Intro to Networks Chapter 9 - TCP/IP Applications
Which protocol is best for simple, connectionless applications that never need more than a single packet?
ICMP
Port numbers from 0 to 1023 are called ___ port numbers and are reserved for specific TCP/IP applications.
Well-Known
What name is given to the port numbers in the range of O to 1023?
Well—known port numbers
Which switch is used with the Windows netstat command to show the process ID?
-o
Which switch is used with the Windows netstat command to show name of a running program?
-b
Network Time Protocol (NTP)/Simple Network Time Protocol (SNTP) uses port ___.
123
Which TCP ports does the o1d active File Transfer Protocol (FTP) use by default?
20 and 21
A particular multicast called an IGMP group is assigned to which address?
224.0.0.0/4
Hypertext Transfer Protocol over SSL (HTTPS) uses TCP port ___.
443
Web servers use port number __.
80
A(n) ___ site is a Web site that is functioning by serving Web pages.
Active
Which protocol does the ping application use?
ICMP
Firefox enables programmers to create ___, small programs that extend the capabilities of the browser with some pretty impressive results.
Add-Ons
Which free Web server was originally created for the UNIX/Linux platforms, but now runs on multiple operating systems (including Windows)?
Apache HTTP Server
Which term refers to another name for a session?
Connection
Two computers first acknowledge the other, after which they conduct their communication. They end by closing the communication. Which term describes this communication process?
Connection-oriented
With a(n) ___ communication protocol, there is no acknowledgment or any closing.
Connectionless
Using the ping command, Which message is displayed if your computer has no route to the address listed?
Destination host unreachable
Which term refers to ports in the 49152 to 65535 range?
Dynamic port
A(n) ___ is a program that runs on a computer and enables you to send, receive, and organize e—mail.
E-mail Client
___ accept incoming mail and sort out the mail for recipients into individual storage area mailboxes.
E-mail Servers
All computers running TCP/IP (assuming no firewall is involved) respond to echo requests with a(n) ___.
Echo Reply
Ping is an Internet Control Message Protocol (ICMP) application that works by sending a single ICMP packet called a(n) ___ to an IP address you specify.
Echo Request
Which term refers to session information stored in RAM by a computer on one side of a session?
Endpoint
Which term describes the status of a port that is part of an active working endpoint pair?
Established port
___ is the original protocol used on the Internet for transferring files.
FTP
A(n) ___ is a device or software that filters all the packets between two computers (or groups or computers) and decides what gets in and what gets blocked.
Firewall
To publish Web pages, begin with a(n) ____ document that you wish to share with the rest of the world.
HTML
Today, many developers use the HTML version known as ___.
HTML5
Which protocol is the underlying protocol used by the World Wide Web?
HTTP
By convention, Web pages that use an SSL connection start with ___ instead of HTTP.
HTTPS
Which protocol is the secure counterpart of HTTP?
HTTPS
The ___ enables routers to communicate with hosts to determine a "group" membership.
IGMP
The e-mail you find on the Intemet uses SMTP to send e—mail, and either POP3 or ___ to receive e-mail.
IMAP4
Which protocol is an enhanced alternative to POP3 and runs on TCP port 143?
IMAP4
The Internet Control Message Protocol (ICMP) works at to deliver connectionless packets.
Layer 3
A mail server maintains ___, separate holding areas for each user's messages.
Mailboxes
Which command is known as the "show me the endpoint" command?
Netstat
The ___ command will show all open connections on a computer, along with the status of each.
Netstat-an
Which term describes the status for a socket that is prepared to respond to any IP packets destined for that socket's port number?
Open port
___ are domain names that have been registered but do not really do anything, such as Web or e-mail.
Parked Sites
Clearly defined ___ numbers exist for every popular or well—known TCP/IP application.
Port
Dynamic ports are also called ___.
Private Port Numbers
Which term defines a number used by the operating system to track all the running programs?
Process ID (PID)
What type of key does SSL use to encrypt communication?
Public
Which type of port has a number in the 1024 to 49151 range?
Registered port
Which protocol is used to send e-mail over TCP port 25 and is used by clients to send messages?
SMTP
___ is used to send e—mail messages via TCP port 25.
SMTP
All of the popular Telnet servers are also ___ servers.
SSH
___ is a protocol developed by Netscape that can be used to protect your purchases and your anonymity.
SSL
Which Linux and UNIX e-mail server program controls about 20 percent of the market and only runs the SMTP protocol?
Sendmail
In the networking world, any single communication between a computer and another computer is called a(n) ___.
Session
Which protocol is by far the most common type of session on a typical TCP/IP network?
TCP
What file transfer protocol uses UDP port 69?
TFTP
Which protocol is popular for moving files between computers on the same LAN, where the chances of losing packets are very small?
TFTP
Which protocol enables you to control a remote computer from a local computer over a network?
Telnet
Which Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?
UDP
Google's Gmail is a(n) ___ -based e—mail service that is an alternative to using a service based on SMTP and POP3 or IMAP4.
Web
What function is being used if a packet is sent to port 80?
Web browsing
Google Chrome and Mozilla Firefox are examples of ___ applications.
Web client
A Web client's source port number. generated pseudo—randomly by the Web client computer, is classically assigned as a(n) ___.
ephemeral port number
To use your Web browser as an FTP client, type ___ followed by the IP address or domain name of the FTP server.
ftp://
Many years ago, the ping command had a bug that allowed malicious users to send malformed ping packets to a destination causing the ___ issue.
ping of death
If you ping a device and no echo reply comes back before the 1—second default time, ping wi11 respond with a ___ message.
request timed out
The oldest Telnet server, found on UNIX and Linux systems, is the venerable ___.
telnetd