TCP/IP Flashcards

1
Q

The __________ suite was designed and implemented by the Department of Defense (DoD) to ensure and preserve data integrity as well as maintain communications in the event of catastrophic war.

A

Transmission Control Protocol/Internet Protocol (TCP/IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is DoD?

A

Department of Defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False:
TCP/IP network can be a secure, dependable and resilient one.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP first came on the scene way back in 1973, and in 1978, it was divided into two distinct protocols: ____and ____.

A

TCP and IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Later, in 1983, TCP/IP replaced the ______ and was authorized as the official means of data transport for anything connecting to ARPAnet, the Internet’s ancestor.

A

Network Control Protocol (NCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The DoD’s_____ created this ancient network way back in 1957 in a cold war reaction to the Soviet’s launching of Sputnik.

A

Advanced Research Projects Agency (ARPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In 1983, ARPA was redubbed DARPA and divided into _____ and _____ until both were finally dissolved in 1990.

A

ARPAnet and MILNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It may be counterintuitive, but most of the development work on TCP/IP happened at UC Berkeley in Northern California, where a group of scientists were simultaneously working on the Berkeley version of UNIX, which soon became known as the _____ series of UNIX versions.

A

Berkeley Software Distribution (BSD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______ bundled with TCP/ IP began as shareware in the world of academia. As a result, it became the foundation for the tremendous success and unprecedented growth of today’s Internet as well as smaller, private and corporate intranets.

A

BSD Unix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

________ —that sealed its popularity because this quality guarantees a solid connection between myriad hardware and software platforms with no strings attached.

A

TCP/IP family of protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The DoD model is basically a condensed version of the OSI model that comprises four instead of seven layers:

A
  1. Process/Application layer
  2. Host-to-Host layer or Transport layer
  3. Internet layer
  4. Network Access layer or Link layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

______ defines protocols for node-to-node application communication and controls user-interface specifications.

A

Process/Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_______ parallels the functions of the OSI’s Transport layer, defining protocols for setting up the level of transmission service for applications.

A

The Host-to-Host layer or Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It tackles issues like creating reliable end-to-end communication and ensuring the error-free delivery of data. It handles packet sequencing and maintains data integrity.

A

The Host-to-Host layer or Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The _______ corresponds to the OSI’s Network layer, designating the protocols relating to the logical transmission of packets over the entire network.

A

Internet layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It takes care of the addressing of hosts by giving them an IP (Internet Protocol) address and handles the routing of packets among multiple networks.

A

Internet layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The _______ or Link layer implements the data exchange between the host and the network.

A

Network Access layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It was one of the first Internet standards, developed in 1969, and is the chameleon of protocols—its specialty is terminal emulation.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

It allows a user on a remote client machine, called the ______ client, to access the resources of another machine, the Telnet server, in order to access a command-line interface.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_____ achieves this by pulling a fast one on the Telnet server and making the client machine appear as though it were a terminal directly attached to the local network. This projection is actually a software image—a virtual terminal that can interact with the chosen remote host.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A drawback is that there are no encryption techniques available within the _____ protocol, so everything must be sent in clear text, including passwords!

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

_______ sets up a secure session that’s similar to Telnet over a standard TCP/IP connection and is employed for doing things like logging into systems, running programs on remote systems, and moving files from one system to another. And it does all of this while maintaining an encrypted connection.

A

Secure Shell (SSH) protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

______ actually lets us transfer files, and it can accomplish this between any two machines using it.

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

_____ isn’t just a protocol; it’s also a program. Operating as a protocol, it is used by applications. As a program, it’s employed by users to perform file tasks by hand.

