Deck 2: Tcpip Concepts Review
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/49
Play
Full screen (f)
Deck 2: Tcpip Concepts Review
1
What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack?
A) Internet
B) Network
C) Transport
D) Application
A) Internet
B) Network
C) Transport
D) Application
D
2
What layer,in the TCP/IP stack,do applications and protocols,such as HTTP and Telnet,operate?
A) Internet
B) Network
C) Transport
D) Application
A) Internet
B) Network
C) Transport
D) Application
D
3
What does the acronym TCP represent?
A) Transfer Control Protocol
B) Transmission Control Protocol
C) Transfer Congestion Protocol
D) The Control Protocol
A) Transfer Control Protocol
B) Transmission Control Protocol
C) Transfer Congestion Protocol
D) The Control Protocol
B
4
What layer,in the TCP/IP stack,is responsible for routing a packet to a destination address?
A) Internet
B) Network
C) Transport
D) Application
A) Internet
B) Network
C) Transport
D) Application
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
5
No matter what medium connects computers on network-copper wires,fiber-optic cables,or a wireless setup; the same protocol must be running on all computers if communication is going to function correctly.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
6
What port does the Simple Mail Transfer Protocol,or SMTP service use?
A) 25
B) 53
C) 69
D) 80
A) 25
B) 53
C) 69
D) 80
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
7
What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?
A) 443
B) 80
C) 434
D) 408
A) 443
B) 80
C) 434
D) 408
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
8
In the TCP/IP stack,the Transport layer includes network services and client software.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
9
What protocol is the most widely used and allows all computers on a network to communicate and function correctly?
A) IPX/SPX
B) ATM
C) TCP/IP
D) NetBIOS
A) IPX/SPX
B) ATM
C) TCP/IP
D) NetBIOS
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
10
What port does the Trivial File Transfer Protocol,or TFTP service use?
A) 25
B) 53
C) 69
D) 80
A) 25
B) 53
C) 69
D) 80
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
11
What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?
A) ISN
B) IP
C) port
D) SYN
A) ISN
B) IP
C) port
D) SYN
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
12
In the TCP/IP stack,what layer is concerned with physically moving bits across the network's medium?
A) Internet
B) Network
C) Transport
D) Application
A) Internet
B) Network
C) Transport
D) Application
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
13
What port does the Hypertext Transfer Protocol,or HTTP service use?
A) 25
B) 53
C) 69
D) 80
A) 25
B) 53
C) 69
D) 80
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
14
An octal digit can be represented with only three bits because the largest digit in octal is seven.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
15
What type of network attack relies on guessing a TCP header's initial sequence number,or ISN?
A) ARP spoofing
B) Session hijacking
C) DoS
D) Man-in-the-middle
A) ARP spoofing
B) Session hijacking
C) DoS
D) Man-in-the-middle
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
16
A hex number is written with two characters,each representing a byte.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
17
To retrieve e-mail from a mail server,you most likely access port 119.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
18
In the TCP/IP stack,what layer is concerned with controlling the flow of data,sequencing packets for reassembly,and encapsulating the segment with a TCP or UDP header?
A) Internet
B) Network
C) Transport
D) Application
A) Internet
B) Network
C) Transport
D) Application
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
19
What port does the Domain Name System,or DNS service use?
A) 25
B) 53
C) 69
D) 80
A) 25
B) 53
C) 69
D) 80
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
20
What layer,in the TCP/IP protocol stack,is responsible for encapsulating data into segments?
A) Transport layer
B) Internet layer
C) Application layer
D) Network layer
A) Transport layer
B) Internet layer
C) Application layer
D) Network layer
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
21
UDP is an unreliable data delivery protocol.Why is UDP widely used on the Internet?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
22
What TCP/IP protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity?
A) ICMP
B) UDP
C) TCP
D) ARP
A) ICMP
B) UDP
C) TCP
D) ARP
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
23
What is the binary numbering system and why was it chosen by computer engineers to be used in computers?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
24
Why should a security professional fully understand the TCP header components?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
25
How many host computers can be assigned a valid IPv4 address when using a CIDR /24 prefix?
