TCP/IP Services 7 Flashcards

0
Q

What is static IP address assignment

A

Each node has its IP address entered manually by an administrator. If the node moves it must be manually reconfigured.
Time consuming and prone to errors. Only assigned to systems with a dedicated functionality such as routers, printers or servers that host applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Name the two ways to assign IP address

A

Static and dynamic IP addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can IP addresses be assigned dynamically

A

By using the DHCP service Dynamic Host Configuration Protocol to automatically assign IP addresses.
A DHCP server enables the scope, the range of IP addresses a subnet mask and the lease period, it automatically leases TCP/IP info to DHCP clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List the 4 categories of options for DHCP

A

Global options
Scope options
Class options
Reserved client options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are DHCP reservations

A

Are lease assignments in DHCP that allow permanent IP address configuration. If case of network changes the IP address received the change when the lease is renewed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Steps in the DHCP Lease process

A
Node comes online
DHCP discovery
DHCP offer
DHCP request
DHCP ACK
unused DHCP offers expire
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is BOOTP

A

A UDP network protocol. Servers assign IP address from a pool of available address to diskless workstation (devices with no storage) computers to obtain an IP address prior to loading an advanced operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is DHCP relay agent

A

A service that captures BOOTP broadcast and forwards it through the router as a unicast transmission to the DHCP server on another subnet. Used if there is no DHCP server on the subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is APIPA

A

automatic private IP addressing
A service that enables a DHCP Client computer to configure itself automatically with an IP address in the range of 169.254.0.1 to 169.254.255.254
Not routable. Cannot communicate outside of the local subnet. Can initialize TCP/IP and communicate on the local subnet in the absence of an active DHCP Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ipconfig used for

A

Entered into the command prompt to display connection specific DNS suffix, IP address, subnet mask and default gateway information.
Use ipconfig /all for additional information about IP configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ipconfig options for DHCP

A

Ipconfig /release to force release of IP address used by client

Ipconfig /renew requests renewal of an IP address for a client

The system first attempts to obtain a DHCP address and if a DHCP server fails to respond it will switch to APIPA addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ping command is used for

A

Verifying the network connectivity of a computer. Also checks if the target system is active. Verifies the IP address, host name, and reach ability of the remote system. Uses ICMP to check the connections and listens for reply packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the ping options

A

You can ping a computer or IP address.
The loop back address of 127.0.0.1 to test if TCP/IP has initialized on individual systems.
Other options enter ping /? at command prompt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

By default packet size are

A

32 bytes

To change packet size use -1 followed by packet length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is TTL

A

Time to live. A value that determines how many hops an IP packet can travel before being discarded
Ping target -i TTL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Default packet count is

A

Four packets
Specify a night number with the -n option
Ping target -n packet count

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ping blocking

A

A security measure used to block incoming packets generated by the ping command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In TCP and UDP networks a port is

A

The endpoint of a logical connection. All are assigned a number ranging from 0 to 65535.
Three blocks of numbers. Well known, registered, dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe the three blocks of ports

A

Well known ports range from 0 to 1023
assigned for used by common service

Registered ports range from 1024 to 49151
For software makers use

Dynamic or private ports range for. 49152 to 65535
Used by unregistered services needing a temporary connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TCP Port 7

& UDP

A

Ping runs on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TCP Port 20

A

FTP default data runs on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TCP Port 21

A

FTP control runs on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

TCP Port 22

& UDP

A

SSH runs on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TCP Port 23

& UDP

A

Telnet runs on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TCP Port 25

A

SMTP runs on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

TCP Port 53

& UDP

A

DNS runs on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

TCP Port 67

& UDP

A

DHCP BOOTP server runs on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

TCP Port 68

& UDP

A

DHCP BOOTP client runs on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

TCP Port 80

A

HTTP runs on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

TCP Port 110

A

POP3 runs on

30
Q

TCP Port 137

& UDP

A

NetBIOS naming service runs on

31
Q

TCP Port 143

& UDP

A

IMAP runs on

32
Q

TCP Port 194

A

IRC Internet relay chat runs on

33
Q

TCP Port 389

& UDP

A

LDAP runs on

34
Q

TCP Port 443

A

HTTPS runs on

35
Q

TCP Port 3389

& UDP

A

RDP runs on

36
Q

UDP Port 69

A

TFTP runs on

37
Q

UDP Port 123

A

NTP runs on

38
Q

UDP Port 161

A

SNMP runs on

39
Q

What is a socket

A

A communication endpoint in an IP Based network. A socket links an IP address with the port number of a service. Help in delivering data packets to the appropriate application process running in the target node. The address is a combination of the protocol, IP address and port number.

40
Q

{tcp, 193.44.234.3, 53} is an example of

A

An IP Address socket

41
Q

What is a host name

A

A unique name given to a node on a TCP/IP network. A host name combined with the hosts domain name forms the nodes FQDN fully qualified domain name

42
Q

FQDNs are

A

The hostname.domainname
Max length is 255. Each dot section can be up to 63 characters long. A network node can have more than one host name assigned to it. It’s primary name is the nose name the other names are called canonical names or aliases.

43
Q

A domain is

A

A grouping of computers in the Internet based on the nature of their operations
Identified by their unique names; com,gov,edu

44
Q

What is a domain name

A

A unique name that identifies an entity on the Internet. Also known as site names. Usually registers by organization as their website address

45
Q

What is DNS

A

Domain name system
A TCP/IP name resolution service that translates FQDNs into IP addresses. Servers store, maintain, update databases. Responds to DNA client name resolution requests to translate host names into IP addresses.

