The internet Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is the internet

A

A network of networks that are Inter-Connected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how are devices on the internet uniquely identified

A

an ip address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe IPV4

A

IP version 4, addresses are made up of four octet values ( numerical values described by 8 bits) separated by a full stop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is A FQDN

A

A fully qualified domain name can be broken down into constituent parts including a host name, and the domain name itself.

www.example.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is bbc.co.uk

A

the domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what does URL stand for

A

Uniform resource locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what does www. do

A

specifies the host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what would be the FQDN for the bbc

A

www.bbc.co.uk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the url made up of

A

the protocol and the domain name of the resource together form the URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does DNS servers mean

A

Domain Name System- servers are dedicated computers with an index of domain names and their corresponding ip addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the process of resolving an ip address (7 steps)

A

1st URL request by browser from a user
2nd Browser extracts the FQDN and sends it to a dns server
3rd Local dns server maps the FQDN to ip address and returns it to browser
4. If local DNS doesnt have the request is moved to the Regional DNS. (has a much larger look up table)
5. Unlikely event Regional DNS doesnt have it it mvoed to NSP (network service provider)
6. Ip is sent to browser and GET request is sent to web server.
7. File is returned to web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Simply put what is the TCP IP protocol

A

A set of protocols that support network communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the purpose of the dns system

A

domain name system resolves names to ip addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why do websites have both domain names and ip addresses

A

hard to remember ip
IP address required for computer to access the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the process of packet switching (6 steps)

A

Messages are split into packets
Each packet is given a destination and source address
Packets are given a sequence number
Each packet in independently dispatched to the Internet through a router gateway
Routers forward packets to other nodes on the network until they reach destination
Packets reassembled at the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a router

A

Connects two networks together
Determines which node to send a packet to next

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe the process of Routing (3)

A

Routers forward data packets from one network to another
Each router stores data about the available routes to the destination node
Routers are organised in a hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the header of a packet contain (4)

A

the destination’s (recipient’s) address so that it can be directed appropriately across the network

the source (sender’s) address

the packet (sequence) number and number of packets

the Time To Live (TTL) or hop limit is also included

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the 3 parts of the data packet

A

Trailer payload header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the payload contain

A

At its core, a data packet is a segment of data that needs to be sent, often referred to as the payload
This part of the packet will often vary in size from 500 to
1,500 bytes

Payload refers to the actual data being sent in the packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does the Trailer/Footer contain

A

A packet trailer / footer contains error checking components that verify the data received in the payload has not been corrupted on transfer
Techniques such as checksums are used to check the data by the receiving host
The same checksum is recalculated at the destination
If they do not match, the data has become corrupted and is refused and a new copy is requested to be sent again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a gateway when is it required (2)

A

A gateway is required where data is travelling from one network to another that use different protocols

Networks using different transmission media can require this

A router and gateway can often be combined into one integrated device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe how a gateway operates

A

Header data are removed and reapplied using the correct format of the new network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Describe what is meant by the Time To Live data in a data packet.

A

a maximum number of hops a packet can take to reach its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

why are packets a certain size

A

small enough to ensure individual packets do not take excessive time to transfer

However, they should not be too small as the additional data added makes data transfer inefficient as unnecessary headers and trailers would be required each time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Example gateways

A

Examples include connecting a LAN to the Internet, or connecting different types of internal networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

describe what happens to the data packet at a gateway

A

header is removed and reapplied using the correct format of the new newtork.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the point of the application layer of the TCP/IP Layer (2)

A

The application layer uses an appropriate protocol relating to the application sending data.
For websites this would be http

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

How is the transport layer of the TCP/IP Model used (4 parts)

A

Uses TCP protocol

establishes end to end connection

splits data into packets.

adds sequence number and port to packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How is the network layer of the tcp/ip layer used (4)

A

Uses the internet protocol (IP)

Adds source IP destination IP addressses to packets

Performs routing

Creates checksum for the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How is the link layer of the TCP/IP used

A

Adds mac address of source device and destination device to the packets of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What happens at the link layer when receiving data

A

removes the MAC addressfrom each packet and passes it to the network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What happens at the network layer when receiving data

