Network Protocols Flashcards

1
Q

What are Network protocols?

A

A set of rules used by two or more devices on a network to describe:
the order of delivery
and
the structure of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does TCP stand for?

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is TCP?

A

Transmission Control Protocol:
An internet communications protocol that allows two devices to form a connection and stream data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP is limited to two devices.
True or False?

A

False:
It establishes a direct connection between two endpoints, but the underlying network infrastructure can handle routing data packets across multiple devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a TCP handshake?

A

The process in which TCP verifies both devices before allowing any further communications to take place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does ARP stand for?

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ARP used for?

A

is used to determine the MAC address of the next router or device on the path. This ensures that the data gets to the right place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does HTTPS stand for?

A

Hypertext Transfer Protocol Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is HTTPS?

A

It is a network protocol that provides a secure method of communication between client and website servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does DNS stand for?

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is DNS?

A

is a network protocol that translates internet domain names into IP addresses.
The DNS protocol sends the domain name and the web address to a DNS server that retrieves the IP address of the website you were trying to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does HTTPS provide security?

A

It is a secure protocol that requests a webpage from a web server. HTTPS encrypts data using the Secure Sockets Layer and Transport Layer Security, otherwise known as SSL/TLS. This helps keep the information secure from malicious actors who want to steal valuable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does SSL/TLS stand for

A

Secure Sockets Layer and Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do SSL or TLS do?

A

encrypts data.
This helps keep the information secure from malicious actors who want to steal valuable information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which protocol allows two or more devices to form a connection and stream data?

a) Domain Name System (DNS)

b) Address Resolution Protocol (ARP)

c) Transmission Control Protocol (TCP)

A

c) Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three main categories of network protocols?

A

communication protocols
management protocols
security protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What do Communication protocols do?

A

They govern the exchange of information in network transmission.
How the data is transmitted between devices
Timing of the communication
Can include methods of recovery for data lost in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TCP, UDP, HTTP and DNS are types of which protocols?
a) Communication protocols
b) Management protocols
c) Security protocols

A

a) Communication protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SNMP and ICMP are types of which protocols?
a) Communication protocols
b) Management protocols
c) Security protocols

A

b) Management protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

HTTPS and SFTP are types of which protocols?
a) Communication protocols
b) Management protocols
c) Security protocols

A

c) Security protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does UDP stand for?

A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is UDP?

A

is a connectionless protocol that does not establish a connection between devices before a transmission.
This makes it less reliable than TCP. But it also means that it works well for transmissions that need to get to their destination quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are management protocols used for?

A

Monitoring and managing activity on a network.
They include protocols for error reporting and optimizing performance on the network.

24
Q

What are security protocols used for?

A

To ensure that data is sent and received securely across a network.

25
Q

How do security protocols protect data in transit?

A

Security protocols use encryption algorithms to protect data in transit.

26
Q

What does SNMP stand for?

A

Simple Network Management Protocol

27
Q

What does ICMP stand for?

A

Internet Control Message Protocol

28
Q

What is SNMP used for?

A

Simple Network Management Protocol (SNMP) is a network protocol used for monitoring and managing devices on a network.

SNMP can reset a password on a network device or change its baseline configuration. It can also send requests to network devices for a report on how much of the network’s bandwidth is being used up. In the TCP/IP model, SNMP occurs at the application layer.

29
Q

What is ICMP used for?

A

Internet Control Message Protocol (ICMP) is an internet protocol used by devices to tell each other about data transmission errors across the network.

ICMP is used by a receiving device to send a report to the sending device about the data transmission. ICMP is commonly used as a quick way to troubleshoot network connectivity and latency by issuing the “ping” command on a Linux operating system. In the TCP/IP model, ICMP occurs at the internet layer.

30
Q

What can the IANA assign?

A

Internet Assigned Numbers Authority (IANA)
can assign port numbers to protocols

31
Q

What type of address is required in order for devices with private IP addresses to communicate with the public internet?

A

Devices with private IP addresses need to have a single public IP address that represents all devices on the LAN to the public in order to communicate with the public internet.

32
Q

What does NAT stand for?

A

Network Address Translation (NAT)

33
Q

What is NAT used for?

