tryhackme notes sep2024 Flashcards

1
Q

How does a switch improve network efficiency compared to a hub?

A

A switch improves network efficiency by managing data traffic intelligently, directing packets only to the intended recipient device, whereas a hub broadcasts data to all connected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does the ‘Content-Type’ header function in HTTP responses?

A

‘Content-Type’ header specifies what kind of data the server returns to the client, such as an HTML document or a JPEG image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the priority of encoding specified in HTTP headers.

A

The encoding specified in the HTTP headers has a higher priority than the encoding specified in the header of the HTML document using the ‘meta charset’ HTML tag.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the significance of the SID for services.exe?

A

The SID for services.exe is NT AUTHORITY\SYSTEM (S-1-5-18), indicating it runs with the privileges of the most authorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What follows the HTTP status line in a response?

A

After the HTTP status line, the HTTP response headers come, providing metadata for the returned resource or error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain the concept of idempotent methods in HTTP.

A

Idempotent methods can send multiple identical requests to the server, and the outcome will always be the same regardless of how many times the requests are sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the range of values for each octet in an IP address?

A

Each octet in an IP address can range from 0 to 255.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does an ARP request work?

A

An ARP request broadcasts a message on the network asking for the MAC address associated with a specific IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the Destination Port differ from the Source Port in a UDP connection?

A

Unlike the Source Port, which is chosen at random, the Destination Port is not randomly chosen and corresponds to a specific application or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the purpose of caching DNS queries.

A

Caching DNS queries mitigates the risk of using stale values in a DNS cache and improves efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define TCP/IP in the context of web servers.

A

TCP/IP, or Transmission Control Protocol/Internet Protocol, is the underlying protocol suite used for communication over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the OSI model.

A

The OSI model, or Open Systems Interconnection Model, is a fundamental framework used in networking that dictates how all networked devices send, receive, and interpret data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain the significance of the FIN packet in TCP communication.

A

The FIN packet signifies the intention to terminate a connection, allowing both parties to acknowledge the closure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does the checksum field contribute to data integrity in networking protocols?

A

The checksum field provides integrity checking for protocols such as TCP/IP; if any data is changed, the checksum value will differ from what was expected, indicating corruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define the purpose of the OSI model.

A

The purpose of the OSI model is to provide a standardized framework for understanding and implementing network communication between different systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain the role of a DNS resolver in the browsing process.

A

The DNS resolver responds to the web browser with the IP address of the domain requested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What devices can be aggregated by a switch?

A

A switch can aggregate multiple devices such as computers and printers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain the role of the Default Gateway in data transmission.

A

The Default Gateway is responsible for sending data to devices that are not on the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain the function of an AAAA Record.

A

An AAAA Record maps a domain name to its corresponding IPv6 address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Describe the function of the Flag header in packet handling.

A

The Flag header determines how the packet should be handled by either device during the handshake process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Explain the setup complexity of IPSec compared to other protocols.

A

IPSec is more difficult to set up than other VPN protocols, but it offers stronger encryption if successfully configured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the advantages of using UDP?

A

UDP is much faster than TCP, does not care if data is received or not, and allows application developers flexibility in how quickly packets are sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe the process a new device follows to obtain an IP address using DHCP.

A

A new device sends a request to the network to check for any available DHCP server. The DHCP server replies with an IP address that the device can use. The device then confirms the IP address, and the DHCP server acknowledges and confirms the completion of the process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How does the HTTP server component function?

A

The HTTP server component interprets the client’s request and formulates the appropriate response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How do headers enhance the web experience when making requests?

A

Headers allow additional data to be sent along with the request, providing a richer web experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Describe the two types of Top Level Domains (TLD).

A

The two types of Top Level Domains (TLD) are generic Top Level Domains (gTLD) and country code Top Level Domains (ccTLD).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How do devices associate their MAC address with an IP address?

A

Devices use the ARP protocol to associate their MAC address with an IP address on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How does a dynamic web server generate responses?

A

A dynamic web server generates responses based on user input, data processing, or interaction with external systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Describe the response from the server when a file has been deleted.

A

The server returns a response indicating that the file has been deleted. If the same request is sent again, the server responds that the file has already been deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Explain the process of an ARP request.

A

An ARP request is a broadcast message sent on the network asking, ‘What is the MAC address that owns this IP address?’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Describe the average time it takes for DNS lookups to complete.

A

DNS lookups on average take between 20-120 milliseconds to complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

How does a web browser access resources on a website?

A

A web browser requests assets such as HTML and images from a web server, using URLs to specify how and where to access these resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What types of content can a web server store in its file system?

A

A web server can store various types of content in its file system, including HTML files, images, scripts, and other files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Describe the two types of messages sent by the ARP protocol.

A

The ARP protocol sends ARP requests and ARP replies to map IP addresses to MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the first message in the Three-way handshake?

A

The first message is the SYN message, which is the initial packet sent by a client to initiate a connection and synchronize the two devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Explain the disadvantages of using UDP.

A

Disadvantages of UDP include a lack of safeguards like data integrity, resulting in a poor user experience during unstable connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Define a TXT Record in DNS.

A

A TXT Record is a free text field where any text-based data can be stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the function of web server software?

A

Web server software controls the processing and delivery of web content to clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Describe the process of encapsulation in the TCP model.

A

Encapsulation in the TCP model involves adding information to each layer as a piece of data (or packet) traverses it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Describe the purpose of a Three-way handshake in TCP.

A

The Three-way handshake establishes a reliable connection between two parties before data transmission begins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How are IP addresses typically assigned to devices on a network?

A

IP addresses are mostly assigned automatically using DHCP, although they can also be assigned manually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

How does subnetting work in networking?

