SLR22 TCPIP and protocols Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Transmission Control Protocol/Internet Protocol stack

A

“The most common general-purpose standard protocol that allows any networked computers (including those on the internet) to communicate with each other whatever their equipment.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application layer

A

“Contains the communications protocols and interface methods used in process-to-process communications across an Internet Protocol (IP) computer network.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Transport layer

A

“Contains the host-to-host communication service protocols for applications.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network layer

A

“Contains the protocols responsible for packet forwarding including routing through intermediate routers.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Link layer

A

“Contains the protocols which move packets between the Internet layer interfaces of two different hosts on the same link. The lowest component layer of the Internet protocols, as TCP/IP is designed to be hardware independent. As a result, TCP/IP may be implemented on top of virtually any hardware networking technology.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Media Access Control

A

“A unique identifier assigned to network interfaces for communications at the data link layer of a network segment. MAC addresses are used as a network address for most network technologies, including Ethernet and Wi-Fi.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

File Transfer Protocol

A

“A standard network protocol used for the transfer of computer files between a client and server on a computer network.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hypertext Transfer Protocol

A

“The foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hypertext Transfer Protocol Secure

A

“The use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under regular HTTP application layering. HTTPS encrypts and decrypts user page requests as well as the pages that are returned by the web server.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Post Office Protocol 3

A

“The most recent version of a standard protocol for receiving email. POP3 is a client/server protocol in which email is received and held for you by your internet server.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Simple Mail Transfer Protocol

A

“An internet standard for electronic mail (email) transmission.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSH

A

Secure Shell: “A network protocol that provides administrators with a secure way to access a remote computer. SSH also refers to the suite of utilities that implement the protocol.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Email server

A

“A computer system that sends and receives email. Mail servers send and receive email using standard email protocols. For example, the SMTP protocol sends messages and handles outgoing mail requests.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Web server

A

“A program that uses HTTP (Hypertext Transfer Protocol) to serve the files that form Web pages to users, in response to their requests, which are forwarded by their computers’ HTTP clients. Dedicated computers and appliances may be referred to as web servers as well.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Subnets

A

“An identifiably separate part of an organisation’s network. Typically, a subnet may represent all the machines at one geographic location, in one building, or on the same local area network (LAN).”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Subnet mask

A

“A number that defines a range of IP addresses that can be used in a network.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IPv4

A

“The fourth revision of the IP and a widely used protocol in data communication over different kinds of networks.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IPv6

A

“Most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Dynamic Host Configuration Protocol

A

“A network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Network Address Translation

A

“A method of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Port forwarding

A

“The application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

WebSocket

A

“A computer communications protocol, providing full-duplex communication channels over a single TCP connection. The WebSocket protocol enables interaction between a browser and a web server with lower overheads, facilitating real-time data transfer from and to the server.”

23
Q

Create, Retrieve, Update, Delete

A

“Refers to the four major functions implemented in database applications.”

24
Q

JavaScript Object Notation

A

“A lightweight data-interchange format. It is easy for humans to read and write. It is easy for machines to parse and generate.”

25
Q

XML

A

“A metalanguage which allows users to define their own customised mark-up languages, especially to display documents on the internet.”

26
Q

Thin-client computing

A

“A lightweight computer that is purpose-built for remoting into a server (typically cloud or desktop virtualisation environments). It depends heavily on another computer (its server) to fulfil its computational roles.”

27
Q

Thick-client computing

A

“A computer (client) in client-server architecture or networks that typically provides rich functionality independent of the central server.”

28
Q

“The most common general-purpose standard protocol that allows any networked computers (including those on the internet) to communicate with each other whatever their equipment.”

A

Transmission Control Protocol/Internet Protocol stack

29
Q

“Contains the communications protocols and interface methods used in process-to-process communications across an Internet Protocol (IP) computer network.”

A

Application layer

30
Q

“Contains the host-to-host communication service protocols for applications.”

A

Transport layer

31
Q

“Contains the protocols responsible for packet forwarding including routing through intermediate routers.”

A

Network layer

32
Q

“Contains the protocols which move packets between the Internet layer interfaces of two different hosts on the same link. The lowest component layer of the Internet protocols, as TCP/IP is designed to be hardware independent. As a result, TCP/IP may be implemented on top of virtually any hardware networking technology.”

A

Link layer

33
Q

“A unique identifier assigned to network interfaces for communications at the data link layer of a network segment. MAC addresses are used as a network address for most network technologies, including Ethernet and Wi-Fi.”

A

Media Access Control

34
Q

“A standard network protocol used for the transfer of computer files between a client and server on a computer network.”

A

File Transfer Protocol

35
Q

“The foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text.”

A

Hypertext Transfer Protocol

36
Q

“The use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under regular HTTP application layering. HTTPS encrypts and decrypts user page requests as well as the pages that are returned by the web server.”

A

Hypertext Transfer Protocol Secure

37
Q

“The most recent version of a standard protocol for receiving email. POP3 is a client/server protocol in which email is received and held for you by your internet server.”

A

Post Office Protocol 3

38
Q

“An internet standard for electronic mail (email) transmission.”

A

Simple Mail Transfer Protocol

39
Q

Secure Shell: “A network protocol that provides administrators with a secure way to access a remote computer. SSH also refers to the suite of utilities that implement the protocol.”

A

SSH

40
Q

“A computer system that sends and receives email. Mail servers send and receive email using standard email protocols. For example, the SMTP protocol sends messages and handles outgoing mail requests.”

A

Email server

41
Q

“A program that uses HTTP (Hypertext Transfer Protocol) to serve the files that form Web pages to users, in response to their requests, which are forwarded by their computers’ HTTP clients. Dedicated computers and appliances may be referred to as web servers as well.”

A

Web server

42
Q

“An identifiably separate part of an organisation’s network. Typically, a subnet may represent all the machines at one geographic location, in one building, or on the same local area network (LAN).”

A

Subnets

43
Q

“A number that defines a range of IP addresses that can be used in a network.”

A

Subnet mask

44
Q

“The fourth revision of the IP and a widely used protocol in data communication over different kinds of networks.”

A

IPv4

45
Q

“Most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet.”

A

IPv6

46
Q

“A network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network.”

A

Dynamic Host Configuration Protocol

47
Q

“A method of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device.”

A

Network Address Translation

48
Q

“The application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.”

A

Port forwarding

49
Q

“A computer communications protocol, providing full-duplex communication channels over a single TCP connection. The WebSocket protocol enables interaction between a browser and a web server with lower overheads, facilitating real-time data transfer from and to the server.”

A

WebSocket

50
Q

“Refers to the four major functions implemented in database applications.”

A

Create, Retrieve, Update, Delete

51
Q

“A lightweight data-interchange format. It is easy for humans to read and write. It is easy for machines to parse and generate.”

A

JavaScript Object Notation

52
Q

“A metalanguage which allows users to define their own customised mark-up languages, especially to display documents on the internet.”

A

XML

53
Q

“A lightweight computer that is purpose-built for remoting into a server (typically cloud or desktop virtualisation environments). It depends heavily on another computer (its server) to fulfil its computational roles.”

A

Thin-client computing

54
Q

“A computer (client) in client-server architecture or networks that typically provides rich functionality independent of the central server.”

A

Thick-client computing