A

The network layer removes the ip address from each packet and passes it to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What happens at the transport layer when receiving data

A

The transport layer removes the port number from each packet, reassembles the packets in correct order and passes them to the application layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What happens at the application layer when receiving data

A

The application layer presents the image data for the user in a browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Describe how a port number is used

A

A port is used to alert a specific application to deal with data sent to a computer

These are used by protocols to specify what data is being sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are the two types of port numbers

A

Well known port numbers

Client port numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

what are well known port numbers

A

A reserved port number that has a specific purpose assigned by the Internet Assigned Numbers Authority (IANA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

what are client port numbers

A

Temporary port numbers that are assigned by the transport layer to the network application on the client computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is Secure Shell

A

An encrypted protocol that allows secure communication between nodes across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What does SSH stand for

A

Secure Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Why was SSH invented, and what are its functions

A

As a protocol used to securely connect to and manage devices or servers over an unsecured network, such as the internet.

It provides encrypted communication and ensures confidentiality, integrity, and authentication during data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are the key features of SSH ( 6)

A

Encryption
Authentication
Port Forwarding
Secure Remote Access
Command execution
File transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What protocols are used for sending an receiving emails

A

SMTP
POP3
IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Explain SMTP

A

Used to send emails and forward them between mail servers to their destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Explain POP3

A

Downloads emails stored on a remote server to a local client(removed after download)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Explain IMAP

A

Manages emails on a server so multiple clients can access the same email account in synchronicity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is a firewall

A

A firewall is either software or hardware that controls access to and from a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

How does a firewall operate

A

A firewall is either software or hardware that controls access to and from a network
Data packets from specific IP addresses can be filtered
Data packets also have ports which can be used to only allow traffic through from certain port numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Describe packet filtering

A

Packets of data are inspected by the firewall to check their source IP address and which port they are attempting to access
Different network protocols use different port numbers for example, HTTP traffic, used to transfer web page data, uses port 80 or 8080
If this traffic is to be allowed through, the port must be opened for the duration of the connection, otherwise the firewall will automatically reject it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is a proxy server

A

A proxy server makes a web request on behalf of your own computer, hiding the true request IP addresses from the recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What are the functions of a proxy server

A

Enables anonymous surfing

Can be used to filter undesirable online content

Logs user data with their requests

Provides a cache of previously visited sites to speed up access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

four different ways that a firewall can protect computers on a LAN

A

Block/allow traffic on specific ports

Block/allow traffic from specific IP addresses

Block/allow certain types of packet

Firewall maintains information about current connections and only allows packets relevant to these connections through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Definition of encryption

A

The act of encoding a plaintext message so that it cannot be deciphered unless you have a numerical key to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is meant by symmetric encryption

A

Symmetric encryption uses the same key to encrypt and decrypt the data being transferred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is asymmetric encryption

A

Uses two separate, but related keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is a popular and secure way for generating a key pair for asymmetric encryption

A

One way of achieving this would be by using the RSA algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Describe the steps of asymettric encryption

A

recipients public key is made available
The recipient’s public key is then used to encrypt the data before sending
The encrypted message is sent
The recipient’s private key is used to decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Summarise the Digital Signature Creation and Encryption process ( 3steps)

A

Hashing: The sender computes a hash (digest) of the message using a hashing algorithm.

Signing: The sender encrypts the hash using their private key, creating the digital signature.

Encryption for Recipient: The sender bundles the digital signature with the message and encrypts the bundle using the recipient’s public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Describe the digital signature decryption process (3steps)

A

Decrypt Bundle: The recipient uses their private key to decrypt the message and digital signature bundle.

Verify Signature: The recipient decrypts the digital signature using the sender’s public key, revealing the hash (digest) created by the sender.

Hash Comparison: The recipient computes their own hash of the received message and compares it with the sender’s hash:

61
Q

What makes a digital signature unique

A

As a signature can only be decrypted by the sender’s public key the signature can be considered genuine and unaltered

62
Q

What is another name for the hash that is produced from the hash algorithm and forms the digital signature?

A

Digest

63
Q

How does a digital signature check if a message has been tampered with ( 4 steps)

A

Hash of the Original Message: The sender computes a hash of the message and encrypts it with their private key to create the digital signature. This hash uniquely represents the original message’s content.

