Test Ch. 9-12 Flashcards
Connection-oriented Communication
A protocol that does not establishes a connection between two hosts before transmitting data and verifies receipt before closing the connection between the hosts. TCP is an example of a connection-oriented protocol.
Connectionless Communication
A protocol that does not establish and verify a connection between the hosts before sending data; it just sends the data and hopes for the best. This is faster than connection-oriented protocols. UDP is an example of a connectionless protocol.
Session
Any single communication between a computer and a another computer.
TCP
Transmission Control Protocol - enables connection-oriented communication in networks that use the TCP/IP protocol suite.
TCP Three-way handshake
.
If the network is not visible on the Internet, the DNS naming convention does not require top-level domain names such as .com or .org
True
As the Internet grew, HOSTS replaced DNS
False
Which is the correct sequence according to the DNS naming convention?
Host.Domain.Root
Symmetric-key encryption is what we call any encryption that uses the same key for both encryption and decryption.
True
This is a mathematical function that creates a checksum, and which is used by most forms of nonrepudiation.
Hash
This protocol offers a method for querying the state of certain network devices
SNMP
Hubs, switches and routers all work at layer 1 of the OSI seven-layer model.
False
Microsoft Exchange is an example of a dedicated e-mail client.
False
This is one example of the many programs that use the BitTorrent file-sharing protocol in modern peer-to-peer implementations.
µTorrent
VPNs use encryption.
True
UDP
User Datagram Protocol - Part of the TCP/IP protocol suite, a connectionless protocol that is an alternative to TCP.
DHCP
Dynamic Host Configuration Protocol - uses UDP - DHCP clients uses port 67 for sending data, DHCP servers use port 68 for sending data.
NTP/SNTP
Network Time Protocol. Simple Network Time Protocol.
TFTP
Trivial File Transfer Protocol enables you to transfer from one machine to another. Doesn’t have any protection. Uses port 69.
ICMP
Internet Control Message Protocol
IGMP
Internet Group Managment Protocol
Well-known Port Numbers
Port numbers between 0 and 1023
Ephemeral Port Numbers
1024-5000
Dynamic or Private Port Numbers
49152-65535
IANA
Internet Assigned Numbers Authority
Registered Ports
1024-49151
Socket or Endpoint
Terms for the connection data stored on a single computer
Netstat
Show me the endpoint command utility
FTP
File Transfer Protocol - used for large files.
SMTP
Simple Mail Transfer Protocol - port 25, used by clients to send messages.
POP3
Post Office Protocol version 3 - receive e-mail from SMTP servers. POP3 uses TCP port 110.
IMAP4
Internet Message Access Protocol version 4. Retrieves e-mail from an e-mail server. IMAP4 enables you to search through messages on the mail server to find specific keywords and select the messages you to download onto your machine.
Remote Login
rlogin - works over TCP port 513
Remote Shell
RSH - runs over TCP port 514
Remote Copy Protocol
RCP - TCP port 524
Telnet
A program that enables users on the internet to log onto remote systems from their own host systems.
Secure Socket Layer
SSL - A protocol developed by Netscape for transmitting private documents over the Internet
What 3 things make a secure website?
- Authentication
- Encryption
- Nonrepudiation
HTTPS
Hypertext Transfer Protocol over SSL - uses port 443.
DNS
Domain Name System - name resolution protocol
WINS
Windows Internet Name Service
HOSTS File
The predecessor to DNS, a static text file that resides on a computer and is used to resolve DNS host names to IP addresses. The HOSTS file is checked before the machine sends a name resolution request to a DNS name server. The HOSTS file has no extension.
TLD
Top-level Domain
FQDN
Fully Qualified Domain Name - A complete DNS name, including the host name and all of its domains (in order).
Name Servers
A computer whose job is to know the name of every other computer.
- DNS server
- Zone
- Record
CNAME
Canonical name - Less common type of DNS record that acts as a computer’s alias.
PKI
Public-key Infrastructure - The system for creating and distributing digital certificates using sites like Verisign, Thawte or GoDaddy.
Authentication
A process that proves good data traffic truly came from where it says it originated by verifying the sending and receiving users and computers.
Authorization
A step in the AAA philosophy during which a client’s permissions are decided upon.
Nonrepudiation
The process that guarantees the data is as originally sent and that it came from the source you think it should have come from.
Hash
A mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length (often called a checksum or a digest.)
SHA
Secure Hash Algorithm
MD5
Message-Digest Algorithm version 5, hashing function.
Encryption
A method of securing messages by scrambling and encoding each packet as it is sent across an unsecured medium, such as the Internet. Each encryption level provides multiple standards and options.
DNS Server
A DNS server is a computer running DNS server software.
Zone
A zone is a container for a single domain that gets filled with records.
Record
A record is a line in the zone data that maps an FQDN to an IP address.
Authoritative DNS server
Also called Start of Authority or SOA, A DNS server that has a single zone that lists all the host names on the domain and their corresponding IP addresses.
Cached lookups
The list kept by a DNS server of IP addresses it has already resolved, so it won’t have to re-resolve it an FQDN it has already checked.