP first came on the scene

A

1973

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When was divided into two distinct protocols: TCP and IP.

A

1978

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is when TCP/IP replaced the Network Control Protocol (NCP) and was authorized as the official means of data transport for anything connecting to ARPAnet, the Internet’s ancestor.

A

1983

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In 1983, TCP/IP is replaces with _________

A

NCP - Network Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Meaning of ARPA

A

Advances Research Projects Agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The DoD’s Advanced Research Projects Agency (ARPA) created this ancient network way back in a cold war reaction to the Soviet’s launching of Sputnik. What year is this?

A

1957

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is when ARPA was redubbed DARPA and divided into ARPAnet and MILNET

A

1983

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When was ARPAnet and MILNET dissolved?

A

1990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The DoD model is basically a condensed version of the OSI model that comprises four instead of seven layers. What are those 4?

A
  1. Process/Application layer
  2. Host-to-Host layer or Transport layer
  3. Internet layer
  4. Network Access layer or Link layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This defines protocols for node-to-node application communication and controls user-interface specifications.

A

Process/Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is defining protocols for setting up the level of transmission service for applications. It tackles issues like creating reliable end-to-end communication and ensuring the error-free delivery of data. It handles packet sequencing and maintains data integrity.

A

The Host-to-Host layer or Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This corresponds to the OSI’s Network layer, designating the protocols relating to the logical transmission of packets over the entire network. It takes care of the addressing of hosts by giving them an IP (Internet Protocol) address and handles the routing of packets among multiple networks.

A

The Internet Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This implements the data exchange between the host and the network.

A

The Network Access layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This was one of the first Internet standards, developed in 1969, and is the chameleon of protocols—its specialty is terminal emulation.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It allows a user on a remote client machine, to
access the resources of another machine, the Telnet server, in order to access a command-line interface.

A

Telnet Client

18
Q

This achieves this by pulling a fast one on the Telnet server and making the client machine appear as though it were a terminal directly attached to the local network. This projection is actually a software image—a virtual terminal that can interact with the chosen remote host.

19
Q

This sets up a secure session that’s similar to Telnet over
a standard TCP/IP connection and is employed for doing things like logging into systems, running programs on remote systems, and moving files from one system to another. And it does all of this while maintaining an encrypted connection.

A

Secure Shell (SSH) protocol

20
Q

This actually lets us transfer files, and it can accomplish this between any two machines using it.

A

File Transfer Protocol (FTP)

21
Q

True or False:
But FTP isn’t just a protocol; it’s also a program. Operating as a protocol, FTP is used by applications. As a program, it’s employed by users to perform file tasks by hand.

22
Q

This allows for access to both directories and files and can accomplish certain types of directory operations, such as relocating into different ones

A

File Transfer Protocol

23
Q

This is the stripped-down, stock version of FTP,
but it’s the protocol of choice if you know exactly what you want and where to find it because it’s fast and so easy to use!

A

Trivial File Transfer Protocol

24
Q

This collects and manipulates valuable network information

A

Simple Network Management Protocol

25
Q

It gathers data by polling the devices on the network from a network management station (NMS) at fixed or random intervals, requiring them to disclose certain information, or even asking for certain information from the device.

A

Simple Network Management Protocol

26
Q

This a report delimiting the operational traits of a healthy network.

27
Q

This protocol can also stand as a watchdog over the network, quickly notifying managers of any sudden turn of events. These network watchdogs are called

28
Q

when aberrations occur, agents send an alert called

29
Q

It’s used to manage communications between web browsers and web servers and opens the right resource when you click a link, wherever that resource may actually reside.

A

Hypertext Transfer Protocol

30
Q

Hypertext Transfer Protocol Secure is also knows as

A

Secure Hypertext Transfer Protocol

31
Q

It uses Secure Sockets Layer (SSL). which were slightly different protocols, but since Microsoft supported HTTPS, it became the de facto standard for securing web communication.

A

Hypertext Transfer Protocol Secure (HTTPS)

32
Q

it’s a secure version of HTTP that arms you with a whole
bunch of security tools for keeping transactions between a web browser and a server secure.

A

Hypertext Transfer Protocol Secure (HTTPS)

33
Q

This works by synchronizing devices to ensure that all computers on a given network agree on the time

A

Network Time Protocol

34
Q

resolves hostnames—specifically, Internet names.

A

Domain Name Services

35
Q

This allows to use a domain name to specify an IP address. You can change the IP address as often as you want and no one will know the difference.

A

Domain Name Services

36
Q

This assigns IP addresses to hosts. It allows for easier administration and works well in small to very large network environments.

A

Dynamic Host Configuration Protocol (DHCP)

37
Q

assigns an IP address to a host but the host’s hardware address must be entered manually in a BootP table.

38
Q

This is also used to send an operating system that a host can boot from.

39
Q

DHCP server provides?

A
  • IP address
  • Subnet mask
  • Domain name
  • Default gateway (routers)
  • DNS server address
  • WINS server address