A

Subnetting splits a network into smaller networks, known as subnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Describe the role of the data header in a UDP packet.

A

The data header in a UDP packet is where the actual data, or bytes of a file being transmitted, is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What happens if a DNS query is not found in a laptop’s cache?

A

If a DNS query is not found in the laptop’s cache, it will send the DNS query to the first DNS server in the chain, often the home router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

How does a web server process requests from web browsers?

A

A web server acts as a central hub that processes requests from web browsers and serves the requested content back to the clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Describe the purpose of the Destination Port in a UDP connection.

A

The Destination Port is the port number that an application or service is running on the remote host that is receiving the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

How does the checksum function in a TCP packet?

A

The checksum is used to verify the integrity of the data by checking for errors in the transmitted packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

How can a virtual host be configured?

A

There are many ways to configure a virtual host, with various methods commonly used today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

How does the HTTP response status line begin?

A

The HTTP response status line starts with the protocol version, followed by the response status code, and then a human-readable text explanation of the status code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

How do traditional web servers operate?

A

Traditional web servers handle HTTP requests and serve web content. Examples include Apache HTTP Server, Nginx, LiteSpeed, and Cherokee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

How many logical root name servers exist globally?

A

There are 13 logical root name servers globally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

How are HTTP status codes categorized?

A

HTTP status codes are categorized into classes such as informational responses (100–199), successful responses (200–299), redirection messages (300–399), client error responses (400–499), and server error responses (500–599).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What happens after a device confirms the IP address it received from the DHCP server?

A

After confirming the IP address, the DHCP server acknowledges the assignment, completing the process, and the device starts using the assigned IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Define the Sequence Number in data transmission.

A

The Sequence Number is a random number assigned to the first piece of data transmitted during a connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is the main difference between Layer 2 and Layer 3 switches?

A

Layer 2 switches operate at the data link layer and forward frames based on MAC addresses, while Layer 3 switches operate at the network layer and route packets based on IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Describe the exchange of data packets between client and server.

A

The exchange of data packets between the client and the server ensures reliable delivery of requests and responses, facilitating communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is the role of the destination address in a packet?

A

The destination address is the IP address of the device that the packet is being sent to, guiding the data on where to travel next.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

How does the DNS resolver interact with the root name server?

A

The DNS resolver queries a DNS root name server to obtain the address of a TLD DNS server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Describe the significance of Layer 7 in the OSI model.

A

Layer 7, known as the Application layer, is significant because it provides network services directly to end-user applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Give an example of an HTTP DELETE request.

A

An example of an HTTP DELETE request is for deleting an item from the shopping cart in an e-commerce web application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

How many instances of services.exe can exist in a process tree?

A

There can only be one instance of services.exe in a process tree.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Describe the initial function of a virtual host.

A

A virtual host initially started to host more than one website on a single machine, sharing resources like memory and CPU to achieve maximum efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

How does a router handle DNS queries?

A

The router checks its own DNS cache for an answer; if not found, it forwards the request to the next DNS server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What happens after the DNS resolver receives the address of a TLD DNS server?

A

The resolver makes a request to the TLD server, which responds with the IP address of the domain’s authoritative name server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

How does the HEAD method function in HTTP?

A

The HEAD method retrieves the resource’s headers without retrieving the resource itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Describe the purpose of the Destination IP in a packet.

A

The Destination IP is the IP address of the device that the packet is intended for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Explain the Three-way handshake process.

A

The Three-way handshake is a method used to establish a connection between two devices, involving a series of special messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Define the purpose of the FIN packet in TCP connection termination.

A

The FIN packet is used to initiate the closure of a TCP connection, indicating that the sender has finished sending data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Describe the role of a DHCP server in the network.

A

A DHCP server assigns IP addresses to devices on the network, manages the IP address pool, and ensures that each device receives a unique IP address for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

How do dynamic and static web servers differ?

A

Dynamic web servers generate content on-the-fly based on user requests, while static web servers deliver pre-existing content without modification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Describe the function of a router in a network.

A

A router’s job is to connect networks and pass data between them using routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is the significance of ping in network diagnostics?

A

Ping is significant in network diagnostics as it uses ICMP packets to determine the performance and reliability of a connection between devices, checking if the connection exists and is functioning properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Explain the importance of web servers in the Internet.

A

Web servers are the backbone of the Internet, facilitating the accessibility and availability of online resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Identify the typical provider of the next DNS server in the chain.

A

The next DNS server in the chain is typically provided by your Internet Service Provider (ISP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What must both computers agree on during the communication process?

A

Both computers must agree on the same random number sequence for successful data reconstruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What processes are spawned by the system process during Windows startup?

A

The system process launches the Session Manager Subsystem (smss.exe) and is responsible for starting other processes like services.exe, lsass.exe, and lsm.exe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Differentiate between gTLD and ccTLD.

A

gTLD stands for generic Top Level Domain, while ccTLD stands for country code Top Level Domain, such as .ca or .co.uk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Explain the significance of acknowledging packets in TCP.

A

Acknowledging packets ensures that both devices confirm receipt of data, which is crucial for maintaining data integrity and reliability in the communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Identify the function of Layer 3 in the OSI model.

A

Layer 3, known as the Network layer, is responsible for routing packets using IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

How does TCP handle synchronization between devices?

A

TCP is capable of synchronizing two devices to prevent them from being flooded with data in the wrong order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Explain the function of a TLD name server.

A

A TLD name server stores the IP addresses of authoritative name servers and responds to queries from DNS resolvers with the address of the domain’s name server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Describe when the system process is started.

A

The system process is started at boot time, before any other user-mode processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Define the CRUD operations associated with HTTP methods.

