Network Protocols Flashcards

1
Q

An academic and military network that later became the Internet’s primary precursor

A

ARPANET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do the 1s represent in a Subnet Mask?

A

Network ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do the 0s represent in a Subnet Mask?

A

Host ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the IP range and subnet for class A networks?

A

0.-127.255.255.255

Subnet Mask 255.0.0.0 /8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the IP range and subnet for class B networks?

A
    • 191.255.255.255

Subnet Mask 255.255.0.0 /16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the IP range and subnet for class C networks?

A
    • 223.255.255.255

Subnet Mask 255.255.255.0 /24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the IP range for class D networks?

A
    • 239.255.255.255
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the IP range for class E networks?

A
    • 254.255.255.255
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A non-routable address which can either mean the current network, the default route, any address at all, or a specific error condition, depending on context.

A

0.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The broadcast address that addresses the entire subnet at once. Broadcasts aren’t generally routed, so any packet to this address is just sent through the local broadcast domain.

A

255.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reserved for loopback addresses, which, as the name implies, simply points right back to the local host.

A

127.0.0.0, Most commonly, you’ll see 127.0.0.1 used to refer to the local system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These network addresses aren’t routable on the Internet, but are instead commonly used on home or office networks. They were originally assigned as classful addresses, but you can break them into CIDR subnets on your own networks.

A

Private Networks

  1. 0.0.0/8, or the single Class A network with addresses 10.0.0.0 – 10.255.255.255.
  2. 16.0.0/12, or the 16 contiguous Class B networks with addresses 172.16.0.0 – 172.31.255.255.
  3. 168.0.0/16, or the 256 contiguous Class C networks with addresses 192.168.0.0 – 192.168.255.255.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What network address is reserved for link-local or automatic Private IP addressing (APIPA) addresses

A

169.254.0.0/16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Used to find the physical address corresponding to an IvP4 local IP address

A

ARP Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Used to find the physical address corresponding to an IvP6 local IP address

A

Neighbor Discovery Protocol (NDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A hierarchical directory service that stores assigned domain names and their corresponding IP addresses.

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The root category of the domain. Originally these were either three-letter functional categories like.comor.edu, or two letter country codes like.ukor.jp.

A

Top-Level Domain (TLD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Represents a particular organization

A

Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An optional level used for categories within the organization.

A

Subdomain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The name of the specific host within the organization, or its alias

A

Hostname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Usable on the local segment, but not routable and starts with 1111111010 (fe80) followed by 54 zero bits

A

Link-Local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Routable on public networks and starts with the bits 001, and the first group is in the range 2000-3fff

A

Global

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Routable within an organization, but not on public networks and starts in the range fec0 to fef0 followed by 38 zero bits

A

Site-Local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TCP negotiates a virtual connection between two hosts, a dedicated channel that carries a defined stream of data to the remote host. This connection always requires two-way communications: even if the ultimate goal is a one-way transfer, the recipient must be able to acknowledge receipt of data.

A

Connection-oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Provides connection-oriented, reliable communications, with error correction, flow control, and sequencing

A

TCP (Transmission Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

TCP guarantees that all data is successfully delivered to the host. If a segment fails to arrive, TCP itself handles discovering the failure and resending the segment

A

Reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A TCP segment itself contains a checksum which is used for error detection. Detected errors are then corrected, since corrupt segments are discovered and resent just like missing ones.

A

Error Correction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

As part of the acknowledgement process, the remote host can regulate the rate of data flow. This keeps a slow recipient from being overwhelmed by high-speed transmissions

A

Flow Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

When a long transmission must be broken into many segments, for example a large file transfer, TCP can guarantee they will be delivered to the upper layers in the correct sequence, even if the packets on the network arrived out of order. This keeps applications from being burdened with reassembling fragmented transmissions.

A

Sequencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Protocol that is unreliable, connectionless, fast, and lightweight.

A

UDP (User Datagram Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What network services use UDP?

A

streaming video or online multiplayer games

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Represents a certain place on the Transport layer that represents the end point of the conversation

A

Port or Socket number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Process in which a single port on a host can only be used by one application at a time.

