IT 276 Exam #1

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

How does an SPF work and what does it do?

1 / 77

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

78 Terms

1

How does an SPF work and what does it do?

A Sender Policy Framework (SPF) record is used to confirm the IP addresses that can legitimately send email for a particular domain.

New cards
2

What are three primary features of TCP error control?

1) Checksum
2) Acknowledgement
3) Retransmission of data

New cards
3

What does an application layer-address look like?

URL, email address

New cards
4

How many layers are in the TCP/IP hybrid model?

five

New cards
5

How many layers is a switch involved in?

two

New cards
6

What does SYN, FIN, and ACK mean?

SYN - SYNchronize sequence numbers, used to open a new connection

FIN - Finishes the connection

ACK - Indicates that the segment is ACKnowledging a previously-sent segment

New cards
7

What are 5 important application layer protocols?

HTTP, SSH, SMS, SMTP, Telnet

New cards
8

What is SSH?

A modern application layer protocol used to securely access a CLI, complete with encryption of the transmitted data. This protocol can also be used to securely send files between two machines.

New cards
9

Which application layer protocol is often used to transfer files between computers?

FTP

New cards
10

Which application layer protocol can be used to set the correct time and keep it synchronized between network connected devices?

NTP

New cards
11

What are some important transport layer protocols?

TCP, UDP

New cards
12

List the five layers in order

1) Physical layer
2) Data link
3) Network
4) Transport
5) Application

New cards
13

What is the basic function of layer 1?

The physical layer:

Converting messages to signals, also physical and electrical cabling and connector specifications

New cards
14

What does a layer 4 address look like?

port numbers

New cards
15

What layer do we interact with for email, websites, etc.?

The application layer

New cards
16

How many layers are in the OSI suite?

7

New cards
17

How many layers is a router involved in?

three

New cards
18

How many layers is a computer or server involved in?

All five

New cards
19

What is the basic function of layer 2?

Data-link layer:

Delivery of messages (frames) within a single LAN

New cards
20

What is the basic function of layer 3?

Network layer:

Routing e.g., Delivery of packets between networks

New cards
21

What is the basic function of layer 4?

Transport layer:

Messages called segments

Session control, error and flow control

New cards
22

What is the basic function of layer 5?

Application layer:

Messages

Interaction with user through websites and email
Software encryption, software to software interaction

New cards
23

One of the main duties of the transport layer is to provide _______ _______

process-to-process communication

New cards
24

What is encapsulation?

The process of a higher layer adding its own header and passing it down to the stack is called

New cards
25

What is decapsulation?

The process that takes place at the receiving end, and begins at the lowest layer and passes the header up the stack

New cards
26

Data from the application layer is encapsulated at what layer?

The layer right below it

New cards
27

Data from the transport layer is decapsulated at what layer?

The layer right above it

New cards
28

What are the different types of DNS servers?

1) Recursive
2) Root
3) TLD
4) Authoritative

New cards
29

What does each DNS server do? (Can split this one up once #23 is answered)

Authoritative - Know about their domain (Apple.com)
Root - Know about all TLD servers
TLD - Ultimate autho

New cards
30

What is the difference between a client-server and peer-to-peer model?

Client-server: One machine does the bulk of the work
Peer-to-peer: All machines share the load of work

New cards
31

What is a domain?

A domain is a name that defines a certain administrative authority on the Internet

New cards
32

What is the difference between a circuit-switched network and a packet-switched network?

Circuit-switched maintains a point-to-point connection over the duration of the call

Packet switched move data in small blocks called packets according to the destination address

New cards
33

What is the difference between iterative and recursive for DNS lookups?

Iterative DNS queries are ones in which a DNS server is queried and returns an answer without querying other DNS servers, even if it cannot provide a definitive answer

Recursive DNS queries occur when a DNS client requests information from a DNS server that is set to query subsequent DNS servers until a definitive answer is returned to the client

New cards
34

What is the SMTP protocol and what layer is it found in?

Found in the application layer, the SMTP protocol is used as the "delivery" service for the client to send mail to the mail server

New cards
35

How is the IMAP server used?

IMAP temporarily downloads emails from the server and stores them locally

New cards
36

How is the POP server used?

POP downloads emails from the server for permanent storage

New cards
37

Flow Control is a feature of what?

TCP

New cards
38

What are the goals/features of Flow Control?

TCP will ensure that a sender is not overwhelming a receiver by sending packets faster than it can consume.

New cards
39

List four important DNS record types

1) Host record
2) Alias record
3) SPF record
4) MX record

New cards
40

What is the MX record?

Mail exchange address, lists where email should be delivered

New cards
41

What are the functions of DNS records?

They point to different servers on the domain

New cards
42

What are the basics of TCP Window?

How much data (in bytes) the receiving device is willing to receive at any point in time. The receiving device can use this value to control the flow of data, or as a flow control mechanism

New cards
43

What are the three TCP / UDP port ranges and what do they stand for?