A

CRUD operations correspond to Create (POST), Read (GET), Update (PUT), and Delete (DELETE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Describe the relationship between Network Address and Host Address.

A

The Network Address identifies the network, while the Host Address identifies individual devices within that network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Describe the purpose of the RS T packet in communication.

A

The RS T packet abruptly ends all communication and indicates that there was some problem during the process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

How do both types of web servers contribute to client requests?

A

Both dynamic and static web servers contribute to receiving and processing client requests, ensuring smooth communication by delivering the requested content promptly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Describe how subnet masks are represented.

A

Subnet masks are also represented as a number of four bytes (32 bits), similar to IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

How does UDP’s flexibility benefit software developers?

A

UDP’s flexibility allows software developers to decide how quickly packets are sent without the constraints of a continuous connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Describe the purpose of a Network Address.

A

A Network Address identifies the start of the actual network and is used to identify a network’s existence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Explain the function of a VPN.

A

A VPN (Virtual Private Network) allows devices on separate networks to communicate securely by creating a dedicated path, known as a tunnel, over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Explain the significance of the random number sequence in data transmission.

A

The random number sequence is assigned to any sent data and is used to reconstruct the data by incrementing the sequence by 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What is the most common network topology mentioned?

A

Star topology is mentioned as the most common.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

How does redundancy improve network reliability?

A

Redundancy increases network reliability by adding multiple paths for data to take, allowing alternative routes if one path goes down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

How does a browser initiate a DNS lookup for a domain like google.com?

A

When a user types google.com into the browser, the browser sends the domain name to the DNS resolver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What technology does DNS represent and its primary function?

A

DNS, or Domain Name System, translates domain names into IP addresses, allowing users to access websites using human-readable names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

How does the Windows initialization process relate to system processes?

A

The Windows initialization process, represented by wininit.exe, is created by the Windows kernel at boot time and does not have a parent process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Describe the function of routers in a network.

A

Routers connect different networks and route data packets between them, operating at Layer 3 of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

How does the process of establishing a connection via UDP differ from TCP?

A

The process of establishing a connection via UDP differs from TCP in that UDP does not require a connection to be established and does not send acknowledgments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Define what an ARP cache is.

A

An ARP cache is a ledger stored in each device that keeps track of the identifiers (IP and MAC addresses) of other devices on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

How does the Checksum contribute to TCP integrity?

A

The Checksum is a value calculated mathematically to ensure data integrity; if the output differs from what was sent, the data is considered corrupt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Identify potential issues that could lead to the use of the RS T packet.

A

Potential issues include the service or application not working correctly or the system having faults such as low resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

How does a client send a request to a web server?

A

A client, which can be a web browser, sends an HTTP request to the web server. The request includes information such as the requested URL, request method (e.g., GET, POST), headers, and optional data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

What are the components of a web server?

A

The components of a web server include the HTTP server, which handles incoming HTTP requests and manages communication between the client and the server, and TCP/IP, which is the underlying protocol suite used for communication over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Explain the function of the ARP protocol.

A

The ARP protocol is used to map IP addresses to MAC addresses within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Define the purpose of a network address.

A

A network address is used to identify the start of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

How does TCP handle resource management during a connection?

A

TCP reserves system resources for each connection, and it is best practice to close connections as soon as they are no longer needed to free up these resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What does Alice do after hearing Bob’s acknowledgment of the FIN packet?

A

Alice acknowledges Bob’s response, confirming that she has received his acknowledgment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Define application servers and their purpose.

A

Application servers are designed for hosting web applications and executing server-side code. Examples include Microsoft Internet Information Services (IIS) for .NET apps and Apache Tomcat for Java apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

How do safe methods affect server state when used on a resource URL?

A

Using safe methods like GET or HEAD on a resource URL should never change the resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

What is the maximum number of ports available for use in a UDP connection?

A

The maximum number of ports available for use in a UDP connection is 65535.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What is a frame in the context of the OSI model?

A

A frame is a data unit at Layer 2 of the OSI model, which does not contain IP addresses and is used for data link layer communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Define ICMP and its role in network diagnostics.

A

ICMP stands for Internet Control Message Protocol, and it is used for sending error messages and operational information in network communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

How do routers function in relation to the OSI model?

A

Routers function at Layer 3 of the OSI model, enabling them to deliver packets using IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Define what happens when the RS T packet is used.

A

When the RS T packet is used, it signifies that communication has been terminated due to issues such as service or application malfunctions or system faults.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

How does the cost of star topology compare to other network topologies?

A

The cost of star topology is higher than other network topologies due to the need for more cabling and dedicated networking equipment, but it offers better reliability and scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Provide an example of an HTTP PATCH request.

A

An example of an HTTP PATCH request is for updating the quantity of an order item in the shopping cart of an e-commerce web application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

What does an MX Record do?

A

An MX Record resolves to the address of the servers that handle email for the queried domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

How does cloud computing enhance the use of virtual hosts?

A

With the invention of cloud computing, virtual hosts now serve more purposes than ever, including virtual application hosting, virtual server hosting, virtual storage hosting, and sometimes entire data center hosting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Explain the role of switches in a network.

A

Switches are dedicated devices in a network designed to aggregate multiple devices, such as computers and printers, using Ethernet. They are more efficient than hubs or repeaters and keep track of which device is connected to which port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Explain the advantages of using a switch over a hub.

A

A switch is more efficient than hubs or repeaters because it sends data only to the intended target rather than repeating it to every port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

How does Bob acknowledge the receipt of the FIN packet from Alice?

A

Bob lets Alice know that he received the FIN packet and also wants to close the connection.

122
Q

What is the range of an octet in a subnet mask?

A

The range of an octet in a subnet mask is 0-255.

123
Q

Explain the importance of web servers in web accessibility.