A) 254
B) 512
C) 65,000
D) 16 million
A) 254
B) 512
C) 65,000
D) 16 million
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
26
How many host addresses can be assigned with a subnet mask of 255.255.255.0? Explain how you calculated the result.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
27
What is the Domain Name System (DNS)used for?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
28
What is the decimal equivalent of the binary number 11000001?
A) 128
B) 164
C) 193
D) 201
A) 128
B) 164
C) 193
D) 201
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
29
What is ICMP used for?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
30
What TCP flag is responsible for synchronizing the beginning of a session?
A) URG flag
B) ACK flag
C) PSH flag
D) SYN flag
A) URG flag
B) ACK flag
C) PSH flag
D) SYN flag
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
31
Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or firewall can protect a network from attack.Why is this solution ?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
32
Match each item with a statement below.a.ICMP
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
Protocol used to send messages related to network operations
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
Protocol used to send messages related to network operations
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
33
What are the critical components of a TCP header?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
34
What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network?
A) 128 address
B) 127 address
C) 224 address
D) 255 address
A) 128 address
B) 127 address
C) 224 address
D) 255 address
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
35
What TCP/IP protocol is fast,unreliable,and operates at the Transport layer?
A) TCP
B) UDP
C) FTP
D) POP3
A) TCP
B) UDP
C) FTP
D) POP3
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
36
What is a Class B IP address?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
37
What TCP flag is responsible for delivering data directly and immediately to an application?
A) ACK flag
B) PSH flag
C) RST flag
D) SYN flag
A) ACK flag
B) PSH flag
C) RST flag
D) SYN flag
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
38
What connection-oriented protocol is utilized by the Transport layer?
A) HTTPS
B) UDP
C) TCP
D) SSL
A) HTTPS
B) UDP
C) TCP
D) SSL
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
39
What 32-bit number tracks packets received by a node and allows the reassembling of large packets that have been broken up into smaller packets?
A) IP
B) TCP
C) UDP
D) ISN
A) IP
B) TCP
C) UDP
D) ISN
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
40
What IPv4 address class has the IP address 221.1.2.3?
A) Class A
B) Class B
C) Class C
D) Class D
A) Class A
B) Class B
C) Class C
D) Class D
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
41
Match each item with a statement below.a.ICMP
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
A 32-bit number that tracks packets received by a node and allows reassembling large packets that have been broken up into smaller packets
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
A 32-bit number that tracks packets received by a node and allows reassembling large packets that have been broken up into smaller packets
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
42
Match each item with a statement below.a.ICMP
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
A protocol that does not need to verify whether the receiver is listening or ready to accept the packets
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
A protocol that does not need to verify whether the receiver is listening or ready to accept the packets
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
43
Match each item with a statement below.a.ICMP
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
A TCP/IP process that is used to establish a connection before data is sent
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
A TCP/IP process that is used to establish a connection before data is sent
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
44
Match each item with a statement below.a.ICMP
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
Attack that relies on guessing the ISNs of TCP packets
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
Attack that relies on guessing the ISNs of TCP packets
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
45
Match each item with a statement below.a.ICMP
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
Occupies one bit of the TCP segment and can be set to 0 (off)or 1 (on)
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
Occupies one bit of the TCP segment and can be set to 0 (off)or 1 (on)
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
46
Match each item with a statement below.a.ICMP
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
A common language used so computers can communicate with one another
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
A common language used so computers can communicate with one another
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
47
Match each item with a statement below.a.ICMP
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
A protocol where the sender doesn't send any data to the destination node until the destination node acknowledges that it's listening to the sender
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
A protocol where the sender doesn't send any data to the destination node until the destination node acknowledges that it's listening to the sender
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
48
Match each item with a statement below.a.ICMP
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
Fast but unreliable delivery protocol that operates at the Transport layer
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
Fast but unreliable delivery protocol that operates at the Transport layer
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
49
Match each item with a statement below.a.ICMP
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
A logical component of a TCP connection that can be assigned to a process that requires network connectivity
b.network session hijacking
c.TCP flag
d.port
e.UDP
f.connection-oriented protocol
g.ISN
h.connectionless protocol
i.protocol
j.three-way handshake
A logical component of a TCP connection that can be assigned to a process that requires network connectivity
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck