Term
|
Definition
| Transfer Control Protocol (Host-to-Host) Reliable connection-oriented |
|
|
Term
|
Definition
| File Transfer Protocol SFTP is the secure form(Process/Application) |
|
|
Term
|
Definition
| User Datagram Protocol (Host-to-Host) connectionless protocol (Doesn't support windowing) Thin Protocol |
|
|
Term
|
Definition
| Dynamic Host Configuration Protocol, Automatically assigns IP addresses to hosts |
|
|
Term
|
Definition
| Trivial File Transfer Protocol, Connectionless, unsecure (Process/Application) |
|
|
Term
|
Definition
| Domain Name Service (Resolves host names to IP addresses) |
|
|
Term
|
Definition
| Hyper Text Transfer Protocol (Secure)(Process/Application) |
|
|
Term
|
Definition
| Address Resolution Protocol(Internet Layer)Finds the MAC address from a known IP address |
|
|
Term
|
Definition
| Session Initiation Protocol (VoIP) (Process/Application) |
|
|
Term
|
Definition
| Real-time Transfer Protocol (VoIP)(Process/Application) |
|
|
Term
|
Definition
| Secure Shell, Sets up a secure telnet connection (Process/Application) |
|
|
Term
|
Definition
| Post Office Protocol (Process/Application) downloads all email. |
|
|
Term
|
Definition
| Network Time Protocol, used to synchonize clocks amoung computer networks (Process/Application) |
|
|
Term
|
Definition
| Internet Message Access Protocol, Allows for very secure and selective downloading of emails (Process/Application) |
|
|
Term
|
Definition
| Terminal Emulation (Process/Application) |
|
|
Term
|
Definition
| Simple Mail Transfer Protocol (Process/Application) Sends spooled email |
|
|
Term
|
Definition
| Simple Network Management Protocol (Process/Application) Analyzes network and reports a baseline, as well as sudden changes |
|
|
Term
|
Definition
| Internet Control Message Protocol (Internet Layer)Ping, Tracert, hops, buffer full, destination unreachable, uses encapsulated datagrams |
|
|
Term
|
Definition
| Internet Group Management Protocol, Helps manage multicast sessions (Process/Application) |
|
|
Term
|
Definition
| Transport Layer Security (Process/Application) handle encryption |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| What is the difference between TCP and UDP? |
|
Definition
| Transfer Control Protocol is reliable, whereas User Datagram Protocol is not. |
|
|
Term
| List the layers of the DOD model from top to bottom |
|
Definition
| Process/Application, Host-to-Host, Internet, Network Access |
|
|
Term
| Name the OSI corosponding layers for the Process/Application DOD model. |
|
Definition
| Application, Presentation, Session |
|
|
Term
| Name the corosponding OSI layer for the Host-to-Host DOD layer. |
|
Definition
|
|
Term
| Name the corosponding OSI layer for the Internet DOD layer. |
|
Definition
|
|
Term
| Name the corosponding OSI layer for the Network Access DOD layer. |
|
Definition
|
|
Term
| What protocols use port numbers. |
|
Definition
|
|