Term
|
Definition
FTP DATA Port used by FTP commands sent to a client. |
|
|
Term
|
Definition
FTP Control Port used by FTP commands sent to the server. |
|
|
Term
|
Definition
SSH Port used by Secure Shell (SSH) to encrypt remote access communication. It typically is used as a secure replacement to Telnet. |
|
|
Term
|
Definition
Telnet Port used by Telnet to remotely connect to a system such as a server or router. |
|
|
Term
|
Definition
SMTP SMTP (Simple Mail Transfer Protocol) port used to send e-mail. |
|
|
Term
|
Definition
DNS DNS (Domain Name Systems) zone transfers. |
|
|
Term
|
Definition
HTTP HTTP (Hypertext Transfer Protocol) Internet protocol for delivering web pages to the browser. |
|
|
Term
|
Definition
POP3 POP3 (Post Office Protocol version 3) Port used by POP3, which is the internet protocol to read e-mail. |
|
|
Term
|
Definition
NetBios Port used by the NetBios session service and is used to establish a connection between two systems for NetBios communication. |
|
|
Term
|
Definition
IMAP IMAP (Internet Message Access Protocol) is a port that used by IMAP, which is newer Internet protocol to read e-mail. |
|
|
Term
|
Definition
HTTPS HTTPS (Hypertext Transfer Protocol Secure) Port used for secure web traffic. |
|
|
Term
|
Definition
RDP Port used by Remote Desktop Protocol (RDP) for remote administration of a Windows System. |
|
|
Term
|
Definition
| The SYN flag is assigned to any packets that are part of the SYN phases of a three-way handshake. |
|
|
Term
|
Definition
| The acknowledgement flag acknowledges that a previous packet has been received. |
|
|
Term
|
Definition
| The push flag is designed to force data on an application. |
|
|
Term
|
Definition
| The urgent flag is specifies that a packet is an urgent packet. |
|
|
Term
|
Definition
| The finish flag specifics that you would like to finalize, or end, he connection. This ends a TCP connection politely, like saying goodbye to end a phone call. |
|
|
Term
|
Definition
| The reset flag is used to end a TCP conversation impolitely. This is like hanging up the phone without saying goodbye. |
|
|
Term
|
Definition
| This 16-bit field identifies the port number of the sending system. |
|
|
Term
|
Definition
| This 16-bit field identifies the port number the packet is destined for on the destination system. |
|
|
Term
|
Definition
| This 32-bit field identifies the sequence number of the packet. |
|
|
Term
|
Definition
| This 32-bit field identifies the packet that this packet is acknowledging. |
|
|
Term
|
Definition
| This 4-bit field indicates where the data begins. |
|
|
Term
|
Definition
| This 6-bit field is always set to 0 and was designed for future use. |
|
|
Term
|
Definition
| This 6-bit field is where the TCP flags are stored. There is a 1-bit field for each of the flags mentioned earlier in this section. |
|
|
Term
|
Definition
| This 16-bit field determines the amount of information that can be sent before an acknowledgment is expected. |
|
|
Term
|
Definition
| This 16-bit field is used to verify the integrity of the TCP header. |
|
|
Term
|
Definition
| This 16-bit field is used only if the URG flag is set and is a reference to the last piece of information that is urgent. |
|
|
Term
|
Definition
| This field is a variable-length field tat specifies any additional settings that may be needed in the TCP header. |
|
|
Term
|
Definition
| A 4-bit field that identifies the version of the IP being used, for example, IP4 or IP6 |
|
|
Term
|
Definition
| A 4-bit field that indicates the size of the IP header. |
|
|
Term
|
Definition
| An 8-bit field that indicates how the packet should be handled by the system. For example, if the Low Delay option is specified here, it means that the system should deal with the packet right away. |
|
|
Term
|
Definition
| A 16-bit field that indicates the size of the IP header. |
|
|
Term
|
Definition
| A 16-bit field. Networks can only handle packets of a specific maximum size -- known as a Maximum Transmission Unit (MTU) -- so the system may break the data being sent into multiple fragments. This field uniquely identifies the fragment. |
|
|
Term
|
Definition
| A 3-bit field that specifics how fragments are going to be dealt with. For example, a More Fragments (MF) flag indicates more fragments are to come . Also, a bit known as Don't Fragment (DF) specifics not to fragment the packet. |
|
|
Term
|
Definition