A

Web servers play a crucial role in enabling the availability and accessibility of websites and web applications.

124
Q

How are the HTTP methods categorized according to CRUD operations?

A

The main HTTP methods corresponding to CRUD operations are POST, GET, PUT/PATCH, and DELETE.

125
Q

Define the ‘Content-Type’ header in HTTP requests.

A

The ‘Content-Type’ header in HTTP requests specifies what kind of data the client sends to the server, such as JSON documents, URL-encoded form data, plain-text documents, or JPEG images.

126
Q

How do database servers collaborate with web servers?

A

Database servers store, process, and retrieve data in collaboration with web servers and application servers, making them essential components of many web applications.

127
Q

Describe the continuous interaction in client-server architecture.

A

Client-server interaction happens continuously as users navigate through websites and interact with web applications.

128
Q

Describe the User Datagram Protocol (UDP).

A

UDP is a protocol used to communicate data between devices without requiring a constant connection, making it stateless.

129
Q

What is a disadvantage of TCP related to data transmission?

A

A disadvantage of TCP is that if one small chunk of data is not received, the entire chunk must be re-sent.

130
Q

What is the difference in intelligence between stateful and stateless firewalls?

A

Stateful firewalls are considered more intelligent as they track the state of connections, while stateless firewalls are described as dumber or less intelligent.

131
Q

How does the Service Control Manager function in Windows?

A

The Service Control Manager (services.exe) loads services and drivers into memory and is the parent process for svchost.exe, dllhost.exe, taskhost.exe, and spoolsv.exe.

132
Q

How does ARP contribute to network communication?

A

ARP enables devices to find the MAC address of another device, which is essential for establishing communication over the network.

133
Q

How does a device remember the mapping of IP and MAC addresses?

A

The requesting device stores the mapping in its ARP cache for future use after receiving the ARP reply.

134
Q

Explain the three-step process for establishing a TCP connection.

A

The three steps are: 1) The client sends a SYN packet with its ISN, 2) The server responds with a SYN/ACK packet containing its ISN and acknowledging the client’s ISN, 3) The client sends an ACK packet to acknowledge the server’s ISN.

135
Q

Describe the TCP/IP protocol and its relation to the OSI model.

A

TCP/IP is a networking protocol that consists of four layers and is similar to the OSI model, serving as a summarized version of it.

136
Q

How does a device remember the mapping of IP addresses to MAC addresses?

A

The requesting device can remember the mapping by storing it in its ARP cache for future use.

137
Q

Explain the process of assigning the next Sequence Number after data transmission.

A

After a piece of data has been given a sequence number, the next piece of data will have a sequence number that is one greater than the previous one.

138
Q

What is an example of a resource returned in an HTTP response body?

A

An example of a resource returned in an HTTP response body is a CSS script for styling a navigation bar.

139
Q

Define a URL in the context of internet resources.

A

A URL is predominantly an instruction on how to access a resource on the internet.

140
Q

Explain the significance of the Default Gateway.

A

Any data that needs to go to a device that isn’t on the same network will be sent to the Default Gateway.

141
Q

What happens when a POST request is made to a server?

A

A POST request modifies the server state by creating new resources, such as when logging into a website by sending credentials to the server.

142
Q

Define the term ‘broadcast’ in the context of ARP.

A

In ARP, a broadcast is a message sent to all devices on the network to request information about a specific IP address.

143
Q

What is TTL in relation to DNS queries?

A

TTL, or ‘time to live’, is the finite amount of time that each DNS query is stored in the cache.

144
Q

How does IPSec enhance data security?

A

IPSec encrypts data using existing IP framework, providing strong encryption for secure data transmission.

145
Q

Describe the role of the Initial Sequence Number (ISN) in TCP.

A

The ISN is a unique number assigned to the first byte of data sent in a TCP connection, used to synchronize the sequence of data packets between devices.

146
Q

Define what data refers to in the context of a UDP header.

A

In the context of a UDP header, data refers to the bytes of a file that are being transmitted.

147
Q

Describe a potential issue with slow connections in TCP.

A

A slow connection can bottleneck another device because the connection will be reserved on the other device the whole time.

148
Q

Define the purpose of the DELETE method in HTTP.

A

The DELETE method is used to delete or remove an existing resource.

149
Q

What are some solutions provided by virtual hosting in modern computing?

A

Modern virtual hosting solutions include virtual application hosting, virtual server hosting, virtual storage hosting, and sometimes entire data center hosting.

150
Q

Explain the role of the file system in a web server.

A

The file system in a web server stores web content, including HTML files, images, scripts, and other files, allowing the server to locate and serve requested files to clients.

151
Q

How does the OSI model facilitate communication between different networked devices?

A

The OSI model facilitates communication by providing a structured approach that standardizes the processes and protocols used for data transmission across different devices.

152
Q

Explain the encryption strength of PPTP compared to other VPN protocols.

A

PPTP is considered weakly encrypted compared to alternatives, making it less secure.

153
Q

How are IP addresses structured?

A

An IP address is made up of four sections called octets.

154
Q

What is the relationship between services.exe and the memory loading of services?

A

The Service Control Manager task, services.exe, is responsible for loading services and drivers into memory.

155
Q

Describe the purpose of Process Hacker in Windows.

A

Process Hacker is a free and open-source tool that helps monitor all processes running in the Windows operating system.

156
Q

What is the typical format of a Network Address in IPv4?

A

A typical format of a Network Address in IPv4 is in the form of an IP address, such as 192.168.1.0.

157
Q

Define the types of DHCP packets involved in the IP address assignment process.

A

The types of DHCP packets include: DHCP Discover (sent by a device to retrieve an IP address), DHCP Request (sent by a device after being offered an IP address), and DHCP Ack (the last packet sent from the DHCP server to confirm the IP address assignment).

