TCP/IP Flashcards

1
Q

what does TCP/IP mean

A

Transmission control protocol/internet protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

who designed and developed TCP/IP to ensure and preserve data integrity as well as maintain communications in the event of catastrophic war

A

department of defense (DoD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: TCP/IP network can be a secure, dependable, and resilient one

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

in 1983, TCP/IP replaced the ____ and was authorized as the official means of data transport for anything connecting to ARPAnet

A

Network Control Protocol (NCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does ARPA mean

A

Advanced Research Projects Agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

when did the DoD’s ARPA create TCP/IP

A

1957, in a cold war reaction to the Soviet’s launching of Sputnik

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

in 1983, ARPA was redubbed?

A

DARPA divided into ARPAnet and MILNET until both were finally dissolved in 1990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does BSD mean

A

Berkely Software Distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

basically a condensed version of the OSI model that comprses four instead of seven layers

A

TCP/IP and DoD model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Enumerate the TCP/IP and DoD model

A
  1. Process/Application Layer
  2. Host-to-Host layer or Transport Layer
  3. Internet Layer
  4. Network Access Layer or Link Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The TCP/IP process/application layer encompas what layers in the OSI model

A

Application presentation and session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

defines protocols for node-to-node application communication and controls user-interface specifications

A

Process/Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

parallels the functions of the OSI’s Transport layer, defining protocols for setting up the level of transmission service for applications.

A

Host-to-Host Layer or Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

tackles issues like creating reliable end-to-end communication and ensuring the error-free delivery of data

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

handles packet sequencing and maintains data integrity

A

transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

corresponds to the OSI’s network layer, designating the protocols relating to the logical transmission of packets over the entire network. it takes care of the addresing of hosts by giving them an IP address and handles the routing of packets among multiple networks

A

Internet Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

implements the data exchange between the host and the network

A

network access layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Give examples of application layer protocols

A

telnet, ftp, lpd, snmp, tftp, smtp, nfs, x window, https, dns, apipa, ssh, ntp, dhcp/bootp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

give examples of transport layer protocols

A

TCP and UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Give examples of internet layer protocols

A

ICMP, ARP, RARP, IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Give examples of link layer protocols

A

Ethernet, Fast Ethernet, Token RIng, FDDI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

one of the first internet standards developed in 1969 and is the chameleon of protocols

A

telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or false: telnet allows a user on a remote client machine (telnet client) to access the resources of another machine (telnet server) in order to access a command-lilne interface

