Shared Flashcard Set

Details

CompTIA Network+ Chapter 6: TCP/IP Basics
Studying material based on Mike Meyers' book
27
Computer Networking
Post-Graduate
11/07/2023

Additional Computer Networking Flashcards

 


 

Cards

Term

The ___ Protocol works at the Network layer, where it takes data chunks from the Transport layer, adds addressing, and creates the final IP packet. (pg. 173)

 

A. Hypertext Transfer (HTTP)

B. Internet (IP)

C. Transmission Control (TCP)

D. User Datagram (UDP)

Definition

B. Internet Protocol

 

HTTP operates at the Application Layer.

 

TCP and UDP operate at the Transport Layer.

Term

The connection-oriented protocol used with TCP/IP is called the ___. The connectionless one is called the ___. (pg. 174)

 

A. Hypertext Transfer Protocol (HTTP)

B. User Datagram Protocol (UDP)

C. Internet Control Message Protocol (ICMP)

D. Transmission Control Protocol (TCP)

Definition

D. and B.

 

TCP gets an application's data from one machine to another reliably and completely.

 

UDP works best with a lot of data that doesn't need to be perfect or when the chances of a problem occurring are too small to worry about.

Term

The three parts of the TCP three-way handshake are: (pick three)

 

A. ACK

B. ACK-SYN

C. SYN-ACK

D. SYN

Definition

A. C. and D.

 

The three parts in order are SYN, SYN-ACK and ACK.

Term

___ is/are used by systems to determine what application needs the data received or requested from a sending device. (pg. 175)

 

A. Checksum

B. Sequence numbers and acknowledgement numbers

C. Flags

D. Port numbers

Definition

D. Port numbers range from 1- 65,535. Each application is assigned a specific port number on which to listen/send.

Term

The ___ field(s) in the TCP header enable the sending and receiving computers to keep track of the various pieces of data flowing back and forth. (pg. 175)

 

A. port numbers

B. sequence/acknowledgement numbers

C. flags

D. checksum

Definition
B. Sequence numbers and acknowledgement numbers
Term

Individual bits of a TCP header that gives both sides detailed information about the state of the connection. (pg. 175)

 

A. Flags

B. SYN, SYN-ACK and ACK

C. Datagram

D. Segments

Definition
A. Flags, also known as TCP flags
Term

The recipient device of a TCP packet can use the ___ to check the header for errors such as bits flipped or lost during transmission. (pg. 175)

 

A. Protocol

B. Checksum

C. SYN

D. Flags

Definition

B. The checksum adds a numerical value to the end of each packet, enabling the receiver to detect corruption that can occur as the packet moves through the network.

Term

True or False:

 

Data gets chopped into chunks at the Transport layer when using UDP. These chunks are called segments. (pg. 176)

Definition

False: UDP data is sent as datagrams and don't get divided; they just get a header.

 

TCP data is chopped into segments at the Transport layer.

Term

The process and protocol used in resolving an IP address to an Ethernet MAC address is called ___. (pg. 180)

 

A. Address Resolution Protocol (ARP)

B.Transmission Control Protocol (TCP)

C. Internet Control Message Protocol (ICMP)

D. Hypertext Transfer Protocol (HTTP)

Definition

A. A computer sends an ARP request to MAC address FF-FF-FF-FF-FF-FF. The switch forwards the broadcast to every node, and the intended recipient responds to the ARP request by sending the first computer an ARP reply through the switch.

Term
An IP address is made up of two parts: a network ID and a host ID. What is the difference between them? (pg. 189)
Definition

The network ID is the part of an IP address that each computer on a LAN share identically. The host ID is the unique part of the IP address for each device.

Term

When you have a router that routes traffic out to other networks, both the router's interface on a LAN and the router itself are called the ___. (pg. 190)

 

A. Subnet mask

B. Host ID

C. Routing table

D. Default gateway

Definition

D. The IP address of the default gateway is used to configure a client to access the network beyond the router (in a typical scenario).

Term

The instructions that tell a router what to do with incoming packets and where to send them. (pg. 190)

 

A. Address Resolution Protocol (ARP)

B. Transmission Control Protocol (TCP)

C. Routing table

D. Domain Naming System (DNS)

Definition

C. A routing table is a list of various networks and the next hop to reach them. Routers direct traffic for each network to the next hop.

Term

The value used in TCP/IP settings to divide the IP address of a host into its component parts: network ID and host ID. (pg. 193, 879)

 

A. MAC address

B. ARP table entry

C. subnet mask

D. binary

Definition

C. A subnet mask is a string of ones followed by zeroes totaling 32 bits set on every TCP/IP host. It allows a sending device to determine if the intended recipient is on the same network.

