IT 276 Exam #1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/77

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

78 Terms

1
New cards

How does an SPF work and what does it do?

A Sender Policy Framework (SPF) record is used to confirm the IP addresses that can legitimately send email for a particular domain.

2
New cards

What are three primary features of TCP error control?

1) Checksum
2) Acknowledgement
3) Retransmission of data

3
New cards

What does an application layer-address look like?

URL, email address

4
New cards

How many layers are in the TCP/IP hybrid model?

five

5
New cards

How many layers is a switch involved in?

two

6
New cards

What does SYN, FIN, and ACK mean?

SYN - SYNchronize sequence numbers, used to open a new connection

FIN - Finishes the connection

ACK - Indicates that the segment is ACKnowledging a previously-sent segment

7
New cards

What are 5 important application layer protocols?

HTTP, SSH, SMS, SMTP, Telnet

8
New cards

What is SSH?

A modern application layer protocol used to securely access a CLI, complete with encryption of the transmitted data. This protocol can also be used to securely send files between two machines.

9
New cards

Which application layer protocol is often used to transfer files between computers?

FTP

10
New cards

Which application layer protocol can be used to set the correct time and keep it synchronized between network connected devices?

NTP

11
New cards

What are some important transport layer protocols?

TCP, UDP

12
New cards

List the five layers in order

1) Physical layer
2) Data link
3) Network
4) Transport
5) Application

13
New cards

What is the basic function of layer 1?

The physical layer:

Converting messages to signals, also physical and electrical cabling and connector specifications

14
New cards

What does a layer 4 address look like?

port numbers

15
New cards

What layer do we interact with for email, websites, etc.?

The application layer

16
New cards

How many layers are in the OSI suite?

7

17
New cards

How many layers is a router involved in?

three

18
New cards

How many layers is a computer or server involved in?

All five

19
New cards

What is the basic function of layer 2?

Data-link layer:

Delivery of messages (frames) within a single LAN

20
New cards

What is the basic function of layer 3?

Network layer:

Routing e.g., Delivery of packets between networks

21
New cards

What is the basic function of layer 4?

Transport layer:

Messages called segments

Session control, error and flow control

22
New cards

What is the basic function of layer 5?

Application layer:

Messages

Interaction with user through websites and email
Software encryption, software to software interaction

23
New cards

One of the main duties of the transport layer is to provide _______ _______

process-to-process communication

24
New cards

What is encapsulation?

The process of a higher layer adding its own header and passing it down to the stack is called

25
New cards

What is decapsulation?

The process that takes place at the receiving end, and begins at the lowest layer and passes the header up the stack

26
New cards

Data from the application layer is encapsulated at what layer?

The layer right below it

27
New cards

Data from the transport layer is decapsulated at what layer?

The layer right above it

28
New cards

What are the different types of DNS servers?

1) Recursive
2) Root
3) TLD
4) Authoritative

29
New cards

What does each DNS server do? (Can split this one up once #23 is answered)

Authoritative - Know about their domain (Apple.com)
Root - Know about all TLD servers
TLD - Ultimate autho

30
New cards

What is the difference between a client-server and peer-to-peer model?

Client-server: One machine does the bulk of the work
Peer-to-peer: All machines share the load of work

31
New cards

What is a domain?

A domain is a name that defines a certain administrative authority on the Internet

32
New cards

What is the difference between a circuit-switched network and a packet-switched network?

Circuit-switched maintains a point-to-point connection over the duration of the call

Packet switched move data in small blocks called packets according to the destination address

33
New cards

What is the difference between iterative and recursive for DNS lookups?

Iterative DNS queries are ones in which a DNS server is queried and returns an answer without querying other DNS servers, even if it cannot provide a definitive answer

Recursive DNS queries occur when a DNS client requests information from a DNS server that is set to query subsequent DNS servers until a definitive answer is returned to the client

34
New cards

What is the SMTP protocol and what layer is it found in?

Found in the application layer, the SMTP protocol is used as the "delivery" service for the client to send mail to the mail server

35
New cards

How is the IMAP server used?

IMAP temporarily downloads emails from the server and stores them locally

36
New cards

How is the POP server used?

POP downloads emails from the server for permanent storage

37
New cards

Flow Control is a feature of what?

TCP

38
New cards

What are the goals/features of Flow Control?

TCP will ensure that a sender is not overwhelming a receiver by sending packets faster than it can consume.

39
New cards

List four important DNS record types

1) Host record
2) Alias record
3) SPF record
4) MX record

40
New cards

What is the MX record?