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
True or false: a drawback of telnet is that there are no encryption techniques available within the telnet protocol,, so everything must be sent in clear text, including passwords
true
26
sets up a secure session that's similar to telnet over a standard tcp/ip connection and is empoyed for doing things like logging into systems, running programs on remote systems, and moving files from one system to another. it does this while maintaining an encrypted connection
secure shell (ssh) protocol
27
actually lets us transfer files and can accomplish this between any two machines using it
file transfer protocol
28
true or false: ftp isn't just a protocol; it's also a program. operating as a protocol, ftp is used by applications. as a program, it's employed by users to perform file tasks by hand
true
29
allows for access to both directories and files and can accomplish certain types of directory operations, such as relocating into different ones
file transfer protocol (ftp)
30
stripped-down, stock version of FTP, but it's the protocol of choice if you know exactly what you want and where to find it because it's fast and so easy to use
trivial file transfer protocol (tftp)
31
true or false: tftp has no directory-browsing abilities, meaning that it can only send and receive files
true
32
collects and manipulates valuable network information. it gathers data by polling the devices on the network from a network management station (nms) at fixed or random intervals, requiring them to disclose certain information, or even ask for certain information from the device
simple network management protocol (snmp)
33
true or false: in snmp, network devices can inform the nms station about problems as they occur so the network administrator is alerted
true
34
in snmp, it is a report delimiting the operational traits of a healthy network
a baseline
35
network watchdogs in snmp are called
agents
36
when aberrations occur, agents send an alert called a ___ to the management station
trap
37
used to manage communications between web browsers and web servers and opens the right resource when you click a link, wherever that resource may actually reside
hypertext transfer protocol (http)
38
http is also known as
secure hypertext transfer protocol
39
what protocol uses secure socket layers (SSL)
https
40
what became the de facto standard for securing web communication
https
41
a secure version of HTTP that arms you with a whole bunch of security tools for keeping transactions between a web browser and a server secure
https
42
used to synchronize the clocks on our computers to one standard time source (an atomic clock)
network time protocol (ntp)
43
ntp was created by ____ of the university of delaware
professor david mills
44
works by synchronizing devices to ensure that all computers on a given network agreen on the time
network time protocol (ntp)_
45
resolves hostnames-specifically, internet names allows the use a domain name to specify an ip address
domain name service (dns)
46
true or false: you can change ip address as often as you want and no one will know the difference
true
47
assigns ip addresses to hosts. it allows for easier administration and works well in small to very large network environments
dynamic host configuration protocol (dhcp)
48
assigns an ip address to a host but the host's hardware address must be entered manually in a bootp table also used to send an operating system that a host can boot from
bootp
49
enumerate what the dhcp server can provide:
- ip address - subnet mask - domain name - default gateway (routers) - dns server address - wins server address
50
dhcp is connectionless, which means it uses ____ at the transport layer
user datagram protocol
51
enumerate the four-step process a client takes to receive an ip address from a dhcp server
1. the dhcp client broadcasts a dhcp discover message looking for a dhcp server (port 67) 2. the dhcp server that received the dhcp discover message message sends a layer 2 unicast dhcp offer message back to the host 3. the client then broadcasts to the server a dhcp request message asking for the offered ip address and possibly other information 4. the server finalizes the exchange with a unicast dhcp acknowledgement message
52
when does a dhcp address conflict occur
when two hosts use the same IP address
53
dhcp server checks for conflicts using the ___ program to test the availability of the address before it's assigned from the pool. if no host replies, then the dhcp server assumes that the ip address is not already allocated
ping
54
a host uses something called a _____ to help avoid a possible duplicate address. the dhcp client sends an arp broadcast out on the local LAN or VLAN using its newly assigned address to solve conflicts before they occur
gratuitous ARP
55
with this, clients can automatically self-configure an ip address and subnet mask-basic IP information that hosts use to communicate- when a dhcp server isn't available.
Automatic Private IP addressing
56
the ip address range for apipa is ____. the client also configures itself with a default class b subnet mask of 255.255.255.0
169.254.0.1 through 169.254.255.254
57
the main purpose of the _____ is to shield the upper layer applications from the complexities of the network
hos-to-host layer or transport layer
58
what are the two protocols at the transport layer
transmission control protocol (tcp) and user datagram protocol (udp)
59
enumerate the process of transmission control protocol (TCP)
