1.1-1.2 Explain the purposes and uses of ports and protocols. Flashcards

1
Q

Explain the purposes and uses of DHCP

A

An automatic method for allocating IP address, Subnet Mask, Default gateway and DNS server addresses.

A host is configured to use DHCP by specifying in the TCP/IP configuration that it should automatically obtain an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain the purposes and uses of ports DHCP 67, 68

A
  • When a DHCP client initializes, it broadcasts to find a DHCP server.
  • This is called a DHCPDISCOVER packet.

All communications are sent using UDP, with the server listening on port 67 and the client on port 68. The DHCP server responds to the client with an IP address and other configuration information, as long as it has an appropriate IP address available.

The IP addressing information is offered for a period of time. This packet is also broadcast and is called a DHCPOFFER. The client may choose to accept the offer using a DHCPREQUEST packet—also broadcast onto the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the purposes and uses of SECURE SHELL (SSH)

A

Secure Shell (SSH)is the principal means of obtaining secure remote access to a UNIXor Linux server. The main uses of SSH are for remote administration and secure file transfer (SFTP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SSH Port #

A

An SSH server listens on TCP port 22 bydefault.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain how the Simple Authentication and Security Layer (SASL) provides binding in Lightweight Directory Access Protocol Secure (LDAPS).

A

The client and server negotiate the use of a supported security mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A routing table is corrupted and causing a packet to loop. The router discards the packet and sends a warning packet to the source host. Consider the types of Internet Control Message Protocol (ICMP) messages to determine what type of message the source host receives.

A

Time exceeded

A time exceeded message is used when the Time to Live (TTL) of a packet reaches 0. A packet has a maximum TTL of 255, and this value is reduced by one every time the packet crosses a router. A packet looping will eventually result in the TTL reaching 0.

An echo request/reply message is used with the ping utility.

A destination unreachable message indicates that a local host, or a host on a remote network, can not be contacted. This can be caused by a configuration error or by a router not being available.

A redirect message is used if there are multiple routers and a more efficient route can be identified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What protocol is an alternative to the Session Initiation Protocol (SIP)?

H.323 Protocol
Real-time Transport Protocol (RTP)
Common Address Redundancy Protocol (CARP)
Real-time Transport Protocol Control Protocol (RTCP)

A

H.323 Protocol

H.323 is an alternative session control protocol to the Session Initiation Protocol (SIP). Endpoints, known as terminals, connect to gatekeepers to request services.

The Real-time Transport Protocol (RTP) enables the delivery of a stream of media data via the User Datagram Protocol (UDP), while implementing some of the reliability features usually associated with the Transmission Control Protocol (TCP).

The RTP Control Protocol (RTCP) is used by RTP to monitor the quality of the connection and to provide reports to the endpoints.

The Common Address Redundancy Protocol (CARP) handles Virtual Internet Protocol (VIP) addresses for load balancing.

next

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A system administrator notices a server cannot access network services. Authentication is also failing. The error is an invalid token message. Which of the following protocols should the system administrator verify early in the troubleshooting process?

A

Network Time Protocol (NTP)

A server or host that is configured with the incorrect time may not be able to access network services. Authentication, and other security mechanisms will often fail if the time is not synchronized on both communicating devices. The Network Time Protocol (NTP) enables the synchronization of time-dependent applications. Errors are likely to be generic failed or invalid token messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A router downloads configuration files over User Datagram Protocol (UDP) port 69. The router does not have access to browse the directory or to delete files. Analyze File Transfer Protocols (FTPs) and determine what protocol the router is using.

A

Trivial File Transfer Protocol (TFTP)

The Trivial File Transfer Protocol (TFTP) supports reading and writing files, not directory browsing or file deletion.

TFTP is a connectionless protocol that runs over User Datagram Port (UDP) port 69.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A system administrator notices a server cannot access network services. Authentication is also failing. The error is an invalid token message. Which of the following protocols should the system administrator verify early in the troubleshooting process?

A

The Network Time Protocol (NTP) enables the synchronization of time-dependent applications. A server or host that is configured with the incorrect time may not be able to access network services. Authentication, and other security mechanisms will often fail if the time is not synchronized on both communicating devices. Errors are likely to be generic failed or invalid token messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain how the Simple Authentication and Security Layer (SASL) provides binding in Lightweight Directory Access Protocol Secure (LDAPS).

A

The client and server negotiate the use of a supported security mechanism.

