Deck 2: Tcpip Concepts Review

Full screen (f)
exit full mode
Question
The HTTP service uses port ____.

A)25
B)53
C)69
D)80
Use Space or
up arrow
down arrow
to flip the card.
Question
____ is an attack that relies on guessing the ISNs of TCP packets.

A)ARP spoofing
B)Session hijacking
C)DoS
D)Man-in-the-middle
Question
In the TCP/IP stack, the Transport layer includes network services and client software.
Question
TCP stands for ____.

A)Transfer Control Protocol
B)Transmission Control Protocol
C)Transfer Congestion Protocol
D)THE Control Protocol
Question
The DNS service uses port ____.

A)25
B)53
C)69
D)80
Question
The SMTP service uses port ____.

A)25
B)53
C)69
D)80
Question
In the TCP/IP stack, the ____ layer is concerned with physically moving electrons across a medium.

A)Internet
B)Network
C)Transport
D)Application
Question
The ____-layer protocols are the front ends to the lower-layer protocols in the TCP/IP stack.

A)Internet
B)Network
C)Transport
D)Application
Question
No matter what medium connects computers on a network-copper wires, fiber-optic cables, or a wireless setup-the same protocol must be running on all computers if communication is going to function correctly.
Question
The most widely used is protocol is ____.

A)IPX/SPX
B)ATM
C)TCP/IP
D)NetBIOS
Question
In the TCP/IP stack, the ____ layer is where applications and protocols, such as HTTP and Telnet, operate.

A)Internet
B)Network
C)Transport
D)Application
Question
The TFTP service uses port ____.

A)25
B)53
C)69
D)80
Question
A hex number is written with two characters, each representing a byte.
Question
An octal digit can be represented with only three bits because the largest digit in octal is seven.
Question
To retrieve e-mail from a mail server, you most likely access port 119.
Question
A(n) ____ is the logical, not physical, component of a TCP connection.

A)ISN
B)socket
C)port
D)SYN
Question
In the TCP/IP stack, the ____ layer uses IP addresses to route packets.

A)Internet
B)Network
C)Transport
D)Application
Question
____ was the standard for moving or copying large files and is still used today, although to a lesser extent because of the popularity of HTTP.

A)FTP
B)TFTP
C)SNMP
D)SMTP
Question
In the TCP/IP stack, the ____ layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header.

A)Internet
B)Network
C)Transport
D)Application
Question
The POP3 service uses port ____.

A)110
B)119
C)135
D)139
Question
The Microsoft RPC service uses port ____.

A)110
B)119
C)135
D)139
Question
The Network News Transport Protocol service uses port ____.

A)110
B)119
C)135
D)139
Question
In TCP, the ______________________________ is a 32-bit number that tracks the packets received by the node and allows reassembling of large packets that have been broken up into smaller packets.
Question
An octet is equal to ____________________ bits, which equals one byte.
Question
____ is a fast but unreliable delivery protocol that operates on the Transport layer.

A)IP
B)TCP
C)TFTP
D)UDP
Question
UDP stands for ____.

A)User Datagram Protocol
B)Universal Datagram Protocol
C)User Data Packet
D)Universal Data Packet
Question
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
the main protocol for transmitting e-mail messages across the Internet
Question
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
the primary protocol used to communicate over the World Wide Web
Question
The binary number 11000001 converted to decimal is ____.

A)128
B)164
C)193
D)201
Question
In addition to a unique network address, each network must be assigned a(n) ____________________, which helps distinguish the network address bits from the host address bits.
Question
The IP in TCP/IP stands for ____________________.
Question
TCP is a(n) ____________________ protocol, which means the sender doesn't send any data to the destination node until the destination node acknowledges that it's listening to the sender.
Question
Each Class C IP address supports up to ____ host computers.

A)254
B)512
C)65,000
D)16 million
Question
The NetBIOS service uses port ____.

