Term
|
Definition
Transfer Control Protocol (Host-to-Host) Reliable connection-oriented |
|
|
Term
|
Definition
File Transfer Protocol SFTP is the secure form(Process/Application) |
|
|
Term
|
Definition
User Datagram Protocol (Host-to-Host) connectionless protocol (Doesn't support windowing) Thin Protocol |
|
|
Term
|
Definition
Dynamic Host Configuration Protocol, Automatically assigns IP addresses to hosts |
|
|
Term
|
Definition
Trivial File Transfer Protocol, Connectionless, unsecure (Process/Application) |
|
|
Term
|
Definition
Domain Name Service (Resolves host names to IP addresses) |
|
|
Term
|
Definition
Hyper Text Transfer Protocol (Secure)(Process/Application) |
|
|
Term
|
Definition
Address Resolution Protocol(Internet Layer)Finds the MAC address from a known IP address |
|
|
Term
|
Definition
Session Initiation Protocol (VoIP) (Process/Application) |
|
|
Term
|
Definition
Real-time Transfer Protocol (VoIP)(Process/Application) |
|
|
Term
|
Definition
Secure Shell, Sets up a secure telnet connection (Process/Application) |
|
|
Term
|
Definition
Post Office Protocol (Process/Application) downloads all email. |
|
|
Term
|
Definition
Network Time Protocol, used to synchonize clocks amoung computer networks (Process/Application) |
|
|
Term
|
Definition
Internet Message Access Protocol, Allows for very secure and selective downloading of emails (Process/Application) |
|
|
Term
|
Definition
Terminal Emulation (Process/Application) |
|
|
Term
|
Definition
Simple Mail Transfer Protocol (Process/Application) Sends spooled email |
|
|
Term
|
Definition
Simple Network Management Protocol (Process/Application) Analyzes network and reports a baseline, as well as sudden changes |
|
|
Term
|
Definition
Internet Control Message Protocol (Internet Layer)Ping, Tracert, hops, buffer full, destination unreachable, uses encapsulated datagrams |
|
|
Term
|
Definition
Internet Group Management Protocol, Helps manage multicast sessions (Process/Application) |
|
|
Term
|
Definition
Transport Layer Security (Process/Application) handle encryption |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What is the difference between TCP and UDP? |
|
Definition
Transfer Control Protocol is reliable, whereas User Datagram Protocol is not. |
|
|
Term
List the layers of the DOD model from top to bottom |
|
Definition
Process/Application, Host-to-Host, Internet, Network Access |
|
|
Term
Name the OSI corosponding layers for the Process/Application DOD model. |
|
Definition
Application, Presentation, Session |
|
|
Term
Name the corosponding OSI layer for the Host-to-Host DOD layer. |
|
Definition
|
|
Term
Name the corosponding OSI layer for the Internet DOD layer. |
|
Definition
|
|
Term
Name the corosponding OSI layer for the Network Access DOD layer. |
|
Definition
|
|
Term
What protocols use port numbers. |
|
Definition
|
|