Lower range - well known
Mid-range - registered
Upper range - dynamic private random ephemeral (DPRE)

New cards
44

What are the specific numeric ranges for the three port ranges?

Lower: 0 -1023
Middle: 1024 - 49151
Upper: 49152 - 65535

New cards
45

A client program normally uses ____________ port number. A server program normally uses __________ port number.

An ephemeral, a well known

New cards
46

What is a socket address?

The IP address and a port number for the local node, and there is a corresponding socket address at the foreign node

New cards
47

How many addresses does the physical layer have?

zero

New cards
48

What is the difference between SSH and Telnet protocols?

SSH is modern and widely used, Telnet is outdated and typically a security threat today to have

ADD MORE HERE FROM SLIDES

New cards
49

Is CheckSum optional for TCP or UDP?

UDP

New cards
50

Why is CheckSum optional for UDP?

For UDP, packets with differing CheckSum values are detected and discarded for security

New cards
51

What is CheckSum used for in TCP?

Packets with differing CheckSum values are detected and discarded for security, but are sent again in order for the original packet to be recovered

New cards
52

Does UDP use error detection or error recovery?

Error detection

New cards
53

What is TCP?

Transmission Control Protocol is a bidirectional, connection-based protocol that transfers data

New cards
54

What is UDP?

UDP, User Datagram Protocol is a protocol that transfers data without a connection

New cards
55

Is TCP or UDP used more often?

TCP

New cards
56

Protocols using protocols:

HTTP is to _______

as

DNS is to _______

TCP

UDP

New cards
57

What are the primary advantages of TCP?

1) Requires acknowledgment for all packets sent
2)Error detection and correction
3)No data loss

New cards
58

What are three primary disadvantages of TCP?

1) Requires a connection

New cards
59

What are three primary advantages of UDP?

1) Smaller overhead means less bytes equalling less processing time
2) Does not require a connection
3) Fast

New cards
60

What are four primary disadvantages of UDP?

1) No corruption detection
2) Corrupt data is dropped and not recovered
3) Data is unordered
4) No error control

New cards
61

Why is UDP considered unreliable?

It is connectionless and lacks the SYN/ACK flags like TCP

New cards
62

What is a header vs an overhead?

A header is the extra information on top of the payload to ensure data gets to its destination

Overhead is the amount of wasted bandwidth required to transmit the payload

New cards
63

Does TCP or UDP have a higher overhead?

TCP

New cards
64

What layer is TCP and UDP found in?

The transport layer

New cards
65

How does TCP know how to reassemble data?

The sequence number

New cards
66

In _______ switched networks, a single connection is established for the duration of the communication

circuit

New cards
67

What is the goal of DNS?

Phone book

They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses

New cards
68

What is Error correction vs Error detection?

Error detection is the detection of errors

Error correction is the detection of errors and reconstruction of the original, error-free data.

New cards
69

The application layer on the sending side logically talks to the ______ layer on the receiving end.

application

New cards
70

In the __________model, machines have dedicated roles, and one machine does the bulk of the work.

client-server

New cards
71

___________ is a legacy application layer protocol that can be used to access a CLI, but lacks any encryption.

Telnet

New cards
72

A (An) ___________DNS server will only respond to queries for the domain it is responsible for

authoritative only

New cards
73

A standard switched LAN environment, as you'll find in most homes and businesses, is an example a ____________ topology

star

New cards
74

The source port number on the UDP or TCP user datagram header defines _______

The process running on the sending computer

New cards
75

The Application layer is responsible for:

A. Data encryption
B. Presenting data to the user
C. Speaking to the corresponding software at the receiving end
D. All of the above

D: All the above

New cards
76

The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________.

randomly generated number

New cards
77

______________ means combining multiple data sources onto a single network connection. ______________ means processing/delivering multiple data streams arriving over a single connection.

Multiplexing, demultiplexing

New cards
78

A DNS server receives a request from a client, but doesn't have the answer. The server responds with the next DNS server in the hierarchy for the client to query in order to find the answer. This process may be repeated throughout the entire DNS hierarchy until the client receives the answer. This describes the ___________ method of DNS.

iterative

New cards

Explore top notes

note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 16 people
... ago
4.0(1)
note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 69 people
... ago
5.0(3)
note Note
studied byStudied by 18 people
... ago
4.5(2)

Explore top flashcards

flashcards Flashcard (80)
studied byStudied by 13 people
... ago
4.0(1)
flashcards Flashcard (73)
studied byStudied by 15 people
... ago
4.5(2)
flashcards Flashcard (65)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (28)
studied byStudied by 242 people
... ago
5.0(5)
flashcards Flashcard (79)
studied byStudied by 12 people
... ago
5.0(1)
flashcards Flashcard (80)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (81)
studied byStudied by 228 people
... ago
5.0(4)
robot