158
Q

Define the role of services.exe in Windows.

A

Services.exe is responsible for initiating services, as well as starting, stopping, and suspending service activities.

159
Q

Describe the purpose of the PUT method in HTTP.

A

The PUT method is used to update or create a resource on the server, but it is not considered a safe method as it can change the server state.

160
Q

What is an authoritative name server?

A

An authoritative name server provides actual answers to DNS queries and can be registered with domain name registrars.

161
Q

Define safe methods in the context of HTTP.

A

Safe methods can only be used for read-only operations since they do not alter the server state.

162
Q

How does the server respond to a GET request for a web page?

A

The server responds by sending the content of the web page, which may include fonts, images, and other resources, without modifying the server state.

163
Q

Describe the scalability of star topology.

A

Star topology is highly scalable, meaning it can easily accommodate the addition of more devices without significant reconfiguration, making it suitable for growing networks.

164
Q

How does an application server integrate with a web server?

A

An application server may interact with a web server to process dynamic content and execute the application’s business logic, enabling the generation of dynamic responses based on user input or data processing.

165
Q

How does TCP ensure data is sent in the correct order?

A

TCP uses a sequence number for each byte of data sent, which allows the receiving device to reorder packets if they arrive out of sequence.

166
Q

Describe the function of a web server.

A

A web server is a computer system or software that hosts and delivers web pages, files, and related content to clients over the internet, typically via the Hypertext Transfer Protocol (HTTP) or its secure version HTTPS.

167
Q

Describe the process of setting up a connection with UDP.

A

No process takes place in setting up a connection between two devices using UDP, meaning there is no regard for whether data is received.

168
Q

List one advantage of using TCP.

A

One advantage of TCP is that it guarantees the integrity of data during transmission.

169
Q

How does TCP ensure data integrity during transmission?

A

TCP guarantees data integrity by establishing a connection between the client and server, ensuring that any data sent will be received on the other end.

170
Q

What makes TCP slower compared to UDP?

A

TCP is significantly slower than UDP because it performs more processes for reliability, requiring more computing work by the devices.

171
Q

What is the role of the DELETE method in HTTP?

A

The DELETE method is used to remove a specified resource from the server, but it is idempotent, meaning repeated requests do not change the server state after the resource is deleted.

172
Q

How do devices communicate using the ARP protocol?

A

Devices send a broadcast message to the entire network searching for a specific device’s MAC address associated with an IP address.

173
Q

What is a subnet mask and its purpose?

A

A subnet mask is a number that represents how many hosts can fit within a network, used in the process of subnetting.

174
Q

Define a situation where UDP is preferred over TCP.

A

UDP is preferred in situations where applications can tolerate data loss, such as video streaming or voice chat.

175
Q

Describe the role of HTTP headers in modern web development.

A

HTTP headers play an important role in modern web development by specifying how to process the data in HTTP requests and responses.

176
Q

Identify examples of safe methods in HTTP.

A

Safe methods include GET, HEAD, TRACE, and OPTIONS.

177
Q

Define star topology in networking.

A

Star topology is a network configuration where devices are individually connected to a central networking device, such as a switch or hub. It is known for its reliability and scalability.

178
Q

How is a frame different from a packet in networking?

A

A frame is a piece of data that does not have IP addressing information, while a packet includes IP addressing.

179
Q

Describe stateful firewalls and their operation layers.

A

Stateful firewalls operate at Layer 3 and Layer 4 of the OSI model, determining the behavior of devices based on the entire connection rather than inspecting individual packets.

180
Q

Describe the structure of a packet in networking.

A

A packet consists of a set of headers that contain additional pieces of information along with the data being sent across a network.

181
Q

Explain the difference between safe and unsafe HTTP methods.

A

Safe HTTP methods, like GET, do not modify the server state, while unsafe methods, like POST, PUT, and DELETE, can modify the server state.

182
Q

What happens when a device receives an ARP request?

A

The device will respond with an ARP reply containing its MAC address only if it owns the requested IP address.

183
Q

Explain the significance of idempotency in web operations.

A

Idempotency ensures that making the same request multiple times will not change the outcome after the first request, which is important for reliability in web operations.

184
Q

How many layers are in the OSI model?

A

The OSI model consists of seven layers, each serving a specific function in the process of network communication.

185
Q

How does a switch identify network addresses?

A

A switch identifies the network address, the host address, and the default gateway.

186
Q

What happens when devices receive an ARP request?

A

Devices will respond only if they have the IP address being queried.

187
Q

Explain the significance of MAC addresses in ARP.

A

MAC addresses serve as the physical identifiers for devices on a network, allowing ARP to map them to their corresponding IP addresses.

188
Q

How does subnetting provide benefits in networking?

A

Subnetting provides a range of benefits, including improved efficiency and security.

189
Q

Describe the role of a CNAME Record.

A

A CNAME Record resolves to another domain name, allowing for aliasing of domain names (e.g., store.tryhackme.com returns a CNAME record shops.shopify.com).

190
Q

Define the term ‘decapsulation’ in the context of TCP.

A

Decapsulation is the reverse process of encapsulation, where the added information is removed as the data packet moves up through the layers.

191
Q

What is the significance of the DELETE method in HTTP requests?

A

The DELETE method is used to remove a resource from the server.

192
Q

What are specialized servers and give examples?

A

Specialized servers, such as Node.js and CherryPy, serve specific purposes; Node.js runs JavaScript on the server side, while CherryPy acts as a server for Python applications.

193
Q

Describe the purpose of Ping in networking.

A

Ping uses ICMP (Internet Control Message Protocol) to determine the performance of a connection between devices.

