Shared Flashcard Set

Details

CompTIA Network+ Chapter 8: TCP/IP Applications
Studying material based on Mike Meyers' book
17
Computer Networking
Professional
01/26/2024

Additional Computer Networking Flashcards

 


 

Cards

Term

Network communication between two hosts that includes negotiation between the hosts to establish a communication session. (pg.282)

 

A. unicast

B. connection-oriented

C. peer-to-peer (P2P)

D. open-source

Definition

B. In connection-oriented communication, each data segment that are transferred between hosts are acknowledged before a subsequent segment can be sent.

 

Orderly closure of the communication is conducted at the end of the data transfer or in the event of a communication failure.

Term

Network communication method characterized by sending packets that aren't acknowledged by the destination host. (pg. 282)

 

A. unsecured

B. closed source

C. broadcast

D. connectionless

Definition
D. There is no acknowledgement or closing in connectionless communication. UDP is the quintessential connectionless protocol in the TCP/IP suite.
Term

True or false: connection-oriented protocols are generally faster than connectionless protocols. (pg. 821)

 

Definition
False: connectionless protocols are faster because they don't require as much overhead like acknowledgment and closing.
Term

The protocol in the TCP/IP suite that enables connection-oriented communication. (pg. 283)

 

A.TCP

B. DHCP

C. DNS

D. NTP

Definition

A. Transmission Control Protocol (TCP) is the only protocol in the TCP/IP suite that enables connection-oriented programming. The other three choices are all connectionless.

 

TCP uses the three-way handshake to establish connections.

Term
Describe the TCP three-way handshake between a Web server and client. (pg. 283)
Definition
The client sends a synle SYN (synchronize) segment to the Web server. If the server gets that segment, it returns a single SYN, ACK (synchronize, acknowledge) segment. The client then sends the server a single ACK (acknowledgement) segment and immediately requests that the server begin sending Web data.
Term

The protocol used for the types of sessions that don't require the overhead of connection-oriented programming. (pg. 284)

 

A. ACK

B. UDP

C. SYN

D. TCP

Definition
B. DNS, DHCP, NTP/SNTP and TFTP all use User Datagram Protocol (UDP).
Term

Protocol that enables the use of names associated with IP addresses for devices connected to IP networks. (pg. 284)

 

A. UDP

B. ICMP

C. DHCP

D. DNS

Definition

D. DNS (Domain Name System) is why you can type a Web site name such as google.com into an address bar and get to Google instead of having to remember the server's IP address.

 

It uses UDP on port 53 by default.

Term

Protocols that use UDP to synchronize the clocks of devices on a network. (pg. 285)

 

A. IGMP/SIGMP

B. NTP/SNTP

C. DNS/DNSS

D. FTP/TFTP

Definition
B. If a device requires NTP (Network Time Protocol) or SNTP (Simple Network Time Protocol), you will be able to enter the IP address for an NTP/SNTP server. They use port 123.
Term

Protocol that enables the transfer of files from one machine to another using UDP (pg. 286).

 

A. SNMP

B. HTTP

C. TFTP

D. TCP

Definition
D. Trivial File Transfer Protocol (TFTP) is typically used to update software and configurations on routers, switches, VOIP phones and other devices on a LAN, where the chances of losing packets is very small.
Term

Protocol that works at Layer 3 to handle low-level housekeeping tasks such as host unreachable messages and router advertisements (pg. 286).

 

A. PPP

B. IGMP

C. NTP/SNTP

D. ICMP

Definition
D. Internet Control Message Protocol (ICMP) is used for utilities like ping to send an echo request to a specified IP address. Acll computers running TCP/IP (sans firewall) respond to with an echo reply.
Term

The port numbers from 0-1023 are called ___ ports

The port numbers from 1024-49151 are called ___ ports

The port numbers from 49152-65535 are called ___ ports (pg. 291)

 

A. static

B. ephemeral

C. dynamic

D. secured

E. private

F. open

G. registered

H. well-known

Definition

The port numbers from 0-1023 are called well-known ports

 

The port numbers from 1024-49151 are called registered ports

 

The port numbers from 49152-65535 are called dynamic, ephemeral or private ports

Term

In TCP/IP, the session information (IP address, port number and Layer 4 protocol) held in memory on a single computer. (pg. 291)

 

A. socket pair

B. netstat

C. endpoint

D. socket

Definition

C. and D. A socket or endpoint is the term for the session information on a single computer, while a socket pair is the term for the session information on two computers.

 

netstat is the utility to get information about a computer's active TCP/IP connections from a command line.

Term

True or False:

 

netstat is a command line tool you can use to see active TCP/IP connections at a glance, but it doesn't have a way to update changes on the fly.

Definition
True. You'll need a third-party application if you want a tool that automatically updates connection states.
Term

A socket that is prepared to respond to any traffic destined for that socket's port number is called a ___ port. (pg. 294)

 

A. designated

B. established

C. close_wait

D. listening

Definition

D. Also called an open port, every serving application has a listening port.

 

Established ports are active, working endpoint pairs.

 

The CLOSE_WAIT state indicates that the remote end of the connection has finished transmitting data and that the remote application has issued a close or shutdown call.

 

A designated port is one I made up.

Term

Telnet allows a computer to connect remotely to another computer or server via the command line. What advantage does SSH have over Telnet? (pg. 298)

 

A. More utility and options

B. Security

C. Can work across different OS

D. GUI

E. All of the above

Definition
B. Secure Shell (SSH) is extremely similar in that it creates a terminal to a remote host, but every aspect of SSH is encrypted.
Term

Pick three: (pg. 299)

___ is used to send e-mail from clients and between e-mail servers.

 

___ retrieves e-mail from servers, but is on its way out.

____ retrieves e-mail from a server and is a preferred alternative to ____.

 

A. SSH

B. POP3

C. IMAP4

D. SMTP

Definition
D., B. and C. The e-mail found on the Internet uses SMTP to send-email, and either POP3 or IMAP4 to retrieve e-mail.
Term

Every major relational database uses the ___ query language. (pg. 305)

 

A. Data Manipulation Language (DML)

B. Transaction Control Language (TCL)

C. Structured Query Language (SQL)

D. Data Definition Language (DDL)

Definition
C. Microsoft's SQL Server uses port 1433 by default, Oracle's SQLnet uses port 1521, and the open source MySQL uses port 3306.
Supporting users have an ad free experience!