A

Port Binding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Client programs connecting to servers which are held in a pool by the operating system and only assigned for the length of a given connection.

A

ephemeral ports or dynamic ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Ports 0-1023 are assigned to the most universal and accepted TCP/IP standard applications, or applications the IANA expects to become standards

A

System Ports (Well Known or Privilege)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Ports 1024-49151 are assigned to applications that benefit from assigned port numbers, but aren’t so widely used that they need to become a worldwide standard

A

User Ports (registered ports)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Ports 49152-65535 aren’t assigned by the IANA, and can be used for any purpose without registration

A

Private Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Used to retrieve data from web servers. Port 80

A

HTTP (Hypertext Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Used for secure web pages and sites. Includes encryption services. Port 443

A

HTTPS (HTTP over TLS/SSL)

40
Q

Used for transferring files between hosts. Contains basic authentication features. Port 20 (data) Port 21 (control)

A

FTP (File Transfer Protocol)

41
Q

Used to log into remote systems via a virtual text terminal interface. Port 23

A

Telnet

42
Q

Encrypted replacement for Telnet and FTP. Includes Secure Copy Protocol (SCP) and Secure Shell FTP (SFTP). Port 22

A

SSH Secure

43
Q

Sends an email to and between mail servers. Port 25

A

SMTP Simple Mail Transfer Protocol

44
Q

Retrieves email from mail servers. Port 110

A

POP3 Post Office Protocol version 3

45
Q

Retrieves email from mail servers. Port 143

A

IMAP Internet Message Access Protocol

46
Q

Used to share files and resources like printers. Port 445

A

SMB Server Message Block

47
Q

Used to share files on Linux and other Unix-like networks. Port 2049, 111

A

NFS Network File System

48
Q

Used to share files on OSX and MacOS networks. Port 548 or 427

A

AFP Apple Filing Protocol

49
Q

Allows computers to find network services without prior configuration. Most commonly used for network printers. Port 427

A

SLP Service Location Protocol

50
Q

Used for network directory services that centrally manage user accounts and network services. Port 389, 636 (secure)

A

LDAP Lightweight Directory Access Protocol

51
Q

Used for remote logins to Windows systems. Port 3389

A

RDP Remote Desktop Protocol

52
Q

Provides name, datagram, and session services for networks using the NetBIOS API. NetBIOS used on TCP/IP networks is sometimes called NetBT. SMB often uses NetBIOS functions as well. Port 137 - 139

A

NetBIOS Network Basic Input/Output System

53
Q

Which protocol is used to find the MAC address of a given IP address?

A

ARP

54
Q

Server that controls access to the network or other resources.

A

Authentication Server

55
Q

Server that provides dynamic IP address configuration to client systems.

A

DHCP server

56
Q

Server that provides domain name lookups for client systems.

A

DNS server

57
Q

Manages security policies for end user systems such as PCs and mobile devices. An endpoint management server may centrally administer antivirus protection, security logging, and policy compliance enforcement across the entire network.

A

Endpoint management server

58
Q

Provides centralized file storage and sharing for network users

A

File server

59
Q

Receives, stores, and delivers email messages

A

Mail server

60
Q

Provides central access to a network printer. Today, network-enabled printers usually run print server applications, and connect directly to the network.

A

Print server

61
Q

Relays communications between LAN hosts and Internet hosts. A proxy server may be used for some protocols or all communications; depending on the network it might be designed to improve security or performance

A

Proxy server

62
Q

Gathers syslog data from other computers and devices on the network and compiles them into one place. A syslog server commonly includes features that process raw logs then generate reports or alerts which are more useful to human administrators.

A

Syslog server

63
Q

Distributes web pages. Internet web servers might be most familiar, but local network applications often use web servers as well. Even an embedded appliance like a home router or network printer will typically use a web server for its configuration interface

A

Web server

64
Q

Allows a command line terminal interface with a remote system. Dating to 1969, Telnet is one of the oldest Internet standards, and uses TCP port 23. Its features are very basic and it isn’t very secure, so it’s not nearly as popular as it once was.

A

Telnet

65
Q

Secure shell was developed as a secure alternative to Telnet: it allows stronger authentication and encrypted transmission. It also allows other features, such as file transfers. SSH uses TCP port 22.

A

SSH

66
Q

Microsoft’s proprietary remote access protocol. Not only does it provide security features, but it allows you to log into a complete Windows desktop over the network. RDP uses TCP port 3389. A number of other vendors offer similar protocols for use with their own products.

A

RDP

67
Q

Virtual Network Computing is an open set of standards based on the Remote Frame Buffer (RFB) protocol. Like RDP, VNC allows you to access a complete graphical desktop, but unlike RDP it directly shares input and output rather than creating a remote user session. This makes it especially useful for screen sharing and presentations as well as remote access. There are many VNC variants such as RealVNC, TightVNC, and UltraVNC. Each may have extra features such as security or specific operating system optimizations. By default, VNC uses TCP port 5900+N, where N is the display number.

A

VNC

68
Q

Web-based interfaces aren’t that suitable for remote access to a graphic or command-line shell interface, though it’s possible with the assistance of a web-based application. More commonly, HTTP is used for web management interfaces for network devices and services. Just like any other website, HTTP itself provides no real security, so HTTPS is much better for use on untrusted networks.

A

HTTP

69
Q

Used to remotely manage and monitor network devices like routers and switches. SNMP doesn’t provide a direct login to the device, but rather standardizes communication between managed devices and a central management application. SNMP uses UDP ports 161 and 162.

A

SNMP

70
Q

Designed for dialup connections to private LANs, but widely used in other networks, Remote Authentication Dial-In User Service authenticates users when they attempt to connect to the network. Uses a variety of UDP ports depending on implementation.

A

Radius

71
Q

A proprietary Cisco protocol with similar functions to RADIUS. It was designed for remote administration of network devices but can be used for remote access authentication as well. Compared to RADIUS it has some security and flexibility benefits, but is proprietary and more resource intensive.

A

TACACS+: Terminal Access Controller Access-Control System Plus

72
Q

Allows a client to access multiple network resources via a single sign-in. Used by a number of network systems, including Windows domain networks.

A

Kerberos

73
Q

An IEEE standard Used to authenticate connections to an Ethernet switch or wireless access point. It’s the protocol used by Wi-Fi hotspots operating in Enterprise mode. 802.1X servers commonly use RADIUS servers for back-end authentication.

A

802.1X

74
Q

Manages distributed directory information services across a network. It’s used by many directory service systems from multiple vendors, such as Novel’s eDirectory and Microsoft’s Active Directory. LDAP allows clients to query a central network database for information about user accounts, printers, and other network resources. While it’s not an authentication system in itself, it’s also vital in some single sign-on environments such as Active Directory. LDAP by default uses TCP port 389 and has limited security features LDAP over SSL (LDAPS) uses TCP port 636; it has security features, but is still more suited to trusted LANs than the Internet.

A

LDAP: Lightweight Directory Access Protocol

75
Q

One of the oldest Internet protocols, File Transfer Protocol allows network access to files. It isn’t very secure, and it isn’t very much like accessing local files at all, so it’s been gradually displaced by SSH on the Internet and other file sharing protocols on the LAN. Still, FTP is in common use as a way to provide Internet access to files. FTP uses TCP ports 20 and 21.

A

FTP

76
Q

Allows folders or hard drives to be shared over the network and accessed much like they were local drives. It’s not only used by file servers, but by clients sharing folders on peer-to-peer networks. SMB was primarily developed and popularized by Microsoft, but today is used by many vendors. SMB uses ports 137-139 and 445. Some versions of SMB are called CIFS, but typically the two can be used interchangeably.

A

SMB: Server Message Block

77
Q

Very similar to SMB but is used primarily by Linux and other Unix-like operating systems. In Linux-only environments it tends to have better performance and easier configuration than SMB, while in Windows environments it’s the opposite. The newest version, NFSv4, uses TCP and UDP port 2049. Older versions additionally require port 111, and possibly others depending on configuration.