194
Q

How many bits are in a subnet mask?

A

There are 32 bits in a subnet mask.

195
Q

Describe the advantages of stateful firewalls in high traffic scenarios.

A

Stateful firewalls are advantageous when receiving large amounts of traffic from a set of hosts, such as during DDoS attacks, due to their ability to manage connections effectively.

196
Q

Define idempotent operations in the context of HTTP methods.

A

Idempotent operations are those that do not alter the server state when the same request is made multiple times. Examples include GET, HEAD, OPTIONS, TRACE, PUT, and DELETE.

197
Q

Describe the functionality of a dynamic web server.

A

A dynamic web server generates and serves dynamic content, interacting with databases or other data sources to process client requests.

198
Q

Where is the services.exe located in the Windows file system?

A

Services.exe is located under the C:\Windows\System32 folder.

199
Q

How does packet delivery differ between a hub and a router?

A

Instead of repeating a packet to every port like a hub, a router sends it only to the intended target, reducing network traffic.

200
Q

Describe the role of web servers in client-server interaction.

A

Web servers handle and respond to client requests for various web resources, ensuring timely and accurate delivery of requested web pages to users.

201
Q

Define the components of a web server.

A

A web server consists of software that controls the processing and delivery of web content and hardware that provides the necessary computing power and infrastructure.

202
Q

How can the ‘Content-Type’ header affect data processing in web applications?

A

The ‘Content-Type’ header affects data processing in web applications by informing the server and client about the type of data being sent or received, which determines how the data should be handled.

203
Q

What is the significance of the absence of a three-way handshake in UDP?

A

The absence of a three-way handshake in UDP means that there is no synchronization required between the two devices.

204
Q

How does a client acknowledge the server’s Initial Sequence Number (ISN)?

A

The client sends an ACK packet back to the server, confirming receipt of the server’s ISN.

205
Q

Describe the function of the ARP protocol in a network.

A

The ARP protocol allows devices to identify themselves on a network by associating their MAC address with an IP address.

206
Q

How does a laptop improve latency when resolving domain names?

A

A laptop caches previous DNS queries to improve latency and decrease traffic over the internet.

207
Q

Describe the function of a switch router.

A

A switch router connects networks and passes data between them.

208
Q

What is the function of the PATCH method in HTTP?

A

The PATCH method updates an existing resource partially, allowing modification of a field of a given object.

209
Q

How does a normal Three-way handshake process work between two devices?

A

A normal Three-way handshake process involves a sequence of messages exchanged between two devices to establish a connection.

210
Q

Define the main function of web server software.

A

The main function of web server software is to act as the engine that powers the web server’s functionality by managing incoming requests and delivering responses.

211
Q

Define the structure of an HTTP status code.

A

An HTTP status code is a three-digit integer where the first digit defines the response class.

212
Q

Describe the structure of an HTTP response after a request is received.

A

An HTTP response consists of a status line, response headers, and a response body, providing information on whether the request was successfully executed or failed.

213
Q

Define the role of the root name server in the DNS lookup process.

A

The root name server stores the IP addresses of Top Level Domain (TLD) name servers and responds to queries from DNS resolvers with the address of a TLD DNS server.

214
Q

How does the SYN message function in the handshake process?

A

The SYN message is used to initiate a connection and synchronize the two devices together.

215
Q

Describe the three basic levels of DNS servers.

A

The three basic levels of DNS servers are: 1. Root name server, which stores the IP addresses of Top Level Domain (TLD) name servers; 2. TLD name server, which stores the IP addresses of authoritative name servers; 3. Authoritative name server, which provides actual answers to DNS queries.

216
Q

What information does a cache store in the context of ARP?

A

A cache stores the identifiers of other devices on the network.

217
Q

Describe the significance of specific flags in packet transmission.

A

Specific flags determine specific behaviors for how packets are handled during the transmission process.

218
Q

Define the role of Apache HTTP Server.

A

Apache HTTP Server is an example of web server software that supports multiple operating systems and is often used to host and deliver websites and web applications.

219
Q

Describe the final step in the DNS resolution process for a domain like google.com.

A

The DNS resolver sends a query to the domain’s authoritative name server, which returns the IP address for google.com.

220
Q

What is the first step in closing a TCP connection?

A

The first step is for one device to send a FIN packet to the other device, indicating that it has finished sending data.

221
Q

List the four layers of the TCP/IP protocol.

A

The four layers of the TCP/IP protocol are Application, Transport, Internet, and Network.

222
Q

Describe the process of establishing a TCP connection.

A

The process involves three steps: the client sends a SYN packet with its Initial Sequence Number (ISN), the server responds with a SYN/ACK packet including its own ISN and acknowledging the client’s ISN, and finally, the client sends an ACK packet to acknowledge the server’s ISN.

223
Q

Explain the registry path for services.exe in Windows.

A

The registry path for services.exe is HKLM\SYSTEM\CurrentControlSet\Services.

224
Q

Explain the content of the HTTP response body.

A

The HTTP response body contains the requested resource, which can be text, binary data, or it can be empty.

225
Q

Explain the role of reverse proxy servers.

A

Reverse proxy servers, like Nginx and Apache, act as intermediaries between clients and application servers, enhancing security, load balancing, and performance.

226
Q

What is the default encoding used in HTTP headers?

A

The default encoding used in HTTP headers is UTF-8.

227
Q

Provide the order of a normal Three-way handshake in TCP.

A

The order of a normal Three-way handshake is: SYN, SYN/ACK, ACK.

228
Q

What happens if the data in a packet is altered during transmission?

A

If the data in a packet is altered, the checksum value will be different from what was expected, indicating that the data is corrupt.

229
Q

Explain the significance of maximum efficiency in virtual hosting.

A

Maximum efficiency in virtual hosting is significant as it allows multiple websites to operate on shared resources, optimizing performance and resource utilization.

230
Q

List the most commonly used HTTP request methods.

A

The most commonly used HTTP methods are GET, POST, PUT, DELETE, and PATCH.

231
Q

What happens after a device sends a FIN packet in TCP?

A

The other device must acknowledge the FIN packet before the connection can be fully closed, ensuring that both sides agree to terminate the connection.

232
Q

How does a normal UDP connection function between two devices?

A

A normal UDP connection functions by allowing data to be sent directly between two devices, such as Alice and Bob, without establishing a connection or sending acknowledgments.

233
Q

Define the role of the header in a TCP packet regarding data integrity.

A

The header in a TCP packet includes a checksum that ensures the integrity of the data being transmitted.

234
Q

Describe the communication process between Alice and Bob involving a FIN packet.

A

Alice sends a FIN packet to Bob, indicating that she wants to close the connection. Bob receives this packet and acknowledges it, indicating he also wants to close the connection.

235
Q

Describe the capabilities of Layer 3 switches.

A

Layer 3 switches are more sophisticated than Layer 2 switches; they can route packets between different networks and perform some functions of a router.

236
Q

What types of TLD names exist?

A

There are several types of TLD names, including generic TLDs (e.g., .com, .org), country code TLDs (e.g., .us), and test TLDs (e.g., .test).

237
Q

What type of information do response headers provide?

A

Response headers provide metadata such as content encoding, content size in bytes, and content last-modified date.

238
Q

What is the role of Layer 2 switches in a network?

A

Layer 2 switches use MAC addresses to forward frames to the correct devices within the same network.

239
Q

How does DNS help users on the internet?

A

DNS provides a simple way to communicate with devices on the internet without needing to remember complex numbers, allowing users to visit websites using domain names instead of IP addresses.

240
Q

What is typically the first or last host address in a network?

A

The first or last host address in a network is usually .1 or .254.

241
Q

Explain the significance of the ‘Content-Disposition’ header in HTTP.

A

The ‘Content-Disposition’ header is used to specify how content should be displayed or handled by the client, such as inline display or attachment for download.

242
Q

What is the role of Windows fundamentals in virtual hosting?

A

Windows fundamentals play a role in the configuration and management of virtual hosts, as indicated by resources like SANS.

243
Q

Describe the significance of the first digit in an HTTP status code.

A

The first digit of an HTTP status code defines the response class, indicating the general category of the response.

244
Q

How does UDP handle packet simplicity compared to TCP?

A

UDP packets are much simpler than TCP packets and have fewer headers.

245
Q

How does a web server send a response back to the client?

A

The web server sends the response back to the client over the network, typically including the requested web page, file, or other resources.

246
Q

How can you check common HTTP status codes?

A

You can check the graphic provided in documentation to see the most common status codes.

247
Q

What does it mean for a method to be idempotent?

A

A method is idempotent if multiple identical requests have the same effect as a single request.

248
Q

How many characters can a subdomain have?

A

A subdomain can have a maximum of 63 characters.

249
Q

Define the maximum length of a domain name.

A

The maximum length of a domain name is 253 characters.

250
Q

Define the default gateway in a network.

A

The default gateway is a special address assigned to a device on the network that is capable of sending information to another network.

251
Q

What does a web server deliver from its root directory?

A

A web server delivers files from its root directory, including the requested content, status codes, headers, and any additional data.

252
Q

Define the purpose of the Time to Live (TTL) field in a packet.

A

The TTL field sets an expiry timer for the packet to prevent it from clogging up the network if it never reaches a host or escapes.

253
Q

Define a static web server.

A

A static web server includes pre-existing HTML files and serves requested static content without any additional processing.

254
Q

Explain the significance of UDP being stateless.

A

UDP being stateless means that no acknowledgment is sent during a connection, which differentiates it from connection-oriented protocols like TCP.

255
Q

What is the purpose of an A Record in DNS?

A

An A Record maps a domain name to its corresponding IPv4 address.

256
Q

Explain the significance of ARP in the context of IP addresses and MAC addresses.

A

ARP (Address Resolution Protocol) is used to map an IP address to a MAC address, allowing devices on a network to communicate with each other by resolving IP addresses to their corresponding hardware addresses.

257
Q

Explain the difference between packets and frames in the OSI model.

A

Packets and frames are both small pieces of data, but packets operate at Layer 3 (Network layer) while frames operate at Layer 2 (Data Link layer).

258
Q

What technologies are used in VPNs for security?

A

VPNs use private keys and public certificates for authentication and encryption of data, similar to SSH.

259
Q

Explain the impact of redundancy on network performance.

A

While redundancy may reduce overall network performance due to longer travel times for packets, it ensures there is no downtime.

260
Q

How does the ‘Content-Type’ header indicate JSON data?

A

The ‘Content-Type’ header indicates JSON data by using the format ‘Content-Type: application/json’, which specifies that the data is a JSON-encoded object.

261
Q

How does PPP contribute to VPN functionality?

A

PPP (Point-to-Point Protocol) allows for authentication and provides encryption of data within VPNs.

262
Q

How do devices within a network identify themselves?

A

Devices within a network use a host address to identify themselves.

263
Q

What role does Layer 6 play in the OSI model?

A

Layer 6, known as the Presentation layer, is responsible for translating data formats and ensuring that data is presented in a readable format for the application layer.

264
Q

What is the name used to identify the device responsible for sending data to another network?

A

The name used to identify this device is the Default Gateway.

265
Q

What is the role of a cache in network devices?

A

The cache in network devices stores information to facilitate quicker access to identifiers of other devices.