takes large blocks of information from an application and breaks them into segments numbers and sequences each segment so that the destination's TCP stack can put the segments back into the order the application intended after these segments are sent on the transmitting host, tcp waits for an acknowledgement of the receiving end's tcp virtual circuit session, retransmitting any segments that aren't acknowledged
60
basically the scaled-down economy model of TCP
User Datagram Protocol
61
true or false: udp doesn't require much bandwidth on a network
true
62
what are the key features of tcp
sequenced, reliable, connection-oriented, virtual circuit, acknowledgements, windowing flow control
63
what are the key features of UDP
unsequenced, unreliable, connectionless, low overhead, no acknowledgement, no windowing or flow control of any type
64
these are what keep track of different conversations crossing the network simultaneously
port numbers
65
what port numbers does tcp use to communicate to the application layer
21 - ftp 23 - telnet 110 - pop3 53 - dns
66
what port numbers does udp use when communciating with the application layer
53 - dns 69 - tftp 67 - bootps
67
key protocols that use tcp
telnet 23 smtp 25 http 80 ftp 20, 21 dns 53 https 443 ssh 22 pop3 110 imap4 143
68
key protocols that use udp
snmp 161 tftp 69 dns 53 bootps/dhcp 67 ntp 123
69
true or false: the internet layer's second duty is to provide a single network interface to the upper layer protocols
true
70
this is essentially the internet layer
internet protocol (ip)
71
true or false: all the machines on the network have a software, or logical,, address called an ip adddress
true
72
works at the network layer and is used by ip for many different services; basically a management protocol and messaging service provider for ip. its messages are carried as ip datagrams
internet control message protocol (icmp)
73
this gives hosts extended capability in discoverinig routes to gateways
rfc 1256 annex
74
give 2 characteristics of icmp packets
they can provide hosts with information about network problems they are encapsulated within ip datagrams
75
this finds the hardware address of a host from a known IP address
address resolution protocol (arp)
76
a numeric identifier assigned to each machine on an IP network. it designates the specific location of a device on the network
ip address
77
true or false: an ip address is a software address not a hardware address
true
78
hard-coded on a network interface card (NIC) and used for finding hosts on a local network
hardware address
79
this was designed to allow hosts on one network to communicate with a host on a different network regardless of the type of LANs the hosts are participating in
IP addressing
80
one digit, either 1 or 0
bit
81
7 or 8 bits
byte
82
made up of 8 bits
octet
83
the designation used in routing to send packets to a remote network
network address
84
address used by applications and hosts to send information to al nodes on a network
broadcast address
85
how many bits are in an ip address
32 bits
86
an octet is also called a
byte
87
the network address can also be called
networ number
88
true or false: every machine on the same network shares that network address as part of its IP address
true
89
assigned to, and uniquely identifies, each machine on a network. this part of the address must be unique because it identifies a particular machine as opposed to a network, which is a group
node address
90
node address can also be referred to as
host address
91
enumerate the range of each class
class a: 0-127 class b: 128-191 class c: 192 - 223 class d: 224-239 class 3: 240-255
92
what network address is reserved for loopback tests
127.0.0.1
93
enumerate reserved addresses
network address of all 0s network address of all 1s network 127.0.0.1 node address of all 0s node address of all 1s entire ip address set to all 0s entire ip address set to all 1s
94
numbers between the network address and the broadcast address
valid hosts
95
private ip addresses are also called
rfc 1918
96
can be used on a private network but are not routable through the internet. designed for the purpose of creating a measure of well-needed security, but it also conveniently saves valuable ip address space
private ip address
97
this takes a private IP address and converts it for use on the internet
Network Address Translation (NAT)
98
used to test the ip stack on the local computer
loopback
99
loopback or localhost can be any address from
127.0.0.1 to 127.255.255.254
100
what are the different ipv4 address types
loopback layer 2 broadcasts layer 3 broadcasts unicast multicast
101
sent to all nodes on a LAN
layer 2 broadcasts
102
sent to all nodes on the network
layer 3 broadcasts
103
an address for a single interface, and these are used to send packets to a single destination host
unicast
104
packets sent from a single source and transmitted to many devices on different networks; referred to as one to many
multicast
105
also known as hardware broadcasts that go out on a LAn but don't go past the LAN boundary; the broadcast would be all1s in binary,, which would be all fs in hexadecimal
layer 2 broadcasts
106
how many bytes does a typical hardware address have
6 bytes (48 bits)
107
broadcast messages are meant to reach all hosts on a broadcast domain; these are the network broadcasts that have all host bits on
layer 3 broadcasts
108
defined as a single ip address assigned to a network interface card and is the deestination ip address in a packet; used for directing packets to a specific host
unicast
109
enables multiple recipients to receive messages without flooding the messages to all hosts on a broadcast domain
multicast