Quiz 1-2 Flashcards

failed quiz 1 and every quiz 2 question

1
Q

A(n) _______ is the logical, not physical, component of a TCP connection.

ISN
Socket
Port
SYN

A

port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Each Class C IP address supports up to ___ host computers.

254
512
65, 000
16 million

A

254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In TCP, the __________________________ is a 32 bit number that tracks the packets received by the node and allows reassembling of large packets that have been broken into smaller packets.

A

initial sequence number (ISN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the TCP/IP stack, the _______________ layer represents the physical network pathway and the network interface card.

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the TCP/IP stack the _________________ layer is responsible for getting data packets to and from the Application layer by using port numbers.

A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
In the TCP/IP stack, the \_\_\_\_ layer uses IP addresses to route packets.
Answer    Internet 
   Network 
   Transport 
   Application
A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the TCP/IP stack, the ____ layer is where applications and protocols, such as HTTP and Telnet, operate.

Answer   
 Internet 
   Network 
  Transport 
  Application
A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
In the TCP/IP stack, the \_\_\_\_ layer is concerned with physically moving electrons across a medium.
Answer    Internet 
   Network 
   Transport 
   Application
A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
In the TCP/IP stack, the \_\_\_\_ layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header.
Answer   
 Internet 
   Network 
   Transport 
   Application
A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the TCP/IP stack, the Transport layer includes network services and client software.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

No matter what medium connects computers on a network—copper wires, fiber-optic cables, or a wireless setup—the same protocol must be running on all computers if communication is going to function correctly.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Often technical personnel who aren’t familiar with security techniques think that restricting access to ports on a router or firewall can protect a network from attack. Is this a good solution?

A

This is easier said than done. After all, if a firewall prevents any traffic from entering or exiting a network on port 80, you have indeed closed a vulnerable port to access from hackers. However, you have also closed the door to Internet access for your users, which probably isn’t acceptable to your company. The tricky (and almost impossible) part for security personnel is attempting to keep out the bad guys while allowing the good guys to work and use the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The IP in TCP/IP stands for ____________________.

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
The HTTP service uses port \_\_\_\_.
Answer    25 
   53 
   69 
   80
A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
The DNS service uses port \_\_\_\_.
Answer    25 
   53 
   69 
   80
A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
TCP stands for \_\_\_\_.
Answer  
  Transfer Control Protocol 
   Transmission Control Protocol 
   Transfer Congestion Protocol 
   THE Control Protocol
A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TCP is a(n) ____________________ protocol, which means the sender doesn’t send any data to the destination node until the destination node acknowledges that it’s listening to the sender.

A

connection-oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
The Microsoft RPC service uses port \_\_\_\_.
Answer    110 
   119 
   135 
   139
A

135

19
Q
The NetBIOS service uses port \_\_\_\_.
Answer    
110 
   119 
   135 
   139
A

139

20
Q
The Network News Transport Protocol service uses port \_\_\_\_.
Answer    110 
   119 
   135 
   139
A

119

21
Q
The POP3 service uses port \_\_\_\_.
Answer   
 110 
   119 
   135 
   139
A

110

22
Q
The SMTP service uses port \_\_\_\_.
Answer    25 
   53 
   69 
   80
A

25

23
Q
The TFTP service uses port \_\_\_\_.
Answer    25 
   53 
   69 
   80
A

69

24
Q
The \_\_\_\_-layer protocols are the front ends to the lower-layer protocols in the TCP/IP stack.
Answer    
Internet 
   Network 
   Transport 
   Application
A

Application

25
Q
The most widely used is protocol is \_\_\_\_.
Answer    IPX/SPX 
   ATM 
   TCP/IP 
   NetBIOS
A

TCP/IP

26
Q
UDP stands for \_\_\_\_.
Answer    User Datagram Protocol 
   Universal Datagram Protocol 
   User Data Packet 
   Universal Data Packet
A

User Datagram Protocol

27
Q

To retrieve e-mail from a mail server, you most likely access port 119.

A

False

28
Q

What is ICMP used for?

A

Internet Control Message Protocol (ICMP) is used to send messages that relate to network operations. For example, if a packet cannot reach its destination, you might see the “Destination Unreachable” error. ICMP makes it possible for network professionals to troubleshoot network connectivity problems (with the Ping command) and to track the route a packet traverses from a source IP address to a destination IP address (with the Traceroute command).

29
Q

What is DNS used for?

A

Most networks require a DNS server so that users can connect to Web sites with URLs instead of IP addresses. When a user enters a URL, such as www.yahoo.com, the DNS server resolves the name to an IP address. The DNS server might be internal to the company, or each computer might be configured to point to the IP address of a DNS server that’s serviced by the company’s ISP.

30
Q

What steps are involved in TCP’s “three-way handshake”?

A

Answer:

  1. Host A sends a TCP packet with the SYN flag set (that is, a SYN packet) to Host B.
  2. After receiving the packet, Host B sends Host A its own SYN packet with an ACK flag (a SYN-ACK packet) set.
  3. In response to the SYN-ACK packet from Host B, Host A sends Host B a TCP packet with the ACK flag set (an ACK packet).
31
Q

A hex number is written with two characters, each representing a byte.

A

False

32
Q

An octal digit can be represented with only three bits because the largest digit in octal is seven.

A

True

33
Q

Based on the starting decimal number of the ____ byte, you can classify IP addresses as Class A, Class B, or Class C.

A

first

34
Q

What is the main protocol for transmitting e-mail messages across the Internet

A

SMTP

35
Q

What is the primary protocol used to communicate over the World Wide Web?

A

HTTP

36
Q

What allows allows different operating systems to transfer files between one another

A

FTP

37
Q

What is primarily used to monitor devices on a network, such as remotely monitoring a router’s state?

A

SNMP

38
Q

What is a TCP header flag used to deliver data directly to an application?

A

PSH

39
Q

What enables multiple users to communicate over the Internet in discussion forums?

A

IRC

40
Q

What is a TCP header flag that signifies the beginning of a session called?

A

SYN

41
Q

What enables a remote user to log on to a server and issue commands?

A

SSH

42
Q

What is a TCP header flag that is used to signify urgent data called?

A

URG

43
Q

In a(n) ____, the tester does more than attempt to break in; he or she also analyzes the company’s security policy and procedures and reports any vulnerabilities to management.

A

security test

44
Q

____ takes penetration testing to a higher level.

A

Security testing