| A13-bit field that specifies the order in which the fragments are to be put back together when the packets is assembled. |
|
|
Term
|
Definition
| (TTL) is an 8-bit field that specifies when the packet is to expire. The TT is a value that is decremented with every router the packet passes through. When TTL reaches 0, the packet is discarded. |
|
|
Term
|
Definition
| An 8-bit field that specifies which layer-4 protocol (TCP or UDP) the packet should use. |
|
|
Term
|
Definition
| A 6-bit field that verifies the integrity of the IP header. |
|
|
Term
|
Definition
| A 32*bit field that represents the IP address of the sending system. This is how the receiving system knows where to send the reply message. |
|
|
Term
|
Definition
| A 32-bit field that represents the IP address of the system the packet is destined for. |
|
|
Term
|
Definition
| A variable-length field that is used to specify any other settings in the IP header. |
|
|
Term
|
Definition
|
|
Term
|
Definition
0 - Destination network 1 - Destination host unreachable 2 - Destination protocol unreachable 3 - Destination port unreachable |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Internet Control Message Protocol |
|
|
Term
|
Definition
| An 8-bit field that indicates the ICMP type being used. |
|
|
Term
|
Definition
| An 8-bit field indicating the ICMP code being used. |
|
|
Term
|
Definition
| a 16*bit field that is used to verify the integrity of the ICMP header. |
|
|
Term
|
Definition
| A field that stores any data within the ICMP header. For example, operating system place part of the alphabet in this field for ech request messages. |
|
|
Term
|
Definition
| Address Resolution Protocol |
|
|
Term
| ARP is responsible for .. |
|
Definition
| Converting an IP address (layer-3 address) to the physical MAC address (layer-2 address). |
|
|
Term
|
Definition
| Hypertext Transfer Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Hypertext Transfer Protocol Secure |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Fully Qualified Domain Name Server |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Simple Mail Transfer Protocol |
|
|
Term
|
Definition
| Port used for sending e-mail onto the internet. |
|
|
Term
|
Definition
| Port used for POP3 clients to download e-mail . |
|
|
Term
|
Definition
| Internet protocols for reading (receiving)e-mail. |
|
|
Term
|
Definition
| Internet Message Access Protocol version 4, more advanced e-mail receiving program. |
|
|
Term
|
Definition
| Simply e-mail receiving program. |
|
|
Term
|
Definition
| Internet protocol for sending e-mails. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Simple Network Transport Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| TCP/IP protocol that exists to upload and download files. |
|
|
Term
|
Definition
FTP 21 -- Carries FTP commands from one system to another 22 -- allows transfer between hosts |
|
|
Term
|
Definition
| Trivial File Transfer Protocol |
|
|
Term
|
Definition
| TFTP uses it from a TFTP server. |
|
|
Term
|
Definition
| Secure File Transfer Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Primary Domain Controller |
|
|
Term
|
Definition
| Lightweight Directory Access Protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Network Basic Input/Output System |
|
|
Term
|
Definition
| Application Interface Program |
|
|
Term
|
Definition
| Internet Small Computer System Interface |
|
|
Term
|
Definition
| Fiber Channel Over Ethernet |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| 0:0:0:0:0:0:0:1 or ::1 or :: |
|
|
Term
|
Definition
| Used for one-to-one communication. |
|
|
Term
|
Definition
| Used to send data to a group of systems. |
|
|
Term
|
Definition
| Sent to any system on the any cast system. |
|
|
Term
|
Definition
| A public IPv6 address that is routable on the Internet. The address assigned to the host must be unique on the Internet. |
|
|
Term
|
Definition
| A private address (FEC0), the address can not be used outside the system or the Internet. |
|
|
Term
|
Definition
| A self-assigned address (FE80), that can only tal to other nodes on a link. |
|
|
Term
|
Definition
| Multicast Listener Discovery replaces IGMP (Internet Group Message Protocol) for Multicast communication. |
|
|
Term
|
Definition
| Neighbor Discovery replaces ARP (Address Resolution Protocol) |
|
|
Term
| Sending a bogus MAC address information to the switch to cause the switch to fail-open. |
|
Definition
|
|
Term
|
Definition
|
|
Term