A)110
B)119
C)135
D)139
Question
In the TCP/IP stack, the ____________________ layer is responsible for getting data packets to and from the Application layer by using port numbers.
Question
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
allows different operating systems to transfer files between one another
Question
What type of class has the IP address 193.1.2.3?

A)Class A
B)Class B
C)Class C
D)Class D
Question
Based on the starting decimal number of the ____ byte, you can classify IP addresses as Class A, Class B, or Class C.

A)first
B)second
C)third
D)fourth
Question
In the TCP/IP stack, the ____________________ layer represents the physical network pathway and the network interface card.
Question
____ is a connectionless protocol.

A)TCP
B)UDP
C)FTP
D)POP3
Question
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
TCP header flag that is used to signify urgent data
Question
What steps are involved in TCP's "three-way handshake"?
Question
What is the "poor man's firewall"?
Question
What is DNS used for?
Question
What are the critical components of a TCP header? How may hackers abuse them?
Question
What is ICMP used for?
Question
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
TCP header flag that signifies the beginning of a session
Question
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
enables multiple users to communicate over the Internet in discussion forums
Question
Often technical personnel who aren't familiar with security techniques think that restricting access to ports on a router or firewall can protect a network from attack. Is this a good solution?
Question
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
TCP header flag used to deliver data directly to an application
Question
How many host addresses can be assigned with a subnet mask of 255.255.255.0? Give a brief description of how you calculated the result.
Question
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
primarily used to monitor devices on a network, such as remotely monitoring a router's state
Question
How does the octal numbering system relate to network security? You may answer this question by providing an example.
Question
What is the binary numbering system and why was it chosen by computer engineers to be used in computers?
Question
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
enables a remote user to log on to a server and issue commands
Question
What is a Class B IP address?
Question
UDP is an unreliable data delivery protocol. Why is it widely used on the Internet?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/57
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Tcpip Concepts Review
1
The HTTP service uses port ____.

A)25
B)53
C)69
D)80
D
2
____ is an attack that relies on guessing the ISNs of TCP packets.

A)ARP spoofing
B)Session hijacking
C)DoS
D)Man-in-the-middle
B
3
In the TCP/IP stack, the Transport layer includes network services and client software.
False
4
TCP stands for ____.

A)Transfer Control Protocol
B)Transmission Control Protocol
C)Transfer Congestion Protocol
D)THE Control Protocol
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
5
The DNS service uses port ____.

A)25
B)53
C)69
D)80
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
6
The SMTP service uses port ____.

A)25
B)53
C)69
D)80
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
7
In the TCP/IP stack, the ____ layer is concerned with physically moving electrons across a medium.

A)Internet
B)Network
C)Transport
D)Application
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
8
The ____-layer protocols are the front ends to the lower-layer protocols in the TCP/IP stack.

A)Internet
B)Network
C)Transport
D)Application
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
9
No matter what medium connects computers on a network-copper wires, fiber-optic cables, or a wireless setup-the same protocol must be running on all computers if communication is going to function correctly.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
10
The most widely used is protocol is ____.

A)IPX/SPX
B)ATM
C)TCP/IP
D)NetBIOS
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
11
In the TCP/IP stack, the ____ layer is where applications and protocols, such as HTTP and Telnet, operate.

A)Internet
B)Network
C)Transport
D)Application
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
12
The TFTP service uses port ____.

A)25
B)53
C)69
D)80
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
13
A hex number is written with two characters, each representing a byte.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
14
An octal digit can be represented with only three bits because the largest digit in octal is seven.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
15
To retrieve e-mail from a mail server, you most likely access port 119.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
16
A(n) ____ is the logical, not physical, component of a TCP connection.

A)ISN
B)socket
C)port
D)SYN
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
17
In the TCP/IP stack, the ____ layer uses IP addresses to route packets.

