TCP/IP Services 7 Flashcards

0
Q

What is static IP address assignment

A

Each node has its IP address entered manually by an administrator. If the node moves it must be manually reconfigured.
Time consuming and prone to errors. Only assigned to systems with a dedicated functionality such as routers, printers or servers that host applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Name the two ways to assign IP address

A

Static and dynamic IP addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can IP addresses be assigned dynamically

A

By using the DHCP service Dynamic Host Configuration Protocol to automatically assign IP addresses.
A DHCP server enables the scope, the range of IP addresses a subnet mask and the lease period, it automatically leases TCP/IP info to DHCP clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List the 4 categories of options for DHCP

A

Global options
Scope options
Class options
Reserved client options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are DHCP reservations

A

Are lease assignments in DHCP that allow permanent IP address configuration. If case of network changes the IP address received the change when the lease is renewed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Steps in the DHCP Lease process

A
Node comes online
DHCP discovery
DHCP offer
DHCP request
DHCP ACK
unused DHCP offers expire
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is BOOTP

A

A UDP network protocol. Servers assign IP address from a pool of available address to diskless workstation (devices with no storage) computers to obtain an IP address prior to loading an advanced operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is DHCP relay agent

A

A service that captures BOOTP broadcast and forwards it through the router as a unicast transmission to the DHCP server on another subnet. Used if there is no DHCP server on the subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is APIPA

A

automatic private IP addressing
A service that enables a DHCP Client computer to configure itself automatically with an IP address in the range of 169.254.0.1 to 169.254.255.254
Not routable. Cannot communicate outside of the local subnet. Can initialize TCP/IP and communicate on the local subnet in the absence of an active DHCP Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ipconfig used for

A

Entered into the command prompt to display connection specific DNS suffix, IP address, subnet mask and default gateway information.
Use ipconfig /all for additional information about IP configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ipconfig options for DHCP

A

Ipconfig /release to force release of IP address used by client

Ipconfig /renew requests renewal of an IP address for a client

The system first attempts to obtain a DHCP address and if a DHCP server fails to respond it will switch to APIPA addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ping command is used for

A

Verifying the network connectivity of a computer. Also checks if the target system is active. Verifies the IP address, host name, and reach ability of the remote system. Uses ICMP to check the connections and listens for reply packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the ping options

A

You can ping a computer or IP address.
The loop back address of 127.0.0.1 to test if TCP/IP has initialized on individual systems.
Other options enter ping /? at command prompt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

By default packet size are

A

32 bytes

To change packet size use -1 followed by packet length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is TTL

A

Time to live. A value that determines how many hops an IP packet can travel before being discarded
Ping target -i TTL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Default packet count is

A

Four packets
Specify a night number with the -n option
Ping target -n packet count

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ping blocking

A

A security measure used to block incoming packets generated by the ping command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In TCP and UDP networks a port is

A

The endpoint of a logical connection. All are assigned a number ranging from 0 to 65535.
Three blocks of numbers. Well known, registered, dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe the three blocks of ports

A

Well known ports range from 0 to 1023
assigned for used by common service

Registered ports range from 1024 to 49151
For software makers use

Dynamic or private ports range for. 49152 to 65535
Used by unregistered services needing a temporary connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TCP Port 7

& UDP

A

Ping runs on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TCP Port 20

A

FTP default data runs on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TCP Port 21

