Chapter 9: TCP/IP Applications Flashcards Preview

network A+ > Chapter 9: TCP/IP Applications > Flashcards

Flashcards in Chapter 9: TCP/IP Applications Deck (98)
Loading flashcards...
1
Q

Session

A

A logical stream of data flowing between two programs over a network.

2
Q

Transmission Control Protocol (TCP)

A
  • Enables connection-oriented communication in networks that use the TCP/IP protocol suite.
  • Most common type of session
3
Q

TCP Three-Way Handshake

A

A three-packet conversation between TCP hosts to establish and start a data transfer session.

4
Q

User Datagram Protocol (UDP)

A

Used for the type of sessions that don’t require the overhead of connection-oriented traffic.

5
Q

Port and Session Type of DHCP

A
Port 67 (server) and port 68 (client)
UDP
6
Q

Network Time Protocol (NTP)

A

Synchronizes the clocks of devices on a network.

UDP port 123

7
Q

Trivial File Transfer Protocol (TFTP)

A

Enables you to transfer files from one machine to another.

UDP port 69

8
Q

Internet Control Message Protocol (ICMP)

A
  • Used to handle many low level functions such as error reporting.
  • Usually request and response pairs
9
Q

What kind of packets does ping send?

A

ICMP

10
Q

What is the packet called that ping sends out? The one that comes back?

A

Echo request, Echo reply

11
Q

If your computer has no route to the address listed, ping will display _________.

A

Destination Host Unreachable

12
Q

If you ping a device and no echo reply comes back before the 1-second default time, ping will respond with _______.

A

Request Timed Out

13
Q

Ping of Death

A

A ping that allowed malicious users to send malformed ping packets to your computer and make it crash.

14
Q

Internet Group Management Protocol (IGMP)

A

Enables routers to communicate with hosts to determine a “group” membership for multicasting.

15
Q

What is the subnet that multicast addresses use?

A

224.0.0.0/4

16
Q

Well-known Port Numbers

A

0-1023

Reserved for specific TCP/IP applications

17
Q

Ephemeral Ports

A

1024-5000
An arbitrary number generated by a sending computer that the receiving computer uses as a destination address when sending a return packet.

18
Q

Dynamic/Private Port Numbers

A

49152-65535

Recommended by IANA to use as ephemeral port numbers

19
Q

Registered Ports

A

1024-49151

The IANA assigns these ports for anyone to use for their application

20
Q

Socket

A

A combination of a port number and an IP address that uniquely identifies a connection.

21
Q

Endpoints

A

The term used when discussing the data each computer stores about the connection between two computers’ TCP/IP applications.

22
Q

netstat

A

Shows you the list of endpoints you have connections with.

23
Q

netstat -a

A

Tells netstat to show all used ports

24
Q

netstat -n

A

Tells netstat to show raw port #’s and IP addresses.

25
Q

netstat -o

A

Tells netstat to show the process ID

26
Q

netstat -b

A

Shows the name of the running program

27
Q

Open Port

A

A socket that is prepared to respond to any IP packets destined for that socket’s port number.

28
Q

Established Port

A

Active, working endpoint

29
Q

close_wait

A

Implies that a graceful closure is happening, i.e. each side see the session closing normally

30
Q

time_wait

A

Means a connection has been lost and is waiting a defined amount of time called a timeout period.

31
Q

ps

A

Linux command that shows process IDs

32
Q

Hypertext Transfer Protocol (HTTP)

A

Defines what actions Web servers and browsers should take in response to various commands.
TCP port 80

33
Q

Web Server

A
  • A computer that delivers Web pages.

- Listen on port 80

34
Q

Internet Information Services (IIS)

A
  • Microsoft’s Web server program for managing Web servers.

- Enables you to set a max connection limit on your Web server based on available bandwidth and memory

35
Q

Apache HTTP Server

A

The web server that most UNIX/Linux based operating systems use.

36
Q

What are the three qualities of a secure Internet application?

A

1) Authentication
2) Encryption
3) Nonrepudiation:Process of making sure data came from the person or entity it was supposed to come from.

37
Q

Secure Sockets Layer (SSL)

A

A protocol developed for transmitting private documents over the Internet

38
Q

HTTPS

A
  • The secure form of HTTP

- TCP Port 443

39
Q

Telnet

A
  • The first protocol invented to connect remotely to another computer.
  • TCP Port 23
40
Q

Secure Shell (SSH)

A

Like Telnet, but encrypted.