Recipient’s Hash: When the recipient receives the message, they compute their own hash of the received message using the same hashing algorithm.

Decrypted Signature Hash: The recipient decrypts the digital signature using the sender’s public key, revealing the hash originally created by the sender.

Comparison: The recipient compares their hash (from the received message) with the decrypted hash (from the signature):

If the hashes match, the message has not been altered.
If the hashes do not match, the message was tampered with after being signed.

64
Q

What does a digital signature often come with

A

they also send their digital certificate

A trusted company known as a Certificate Authority (CA) provides this, which includes:

a serial number
name of the CA
expiry date

65
Q

What are viruses

A

A program that attaches itself to or conceals itself within another program / file
It is self-replicating
Has malicious purpose such as deleting files, hiding files

66
Q

What is TLS encryption

A

(Transport Layer Secure) encryption

A protocol that secures communication over the internet by encrypting data exchanged between devices

67
Q

What does TLS encryption prevent

A

Prevents eavesdropping, tampering, and data theft during transmission.

68
Q

What are worms

A

A worm is a standalone program that does not require a user to run it in order for it to spread.

They exploit vulnerabilities in the destination system and spread automatically.

69
Q

A file is being transferred between two computers across a network using a file transfer application.
Identify a protocol that could be used to transfer this file

A

File Transfer Protocol

70
Q

What is trojan horse

A

Trojans are malicious are pieces of software that masquerade as something seemingly innocuous or useful

They cannot self replicate

Often they server to open up back doors in your computer to the internet so that the processing power, internet bandwidth and data can be exploited remotely.

71
Q

How can we reduce threats from malware,

A

improve code quality
Monitoring attempts, protection
Guarding against buffer overflow attack
Use of strong passwords for login credentials.
2FA

72
Q

What is buffer overflow

A

Buffer overflow occurs when a program accidentally writes data to a location too small to handle it.

73
Q

What is sql injection

A

A malicious user can enter SQL commands via online database forms to change the processing.

74
Q

What is a ip address

A

a unique numerical address which identifies a host computer of network.

75
Q

Describe IPv4 makeup

A

Uses four octets each octect made up of a byte.

76
Q

what is the last address in a network used for

A

is reserved as the broadcast address on that network for sending data simultaneously to all host on that network

77
Q

What is a host

A

any computer on a network that can use the internet

78
Q

What is 127.x.y.z

A

is reserved for loopback in which a hosts ip software treats an outgoing packet as incoming

79
Q

what are the address range of IP’s that are private addresses for LANS or private WANS

A

10.x.y.z, 172.16.0.1 to 172.31.255.255 and 192.168.y.z

80
Q

How many devices does IPv4 provide for

A

2^32 4.3 billion addresses

81
Q

What are the two parts that make up IP’s

A

Network identifier

Host identifier

82
Q

Describe the host identifier

A

Right hand bits of 32 bit number used to identify seperate nodes on the network

83
Q

Describe the network identifier

A

left hand bits of 32 bits number used to define the network where the nodes are communicating.

84
Q

What is classless ip addressing

A

The use of a suffix such as /24 enables IP addresses to be used with varying proportions of network ID and host ID

85
Q

what is a subnet mask

A

a number that identifies the network and host portions of an IP address

86
Q

How is a subnet mask

A

The subnet mask is used together with an IP address.

The subnet mask has all network id bits set to 1 and all host ID bits set to - so that, when compared to the IP address using a bitwise and operation, the network is identified.

87
Q

How do computers with private ips address receive and send data on the internet

A

They must communicate via another network device that provides a network address translation, this allows a single public ip address

88
Q

describe the operation of the NAT

A

This allows a single public IP address e.g. 12.65.42.1 to be shared by any number of hosts with private IP addresses
This system is normally part of the router.
It keeps track of which private host is making requests on the internet
It then makes sure that when it receives the response from the internet, it sends it back to the private host that made the request.

