Quiz 1-2 Flashcards
failed quiz 1 and every quiz 2 question
A(n) _______ is the logical, not physical, component of a TCP connection.
ISN
Socket
Port
SYN
port
Each Class C IP address supports up to ___ host computers.
254
512
65, 000
16 million
254
In TCP, the __________________________ is a 32 bit number that tracks the packets received by the node and allows reassembling of large packets that have been broken into smaller packets.
initial sequence number (ISN)
In the TCP/IP stack, the _______________ layer represents the physical network pathway and the network interface card.
network
In the TCP/IP stack the _________________ layer is responsible for getting data packets to and from the Application layer by using port numbers.
transport
In the TCP/IP stack, the \_\_\_\_ layer uses IP addresses to route packets. Answer Internet Network Transport Application
Internet
In the TCP/IP stack, the ____ layer is where applications and protocols, such as HTTP and Telnet, operate.
Answer Internet Network Transport Application
Application
In the TCP/IP stack, the \_\_\_\_ layer is concerned with physically moving electrons across a medium. Answer Internet Network Transport Application
Network
In the TCP/IP stack, the \_\_\_\_ layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header. Answer Internet Network Transport Application
Transport
In the TCP/IP stack, the Transport layer includes network services and client software.
False
No matter what medium connects computers on a network—copper wires, fiber-optic cables, or a wireless setup—the same protocol must be running on all computers if communication is going to function correctly.
True
Often technical personnel who aren’t familiar with security techniques think that restricting access to ports on a router or firewall can protect a network from attack. Is this a good solution?
This is easier said than done. After all, if a firewall prevents any traffic from entering or exiting a network on port 80, you have indeed closed a vulnerable port to access from hackers. However, you have also closed the door to Internet access for your users, which probably isn’t acceptable to your company. The tricky (and almost impossible) part for security personnel is attempting to keep out the bad guys while allowing the good guys to work and use the Internet.
The IP in TCP/IP stands for ____________________.
Internet Protocol
The HTTP service uses port \_\_\_\_. Answer 25 53 69 80
80
The DNS service uses port \_\_\_\_. Answer 25 53 69 80
53
TCP stands for \_\_\_\_. Answer Transfer Control Protocol Transmission Control Protocol Transfer Congestion Protocol THE Control Protocol
Transmission Control Protocol
TCP is a(n) ____________________ protocol, which means the sender doesn’t send any data to the destination node until the destination node acknowledges that it’s listening to the sender.
connection-oriented