-TCP Port 22

41
Q

Simple Mail Transfer Protocol (SMTP)

A

Used by email clients to send messages

TCP Port 25

42
Q

Post Office Protocol version 3 (POP3)

A

Used to receive mail

TCP Port 110

43
Q

Internet Message Access Protocol version 4 (IMAP4)

A

Preferred alternative to POP3 for receiving mail

TCP Port 143

44
Q

File Transfer Protocol (FTP)

A

-The original protocol for transferring files on the Internet.
-Not encrypted
TCP port 20/21

45
Q

Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.
(A) True
(B) False

A

Answer : (A)

46
Q

TCP is preferred over UDP for real time services.​
(A) True
(B) False

A

Answer : (B)

47
Q

CALEA requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.​
(A) True
(B) False

A

Answer : (A)

48
Q

The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.​
(A) True
(B) False

A

Answer : (A)

49
Q

Wireshark or any other monitoring software running on a single computer connected to a switch doesn’t see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.​
(A) True
(B) False

A

Answer : (A)

50
Q
SNMP agents receive requests from an NMS on what port number?​ 
(A) ​161 
(B) ​162 
(C) ​163 
(D) ​160
A

Answer : (A)

51
Q
What security standard below was created to protect credit card data and transactions, requiring network segmentation as part of security controls?​ 
(A) ​CALEA 
(B) ​HIPAA (
C) ​PCI DSS 
(D) ​CAARA
A

Answer : (C)

52
Q
Packets that exceed the medium's maximum packet size are known by what term?​ 
(A) ​giants 
(B) ​runts 
(C) ​ghosts 
(D) ​jabbers
A

Answer : (A)

53
Q
​Packets that are smaller than a medium's minimum packet size are known by what term below? 
(A) jabbers 
(B) ​giants 
(C) ​ghosts
(D) ​runts
A

Answer : (D)

54
Q
When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?​ 
(A) ​ghost 
(B) ​jabber 
(C) ​talker (
D) ​blabber
A

Answer : (B)

55
Q

Which of the following is not a requirement in order to use a soft phone?​
(A) An ​IP telephony client.
(B) ​The ability to communicate with a digital telephone switch.
(C) ​A microphone and speakers, or a headset.
(D) ​A wireless carrier to handle the voice path.

A

Answer : (D)

56
Q
What percentage of Internet traffic, as estimated by Cisco Systems, will be devoted to video traffic by 2018?​ 
(A) ​20% 
(B) ​65% 
C) ​79% 
(D) ​93%
A

Answer : (C)

57
Q
In a VoIP call, what method of transmission is used between two IP phones? 
(A) global multicast 
(B) multicast 
(C) unicast 
(D) ​broadcast
A

Answer : (C)

58
Q
​On circuit switched portions of a PSTN, what set of standards established by the ITU is used to handle call signaling? 
(A) ​MCU 
(B) ​H.323 
(C) ​H.225 
(D) ​SS7
A

Answer : (D)

59
Q
​Which element of H.323 is a device that provides translation between network devices running the H.323 signaling protocols and devices running other types of signaling protocols? 
(A) ​H.323 terminal 
(B) ​H.323 gateway 
(C) ​H.323 gatekeeper
(D) ​MCU
A

Answer : (B)

60
Q
In H.323, which protocol below handles call or video conference signaling?​ 
(A) ​H.225 
(B) ​H.245 
(C) ​H.200 
(D) ​H.252
A

Answer : (A)

61
Q
A computer that provides support for multiple H.323 terminals and manages communication between them is known as what term below? 
(A) ​H.323 gateway 
(B) ​H.323 gatekeeper 
(C) ​MCU 
(D) ​H.323 server
A

Answer : (C)

62
Q
A server running the SIP protocol listens on what TCP/UDP port for unsecured communications?​ 
(A) ​6050 
(B) ​5060 
(C) ​5061 
(D) ​6051
A

Answer : (B)

63
Q
​What component of SIP is a server that responds to user agent clients' requests for session initiation and termination? 
(A) ​proxy server 
(B) ​registrar server 
(C) ​user agent server 
(D) ​redirect server
A

Answer : (C)

64
Q
When using SIP, what term is used to describe end-user devices, which may include workstations, tablet computers, smartphones, or IP phones?​ 
(A) user agent​ 
(B) ​user agent client 
(C) ​user agent proxy 
(D) ​user agent node
A

Answer : (B)

65
Q
In order for gateways to exchange and translate signaling and control information with each other so that voice and video packets are properly routed through a network, what intermediate device is needed?​ 
(A) ​media gateway 
(B) ​media proxy server 
(C) ​media gateway controller
(D) ​analog switch
A

Answer : (C)

66
Q
When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream? 
(A) ​assured forwarding 
(B) ​prioritized forwarding 
(C) ​scaled forwarding 
(D) expedited forwarding​
A

Answer : (D)

67
Q
The Priority Code Point field in a frame consists of how many bits?​ 
(A) ​2 bits
 (B) ​3 bits 
(C) ​5 bits
(D) ​8 bits
A

Answer : (B)

68
Q
What protocol enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols?​ 
(A) ​DiffServ 
(B) ​MPLS 
(C) ​CoS 
(D) ​SIP
A

Answer : (B)

69
Q
A highly available server is available what percentage of the time?​ 
(A) ​90% 
(B) ​99% 
(C) ​99.9% 
(D) ​99.99%
A

Answer : (D)

70
Q
​What two log files are used by older versions of Unix and newer version of Linux to store log information? 
(A) ​/var/log/messages 
(B) ​/var/log/syslog 
(C) ​/var/log/log 
(D) ​/var/adm/messages
A

Answer :

71
Q
What two terms below are used to describe a telephone switch that connects and manages calls within a private organization?​
 (A) ​public branch exchange 
(B) ​private branch exchange 
(C) ​PBX 
D) ​PBE
A