A)Internet
B)Network
C)Transport
D)Application
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
18
____ was the standard for moving or copying large files and is still used today, although to a lesser extent because of the popularity of HTTP.

A)FTP
B)TFTP
C)SNMP
D)SMTP
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
19
In the TCP/IP stack, the ____ layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header.

A)Internet
B)Network
C)Transport
D)Application
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
20
The POP3 service uses port ____.

A)110
B)119
C)135
D)139
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
21
The Microsoft RPC service uses port ____.

A)110
B)119
C)135
D)139
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
22
The Network News Transport Protocol service uses port ____.

A)110
B)119
C)135
D)139
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
23
In TCP, the ______________________________ is a 32-bit number that tracks the packets received by the node and allows reassembling of large packets that have been broken up into smaller packets.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
24
An octet is equal to ____________________ bits, which equals one byte.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
25
____ is a fast but unreliable delivery protocol that operates on the Transport layer.

A)IP
B)TCP
C)TFTP
D)UDP
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
26
UDP stands for ____.

A)User Datagram Protocol
B)Universal Datagram Protocol
C)User Data Packet
D)Universal Data Packet
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
27
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
the main protocol for transmitting e-mail messages across the Internet
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
28
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
the primary protocol used to communicate over the World Wide Web
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
29
The binary number 11000001 converted to decimal is ____.

A)128
B)164
C)193
D)201
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
30
In addition to a unique network address, each network must be assigned a(n) ____________________, which helps distinguish the network address bits from the host address bits.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
31
The IP in TCP/IP stands for ____________________.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
32
TCP is a(n) ____________________ protocol, which means the sender doesn't send any data to the destination node until the destination node acknowledges that it's listening to the sender.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
33
Each Class C IP address supports up to ____ host computers.

A)254
B)512
C)65,000
D)16 million
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
34
The NetBIOS service uses port ____.

A)110
B)119
C)135
D)139
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
35
In the TCP/IP stack, the ____________________ layer is responsible for getting data packets to and from the Application layer by using port numbers.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
36
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
allows different operating systems to transfer files between one another
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
37
What type of class has the IP address 193.1.2.3?

A)Class A
B)Class B
C)Class C
D)Class D
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
38
Based on the starting decimal number of the ____ byte, you can classify IP addresses as Class A, Class B, or Class C.

A)first
B)second
C)third
D)fourth
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
39
In the TCP/IP stack, the ____________________ layer represents the physical network pathway and the network interface card.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
40
____ is a connectionless protocol.

A)TCP
B)UDP
C)FTP
D)POP3
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
41
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
TCP header flag that is used to signify urgent data
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
42
What steps are involved in TCP's "three-way handshake"?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
43
What is the "poor man's firewall"?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
44
What is DNS used for?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
45
What are the critical components of a TCP header? How may hackers abuse them?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
46
What is ICMP used for?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
47
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
TCP header flag that signifies the beginning of a session
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
48
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
enables multiple users to communicate over the Internet in discussion forums
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
49
Often technical personnel who aren't familiar with security techniques think that restricting access to ports on a router or firewall can protect a network from attack. Is this a good solution?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
50
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
TCP header flag used to deliver data directly to an application
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
51
How many host addresses can be assigned with a subnet mask of 255.255.255.0? Give a brief description of how you calculated the result.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
52
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
primarily used to monitor devices on a network, such as remotely monitoring a router's state
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
53
How does the octal numbering system relate to network security? You may answer this question by providing an example.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
54
What is the binary numbering system and why was it chosen by computer engineers to be used in computers?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
55
MATCHING
Match each term with the correct statement below.
a.FTP
f.IRC
b.SMTP
g.URG
c.SNMP
h.SYN
d.SSH
i.PSH
e.HTTP
enables a remote user to log on to a server and issue commands
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
56
What is a Class B IP address?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
57
UDP is an unreliable data delivery protocol. Why is it widely used on the Internet?
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 57 flashcards in this deck.