Term

Which of the following shows an IP address and subnet mask represented by CIDR notation? (pg. 196)

 

A. 10.15.40.83/24

B. 10.15.40.83/1x24

C. 00001010.00001111.00101000.01010011/24

D. 10.15.40.83/255.255.255.0

Definition
A. CIDR notation uses a backslash (/) to distinguish the IP address (in dotted decimal form) and the subnet mask, represented by a number equal to the number of ones it has.
Term

Which of these IP addresses is in the Class B block? (pg. 197)

 

A. 111.54.13.201

B. 164.23.45.123

C. 192.168.72.24

D. 240.126.50.40

Definition

B. The Class ID system goes:

[image]

Term

The concept of taking a single class of IP addresses and chopping it up into multiple smaller groups is called ___. (pg. 199)

 

A. segmenting

B. networking

C. masking

D. subnetting

Definition

D. Subnetting enables a much more efficient use of IP addresses compared to class blocks, and enables you to separate a network for security and bandwidth control.

Term

The IP addressing method that involves typing all of the IP information into each host. (pg. 210)

 

A. Advanced

B. Dynamic

C. Manual

D. Static

Definition
D. Static
Term

The four-step process that a DHCP client uses to obtain an IP address from a DHCP server is referred to as ___ (pg.215-216)

 

A. AT-AT (Ask, Test, Accept, Trust)

B. ICCA (Inquire, Check, Confirm, Accept)

C. DORA (Discover, Offer, Request, Acknowledgment)

D. SFTK (Search, Find, Try, Keep)

Definition

C. Discover - client broadcasts a message to a server.

 

Offer - the server replies with IP information.

 

Request - the client verifies the offer is valid and accepts.

 

Acknowledgment - the server sends a message listing the client's MAC address and IP information in a database.

Term

What are the ports that DHCP servers and clients use? (pg. 216)

 

A. TCP ports 67 and 68

B. UDP ports 67 and 68

C.TCP ports 80 and 443

D. UDP ports 80 and 443

Definition
B. UDP ports 67 and 68 are reserved for DHCP requests. TCP port 80 is used by HTTP servers to field client requests, and HTTPS servers use port 443 for the same.
Term

Pick three: A DHCP server requires: (pg. 217)

 

A. A pool of IP addresses to issue to clients

B. The subnet mask for the network

C. The MAC address of the ISP's router

D. The IP address for the default gateway for the network

Definition
A., B. and C.
Term

What is the purpose of a DHCP relay? (pg. 219)

 

A. It allows DHCP broadcasts to cross routers.

B. It allows DHCP servers to set up MAC reservations.

C. It allows devices with reserved addresses to work in a DHCP environment.

D. It allows a client to connect to a network without manual setup

Definition

A. A DHCP relay (or relay agent) enables a router to accept DHCP broadcasts from clients and then use UDP forwarding to send them on via unicast addresses directly to the DHCP server.

Term

What is the purpose of IP reservation? (pg. 219)

 

A. It allows devices to keep IP address for a time without losing them if they disconnect from the network.

B. It allows authenticated devices to receive an IP address faster.

C. It allows devices that don't need DHCP to have static IP addresses.

D. It ensures that only devices that are on a specified domain can connect to the network.

Definition

C. Certain devices like printers, cameras and servers should have permanent addresses to allow them to be located easily.

Term

All DHCP clients are designed to generate an ___ address automatically if they do not receive a response to a DHCP Discover message. (pg. 223)

 

A. DORA

B. DARPA

C. APIPA

D. TCP/IP

Definition

C. An Automatic Private IP Address (APIPA) allows clients that don't receive a response to their Discover message to communicate with each other while they are on the same network ID.

 

DORA (Discover, Offer, Request, Acknowlegement) is the four-step process a client takes to receive IP configuration from a DHCP server.

 

The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military.

 

TCP/IP is the protocol suite most commonly used for networking.

Term
True or False: APIPA can issue a temporary IP address and default gateway so a client can communicate with others and get out to the Internet until it can talk to the DHCP server.
Definition
False: APIPA can issue a temporary IP address, but not a default gateway. A client can communicate with other clients on the same network ID (usually 169.254.x.x), but can't get out to the Internet.
Term

What is DHCP failover? (pg. 226)

 

A. If a client is unable to reach one DHCP server, it tries to reach another.

B. Two DHCP servers work together to provide failure redundancy for a network.

C. If a DHCP server goes down, another one that was on standby takes over DHCP duties.

D. A DHCP server attempts to provide IP addresses beyond its available scope.

Definition

B. The DHCP failover pair shares a single scope. If either fails, the other picks up the load and the the end users never notice a thing.

Term

What issues can a rogue DHCP server have/cause? (select all that apply, pg. 226)

 

A. It can intercept or capture incoming and outgoing traffic.

B. It passes out incorrect IP information to clients.

C. It goes into Stealth Mode and can't be pinged.

D. It refuses to be reconfigured by a network administrator.

Definition

A. and B. It can change the default gateway to alter traffic in intentionally malicious cases, but pass out incorrect IP info in more accidental ones.

Term

What is the numeric reservation for the loopback address in TCP/IP? (pg. 227)

 

A. 192.168.0.0

B. 127.0.0.1

C. 255.255.255.0

D. 169.254.x.x

Definition

B. 127.0.0.1, although the entire 127.0.0.0/8 is reserved for loopback addresses.

 

When you tell a device to send data to these addresses, you're telling the device to send the packet to itself.

Supporting users have an ad free experience!