Answer :

72
Q
What two terms below describe the process of manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment?​ 
(A) ​bandwidth policing 
(B) ​throughput shaping 
(C) traffic shaping​
 (D) ​packet shaping
A

Answer :

73
Q
What two terms below describe a network device with three ports, two of which send and receive all traffic, and the third port mirrors the traffic?​
(A) network hub​ 
(B) ​network tap 
(C) ​network splitter
(D) packet sniffer​
A

Answer :

74
Q
What two terms below are used to describe an analog-to-digital voice conversion device that accepts and interprets both analog and digital voice signals? 
(A) IP PBX​ 
(B) ​digital PBX 
(C) ​ATA PBX 
D) ​ePBX
A

Answer :

75
Q

True or False: The scope of network management techniques differs according to the network’s size and importance.

A

Answer: True

76
Q

A _____ is a report of the network’s current state of operation.

A

Answer: baseline

77
Q

In addition to internal policies, a network manager must consider ____ regulations that might affect her responsibilities.

a. state
b. federal
c. state and federal
d. local

A

Answer: C

78
Q

The network management protocol that provides for both authentication and encryption is ____.

a. SMTP
b. SNMPv1
c. SNMPv2
d. SNMPv3

A

Answer: D

79
Q

True or False: Much of the information collected in event logs and syslog files does not point to a problem, even if it is marked with a warning.

A

Answer: True

80
Q

VoIP, is the use of any network (either public or private) to carry ____________________ signals using the TCP/IP protocol.

A

Answer: voice

81
Q

True or False: VoIP can run over any packet-switched network.

A

Answer: True

82
Q

____________________ allow the user to customize his or her graphical interface.

A

Answer: Soft phones

83
Q

____ is the protocol specified by the H.323 standard that handles call or video conference signaling.

a. H.225
b. H.245
c. H.248
d. H.252

A

Answer: A

84
Q

____________________, ensures that the type of information - whether voice or video - issued to an H.323 terminal is formatted in a way that the H.323 terminal can interpret.

A

Answer: H.245

85
Q

True or False: SIP does not attempt to perform and control as many functions as the H.323 protocols.

A

Answer: True

86
Q

Media gateways rely on an intermediate device known as a(n) ____________________ to exchange and translate signaling and control information with each other.

A

Answer: MGC (media gateway controller), Media gateway controller, MGC

87
Q

____ is a simple technique that addresses QoS issues by prioritizing traffic.

e. RTCP (Real-time Transport Control Protocol)
f. RSVP (Resource Reservation Protocol)
g. MPLS (multiprotocol label switching)
h. DiffServ (Differentiated Service)

A

Answer: D

88
Q
1.	What federal organization sets strict standards to protect the privacy of patient records?
A.	CALEA
B.	HIPAA
C.	PCI DSS
D.	IETF
A

Answer: B. HIPAA

89
Q
2.	What command retrieves the next record in an SNMP log?
A.	snmpget   
B.	snmpwalk
C.	snmpgetnext
D.	snmptrap
A

Answer: C. snmpgetnext

90
Q
3.	What port do SNMP agents listen on?
A.	Port 161
B.	Port 21
C.	Port 162
D.	Port 10162
A

Answer: A. Port 161

91
Q
4.	What utility in Linux provides standards for generating, storing, and processing messages about events on a system?
A.	Event Viewer
B.	event log
C.	ls
D.	syslog
A

Answer: D. syslog

92
Q
5.	One of your coworkers downloaded several, very large video files for a special project she’s working on for a new client. When you run your network monitor later this afternoon, what list will your coworker’s computer likely show up on?
A.	Top talkers
B.	Top listeners
C.	Event Viewer
D.	Discarded packets
A

Answer: B. Top listeners

93
Q
6.	Your roommate has been hogging the bandwidth on your router lately. What technique can you use to limit the amount of bandwidth his computer can utilize at any one time?
A.	Interface reset
B.	Packet shaping
C.	Caching
D.	Traffic policing
A

Answer: D. Traffic policing

94
Q
7.	What kind of phone is a Skype app?
A.	Analog phone
B.	IP phone
C.	Soft phone
D.	Video phone
A

Answer: C. Soft phone

95
Q
8.	You’re trying to choose a signaling protocol for your company’s network because you’re about to upgrade to a VoIP system. You need to keep it simple because this is a small company with a simple network. Which protocol should you choose?
A.	H.323
B.	SIP
C.	MGCP
D.	Megaco
A

Answer: B. SIP

96
Q
9.	RTP and RTCP operate at which layer of the OSI model?
A.	Application layer
B.	Transport layer
C.	Network layer
D.	Data Link layer
A

Answer: A. Application layer

97
Q
10.	Which QoS technique operates at the OSI layer “2.5”?
A.	RTP
B.	DiffServ
C.	MPLS
D.	CoS
A

Answer: C. MPLS

98
Q
  1. When you arrive at work one morning, your Inbox is full of messages complaining of a network slowdown. You collect a capture from your network monitor. What can you compare it with in order to determine what has changed?
A

Answer: A baseline