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
_____ also allows for access to both directories and files and can accomplish certain types of directory operations, such as relocating into different ones
File Transfer Protocol (FTP)
26
______ is the stripped-down, stock version of FTP, but it’s the protocol of choice if you know exactly what you want and where to find it because it’s fast and so easy to use!
Trivial File Transfer Protocol (TFTP)
27
It doesn’t offer the abundance of functions that FTP does because it has no directory-browsing abilities, meaning that it can only send and receive files
Trivial File Transfer Protocol (TFTP)
28
______ collects and manipulates valuable network information
Simple Network Management Protocol (SNMP)
29
It gathers data by polling the devices on the network from a network management station (NMS) at fixed or random intervals, requiring them to disclose certain information, or even asking for certain information from the device.
Simple Network Management Protocol (SNMP)
30
Network devices can inform the _____ station about problems as they occur so the network administrator is alerted.
NMS; Simple Network Management Protocol (SNMP)
31
______ receives something called a baseline—a report delimiting the operational traits of a healthy network.
Simple Network Management Protocol (SNMP)
32
This protocol can also stand as a watchdog over the network, quickly notifying managers of any sudden turn of events. These network watchdogs are called _______, and when aberrations occur, agents send an alert called a ______ to the management station.
agents; trap
33
It’s used to manage communications between web browsers and web servers and opens the right resource when you click a link, wherever that resource may actually reside.
Hypertext Transfer Protocol (HTTP)
34
______ is also known as Secure Hypertext Transfer Protocol.
Hypertext Transfer Protocol Secure (HTTPS)
35
It uses _____. It referred to as ______ or S-HTTP, which were slightly different protocols, but since Microsoft supported HTTPS, it became the de facto standard for securing web communication.
Secure Sockets Layer (SSL); SHTTP under Hypertext Transfer Protocol Secure (HTTPS)
36
It’s a secure version of HTTP that arms you with a whole bunch of security tools for keeping transactions between a web browser and a server secure.
Hypertext Transfer Protocol Secure (HTTPS)
37
38
Professor David Mills of the University of Delaware for coming up with this handy protocol that’s used to synchronize the clocks on our computers to one standard time source (typically, an atomic clock).
Network Time Protocol (NTP)
39
It works by synchronizing devices to ensure that all computers on a given network agree on the time
Network Time Protocol (NTP)
40
It resolves hostnames—specifically, Internet names.
Domain Name Service (DNS)
41
It allows to use a domain name to specify an IP address. You can change the IP address as often as you want and no one will know the difference.
Domain Name Service (DNS)
42
_______ assigns IP addresses to hosts. It allows for easier administration and works well in small to very large network environments.
Dynamic Host Configuration Protocol (DHCP)
43
______ assigns an IP address to a host but the host’s hardware address must be entered manually in a BootP table.
BootP
44
It is also used to send an operating system that a host can boot from.
BootP
45
DHCP server can provide:
- IP address - Subnet mask - Domain name - Default gateway (routers) - DNS server address - WINS server address
46
Dynamic Host Configuration Protocol (DHCP) is connectionless, which means it uses _______ at the Transport layer, also known as the Host-to-Host layer
User Datagram Protocol (UDP)
47
This is the four-step process a client takes to receive an IP address from a DHCP server:
1. The DHCP client broadcasts a DHCP Discover message looking for a DHCP server (Port 67). 2. The DHCP server that received the DHCP Discover message sends a layer 2 unicast DHCP Offer message back to the host. 3. The client then broadcasts to the server a DHCP Request message asking for the offered IP address and possibly other information. 4. The server finalizes the exchange with a unicast DHCP Acknowledgment message.
48
A _____ address conflict occurs when two hosts use the same IP address.
DHCP
49
______ checks for conflicts using the Ping program to test the availability of the address before it’s assigned from the pool. If no host replies, then the it assumes that the IP address is not already allocated.
DHCP server
50
A host uses something called a ______ to help avoid a possible duplicate address.
gratuitous ARP
51
True or False: The DHCP client sends an ARP broadcast out on the local LAN or VLAN using its newly assigned address to solve conflicts before they occur.
