Term
Network communication between two hosts that includes negotiation between the hosts to establish a communication session. (pg.282)
A. unicast
B. connection-oriented
C. peer-to-peer (P2P)
D. open-source |
|
Definition
B. In connection-oriented communication, each data segment that are transferred between hosts are acknowledged before a subsequent segment can be sent.
Orderly closure of the communication is conducted at the end of the data transfer or in the event of a communication failure. |
|
|
Term
Network communication method characterized by sending packets that aren't acknowledged by the destination host. (pg. 282)
A. unsecured
B. closed source
C. broadcast
D. connectionless |
|
Definition
D. There is no acknowledgement or closing in connectionless communication. UDP is the quintessential connectionless protocol in the TCP/IP suite. |
|
|
Term
True or false: connection-oriented protocols are generally faster than connectionless protocols. (pg. 821)
|
|
Definition
False: connectionless protocols are faster because they don't require as much overhead like acknowledgment and closing. |
|
|
Term
The protocol in the TCP/IP suite that enables connection-oriented communication. (pg. 283)
A.TCP
B. DHCP
C. DNS
D. NTP |
|
Definition
A. Transmission Control Protocol (TCP) is the only protocol in the TCP/IP suite that enables connection-oriented programming. The other three choices are all connectionless.
TCP uses the three-way handshake to establish connections. |
|
|
Term
Describe the TCP three-way handshake between a Web server and client. (pg. 283) |
|
Definition
The client sends a SYN (synchronize) segment to the Web server. If the server gets that segment, it returns a single SYN, ACK (synchronize, acknowledge) segment. The client then sends the server a single ACK (acknowledgement) segment and immediately requests that the server begin sending Web data. |
|
|
Term
The protocol used for the types of sessions that don't require the overhead of connection-oriented programming. (pg. 284)
A. ACK
B. UDP
C. SYN
D. TCP |
|
Definition
B. DNS, DHCP, NTP/SNTP and TFTP all use User Datagram Protocol (UDP). |
|
|
Term
Protocol that enables the use of names associated with IP addresses for devices connected to IP networks. (pg. 284)
A. UDP
B. ICMP
C. DHCP
D. DNS |
|
Definition
D. DNS (Domain Name System) is why you can type a Web site name such as google.com into an address bar and get to Google instead of having to remember the server's IP address.
It uses UDP on port 53 by default. |
|
|
Term
Protocols that use UDP to synchronize the clocks of devices on a network. (pg. 285)
A. IGMP/SIGMP
B. NTP/SNTP
C. DNS/DNSS
D. FTP/TFTP |
|
Definition
B. If a device requires NTP (Network Time Protocol) or SNTP (Simple Network Time Protocol), you will be able to enter the IP address for an NTP/SNTP server. They use port 123. |
|
|
Term
Protocol that enables the transfer of files from one machine to another using UDP (pg. 286).
A. SNMP
B. HTTP
C. TFTP
D. TCP |
|
Definition
D. Trivial File Transfer Protocol (TFTP) is typically used to update software and configurations on routers, switches, VOIP phones and other devices on a LAN, where the chances of losing packets is very small. |
|
|
Term
Protocol that works at Layer 3 to handle low-level housekeeping tasks such as host unreachable messages and router advertisements (pg. 286).
A. PPP
B. IGMP
C. NTP/SNTP
D. ICMP |
|
Definition
D. Internet Control Message Protocol (ICMP) is used for utilities like ping to send an echo request to a specified IP address. All computers running TCP/IP (sans firewall) respond to with an echo reply. |
|
|
Term
The port numbers from 0-1023 are called ___ ports
The port numbers from 1024-49151 are called ___ ports
The port numbers from 49152-65535 are called ___ ports (pg. 291)
A. static
B. ephemeral
C. dynamic
D. secured
E. private
F. open
G. registered
H. well-known |
|
Definition
The port numbers from 0-1023 are called well-known ports
The port numbers from 1024-49151 are called registered ports
The port numbers from 49152-65535 are called dynamic, ephemeral or private ports |
|
|
Term
In TCP/IP, the session information (IP address, port number and Layer 4 protocol) held in memory on a single computer. (pg. 291)
A. socket pair
B. netstat
C. endpoint
D. socket |
|
Definition
C. or D. A socket or endpoint is the term for the session information on a single computer, while a socket pair is the term for the session information on two computers.
netstat is the utility to get information about a computer's active TCP/IP connections from a command line. |
|
|
Term
True or False:
netstat is a command line tool you can use to see active TCP/IP connections at a glance, but it doesn't have a way to update changes on the fly. |
|
Definition
True. You'll need a third-party application if you want a tool that automatically updates connection states. |
|
|
Term
A socket that is prepared to respond to any traffic destined for that socket's port number is called a ___ port. (pg. 294)
A. designated
B. established
C. close_wait
D. listening |
|
Definition
D. Also called an open port, every serving application has a listening port.
Established ports are active, working endpoint pairs.
The CLOSE_WAIT state indicates that the remote end of the connection has finished transmitting data and that the remote application has issued a close or shutdown call.
A designated port is one I made up. |
|
|
Term
Telnet allows a computer to connect remotely to another computer or server via the command line. What advantage does SSH have over Telnet? (pg. 298)
A. More utility and options
B. Security
C. Can work across different OS
D. GUI
E. All of the above |
|
Definition
B. Secure Shell (SSH) is extremely similar in that it creates a terminal to a remote host, but every aspect of SSH is encrypted. |
|
|
Term
Pick three: (pg. 299)
___ is used to send e-mail from clients and between e-mail servers.
___ retrieves e-mail from servers, but is on its way out.
____ retrieves e-mail from a server and is a preferred alternative to ____.
A. SSH
B. POP3
C. IMAP4
D. SMTP |
|
Definition
D., B. C. and B. again.
The e-mail found on the Internet uses SMTP to send-email, and either POP3 or IMAP4 to retrieve e-mail. |
|
|
Term
Every major relational database uses the ___ query language. (pg. 305)
A. Data Manipulation Language (DML)
B. Transaction Control Language (TCL)
C. Structured Query Language (SQL)
D. Data Definition Language (DDL) |
|
Definition
C. Microsoft's SQL Server uses port 1433 by default, Oracle's SQLnet uses port 1521, and the open source MySQL uses port 3306. |
|
|