Term
|
Definition
FTP DATA Port used by FTP commands sent to a client. |
|
|
Term
|
Definition
FTP Control Port used by FTP commands sent to the server. |
|
|
Term
|
Definition
SSH Port used by Secure Shell (SSH) to encrypt remote access communication. It typically is used as a secure replacement to Telnet. |
|
|
Term
|
Definition
Telnet Port used by Telnet to remotely connect to a system such as a server or router. |
|
|
Term
|
Definition
SMTP SMTP (Simple Mail Transfer Protocol) port used to send e-mail. |
|
|
Term
|
Definition
DNS DNS (Domain Name Systems) zone transfers. |
|
|
Term
|
Definition
HTTP HTTP (Hypertext Transfer Protocol) Internet protocol for delivering web pages to the browser. |
|
|
Term
|
Definition
POP3 POP3 (Post Office Protocol version 3) Port used by POP3, which is the internet protocol to read e-mail. |
|
|
Term
|
Definition
NetBios Port used by the NetBios session service and is used to establish a connection between two systems for NetBios communication. |
|
|
Term
|
Definition
IMAP IMAP (Internet Message Access Protocol) is a port that used by IMAP, which is newer Internet protocol to read e-mail. |
|
|
Term
|
Definition
HTTPS HTTPS (Hypertext Transfer Protocol Secure) Port used for secure web traffic. |
|
|
Term
|
Definition
RDP Port used by Remote Desktop Protocol (RDP) for remote administration of a Windows System. |
|
|
Term
|
Definition
The SYN flag is assigned to any packets that are part of the SYN phases of a three-way handshake. |
|
|
Term
|
Definition
The acknowledgement flag acknowledges that a previous packet has been received. |
|
|
Term
|
Definition
The push flag is designed to force data on an application. |
|
|
Term
|
Definition
The urgent flag is specifies that a packet is an urgent packet. |
|
|
Term
|
Definition
The finish flag specifics that you would like to finalize, or end, he connection. This ends a TCP connection politely, like saying goodbye to end a phone call. |
|
|
Term
|
Definition
The reset flag is used to end a TCP conversation impolitely. This is like hanging up the phone without saying goodbye. |
|
|
Term
|
Definition
This 16-bit field identifies the port number of the sending system. |
|
|
Term
|
Definition
This 16-bit field identifies the port number the packet is destined for on the destination system. |
|
|
Term
|
Definition
This 32-bit field identifies the sequence number of the packet. |
|
|
Term
|
Definition
This 32-bit field identifies the packet that this packet is acknowledging. |
|
|
Term
|
Definition
This 4-bit field indicates where the data begins. |
|
|
Term
|
Definition
This 6-bit field is always set to 0 and was designed for future use. |
|
|
Term
|
Definition
This 6-bit field is where the TCP flags are stored. There is a 1-bit field for each of the flags mentioned earlier in this section. |
|
|
Term
|
Definition
This 16-bit field determines the amount of information that can be sent before an acknowledgment is expected. |
|
|
Term
|
Definition
This 16-bit field is used to verify the integrity of the TCP header. |
|
|
Term
|
Definition
This 16-bit field is used only if the URG flag is set and is a reference to the last piece of information that is urgent. |
|
|
Term
|
Definition
This field is a variable-length field tat specifies any additional settings that may be needed in the TCP header. |
|
|
Term
|
Definition
A 4-bit field that identifies the version of the IP being used, for example, IP4 or IP6 |
|
|
Term
|
Definition
A 4-bit field that indicates the size of the IP header. |
|
|
Term
|
Definition
An 8-bit field that indicates how the packet should be handled by the system. For example, if the Low Delay option is specified here, it means that the system should deal with the packet right away. |
|
|
Term
|
Definition
A 16-bit field that indicates the size of the IP header. |
|
|
Term
|
Definition
A 16-bit field. Networks can only handle packets of a specific maximum size -- known as a Maximum Transmission Unit (MTU) -- so the system may break the data being sent into multiple fragments. This field uniquely identifies the fragment. |
|
|
Term
|
Definition
A 3-bit field that specifics how fragments are going to be dealt with. For example, a More Fragments (MF) flag indicates more fragments are to come . Also, a bit known as Don't Fragment (DF) specifics not to fragment the packet. |
|
|
Term
|
Definition