266
Q

Describe how character set is specified in the ‘Content-Type’ header for HTML documents.

A

The character set for HTML documents is specified in the ‘Content-Type’ header using a format like ‘Content-Type: text/html; charset=utf-8’, indicating that the document is HTML with UTF-8 encoding.

267
Q

Define the term ‘packet’ in the context of networking.

A

A packet is a piece of data that includes IP addressing information, allowing it to be routed through a network.

268
Q

What is the purpose of web server software?

A

Web server software, such as, Nginx, or Microsoft IIS, handles incoming requests, processes them, and delivers the appropriate response back to clients.

269
Q

How do stateful firewalls determine packet acceptability?

A

Stateful firewalls use a set of rules to determine whether individual packets are acceptable or not.

270
Q

What is the relationship between packets and frames in networking?

A

Packets are large pieces of information that contain data and headers, while frames are the data link layer encapsulation of packets, which include additional headers for transmission over a physical network.

271
Q

Identify the address used to identify devices within a network.

A

The address used to identify devices within a network is the Host Address.

272
Q

Explain the significance of the three-way handshake in TCP.

A

The three-way handshake is a process used by TCP to establish a connection between a client and a server before data transmission begins.

273
Q

How does PPTP encapsulate data?

A

PPTP encapsulates PPP frames into IP packets, encrypts the data, and transmits them over the internet.

274
Q

Define subnetting in networking.

A

Subnetting is the process of splitting a network into smaller, miniature networks within itself.

275
Q

What happens during unstable connections when using UDP?

A

Unstable connections can lead to a terrible experience for the user, as UDP does not reserve a continuous connection.

276
Q

Define the term ‘seamless browsing experience.’

A

A seamless browsing experience refers to the smooth and uninterrupted interaction users have while navigating through web pages.

277
Q

Identify the address used to identify the start of a network.

A

The address used to identify the start of a network is the Network Address.

278
Q

How does star topology provide advantages despite its cost?

A

Star topology provides significant advantages such as scalability, allowing easy addition of more devices as network demand increases, despite requiring more cabling and dedicated networking equipment, which makes it more expensive.

279
Q

How is a Host Address used in networking?

A

A Host Address is used to identify a device on the subnet.

280
Q

In what scenarios is the HEAD method typically used?

A

The HEAD method is used rarely, for example, to check for modifications on the server-side.

281
Q

What types of IP addresses are typically used for default gateways?

A

Devices can use any host address, but usually the first or last host address in the network, such as .1 or .254.

282
Q

Describe the process of how web servers work.

A

Web servers operate by receiving requests from clients, processing those requests, and responding with the requested content, which is then displayed on the client’s browser.

283
Q

How do switches and routers interact in a network?

A

Both switches and routers can be connected to one another, facilitating data transfer and network management.

284
Q

Describe the purpose of HTTP request methods.

A

HTTP request methods define the action that will be performed on the identified resource.

285
Q

Identify the role of a switch in reducing network traffic.

A

A switch reduces network traffic by sending packets only to the intended target instead of broadcasting to all ports.

286
Q

Describe the client-server model in web servers.

A

The client-server model in web servers involves a client, usually a web browser, sending a request to the server for a specific web resource, such as a web page or file. The server processes the request and responds with the requested content, which is then displayed on the client’s browser.

287
Q

Explain the significance of the source address in a packet.

A

The source address is the IP address of the device that the packet is being sent from, allowing the data to know where to return.

288
Q

Describe the benefits of submitting in a network context.

A

Submitting provides efficiency, security, and full control.

289
Q

How does a device determine if it needs to use the Default Gateway?

A

A device determines it needs to use the Default Gateway when it needs to send data to a device that isn’t on the same network.

290
Q

Describe the purpose of a status code in HTTP responses.

A

The status code informs the client whether the requested operation was successful or not.

291
Q

What is the role of the Data header in packet transmission?

A

The Data header is where the actual data, or bytes of a file being transmitted, is stored.

292
Q

Describe how ICMP packets are used in network performance measurement.

A

ICMP packets are used in network performance measurement by sending echo requests (ping) to a target device and waiting for an echo reply. This process measures the time taken for packets to travel between devices.

293
Q

How do VPN technologies handle information from connections?

A

VPN technologies use entire information from connections rather than inspecting individual packets, allowing for dynamic decision-making.

294
Q

Define the concept of resource sharing in virtual hosting.

A

Resource sharing in virtual hosting refers to the utilization of a single machine’s resources, such as memory and CPU, by multiple websites to maximize efficiency.

295
Q

How does Ping determine the status of a connection?

A

Ping uses ICMP to check if a connection exists and to assess its reliability.

296
Q

Define stateless firewalls and their resource consumption.

A

Stateless firewalls consume fewer resources compared to stateful firewalls, as they do not track the state of connections.

297
Q

Define the Default Gateway in a network.

A

The Default Gateway address is a special address assigned to a device on the network that is capable of sending information to another network.

298
Q

Do HTTP headers apply to both requests and responses?

A

Yes, HTTP headers can be used in both HTTP requests and HTTP responses.

299
Q

How does UDP differ from TCP in terms of connection requirements?

A

Unlike TCP, UDP does not require a continuous connection between devices for data to be sent.

300
Q

How does the GET method function in HTTP requests?

A

The GET method retrieves a specified resource, such as a list or a single resource, and returns a representation of that resource in XML or JSON if there are no errors.

301
Q

Define PPTP and its primary use.

A

PPTP, or Point-to-Point Tunneling Protocol, is a VPN protocol that allows data from PPP to travel over the internet, commonly used for creating secure connections.

302
Q

Describe the role of DHCP in IP address assignment.

A

DHCP can assign IP addresses either manually or automatically, most commonly through a DHCP server.