Chapter 7/introduction to TCP/IP Flashcards

1
Q

What is a protocol

312

A

a protocol is a set of rules that govern communications that a computer use as comunication language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP/IP

312

A

the transmission control protocol/internet protocol

it is the protocol used on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DOD is similar to OSI

312

A

department of defense model is the model that TCP/PI is based on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 layers on the DOD model

312

A

process/ Application
Host to host
Internet
Network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where are the majority of TCP/IP layers at

313

A

the majority of layers are in the process/ Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1- process/ Application

314

A
the layer of differentiation and flexibility 
it has so many protocols:
DHCP
DNS
 FTP
HTTP
HTTPS
IMAP
LDAP
POP3
RDP
SFTP
SMB
SMTP
SNMP
SSH
Telent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • protocol is

314

A

Sometimes referred to as an access method, a protocol is a standard used to define a method of exchanging data over a computer network such as local area network, Internet, Intranet, etc. Each protocol has its own method of how data is formatted when sent and what to do with it once received, how that data is compressed or how to check for errors in data.
One of the most common and known protocols is HTTP (HyperText Transfer Protocol), which is a protocol used to transmit data over the world wide web (Internet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DHCP

314

A

Short for Dynamic Host Configuration Protocol, DHCP is a protocol used to assign an IP address to a computer or device that has been connected to a network automatically. Routers, switches, or servers that use DHCP to assign addresses to other computers can make setup and management easier for the network administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNS

314

A

Short for Domain Name System or Domain Name Service, a DNS is an Internet or network server that helps to point domain names or hostnames to their associated Internet Protocol address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FTP

314

A

Short for File Transfer Protocol, FTP. is a standard way of sending and receiving files between two computers. A good example of how FTP is used today is by web developers, who will connect to their web server using FTP and send updated versions of their web pages to the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTP

315

A

Short for HyperText Transfer Protocol, HTTP is a set of standards that allow users of the World Wide Web to exchange information found on web pages. When accessing any web page entering http:// in front of the address tells the browser to communicate over HTTP.
Hypertext Transfer Protocol Secure, HTTPS is a protocol which uses HTTP on a connection encrypted by transport-layer security.
HTTP transmit Data in plain text it main there is no encryption and the information can be stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HTTPS

315

A

HTTPS is used to protect transmitted data from eavesdropping. It is the default protocol for conducting financial transactions on the web, and can protect a website’s users from censorship by a government or an ISP. The data on HTTPS is encrypts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • encrypts is

315

A

The process of making data unreadable by other humans or computers for the purpose of preventing others from gaining access to its contents. Encrypted data is generated using an encryption program such as PGP, encryption machine, or a simple encryption key and appears as garbage until it is decrypted. To read or use the data, it must be decrypted, and only those who have the correct password or decryption key can make the data readable again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IMAP

316

A

Short for Internet Message Access Protocol, IMAP
It is a protocol for retrieving e-mail from a server, similar to POP. The secure version of IMAP is called IMAPS, which stands for IMAP over SSL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

LDAP ?

316

A

Lightweight Directory Access Protocol, LDAP is an Internet protocol that runs over TCP designed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

POP3

316

A

Post Office Protocol 3 has been the preferred protocol for downloading email but it is being replaced by IMAP4
because the IMAP4 has more security

17
Q

RDP

316

A

Remote Desktop Protocol, RDP is the protocol that enables Remote Desktop Connection to communicate with Microsoft Terminal Services.

18
Q

SFTP port 115

317

A

Secure File Transfer Protocol, SFTP is a version of FTP that encrypts any commands and data transfers, helping keep your passwords secure and your session private.

19
Q

SMB

317

A

Server Message Block, SMB is a common network communications method used on Microsoft operating systems allowing those computers to communicate with other SMB computers.

20
Q

SMTP

317

A

Simple Mail Transfer Protocol, SMTP is an Internet standard for the sending of e-mail, we call it push protocol.

21
Q

SNMP port 161 (set trapes)

317

A

Simple Network Management Protocol, SNMP, it gathered and manage network performance information.

22
Q

SSH

317

A

Secure Shell, SSH
is a secure protocol for remote logins. Using an SSH client, a user can connect to a server to transfer information in a more secure manner than other methods, such as telnet.

23
Q

Telnet

318

A

Telnet is considered insecure because it transfers all data in clear text. Which means if a user was sniffing a network, it’s very possible they could grab your username and password as they were being transmitted. Users who are concerned about the data being transmitted should consider SSH as opposed to telnet.

24
Q

2- Host to Host layer protocol

318

A

within this layer there are two alternatives
TCP guarantees pockets delivery throw the use of a virtual circuit and data acknowledgment but UDP does not ( connection oriented )
UDP is connectionless.it is faster because it doese not have

25
Q

how many ports are there

318

A

there are 65536 ports numbered from 0 to 65535

26
Q

The well known ports

318

A

ports from 0 to 1023

27
Q

the registered ports

318

A

ports from 1024 to 49151

28
Q

TCP/IP applications combine the host IP address with the port number
318

A

the combination is known as a socket

29
Q

3- internet layer protocol

320

A

in this layer we fined the main workhorse of the TCP/IP which is the IP and 3 support protocols ICMP, ARP, RARP.

30
Q

IP

320

A

is responsible for managing logical net work addresses and ultimately getting data from point A to point B

31
Q

octet

A

An octet is unit of digital information equal to exactly eight bits.

32
Q

IPv4 has 32 bits and there are classes, those classes are define by the first three bites on the IP address
322

A
class A 1-127 the first bit is 0
class B 128-191 the first bit is 10
class C 192-223 the first bit is 110
33
Q

what does a DNS do

A

translaet url in to

34
Q

SMB

A

it function as FTP

35
Q

static and dynamic hust configuration protocol DHCP

A

324

36
Q

way would some one use a remote disktop

A

316

37
Q

NAT PAT

A

326