A

NFS: Network File System

78
Q

Operates similarly to SMB, but with specific features more tuned to Apple’s file systems. Operates on ports 427 or 548. Older literature might call AFP AppleShare or AppleTalk Filing Protocol.

A

AFP: Apple Filing Protocol

79
Q

A session-layer API, rather than strictly a protocol, NetBIOS is designed to allow various applications to communicate over the network. NetBIOS was designed by IBM but is best known for its use by Microsoft Windows systems, where it is also called NetBEUI and is used for file and printer sharing as well as computer identification. On TCP/IP networks, NetBIOS is often called NetBT and uses TCP and UDP ports 137-139. Due to a number of serious security vulnerabilities, when NetBIOS must be used it should only be enabled on trusted local networks, not on connections accessible from the Internet.

A

NetBIOS

80
Q

Operates on TCP port 80, and itself is an insecure protocol

A

HTTP

81
Q

Operates on TCP port 443. Connections are encrypted using either Secure Socket Layer (SSL) or Transport Layer Security (TLS) protocols. This not only keeps others from eavesdropping on your conversations, it helps you make sure you’re really logging into your bank’s website and not a clever mockup created by a scammer.

A

HTTPS

82
Q

Used to send an email from clients to servers, and for transferring email between servers. It never is used by clients to receive an email from servers. SMTP typically uses TCP port 25.

A

Simple Mail Transfer Protocol (SMTP)

83
Q

Used by clients to receive email from servers; never used to send an email. Currently at version 3, or POP3. POP3 works best for accounts accessed only on one device, and uses TCP port 110

A

Post Office Protocol (POP)

84
Q

Used by clients to receive email from servers; never used to send an email. Currently at version 4, or IMAP4. IMAP supports more features than POP. It works better for accounts accessed from multiple devices, but it also requires more server resources.

A

Internet Message Access Protocol (IMAP)

85
Q

A proprietary protocol used by Microsoft Exchange email servers. It both sends and receives email, and has other specific features used by Exchange. It’s not usually used on the Internet, but is popular in Microsoft-based networks and email clients.

A

Messaging Application Programming Interface (MAPI)

86
Q

Allows file transfer feature and uses TCP port 22

A

Secure Shell (SSH)

87
Q

Allows a user to access a complete graphical desktop and uses TCP port 5900+N

A

Virtual Network Computing (VNC)

88
Q

Allows a user to log into a complete Windows desktop over the network and uses TCP port 3389

A

Remote Desktop Protocol (RDP)

89
Q

Allows a command-line terminal interface with a remote system and uses TCP port 23

A

Telnet

90
Q

Used to remotely manage and monitor network devices and uses UDP ports 161 and 162

A

Simple Network Management Protocol (SNMP)

91
Q

Used for web management interfaces for network devices and services

A

Hyper Text Transfer Protocol (HTTP)

92
Q

An authentication protocol that provides centralized authentication and authorization services for remote users. It uses TCP port 49 and supports multifactor authentication.

A

Terminal Access Controller Access Control System Plus (TACACS+)

93
Q

IPv6 (version 6) or IPng (next generation) advantages

A
  • IP address size will increase from 32 bits to 128 bits.
  • Some of the header fields have been dropped.
  • Version 6 has less rigid length limits and the ability to introduce new options.
  • Packets will indicate particular traffic type.
  • Support will be provided for data integrity and confidentiality.
  • The IPv6 header is 40 fixed bytes and has eight fields of information.
94
Q

What is the APIPA address range?

A

169.254.0.0 - 169.254.255.255

95
Q

What is the Link Local address?

A

fe80::/10

96
Q

What are the three blocks of IP addresses that have been reserved by the IANA for private networks?

A
  1. 0.0.0 to 10.255.255.255
  2. 16.0.0 to 172.31.255.255
  3. 168.0.0 to 192.168.255.255