Week 5 Flashcards

1
Q

What do TCP/IP protocols do?

A

TCP/IP protocols add a header to data inherited from the layer above it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What layer does TCP operate in?

A

Transmission Control Protocol (TCP) operates in the transport layer (Layer 4) of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three characteristics of TCP?

A
  • Connection-oriented - ensures connection is established using three way handshake
  • Sequencing and checksums - sends a checksum which is checked by host
  • Flow control - gauges rate of transmission based on how quickly recipient can accept data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a three-way handshake?

A

The TCP three-way handshake establishes a session before TCP transmits actual data. Three transmissions are sent before data transmission:
- Step 1 - A request for connection (SYN)
- Step 2 - A response to the request (SYN/ACK)
- Step 3 - A connection is established (ACK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is UDP?

A

User Datagram Protocol (UDP) is an unreliable, connectionless protocol.
- No threeway handshake is performed
- Does not guarantee delivery of data
- No error checking, sequencing, or flow control
- Useful for live or audio or video transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four fields in a UDP header?

A
  • Source port
  • Destination port
  • Length
  • Checksum
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What layer of the OSI model does IP operate at?

A

The network layer (Layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the characteristics of IP?

A
  • IP is an unreliable, connectionless protocol
  • IP depends on TCP to ensure messages are put back together in the right order and to ensure each message reaches the correct application
  • IP enables TCP/IP to interwork
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ICMP?

A

ICMP is a core network layer protocol that reports on the success or failure of data delivery. It only detects errors it does NOT correct them. ICMPv6 on IPv6 networks performs the functions of ICMP and ARP on IPv4 networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can ICMP indicate?

A

ICMP can indicate the following:
- When part of a network is congested
- When data fails to reach its destination
- When data has been discarded because the allotted TTL has expired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is ARP?

A

Address Resolution Protocol (ARP) is a layer 2 (Data Link) protocol that works in conjunction with IPv4 to discover the MAC address of a host or node on the local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an ARP table?

A

An ARP table is the database of IP-to-MAC address mappings. It can contain two types of entries:
- Dynamic - created when client makes ARP request that could not be satisfied by data in the table
- Static - entries created manually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is NDP?

A

Neighbour Discovery Protocol (NDP) allows IPv6 devices learn about other devices on their networks. NDP (Neighbour Discovery Protocol) information carried in ICMPv6messages automatically detects neighbouring devices and automatically adjusts when nodes fail or are removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do encryption protocols do?

A

Encryption protocols use cryptographic methods to scramble data into a format that can be read only by reversing the cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three benchmarks which encryption methods are evaluated?

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two categories of key encryption?

A
  • Private key encryption
  • Public key encryption
17
Q

What is IPsec?

A

IPsec (IP security) is an encryption protocol suite that defines rules for encryption, authentication, and key management for TCP/IP transmissions

18
Q

What are the five steps in IPsec?

A
  1. IPsec initiation
  2. Key management
  3. Security negotiations
  4. Data transfer
  5. Termination
19
Q

What is SSL and TLS?

A

Both SSL and TLS are methods of encrypting TCP/IP transmissions. Both protocols work side by side and are widely known as SSL/TLS or TLS/SSL.

20
Q

What is an RAS and what are the two types?

A

A remote access server (RAS) allows for remote access. There are two different types of RAS:
- Dedicated devices
- Software running on a server