A13-bit field that specifies the order in which the fragments are to be put back together when the packets is assembled. |
|
|
Term
|
Definition
(TTL) is an 8-bit field that specifies when the packet is to expire. The TT is a value that is decremented with every router the packet passes through. When TTL reaches 0, the packet is discarded. |
|
|
Term
|
Definition
An 8-bit field that specifies which layer-4 protocol (TCP or UDP) the packet should use. |
|
|
Term
|
Definition
A 6-bit field that verifies the integrity of the IP header. |
|
|
Term
|
Definition
A 32*bit field that represents the IP address of the sending system. This is how the receiving system knows where to send the reply message. |
|
|
Term
|
Definition
A 32-bit field that represents the IP address of the system the packet is destined for. |
|
|
Term
|
Definition
A variable-length field that is used to specify any other settings in the IP header. |
|
|
Term
|
Definition
|
|
Term
|
Definition
0 - Destination network 1 - Destination host unreachable 2 - Destination protocol unreachable 3 - Destination port unreachable |
|
|
Term
|
Definition
|
|
Term
|
Definition
Internet Control Message Protocol |
|
|
Term
|
Definition
An 8-bit field that indicates the ICMP type being used. |
|
|
Term
|
Definition
An 8-bit field indicating the ICMP code being used. |
|
|
Term
|
Definition
a 16*bit field that is used to verify the integrity of the ICMP header. |
|
|
Term
|
Definition
A field that stores any data within the ICMP header. For example, operating system place part of the alphabet in this field for ech request messages. |
|
|
Term
|
Definition
Address Resolution Protocol |
|
|
Term
ARP is responsible for .. |
|
Definition
Converting an IP address (layer-3 address) to the physical MAC address (layer-2 address). |
|
|
Term
|
Definition
Hypertext Transfer Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
Hypertext Transfer Protocol Secure |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Fully Qualified Domain Name Server |
|
|
Term
|
Definition
|
|
Term
|
Definition
Simple Mail Transfer Protocol |
|
|
Term
|
Definition
Port used for sending e-mail onto the internet. |
|
|
Term
|
Definition
Port used for POP3 clients to download e-mail . |
|
|
Term
|
Definition
Internet protocols for reading (receiving)e-mail. |
|
|
Term
|
Definition
Internet Message Access Protocol version 4, more advanced e-mail receiving program. |
|
|
Term
|
Definition
Simply e-mail receiving program. |
|
|
Term
|
Definition
Internet protocol for sending e-mails. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Simple Network Transport Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
TCP/IP protocol that exists to upload and download files. |
|
|
Term
|
Definition
FTP 21 -- Carries FTP commands from one system to another 22 -- allows transfer between hosts |
|
|
Term
|
Definition
Trivial File Transfer Protocol |
|
|
Term
|
Definition
TFTP uses it from a TFTP server. |
|
|
Term
|
Definition
Secure File Transfer Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Primary Domain Controller |
|
|
Term
|
Definition
Lightweight Directory Access Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
Network Basic Input/Output System |
|
|
Term
|
Definition
Application Interface Program |
|
|
Term
|
Definition
Internet Small Computer System Interface |
|
|
Term
|
Definition
Fiber Channel Over Ethernet |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
0:0:0:0:0:0:0:1 or ::1 or :: |
|
|
Term
|
Definition
Used for one-to-one communication. |
|
|
Term
|
Definition
Used to send data to a group of systems. |
|
|
Term
|
Definition
Sent to any system on the any cast system. |
|
|
Term
|
Definition
A public IPv6 address that is routable on the Internet. The address assigned to the host must be unique on the Internet. |
|
|
Term
|
Definition
A private address (FEC0), the address can not be used outside the system or the Internet. |
|
|
Term
|
Definition
A self-assigned address (FE80), that can only tal to other nodes on a link. |
|
|
Term
|
Definition
Multicast Listener Discovery replaces IGMP (Internet Group Message Protocol) for Multicast communication. |
|
|
Term
|
Definition
Neighbor Discovery replaces ARP (Address Resolution Protocol) |
|
|
Term
Sending a bogus MAC address information to the switch to cause the switch to fail-open. |
|
Definition
|
|
Term
|
Definition
|
|
Term