| A layer-3 device that sends data from one network to another. |
|
Definition
|
|
Term
| A laer-2 device that filters traffic based on MAC addresses. |
|
Definition
|
|
Term
| A device that is used to split the workload between multiple servers. |
|
Definition
|
|
Term
| A cable type that carries pulses of light. |
|
Definition
|
|
Term
| A cable type that has copper wires divided into pairs. |
|
Definition
| UTP (Unshielded Twisted Pair) |
|
|
Term
| Controlling which MAC addresses can connect to the switch. |
|
Definition
|
|
Term
| Class A Subnet range and mask |
|
Definition
Range = 0 - 127 Mask = 255.0.0.0 |
|
|
Term
| Class B Subnet range and mask |
|
Definition
Range = 128 - 191 Mask = 255.255.0.0 |
|
|
Term
| Class C Subnet range and mask |
|
Definition
Range = 192 - 223 Mask = 255.255.255.0 |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| Private address addresses |
|
Definition
10.0.0.0 - 10.255.255.255 172.0.0.0 - 172.255.255.255 192.0.0.0 - 192.255.255.255 |
|
|
Term
| 10.0.40.10 = Valid or Invalid? Why? |
|
Definition
| Invalid (Private address) |
|
|
Term
| 127.54.67.89 = Valid or Invalid? Why? |
|
Definition
| Invalid (Loopback address) |
|
|
Term
| 131.107.34.0 = Valid or Invalid? Why? |
|
Definition
|
|
Term
| 45.12.0.0 = Valid or Invalid? Why? |
|
Definition
|
|
Term
| 216.83.11.255 = Valid or Invalid? Why? |
|
Definition
| Invalid (Class C address on last octet) |
|
|
Term
| 63.256.4.78 = Valid or Invalid? Why? |
|
Definition
| Invalid (Class A address, Octet went over 255 range) |
|
|
Term
| 200.67.34.0 = Valid or Invalid? Why? |
|
Definition
| Invalid (Class C address set at 0 octet) |
|
|
Term
|
Definition
|
|
Term
| Converts FQDNs to IP addresses |
|
Definition
|
|
Term
| Responsible for error reporting and status information |
|
Definition
|
|
Term
| Protocol used to download files |
|
Definition
|
|
Term
| Responsible for network monitoring and management |
|
Definition
|
|
Term
| Coverts logical address to physical address |
|
Definition
|
|
Term
| Protocol used to secure web traffic |
|
Definition
|
|
Term
| Responsible for unreliable delivery |
|
Definition
|
|
Term
| Responsible for logical addressing and routing |
|
Definition
|
|
Term
| Responsible for reliable delivery |
|
Definition
|
|
Term
Which feature of a network switch allows the network administrator to capture network traffic when monitoring or troubleshooting the network? #Port Security #VLAN #Collusion Domain #Port Mirroring |
|
Definition
|
|
Term
Your manager has been reading about hackers capturing network traffic in a switched network environment and ahs asked you to explain how it is possible that hackers can do this. Which technique will you describe in your explanation? #ARP Poisoning #Port Mirroring #Port Security #MAC Flooding #VLANs |
|
Definition
| ARP Poisoning and MAC Flooding |
|
|
Term
Your company has a web application that seems to be running slowly. What cab be done to improve the performance of the application? #Install a proxy server #Install a load balancer #Configure the web site in a VLAN #Configure port security |
|
Definition
|
|
Term
Which of the following devices could be used to limit which web sites users on the network can visit? #Router #Load balancer #Proxy Server #Cat 5e |
|
Definition
|
|
Term
Which TCP/IP protocol is used to convert the IP address to a MAC address? #ARP #TCP #ICMP #UDP |
|
Definition
| ARP (Address Resolution Protocol) |
|
|
Term
Which ICMP type is used to identify echo request messages? #0 #4 #8 #9 |
|
Definition
|
|
Term
Which of the following identifies the stages of the three-way handshake? #ACK/SYN,ACK,SYN #SYN,SYN/ACK,ACK #ACK,SYN,ACK/SYN #SYN,ACK,ACK/SYN |
|
Definition
|
|
Term
Which of the following represent ports used by secure TCP applications? (Choose all that apply) #23 #22 #80 #143 #443 |
|
Definition
|
|
Term
You are the network administrator for a small company, and you wish to follow security best practices that relate to the switch. Which of the following should you do? (Choose all that apply). #Disable unused ports #Enable all unused ports #Configure port security #Disable port security #Enable console password #Disable console password |
|
Definition
| Disable unused ports, Configure port security, and Enable Console password. |
|
|
Term
What popular feature of a switch allows you to create communication boundaries between systems connected to the switch? #Arp Poisoning #Port Mirroring #Port Security #MAC Flooding #VLANs |
|
Definition
|
|