Authentication, referred to as binding to the server, can be implemented in several ways for Lightweight Directory Access Protocol Secure (LDAPS). The Simple Authentication and Security Layer (SASL) completes binding by the client and server negotiating the use of a supported security mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Host A sends a packet to Host B. There is congestion on the network that causes a considerable delay. The source host receives a warning packet after the router discards the packet. Compare the types of Internet Control Message Protocol (ICMP) messages to determine what type of message the source host receives.

A

Time exceeded

A time exceeded message is used when the Time to Live (TTL) of a packet reaches 0. A packet has a maximum TTL of 255, and this value is reduced by one every time the packet crosses a router. A packet looping will eventually result in the TTL reaching 0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which protocol uses Network Level Authentication (NLA) which requires the client to authenticate before a full remote session starts?

Virtual Network Computing (VNC)
Secure Shell (SSH)
Remote Desktop Protocol (RDP)
Telnet

A

Remote Desktop Protocol (RDP)

Remote Desktop Protocol (RDP) is Microsoft’s protocol for operating remote Graphical User Interface (GUI) connections to a Windows machine. RDP uses Network Level Authentication (NLA) which requires the client to authenticate before a full remote session is started.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which port will a Domain Name Server (DNS) use for record transfers over 512 bytes?

Transmission Control Protocol (TCP) port 23
Transmission Control Protocol (TCP) port 53
User Datagram Protocol (UDP) port 53
User Datagram Protocol (UDP) 69

A

User Datagram Protocol (UDP) port 53

A Domain Name Server (DNS) server that needs to allow large record transfers over 512 bytes will be configured to allow connections over Transmission Control Protocol (TCP) port 53.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Simple Network Management Protocol (SNMP) agent informs the monitor of a port failure. Analyze the functions of an SNMP agent to determine what command the monitor uses for this notification.

Get
Walk
Set
Trap

A

Trap

The Trap command is used when the agent informs the monitor of a notable event, such as a port failure. The threshold for triggering traps can be set for each value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which delivery method and protocol may send data out of order and over different paths? (Select two)

TCP
Connectionless
Connection Oriented
UDP

A

Connectionless
UDP

Connectionless, a data transmission delivery method using User Datagram Protocol (UDP), does not establish a connection between devices so data delivery may be out of order and over different paths.

User Datagram Protocol (UDP) is used in the connectionless delivery method where data delivery may be out of order and over different paths.

17
Q

Which of the following protocols reside at the application layer of the Open Systems Interconnection (OSI) model? (Select two)

IP
TCP
HTTP
SMTP

A

HTTP
SMTP

Layer 7 (Application layer) works at the user end to interact with user applications. QoS (Quality of Service), file transfer, and email are the major popular services of the Application layer. This layer uses the following protocols: HTTP, SMTP, and FTP.

18
Q

What is the name of a data unit used at the Open Systems Interconnection (OSI) physical layer?

Frame
Segment
Packet
Bit

A

Bit

Bits are the data unit used at the Physical Layer. The network, at layer 1, transmits the stream of bits making up the Ethernet frame from the Data Link layer.

19
Q

The Open Systems Interconnection (OSI) reference model provides windowing in which layer?

Data link
Transport
Physical
Network

A

Transport

The Internet’s Transmission Control Protocol (TCP) uses windowing as a method of controlling the flow of packets between two computers or network hosts. The Transport layer adds a TCP header to the packet.

20
Q

Host A is communicating with Host B. Host A uses the American Standard Code for Information Interchange (ASCII) and Host B uses Unicode. The clients agree to translate the communication to ASCII. What layer of the Open System Interconnection (OSI) model does the agreement and translation occur?

Application
Presentation
Session
Transport

A

Presentation

The Presentation layer is used for character set conversion.

21
Q

Which Open Systems Interconnection (OSI) layer assumes responsibility for managing network connections between applications?

Physical
Data Link
Network
Session

A

Session

Most application protocols require the exchange of multiple messages between the client and server. This exchange of such a sequence of messages is called a session, thus, the Session layer. Sessions can work in three modes: simplex, half-duplex, or duplex.

22
Q

A laptop connects to a web server on the Internet, and the service provider then assigns the laptop an IP (Internet Protocol) address. Similarly, the web server to which the laptop is communicating, has an IP address. At which layer of the Open Systems Interconnection (OSI) model are these two devices functioning?

Layer 2
Layer 5
Layer 4
Layer 3

A

Layer 3

An Internet Protocol (IP) address lives at layer 3 (the Network layer). Because both the laptop and the web server use an IP at layer 3, they are capable of communicating with one another.