A layer-3 device that sends data from one network to another. |
|
Definition
|
|
Term
A laer-2 device that filters traffic based on MAC addresses. |
|
Definition
|
|
Term
A device that is used to split the workload between multiple servers. |
|
Definition
|
|
Term
A cable type that carries pulses of light. |
|
Definition
|
|
Term
A cable type that has copper wires divided into pairs. |
|
Definition
UTP (Unshielded Twisted Pair) |
|
|
Term
Controlling which MAC addresses can connect to the switch. |
|
Definition
|
|
Term
Class A Subnet range and mask |
|
Definition
Range = 0 - 127 Mask = 255.0.0.0 |
|
|
Term
Class B Subnet range and mask |
|
Definition
Range = 128 - 191 Mask = 255.255.0.0 |
|
|
Term
Class C Subnet range and mask |
|
Definition
Range = 192 - 223 Mask = 255.255.255.0 |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Private address addresses |
|
Definition
10.0.0.0 - 10.255.255.255 172.0.0.0 - 172.255.255.255 192.0.0.0 - 192.255.255.255 |
|
|
Term
10.0.40.10 = Valid or Invalid? Why? |
|
Definition
Invalid (Private address) |
|
|
Term
127.54.67.89 = Valid or Invalid? Why? |
|
Definition
Invalid (Loopback address) |
|
|
Term
131.107.34.0 = Valid or Invalid? Why? |
|
Definition
|
|
Term
45.12.0.0 = Valid or Invalid? Why? |
|
Definition
|
|
Term
216.83.11.255 = Valid or Invalid? Why? |
|
Definition
Invalid (Class C address on last octet) |
|
|
Term
63.256.4.78 = Valid or Invalid? Why? |
|
Definition
Invalid (Class A address, Octet went over 255 range) |
|
|
Term
200.67.34.0 = Valid or Invalid? Why? |
|
Definition
Invalid (Class C address set at 0 octet) |
|
|
Term
|
Definition
|
|
Term
Converts FQDNs to IP addresses |
|
Definition
|
|
Term
Responsible for error reporting and status information |
|
Definition
|
|
Term
Protocol used to download files |
|
Definition
|
|
Term
Responsible for network monitoring and management |
|
Definition
|
|
Term
Coverts logical address to physical address |
|
Definition
|
|
Term
Protocol used to secure web traffic |
|
Definition
|
|
Term
Responsible for unreliable delivery |
|
Definition
|
|
Term
Responsible for logical addressing and routing |
|
Definition
|
|
Term
Responsible for reliable delivery |
|
Definition
|
|
Term
Which feature of a network switch allows the network administrator to capture network traffic when monitoring or troubleshooting the network? #Port Security #VLAN #Collusion Domain #Port Mirroring |
|
Definition
|
|
Term
Your manager has been reading about hackers capturing network traffic in a switched network environment and ahs asked you to explain how it is possible that hackers can do this. Which technique will you describe in your explanation? #ARP Poisoning #Port Mirroring #Port Security #MAC Flooding #VLANs |
|
Definition
ARP Poisoning and MAC Flooding |
|
|
Term
Your company has a web application that seems to be running slowly. What cab be done to improve the performance of the application? #Install a proxy server #Install a load balancer #Configure the web site in a VLAN #Configure port security |
|
Definition
|
|
Term
Which of the following devices could be used to limit which web sites users on the network can visit? #Router #Load balancer #Proxy Server #Cat 5e |
|
Definition
|
|
Term
Which TCP/IP protocol is used to convert the IP address to a MAC address? #ARP #TCP #ICMP #UDP |
|
Definition
ARP (Address Resolution Protocol) |
|
|
Term
Which ICMP type is used to identify echo request messages? #0 #4 #8 #9 |
|
Definition
|
|
Term
Which of the following identifies the stages of the three-way handshake? #ACK/SYN,ACK,SYN #SYN,SYN/ACK,ACK #ACK,SYN,ACK/SYN #SYN,ACK,ACK/SYN |
|
Definition
|
|
Term
Which of the following represent ports used by secure TCP applications? (Choose all that apply) #23 #22 #80 #143 #443 |
|
Definition
|
|
Term
You are the network administrator for a small company, and you wish to follow security best practices that relate to the switch. Which of the following should you do? (Choose all that apply). #Disable unused ports #Enable all unused ports #Configure port security #Disable port security #Enable console password #Disable console password |
|
Definition
Disable unused ports, Configure port security, and Enable Console password. |
|
|
Term
What popular feature of a switch allows you to create communication boundaries between systems connected to the switch? #Arp Poisoning #Port Mirroring #Port Security #MAC Flooding #VLANs |
|
Definition
|
|