The translation device records the source and destination socket addresses for each request
It then communicates on the host’s behalf with the destination IP address
When a response returns, it is passed back to the host that made the original request

89
Q

What is port forwarding

A

Routers can be programmed so that requests with a particular port number can be automatically forwarded on to a device with a specific IP address within the network

90
Q

Describe port forwarding

A

Servers accessible to the public can be given a non-routable
IP address within a private network
A public request reaches the external router of the private network using a given port
The data packets are forwarded internally to the correct device
This also provides additional filtering

91
Q

What is the DHCP

A

Dynamic host configuration protocol is used to automatially allocate ip addressses and other network configuration information

92
Q

What does the DHCP allow

A

Allows limited pools of dynamic ip addresses to be shared out between hosts and freed up when not needed

allows hosts to reconfigure themseleves when moving between networks and reduces the number of ip addressses required locally as not all hosts.

93
Q

What are the 4 steps involved in the DHCP

A

DHCPDISCOER - request ip
DHCPOFFER -
DHCP REQUEST - Broadcast confirm ip request
DHCPACK - acknowledgment and assignment

94
Q

What is the purpose of the DHCP

A

To automate the configuration of hosts connecting to a (TCP/IP) network
To allocate IP addresses to hosts

95
Q

What are internet registers

A

These are five global organisations governed by the internet corporation for assigned names and numbers.

96
Q

How is the domain name hierarchy ordered by

A

Generic Top level domains, Country TLD’s, 2nd Level Domains, 3rd level domains

97
Q

What are the functions of a router

A

Uses the most efficient path to the destination
Monitors the network and updates its routing table to reflect congestion/network changes
Modifies the MAC addresses for the next hop (not actually contained in the packet)

98
Q

how are client ports and well known ports used when retrieving a web page

A

client port allocated to web browser by transport layer

Web servers use well known ports so that client is able to contact it to initiate.

99
Q

A section of the company firewall log is displayed on the accountant’s computer.

Firewall blocked access to resource at 84.134.4.128:80

Firewall granted access to resource at 84.134.4.128:22

From the log above, give an example of the following:

Port number

A

80

100
Q

What layer of the tcp/ip protocol do routers operate at

A

Network layer

101
Q

A section of the company firewall log is displayed on the accountant’s computer.

Firewall blocked access to resource at 84.134.4.128:80

Firewall granted access to resource at 84.134.4.128:22

From the log above, give an example of the following:

IP Address

A

84.134.4.128

102
Q

A section of the company firewall log is displayed on the accountant’s computer.

Firewall blocked access to resource at 84.134.4.128:80

Firewall granted access to resource at 84.134.4.128:22

From the log above, give an example of the following:

Socket

A

IP + PORT NUMBER

103
Q

What can be used to verify the owner’s public key and ensure it is trustworthy?

A

digital certificate

104
Q

What are items of data normally found on the digital certificate

A

Private Key
Public Key
Public Key Algorithm
Firewall Settings

105
Q

What is MAC address

A

A 6 byte unique identifier inscribed on a devices NIC by a manufacturer

106
Q

What is meant by an API

A

application programming interface - is a set of functions and protocols that clients can use

107
Q

What is a server side API

A

is a set of web services or web resources to enable programmers to build web applications

108
Q

What is it called when programmers use multiple server-side web APIs to create combined web applications

A

mashups

109
Q

What is a websocket protocol

A

includes an API for establishing a persistent TCP socket connection

110
Q

Describe the features of the websocket protocol

A

Designed for web browser and server, but any type of client and server can use it

Connection is full-duplex (simultaneous two-way)

Allows client and server to send data at any time

Server can offer (“push”) data to the client
WebSocket Secure is encrypted

111
Q

What are the two widely used formats for the standardised data objects that server and client can both process:

A

JSON

XML

112
Q

Describe XML

A

XML - Extensible markup language has a format similar to HTML and wraps content in tage

113
Q

Describe JSON

A

JavaScript Object Notation is written in a standard programming form, similar to JavaScript, and can be directly used by JavaScript

114
Q

What are the advantages of JSON

A

Easier for a human to read, write and mantain

More compact so requires less storage and quicker to transmit and process

Can be directly manipulated by java script

115
Q

What are the disadvantages of JSON

A

works with a limited range of data types

116
Q

What are the advantages of XML

A

Any data type allowed so more flexible

117
Q

What are the disadvantages of XML

A

Expansive use of tages make it more difficuolt to follow

118
Q

What are features of the thick client architecture

A

Applications are installed locally on the thick client

119
Q

What are the features of thin client architecture

A

applications arent installed locally, or only a light version of the appliocation installed.