True
52
Windows operating systems provide a feature called _______.
Automatic Private IP Addressing (APIPA)
53
True or False: With APIPA, clients can automatically self-configure an IP address and subnet mask—basic IP information that hosts use to communicate—when a DHCP server isn’t available.
True
54
The IP address range for APIPA is ______ through 169.254.255.254. The client also configures itself with a default Class B subnet mask of 255.255.0.0.
169.254.0.1
55
The main purpose of the ________ is to shield the upper-layer applications from the complexities of the network.
Host-to-Host layer; The Host-to-Host or Transport Layer Protocols
56
Two Protocols At the The Host-to-Host or Transport Layer Protocols:
1. Transmission Control Protocol (TCP) 2. User Datagram Protocol (UDP)
57
______ takes large blocks of information from an application and breaks them into segments.
Transmission Control Protocol (TCP)
58
It numbers and sequences each segment so that the destination’s TCP stack can put the segments back into the order the application intended.
Transmission Control Protocol (TCP)
59
True or False: After these segments are sent on the transmitting host, TCP waits for an acknowledgment of the receiving end’s TCP virtual circuit session, retransmitting any segments that aren’t acknowledged.
True
60
________ is basically the scaled-down economy model of TCP, which is why UDP is sometimes referred to as a thin protocol. Like a thin person on a park bench, a thin protocol doesn’t take up a lot of room—or in this case, require much bandwidth on a network.
User Datagram Protocol (UDP)
61
_______ doesn’t offer all the bells and whistles of TCP either, but it does do a fabulous job of transporting information that doesn’t require reliable delivery, using far less network resources.
User Datagram Protocol (UDP)
62
TCP and UDP must use ______ to communicate with the upper layers because these are what keep track of different conversations crossing the network simultaneously.
port numbers
63
True or False: Internet layer has functions relating to routing
True
64
True or False: The Internet layer’s second duty is to provide a single network interface to the upper-layer protocols.
True
65
______ essentially is the Internet layer. The other protocols found here merely exist to support it.
Internet Protocol (IP)
66
holds the big picture and could be said to “see all,” because it’s aware of all the interconnected networks. It can do this because all the machines on the network have a software, or logical, address called an ________
Internet Protocol (IP); IP address
67
______ works at the Network layer and is used by IP for many different services.
Internet Control Message Protocol (ICMP)
68
It is basically a management protocol and messaging service provider for IP. Its messages are carried as IP datagrams.
Internet Control Message Protocol (ICMP)
69
_____ is an annex to ICMP, which gives hosts extended capability in discovering routes to gateways.
RFC 1256
70
ICMP packets have the following characteristics:
They can provide hosts with information about network problems. They are encapsulated within IP datagrams.
71
______ finds the hardware address of a host from a known IP address.
Address Resolution Protocol (ARP)
72
An ______ is a numeric identifier assigned to each machine on an IP network.
IP address
73
It designates the specific location of a device on the network.
IP address
74
An _______ is a software address, not a hardware address—the latter is hard-coded on a network interface card (NIC) and used for finding hosts on a local network.
IP address
75
______ was designed to allow hosts on one network to communicate with a host on a different network regardless of the type of LANs the hosts are participating in.
IP addressing
76
A _____ is one digit, either a 1 or a 0.
Bit
77
A ____ is 7 or 8 bits, depending on whether parity is used.
byte
78
An _______, made up of 8 bits, is just an ordinary 8-bit binary number.
octet
79
This is the designation used in routing to send packets to a remote network—for example, 10.0.0.0, 172.16.0.0, and 192.168.10.0.
Network address
80
The address used by applications and hosts to send information to all nodes on a network is called the ______.
Broadcast address
81
An IP address consists of _______ of information. These bits are divided into four sections, referred to as octets or bytes, with each containing 1 byte (8 bits).
32 bits
82
You can depict an IP address using one of three methods:
Dotted-decimal, as in 172.16.30.56 Binary, as in 10101100.00010000.00011110.00111000 Hexadecimal, as in AC.10.1E.38
83
