Quiz 1-2 Flashcards
failed quiz 1 and every quiz 2 question
A(n) _______ is the logical, not physical, component of a TCP connection.
ISN
Socket
Port
SYN
port
Each Class C IP address supports up to ___ host computers.
254
512
65, 000
16 million
254
In TCP, the __________________________ is a 32 bit number that tracks the packets received by the node and allows reassembling of large packets that have been broken into smaller packets.
initial sequence number (ISN)
In the TCP/IP stack, the _______________ layer represents the physical network pathway and the network interface card.
network
In the TCP/IP stack the _________________ layer is responsible for getting data packets to and from the Application layer by using port numbers.
transport
In the TCP/IP stack, the \_\_\_\_ layer uses IP addresses to route packets. Answer Internet Network Transport Application
Internet
In the TCP/IP stack, the ____ layer is where applications and protocols, such as HTTP and Telnet, operate.
Answer Internet Network Transport Application
Application
In the TCP/IP stack, the \_\_\_\_ layer is concerned with physically moving electrons across a medium. Answer Internet Network Transport Application
Network
In the TCP/IP stack, the \_\_\_\_ layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header. Answer Internet Network Transport Application
Transport
In the TCP/IP stack, the Transport layer includes network services and client software.
False
No matter what medium connects computers on a network—copper wires, fiber-optic cables, or a wireless setup—the same protocol must be running on all computers if communication is going to function correctly.
True
Often technical personnel who aren’t familiar with security techniques think that restricting access to ports on a router or firewall can protect a network from attack. Is this a good solution?
This is easier said than done. After all, if a firewall prevents any traffic from entering or exiting a network on port 80, you have indeed closed a vulnerable port to access from hackers. However, you have also closed the door to Internet access for your users, which probably isn’t acceptable to your company. The tricky (and almost impossible) part for security personnel is attempting to keep out the bad guys while allowing the good guys to work and use the Internet.
The IP in TCP/IP stands for ____________________.
Internet Protocol
The HTTP service uses port \_\_\_\_. Answer 25 53 69 80
80
The DNS service uses port \_\_\_\_. Answer 25 53 69 80
53
TCP stands for \_\_\_\_. Answer Transfer Control Protocol Transmission Control Protocol Transfer Congestion Protocol THE Control Protocol
Transmission Control Protocol
TCP is a(n) ____________________ protocol, which means the sender doesn’t send any data to the destination node until the destination node acknowledges that it’s listening to the sender.
connection-oriented
The Microsoft RPC service uses port \_\_\_\_. Answer 110 119 135 139
135
The NetBIOS service uses port \_\_\_\_. Answer 110 119 135 139
139
The Network News Transport Protocol service uses port \_\_\_\_. Answer 110 119 135 139
119
The POP3 service uses port \_\_\_\_. Answer 110 119 135 139
110
The SMTP service uses port \_\_\_\_. Answer 25 53 69 80
25
The TFTP service uses port \_\_\_\_. Answer 25 53 69 80
69
The \_\_\_\_-layer protocols are the front ends to the lower-layer protocols in the TCP/IP stack. Answer Internet Network Transport Application
Application
The most widely used is protocol is \_\_\_\_. Answer IPX/SPX ATM TCP/IP NetBIOS
TCP/IP
UDP stands for \_\_\_\_. Answer User Datagram Protocol Universal Datagram Protocol User Data Packet Universal Data Packet
User Datagram Protocol
To retrieve e-mail from a mail server, you most likely access port 119.
False
What is ICMP used for?
Internet Control Message Protocol (ICMP) is used to send messages that relate to network operations. For example, if a packet cannot reach its destination, you might see the “Destination Unreachable” error. ICMP makes it possible for network professionals to troubleshoot network connectivity problems (with the Ping command) and to track the route a packet traverses from a source IP address to a destination IP address (with the Traceroute command).
What is DNS used for?
Most networks require a DNS server so that users can connect to Web sites with URLs instead of IP addresses. When a user enters a URL, such as www.yahoo.com, the DNS server resolves the name to an IP address. The DNS server might be internal to the company, or each computer might be configured to point to the IP address of a DNS server that’s serviced by the company’s ISP.
What steps are involved in TCP’s “three-way handshake”?
Answer:
- Host A sends a TCP packet with the SYN flag set (that is, a SYN packet) to Host B.
- After receiving the packet, Host B sends Host A its own SYN packet with an ACK flag (a SYN-ACK packet) set.
- In response to the SYN-ACK packet from Host B, Host A sends Host B a TCP packet with the ACK flag set (an ACK packet).
A hex number is written with two characters, each representing a byte.
False
An octal digit can be represented with only three bits because the largest digit in octal is seven.
True
Based on the starting decimal number of the ____ byte, you can classify IP addresses as Class A, Class B, or Class C.
first
What is the main protocol for transmitting e-mail messages across the Internet
SMTP
What is the primary protocol used to communicate over the World Wide Web?
HTTP
What allows allows different operating systems to transfer files between one another
FTP
What is primarily used to monitor devices on a network, such as remotely monitoring a router’s state?
SNMP
What is a TCP header flag used to deliver data directly to an application?
PSH
What enables multiple users to communicate over the Internet in discussion forums?
IRC
What is a TCP header flag that signifies the beginning of a session called?
SYN
What enables a remote user to log on to a server and issue commands?
SSH
What is a TCP header flag that is used to signify urgent data called?
URG
In a(n) ____, the tester does more than attempt to break in; he or she also analyzes the company’s security policy and procedures and reports any vulnerabilities to management.
security test
____ takes penetration testing to a higher level.
Security testing