Processing is done on a powerful central server and the hosts are only used to display the results and provide user input.

120
Q

What are the advantages of thin client computing

A

Easy to set up, maintain and add terminals
Server software and updates can be automatically distributed to each client terminal
More secure

121
Q

What are the disadvantages of thin client computing

A

Reliant on the server
Requires a very powerful, and reliable server
Server demand and bandwidth increased

122
Q

What are the advantages of thick client computing

A

Robust and reliable - because the machines are more powerful and have more ram and processing speed.
Can operate without a continuous connection to the server
Generally better for running more powerful applications

123
Q

What are the disadvantages of thick client computing

A

Higher specification client computers required
Installation of software required on each terminal separately
Integrity issues with distributed data

124
Q

What is http communication

A

HTTP communication refers to the exchange of data between a client (typically a web browser) and a server using the HyperText Transfer Protocol (HTTP).

125
Q

what does http communication allow for

A

It is the foundational protocol of the World Wide Web, enabling the transmission of resources such as HTML files, images, videos, and other content over the internet.

126
Q

What is the benefit of websocket protocols smaller packets.

A

WebSocket packet sizes are greatly reduced without the usual headers

This in turn creates a superfast, interactive connection commonly used with websites requiring real-time updates

Server load is reduced, saving bandwidth and running costs as well as reducing the number of web servers required

127
Q

What are the 4 basic web applications

A

Create – write a record to a database
Retrieve – retrieve a record from a database
Update – amend a record
Delete – remove a record from the database

128
Q

What are the HTTP request methods

A

GET – request data from a source
POST – submit data to be processed
PUT – uploads a new resource to the server
DELETE – removes a resource from the server

129
Q

What is the Representational State transfer

A

REST is an architectural style which determines how systems communicate with each other

130
Q

Describe the operation of the REST architecture style

A

REST uses HTTP request methods to interact with online databases

REST systems and APIs separate the client from the server database allowing either to be updated independently without impacting on the other

131
Q

Which IP address is used to send a DHCP discover message broadcasts?

A
132
Q

Which layer of the TCP/IP protocol stack can be described as, ‘where the network hardware such as the network interface card is located’?

A

Link/Physical

133
Q

Which protocol is a client-server method of requesting and delivering web pages?

A

HTTP

134
Q

Which IP address is used to send a DHCP discover message broadcasts?

A

255.255.255.255

135
Q

What is the purpose of the TCP protocol

A

provides an error free transmission of data between routers

136
Q

DHCP servers are responsible for allocating what type of IP addresses?

A

dynamic

137
Q

Which IPv4 address is reserved as a broadcast address on a subnet?

A

x.x.x.255

138
Q

What is the advantage of the client server model

A

Easier to maintain a well ordered file store

139
Q

Which standard protocol is usually assigned to port 80 & 8080?

A

HTTP

140
Q

Describe the operation of a proxy server

A

a computer application or physical hardware that accesses data on a different computer system or network. It controls the access of authorised users to data

141
Q

What is the purpose of the FTP protocol?

A

Transfer of computer files between a client and a server on a computer network

142
Q

What is the standard port number assigned to File Transfer Protocol (FTP) control instructions?

A

21

143
Q

Which IPv4 address is reserved as a private, non-routable addresses used for diagnostics within LANs?

A

127.x.x.x

144
Q

What type of server uses POP3, SMTP and IMAP?

A

Mail server

145
Q

Which standard protocol is usually assigned to port 443?

A

HTTPS - Hyper Text Transfer Protocol Secure

146
Q

What does the IP protocol do?

A

routes packets between two routers.

147
Q

Which IPv4 address is reserved as a private, non-routable addresses used for diagnostics within LANs?

A

127.x.x.x

148
Q

What is the standard port number assigned to Simple Mail Transfer Protocol (SMTP)?

A

25

149
Q
A