The _______ (which can also be called the network number) uniquely identifies each network. Every machine on the same network shares that network address as part of its IP address. For example, in the IP address 172.16.30.56, 172.16 is the network address.
network address
84
The node address is assigned to, and uniquely identifies, each machine on a network. This part of the address must be unique because it identifies a particular machine—an individual— as opposed to a network, which is a group. This number can also be referred to as a ______. In the sample IP address 172.16.30.56, the 30.56 specifies the node address.
host address
85
For the small number of networks possessing a very large number of nodes, they created the rank ______ network.
Class A
86
At the other extreme is the _____ network, which is reserved for the numerous networks with a small number of nodes.
Class C
87
The class distinction for networks between very large and very small is predictably called the _____ network. Subdividing an IP address into a network and node address is determined by the class designation of one’s network.
Class B
88
The designers of the IP address scheme decided that the first bit of the first byte in this network address must always be off, or 0. This means a ______ address must be between 0 and 127 in the first byte, inclusive.
Class A
89
True or False: Class A network is defined in the first octet between 0 and 127, and it can’t be less or more. Understand that 0 and 127 are not valid in a Class A network because they’re reserved addresses
True
90
True or False: In a Class B network, the RFCs state that the first bit of the first byte must always be turned on but the second bit must always be turned off. If you turn the other 6 bits all off and then all on, you will find the range for a Class B network: 10000000 = 128 10111111 = 191
True
91
True or False: Class B network is defined when the first byte is configured from 128 to 191.
True
92
True or False: For Class C networks, the RFCs define the first 2 bits of the first octet as always turned on, but the third bit can never be on. Following the same process as the previous classes, convert from binary to decimal to find the range. Here’s the range for a Class C network: 11000000 = 192 11011111 = 223
True
93
An IP address that starts at 192 and goes to 223, it is a Class __ IP address.
Class C
94
______ (224–239) is used for multicast addresses and _____ (240–255) for scientific purposes, but I’m not going into these types of addresses because they are beyond the scope of knowledge you need to gain from this book.
Class D ; Class E
95
These addresses can be used on a private network, but they’re not routable through the Internet. This is designed for the purpose of creating a measure of well-needed security, but it also conveniently saves valuable IP address space.
Private IP Addresses (RFC 1918)
96
True or False: Private IP addresses, ISPs, corporations, and home users only need a relatively tiny group of bona fide IP addresses to connect their networks to the Internet. This is economical because they can use private IP addresses on their inside networks and get along just fine.
True
97
_____, which basically takes a private IP address and converts it for use on the Internet.
Network Address Translation (NAT)
98
Used to test the IP stack on the local computer. Can be any address from 127.0.0.1 through 127.255.255.254
Loopback (localhost)
99
These are sent to all nodes on a LAN.
Layer 2 broadcasts
100
These are sent to all nodes on the network.
Broadcasts (layer 3)
101
This is an address for a single interface, and these are used to send packets to a single destination host.
Unicast
102
These are packets sent from a single source and transmitted to many devices on different networks. Referred to as “one-to-many.”
Multicast
103
layer 2 broadcasts are also known as _______—they only go out on a LAN, but they don’t go past the LAN boundary (router).
hardware broadcasts
104
True or False: There are the plain old broadcast addresses at layer 3. Broadcast messages are meant to reach all hosts on a broadcast domain. These are the network broadcasts that have all host bits on.
True
105
A ______ is defined as a single IP address that’s assigned to a network interface card and is the destination IP address in a packet—in other words, it’s used for directing packets to a specific host.
unicast
106
True or False: Multicast does allow point-to-multipoint communication, which is similar to broadcasts, but it happens in a different manner.
True
107
True or False: Multicast is that it enables multiple recipients to receive messages without flooding the messages to all hosts on a broadcast domain. However, this is not the default behavior—it’s what we can do with multicasting if it’s configured correctly!
True