Mail exchange address, lists where email should be delivered

41
New cards

What are the functions of DNS records?

They point to different servers on the domain

42
New cards

What are the basics of TCP Window?

How much data (in bytes) the receiving device is willing to receive at any point in time. The receiving device can use this value to control the flow of data, or as a flow control mechanism

43
New cards

What are the three TCP / UDP port ranges and what do they stand for?

Lower range - well known
Mid-range - registered
Upper range - dynamic private random ephemeral (DPRE)

44
New cards

What are the specific numeric ranges for the three port ranges?

Lower: 0 -1023
Middle: 1024 - 49151
Upper: 49152 - 65535

45
New cards

A client program normally uses ____________ port number. A server program normally uses __________ port number.

An ephemeral, a well known

46
New cards

What is a socket address?

The IP address and a port number for the local node, and there is a corresponding socket address at the foreign node

47
New cards

How many addresses does the physical layer have?

zero

48
New cards

What is the difference between SSH and Telnet protocols?

SSH is modern and widely used, Telnet is outdated and typically a security threat today to have

ADD MORE HERE FROM SLIDES

49
New cards

Is CheckSum optional for TCP or UDP?

UDP

50
New cards

Why is CheckSum optional for UDP?

For UDP, packets with differing CheckSum values are detected and discarded for security

51
New cards

What is CheckSum used for in TCP?

Packets with differing CheckSum values are detected and discarded for security, but are sent again in order for the original packet to be recovered

52
New cards

Does UDP use error detection or error recovery?

Error detection

53
New cards

What is TCP?

Transmission Control Protocol is a bidirectional, connection-based protocol that transfers data

54
New cards

What is UDP?

UDP, User Datagram Protocol is a protocol that transfers data without a connection

55
New cards

Is TCP or UDP used more often?

TCP

56
New cards

Protocols using protocols:

HTTP is to _______

as

DNS is to _______

TCP

UDP

57
New cards

What are the primary advantages of TCP?

1) Requires acknowledgment for all packets sent
2)Error detection and correction
3)No data loss

58
New cards

What are three primary disadvantages of TCP?

1) Requires a connection

59
New cards

What are three primary advantages of UDP?

1) Smaller overhead means less bytes equalling less processing time
2) Does not require a connection
3) Fast

60
New cards

What are four primary disadvantages of UDP?

1) No corruption detection
2) Corrupt data is dropped and not recovered
3) Data is unordered
4) No error control

61
New cards

Why is UDP considered unreliable?

It is connectionless and lacks the SYN/ACK flags like TCP

62
New cards

What is a header vs an overhead?

A header is the extra information on top of the payload to ensure data gets to its destination

Overhead is the amount of wasted bandwidth required to transmit the payload

63
New cards

Does TCP or UDP have a higher overhead?

TCP

64
New cards

What layer is TCP and UDP found in?

The transport layer

65
New cards

How does TCP know how to reassemble data?

The sequence number

66
New cards

In _______ switched networks, a single connection is established for the duration of the communication

circuit

67
New cards

What is the goal of DNS?

Phone book

They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses

68
New cards

What is Error correction vs Error detection?

Error detection is the detection of errors

Error correction is the detection of errors and reconstruction of the original, error-free data.

69
New cards

The application layer on the sending side logically talks to the ______ layer on the receiving end.

application

70
New cards

In the __________model, machines have dedicated roles, and one machine does the bulk of the work.

client-server

71
New cards

___________ is a legacy application layer protocol that can be used to access a CLI, but lacks any encryption.

Telnet

72
New cards

A (An) ___________DNS server will only respond to queries for the domain it is responsible for

authoritative only

73
New cards

A standard switched LAN environment, as you'll find in most homes and businesses, is an example a ____________ topology

star

74
New cards

The source port number on the UDP or TCP user datagram header defines _______

The process running on the sending computer

75
New cards

The Application layer is responsible for:

A. Data encryption
B. Presenting data to the user
C. Speaking to the corresponding software at the receiving end
D. All of the above

D: All the above

76
New cards

The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________.

randomly generated number

77
New cards

______________ means combining multiple data sources onto a single network connection. ______________ means processing/delivering multiple data streams arriving over a single connection.

Multiplexing, demultiplexing

78
New cards

A DNS server receives a request from a client, but doesn't have the answer. The server responds with the next DNS server in the hierarchy for the client to query in order to find the answer. This process may be repeated throughout the entire DNS hierarchy until the client receives the answer. This describes the ___________ method of DNS.

iterative