Test Ch. 9-12 Flashcards
Connection-oriented Communication
A protocol that does not establishes a connection between two hosts before transmitting data and verifies receipt before closing the connection between the hosts. TCP is an example of a connection-oriented protocol.
Connectionless Communication
A protocol that does not establish and verify a connection between the hosts before sending data; it just sends the data and hopes for the best. This is faster than connection-oriented protocols. UDP is an example of a connectionless protocol.
Session
Any single communication between a computer and a another computer.
TCP
Transmission Control Protocol - enables connection-oriented communication in networks that use the TCP/IP protocol suite.
TCP Three-way handshake
.
If the network is not visible on the Internet, the DNS naming convention does not require top-level domain names such as .com or .org
True
As the Internet grew, HOSTS replaced DNS
False
Which is the correct sequence according to the DNS naming convention?
Host.Domain.Root
Symmetric-key encryption is what we call any encryption that uses the same key for both encryption and decryption.
True
This is a mathematical function that creates a checksum, and which is used by most forms of nonrepudiation.
Hash
This protocol offers a method for querying the state of certain network devices
SNMP
Hubs, switches and routers all work at layer 1 of the OSI seven-layer model.
False
Microsoft Exchange is an example of a dedicated e-mail client.
False
This is one example of the many programs that use the BitTorrent file-sharing protocol in modern peer-to-peer implementations.
µTorrent
VPNs use encryption.
True
UDP
User Datagram Protocol - Part of the TCP/IP protocol suite, a connectionless protocol that is an alternative to TCP.
DHCP
Dynamic Host Configuration Protocol - uses UDP - DHCP clients uses port 67 for sending data, DHCP servers use port 68 for sending data.
NTP/SNTP
Network Time Protocol. Simple Network Time Protocol.
TFTP
Trivial File Transfer Protocol enables you to transfer from one machine to another. Doesn’t have any protection. Uses port 69.
ICMP
Internet Control Message Protocol
IGMP
Internet Group Managment Protocol
Well-known Port Numbers
Port numbers between 0 and 1023
Ephemeral Port Numbers
1024-5000
Dynamic or Private Port Numbers
49152-65535