A

FTP control runs on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

TCP Port 22

& UDP

A

SSH runs on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TCP Port 23

& UDP

A

Telnet runs on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
TCP Port 25
SMTP runs on
25
TCP Port 53 | & UDP
DNS runs on
26
TCP Port 67 | & UDP
DHCP BOOTP server runs on
27
TCP Port 68 | & UDP
DHCP BOOTP client runs on
28
TCP Port 80
HTTP runs on
29
TCP Port 110
POP3 runs on
30
TCP Port 137 | & UDP
NetBIOS naming service runs on
31
TCP Port 143 | & UDP
IMAP runs on
32
TCP Port 194
IRC Internet relay chat runs on
33
TCP Port 389 | & UDP
LDAP runs on
34
TCP Port 443
HTTPS runs on
35
TCP Port 3389 | & UDP
RDP runs on
36
UDP Port 69
TFTP runs on
37
UDP Port 123
NTP runs on
38
UDP Port 161
SNMP runs on
39
What is a socket
A communication endpoint in an IP Based network. A socket links an IP address with the port number of a service. Help in delivering data packets to the appropriate application process running in the target node. The address is a combination of the protocol, IP address and port number.
40
{tcp, 193.44.234.3, 53} is an example of
An IP Address socket
41
What is a host name
A unique name given to a node on a TCP/IP network. A host name combined with the hosts domain name forms the nodes FQDN fully qualified domain name
42
FQDNs are
The hostname.domainname Max length is 255. Each dot section can be up to 63 characters long. A network node can have more than one host name assigned to it. It's primary name is the nose name the other names are called canonical names or aliases.
43
A domain is
A grouping of computers in the Internet based on the nature of their operations Identified by their unique names; com,gov,edu
44
What is a domain name
A unique name that identifies an entity on the Internet. Also known as site names. Usually registers by organization as their website address
45
What is DNS
Domain name system A TCP/IP name resolution service that translates FQDNs into IP addresses. Servers store, maintain, update databases. Responds to DNA client name resolution requests to translate host names into IP addresses.
46
Name the types of DNS records
``` Address A IPv4 IPv6 address AAAA canonical name CNAME Mail exchange MX Name server NS pointer PTR start of authority SOA service locator SRV ```
47
What is an ANS
Authoritative Name Sever | Responds to name related queries in one or more zones in DNS. ITs function is to delegate to other DNS servers
48
The DNS hierarchy
Allows DNS servers on the Internet to use minimum number of queries to locate the source of a domain name.
49
Name the steps in the DNS name resolution process
Client requests DNS name resolution Checks DNS Cache database Root name server reads top level domain of that name DNS server contacts top level domain server If top level domain cannot resolve IP address sent to second level DNS server Reaches level where DNS server can resolve the host name The preferred DNS server provides the client with the IP address of the target host
50
Name the two kinds of DNS queries
Recursive query where the Client requests that its preferred DNS server find data on other DNS servers. If preferred server cannot resolve the na,e it sends a request to another DNS server Iterative query when the client requests only the information a server already has in its cache for a particular domain name. If cannot resolve the request it notifies the client but doesn't forward the request to any other server
51
What is the HOSTS file
A plaintext file configured on a client machine containing a list of IP addresses and their associates host names. Provides an alternative method for host name resolution. Mostly used for trouble shooting
52
What is the purpose of TCP/IP commands
Help to ensure smooth connectivity in TCP/IP network. Allows you to gather information about how the systems are communicating
53
The tracers command
Determines the route data takes to get to a particular destination. ICMP protocol sends out time exceeded messages to each router to trace the route.
54
The pathping command
Provides information about latency and packet loss on a network. Combines the functionality of the ping and tracert commands. Can be used to isolate a router or subnet with issues. Displays the degree if packet loss at any given router or link
55
What is the MTR utility
The my trace route utility combines ping and traceroute into a single function Used on UNIX based systems
56
What is FTP
File transfer protocol A TCP/IP that enables the file transfer of files between a users workstation and a remote host. The FTP daemon or service must be running in the remote host. Commands must be entered in lowercase. Works on the application layer of OSI and TCP/IP models Works on two TCP channels. Port 20 for data transfer and port 21 for control commands.
57
What is NTP
Network time protocol IP the synchronizes the clock times of computers in a network by exchanging time signals. Works on the application layer of both models.
58
What is SMTP
Simple mail transfer protocol A communication protocol used to format and send email messages from a client to a server. Uses a store and forward process.
59
What is POP3
A protocol used to retrieve email messages from a mailbox server. Email messages wait in the mailbox on the server until the client retrieves them.
60
What is IMAP4
Internet message access protocol version 4. Used for retrieving messages from a mail server. More powerful than POP3. Can check email header and specific string of characters before downloading Messages can remain in the server while the client works with them Can search through messages by keywords Can access folders other than the inbox
61
What is NNTP
Network news transfer protocol Used to post and retrieve messages from USENET RSS feeds based in this
62
HTTP is
Hypertext Transfer Protocol Works on the application layer of both models Enables clients to interact with websites by allowing them to connect to and retrieve web pages from a server. Insecure Uses port 80
63
HTTPS is
Hypertext transfer protocol secure Secure version of HTTP Provides a secure connection between a web browser and a server. Uses the secure socket layer SSL to encrypt data. Uses port 443
64
What are TCP/IP interoperability services
Services that run in TCP/IP To create a network where dissimilar systems can securely communicate and share resources.
65
What is the NFS
Network File System A client/server application that enables users to access shared files stored in differs types of computers and work with the files as if they were stored locally. Part of the TCP/IP suite and works on the application layer of the OSI model
66
What is the SSH
Secure Shell is a program that enables a user to log on to another computer over a network, execute commands, and manage files. Creates a shell or session with a remote system and offers strong authentication methods and ensures that communication are secure over insecure channels
67
Describe the two versions of secure shell
SSH1 authenticates systems using keys to identify users, host keys to identify systems, session keys to encrypt communication in a single session and server keys the protect the session keys. SSH2 is more secure. Doesn't use server keys. Includes a secure replacement for FTP called SFTP secure file transfers protocol.
68
What is SCP
Secure Copy Protocol uses SSH to copy files securely between a local and a remote host or between two remote hosts.
69
What is telnet
Telecommunications Network A terminal emulation protocol that allows users at one site to simulate a session on a remote host as it the terminal were directly attached. Not secure.
70
What is SMB
server message block is a protocol that works on the application layer and helps share resources such as files, printers and serial ports among computers. Used in samba, an open source product, to enable UNIX and windows machines for sharing directories and files
71
What is LDAP
Lightweight directory access protocol Defines how a client can access information, perform operations, and share directory data on a server. Designed for use over TCP/IP networks and the Internet in particular
72
What is zeroconf
Zero configuration networking. A set of standards that provides for automatic configuration and IP address allocation on both ethernet and wireless networks. Can exist without central control or configuration services such as DHCP or DNS. typically uses MAC addresses as parameters because they are unique and available on most network devices.
73
Networks implementing Zeroconf must include methods for four functions
Network layer address assignment Automatic address assignment using multicast Translation between network names and network addresses Location or discovery of network services by name and protocol