Module 3: Protocols and Models

¡Supera tus tareas y exámenes ahora con Quizwiz!

ARP

Address Resolution Protocol. Resolves IP addresses to MAC addresses. ARP poisoning attacks can redirect traffic through an attacker's system by sending false MAC address updates. VLAN segregation helps prevent the scope of ARP poisoning attacks within a network.

Which two protocols are service discovery protocols? (Choose two.)

DNS, DHCP

Which two protocols belong in the TCP/IP model application layer?

DNS, DHCP

Ethernet

Defines the rules for wiring and signaling standards of the network access layer.

DNS

Domain Name System - The service that translates URLs to IP addresses.

DHCPv4

Dynamic Host Configuration Protocol for IPv4. A DHCPv4 server dynamically assigns IPv4 addressing information to DHCPv4 clients at start-up and allows the addresses to be re-used when no longer needed.

DHCPv6

Dynamic Host Configuration Protocol for IPv6. DHCPv6 is similar to DHCPv4. A DHCPv6 server dynamically assigns IPv6 addressing information to DHCPv6 clients at start-up.

What types of standards are developed by the Electronics Industries Alliance (EIA)?

Electric wiring and connectors

Which protocol operates at the network access layer of the TCP/IP model?

Ethernet

True or False? Data Link addresses are physical so they never change in the data link frame from source to destination.

False

FTP

File Transfer Protocol. Sets the rules that enable a user on one host to access and transfer files to and from another host over a network. FTP is a reliable, connection-oriented, and acknowledged file delivery protocol.

HTTPS

HTTP Secure. A secure form of HTTP that encrypts the data that is exchanged over the World Wide Web.

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

HTTP, TCP, IP, Ethernet

HTTP

Hypertext Transfer Protocol. A set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the World Wide Web.

Which two protocols function at the internet layer? (Choose two.)

ICMP, IP

Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.)

ICMPv4, ICMPv6

ICMPv6 ND

ICMPv6 Neighbor Discovery. Includes four protocol messages that are used for address resolution and duplicate address detection.

A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device?

IP at the internet layer

This standards organization is responsible for IP address allocation and domain name management.

Internet Assigned Numbers Authority (IANA)

ICMPv4

Internet Control Message Protocol for IPv4. Provides feedback from a destination host to a source host about errors in packet delivery.

This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones.

Internet Engineering Task Force (IETF)

IMAP

Internet Message Access Protocol. Enables clients to access email stored on a mail server as well as maintaining email on the server.

What are two benefits of using a layered network model? (Choose two.)

It assists in protocol design.,,, It prevents technology in one layer from affecting other layers.

What is done to an IP packet before it is transmitted over the physical medium?

It is encapsulated in a Layer 2 frame.

NAT

Network Address Translation. A service that translates public IP addresses to private and private IP addresses to public. It hides addresses on an internal network.

Which of the following statements are true regarding network layer and data link layer addresses? (Choose three.)

Network layer addresses are logical and data link addresses are expressed as 12 hexadecimal digits.,,, Data link layer addresses are physical and network layer addresses are logical.,,,Network layer addresses are either 32 or 128 bits in length.

POP3

Post Office Protocol version 3. Enables clients to retrieve email from a mail server and download the email to the client's local mail application.

What is the purpose of protocols in data communications?

Providing the rules required for a specific type of communication to occur

REST

Representational State Transfer. A web service that uses application programming interfaces (APIs) and HTTP requests to create web applications.

BGP and OSPF are examples of which type of protocol?

Routing

Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.)

Routing protocol, messaging, Internet protocol

SFTP

SSH File Transfer Protocol. As an extension to Secure Shell (SSH) protocol, SFTP can be used to establish a secure file transfer session in which the file transfer is encrypted. SSH is a method for secure remote login that is typically used for accessing the command line of a device.

SMTP

Simple Mail Transfer Protocol. Enables clients to send email to a mail server and enables servers to send email to other servers.

SLAAC

Stateless Address Autoconfiguration. A method that allows a device to obtain its IPv6 addressing information without using a DHCPv6 server.

This protocol is responsible for guaranteeing the reliable delivery of information.

TCP

ICMPv6

The version of ICMP used with IPv6 networks. ICMPv6 performs the functions that ICMP, IGMP, and ARP perform in IPv4. It detects and reports data transmission errors, discovers other nodes on a network, and manages multicasting.

What is the purpose of the sequencing function in network communication?

To uniquely label transmitted segments of data for proper reassembly by the receiver

TCP

Transmission Control Protocol - provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.

TFTP

Trivial File Transfer Protocol. A simple, connectionless file transfer protocol with best-effort, unacknowledged file delivery. It uses less overhead than FTP.

UDP

User Datagram Protocol. Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism.

WLAN

Wireless Local Area Network. Defines the rules for wireless signaling across the 2.4 GHz and 5 GHz radio frequencies.

What type of communication will send a message to all devices on a local area network?

broadcast

Which message delivery option is used when all devices need to receive the same message simultaneously?

broadcast

Which protocol stack layer encapsulates data into frames?

data link

What process is used to receive transmitted data and convert it into a readable message?

decoding

Which logical address is used for delivery of data to a remote network?

destination IP address

What is the order of the two addresses in the data link frame?

destination MAC, source MAC

What is the name of the process of adding protocol information to data as it moves down the protocol stack?

encapsulation

What process is used to place one message inside another message for transfer from the source to the destination?

encapsulation

What is the process of converting information into the proper form for transmission?

encoding

True or false? The right-most part of an IP address is used to identify the network that a device belongs to.

false

Which three are components of message timing? (Choose three.)

flow control, access method, response timeout

Which step of the communication process is concerned with properly identifying the address of the sender and receiver?

formatting

Which delivery method is used to transmit information to one or more end devices, but not all devices on the network?

multicast

Which type of communication will send a message to a group of host destinations simultaneously?

multicast

What is the general term that is used to describe a piece of data at any layer of a networking model?

protocol data unit

What is the PDU associated with the transport layer?

segment

What is the process of dividing a large data stream into smaller pieces prior to transmission?

segmentation

What is used to determine the network portion of an IPv4 address?

subnet mask

In computer communication, what is the purpose of message encoding?

to convert information to the appropriate form for transmission

UDP and TCP belong to which layer of the TCP/IP protocol?

transport

Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?

transport

True or false. Standards organizations are usually vendor-neutral.

true

True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway.

true


Conjuntos de estudio relacionados

5 Questions (Ch. 10), 3 Questions (Ch. 29), 4 Questions (Ch. 30), 5 Questions (Ch. 35), 4 Questions (Ch. 34), 6 Questions (Ch. 33), 4 Questions (Ch. 32), 5 Questions (Ch. 31), 10 Questions (Ch. 28), 8 Questions (Ch. 40)

View Set

Unit 4B: Grammar: Future Time Clauses

View Set

Econ 1000 Exam 2 Questions Review

View Set

Cha 10: Human Resource Management

View Set

Publishing Chapter 01 Key Points Review

View Set

General Chemistry Chapter 9 Gases PPT

View Set