A

For outgoing messages, the router can replace a private source IP address with its public IP address and perform the reverse operation for responses. This process NAT generally requires a router or firewall to be specifically configured to perform Network Address Translation

34
Q

Public IP Addresses are assigned by the router.
True or False?

A

False
Public IP Addresses are assigned by:
(ISP) Internet Service Provider
and
(IANA) Internet Assigned Numbers Authority

35
Q

What does DHCP stand for?

A

Dynamic Host Configuration Protocol (DHCP)

36
Q

What does DHCP do?

A

A management network protocol
DHCP is an application layer protocol used on a network to configure devices.

It works with the router to assign a unique IP address to each device and provide the addresses of the appropriate DNS server and default gateway for each device.
DHCP servers operate on UDP port 67 while DHCP clients operate on UDP port 68.

37
Q

To identify each device on a network, what address/s does it require?

A

public IP address, a private IP address, and a MAC address

38
Q

Which address for a device is permanent?
a) public IP address
b) private IP address
c) MAC address

A

A device’s IP address may change over time, but its MAC address is permanent because it is unique to a device’s network interface card.

39
Q

If a device’s MAC address is unknown, which protocol can be used to translate the IP addresses found within data packets?

A

The Address Resolution Protocol (ARP) is needed.
ARP is mainly a network access layer protocol in the TCP/IP model used to translate the IP addresses that are found in data packets into the MAC address of the hardware device.

40
Q

What is Telnet?

A

Telnet is an application layer protocol that is used to connect with a remote system.
Telnet sends all information in clear text. It uses command line prompts to control another device similar to secure shell (SSH), but Telnet is not as secure as SSH. Telnet can be used to connect to local or remote devices and uses TCP port 23.

41
Q

What is SSH ?

A

Secure shell protocol (SSH) is used to create a secure connection with a remote system. This application layer protocol provides an alternative for secure authentication and encrypted communication. SSH operates over the TCP port 22 and is a replacement for less secure protocols, such as Telnet.

42
Q

What is POP ?

A

Post office protocol (POP)

43
Q

What is Post office protocol (POP) used for?

A

It is an application layer (layer 4 of the TCP/IP model) protocol used to manage and retrieve email from a mail server. POP3 is the most commonly used version of POP.

44
Q

What is Internet Message Access Protocol (IMAP) ?

A

IMAP is used for incoming email. It downloads the headers of emails and the message content. The content also remains on the email server, which allows users to access their email from multiple devices. IMAP uses TCP port 143 for unencrypted email and TCP port 993 over the TLS protocol. Using IMAP allows users to partially read email before it is finished downloading. Since the mail is kept on the mail server, it allows a user to sync emails across multiple devices.

45
Q

What is Simple Mail Transfer Protocol (SMTP) ?

A

is used to transmit and route email from the sender to the recipient’s address. SMTP works with Message Transfer Agent (MTA) software, which searches DNS servers to resolve email addresses to IP addresses, to ensure emails reach their intended destination. SMTP uses TCP/UDP port 25 for unencrypted emails and TCP/UDP port 587 using TLS for encrypted emails. The TCP port 25 is often used by high-volume spam. SMTP helps to filter out spam by regulating how many emails a source can send at a time.

46
Q

What are port numbers used for?

A

port numbers are used by network devices to determine what should be done with the information contained in each data packet once they reach their destination.

47
Q

Which port does the DHCP protocol use for servers?

A

UDP port 67

48
Q

Which port does the DHCP protocol use for clients?

A

UDP port 68 (clients)

49
Q

Which port does the ARP protocol use?

A

None

50
Q

Which port does the Telnet protocol use?

A

TCP port 23

51
Q

Which port does the SSH protocol use?

A

TCP port 22

52
Q

Which port does the POP3 protocol use unencrypted?

A

TCP/UDP port 110 (unencrypted)

53
Q

Which port does the POP3 protocol use encrypted?

A

TCP/UDP port 995 (encrypted, SSL/TLS)

54
Q

Which port does the IMAP protocol use encrypted?

A

TCP port 993 (encrypted, SSL/TLS)

55
Q

Which port does the IMAP protocol use unencrypted?

A

TCP port 143 (unencrypted)

56
Q

Which port does the SMTP protocol use?

A

TCP/UDP Port 25 (unencrypted)

57
Q

Which port does the SMTPS protocol use?

A

TCP/UDP port 587 (encrypted, TLS)