46
Q

Name the types of DNS records

A
Address A IPv4
IPv6 address AAAA
canonical name CNAME
Mail exchange MX
Name server NS
pointer PTR
start of authority SOA
service locator SRV
47
Q

What is an ANS

A

Authoritative Name Sever

Responds to name related queries in one or more zones in DNS. ITs function is to delegate to other DNS servers

48
Q

The DNS hierarchy

A

Allows DNS servers on the Internet to use minimum number of queries to locate the source of a domain name.

49
Q

Name the steps in the DNS name resolution process

A

Client requests DNS name resolution
Checks DNS Cache database
Root name server reads top level domain of that name
DNS server contacts top level domain server
If top level domain cannot resolve IP address sent to second level DNS server
Reaches level where DNS server can resolve the host name
The preferred DNS server provides the client with the IP address of the target host

50
Q

Name the two kinds of DNS queries

A

Recursive query where the Client requests that its preferred DNS server find data on other DNS servers. If preferred server cannot resolve the na,e it sends a request to another DNS server

Iterative query when the client requests only the information a server already has in its cache for a particular domain name. If cannot resolve the request it notifies the client but doesn’t forward the request to any other server

51
Q

What is the HOSTS file

A

A plaintext file configured on a client machine containing a list of IP addresses and their associates host names. Provides an alternative method for host name resolution. Mostly used for trouble shooting

52
Q

What is the purpose of TCP/IP commands

A

Help to ensure smooth connectivity in TCP/IP network. Allows you to gather information about how the systems are communicating

53
Q

The tracers command

A

Determines the route data takes to get to a particular destination. ICMP protocol sends out time exceeded messages to each router to trace the route.

54
Q

The pathping command

A

Provides information about latency and packet loss on a network. Combines the functionality of the ping and tracert commands.
Can be used to isolate a router or subnet with issues. Displays the degree if packet loss at any given router or link

55
Q

What is the MTR utility

A

The my trace route utility combines ping and traceroute into a single function
Used on UNIX based systems

56
Q

What is FTP

A

File transfer protocol
A TCP/IP that enables the file transfer of files between a users workstation and a remote host. The FTP daemon or service must be running in the remote host. Commands must be entered in lowercase. Works on the application layer of OSI and TCP/IP models
Works on two TCP channels. Port 20 for data transfer and port 21 for control commands.

57
Q

What is NTP

A

Network time protocol
IP the synchronizes the clock times of computers in a network by exchanging time signals. Works on the application layer of both models.

58
Q

What is SMTP

A

Simple mail transfer protocol
A communication protocol used to format and send email messages from a client to a server. Uses a store and forward process.

59
Q

What is POP3

A

A protocol used to retrieve email messages from a mailbox server. Email messages wait in the mailbox on the server until the client retrieves them.

60
Q

What is IMAP4

A

Internet message access protocol version 4. Used for retrieving messages from a mail server. More powerful than POP3.
Can check email header and specific string of characters before downloading
Messages can remain in the server while the client works with them
Can search through messages by keywords
Can access folders other than the inbox

61
Q

What is NNTP

A

Network news transfer protocol
Used to post and retrieve messages from USENET
RSS feeds based in this

62
Q

HTTP is

A

Hypertext Transfer Protocol
Works on the application layer of both models
Enables clients to interact with websites by allowing them to connect to and retrieve web pages from a server.
Insecure
Uses port 80

63
Q

HTTPS is

A

Hypertext transfer protocol secure
Secure version of HTTP
Provides a secure connection between a web browser and a server. Uses the secure socket layer SSL to encrypt data.
Uses port 443

64
Q

What are TCP/IP interoperability services

A

Services that run in TCP/IP To create a network where dissimilar systems can securely communicate and share resources.

65
Q

What is the NFS

A

Network File System
A client/server application that enables users to access shared files stored in differs types of computers and work with the files as if they were stored locally.
Part of the TCP/IP suite and works on the application layer of the OSI model

66
Q

What is the SSH

A

Secure Shell is a program that enables a user to log on to another computer over a network, execute commands, and manage files. Creates a shell or session with a remote system and offers strong authentication methods and ensures that communication are secure over insecure channels

67
Q

Describe the two versions of secure shell

A

SSH1 authenticates systems using keys to identify users, host keys to identify systems, session keys to encrypt communication in a single session and server keys the protect the session keys.

SSH2 is more secure. Doesn’t use server keys. Includes a secure replacement for FTP called SFTP secure file transfers protocol.

68
Q

What is SCP

A

Secure Copy Protocol uses SSH to copy files securely between a local and a remote host or between two remote hosts.

69
Q

What is telnet

A

Telecommunications Network
A terminal emulation protocol that allows users at one site to simulate a session on a remote host as it the terminal were directly attached.
Not secure.

70
Q

What is SMB

A

server message block
is a protocol that works on the application layer and helps share resources such as files, printers and serial ports among computers.
Used in samba, an open source product, to enable UNIX and windows machines for sharing directories and files

71
Q

What is LDAP

A

Lightweight directory access protocol
Defines how a client can access information, perform operations, and share directory data on a server. Designed for use over TCP/IP networks and the Internet in particular

72
Q

What is zeroconf

A

Zero configuration networking. A set of standards that provides for automatic configuration and IP address allocation on both ethernet and wireless networks. Can exist without central control or configuration services such as DHCP or DNS.
typically uses MAC addresses as parameters because they are unique and available on most network devices.

73
Q

Networks implementing Zeroconf must include methods for four functions

A

Network layer address assignment
Automatic address assignment using multicast
Translation between network names and network addresses
Location or discovery of network services by name and protocol