Module 4: Protocols

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the difference between dynamic ARP table entries and static ARP table entries?

Dynamic ARP table entries are created when a client makes an ARP request for information that could not be satisfied by data already in the ARP table. Static ARP table entries are those that someone has entered manually using the ARP utility.

What is the difference between dynamic ARP table entries and static ARP table entries?

Dynamic ARP table entries are created when a client makes an ARP request, whereas static ARP table entries are entered manually using the ARP utility.

Explain the key difference between how symmetric encryption works and how asymmetric encryption works.

Private key encryption is also known as symmetric encryption because the same key is used during both the encryption and decryption of the data. Because public key encryption requires the use of two different keys, one to encrypt and the other to decrypt, it is also known as asymmetric encryption.

Explain the key difference between how symmetric encryption works and how asymmetric encryption works.

Private key encryption is also known as symmetric encryption because the same key issues during both the encryption and decryption of the data. Because public key encryption requires the use of two different keys, one to encrypt and the other to decrypt, it is also known as asymmetric encryption

Which remote file access protocol is an extension of SSH?

SFTP (Secure File Transfer Protocol)

Which protocol's header would a layer 4 device read and process?

TCP

What three characteristics about TCP distinguish it from UDP?

TCP is connection-oriented, uses sequencing and checksums, and provides flow control.

What three characteristics about TCP distinguish it from UDP?

TCP is connection-oriented; it uses sequencing and checksums; and it provides flow control.

Which port must be open for RDP traffic to cross a firewall?

The default port for using the Remote Desktop Protocol is 3389. This port should be open through Windows Firewall to make it RDP accessible within the local area network.

When surfing online, you get some strange data on an apparently secure website, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates for websites?

The digital certificate is issued, maintained, and validated by an organization called a CA (certificate authority).

Which two fields in an Ethernet frame help synchronize device communication but are not counted toward the frame's size?

The preamble and SFD (start frame delimiter) fields are not included when calculating a frame's size, and sometimes not even the FCS (frame check sequence), as this data is removed from incoming transmissions by the hardware before it becomes visible to any but the most sophisticated capture tools.

Which two fields in an Ethernet frame help synchronize device communications but are not counted toward the frame's size?

The preamble and SFD (start frame delimiter) fields are not included when calculating a frame's size, and sometimes not even the FCS (frame check sequences), as data is removed from incoming transmissions by the hardware before it becomes visible to any but the most sophisticated capture tools

Which port must be open for RDP traffic to cross a firewall?

The remote port for using the Remote Desktop Protocol (RDP) is 3389. This port should be open through Windows Firewall to make it RDP accessible within the local area network.

What process is used to establish a TCP connection?

The three-way handshake process establishes a TCP connection. SYN (request for a connection); SYN/ACK (response to the request); ACK (connection established)

What process is used to establish a TCP connection?

The three-way handshake process establishes a TCP connection. SYN (request for a connection); SYN/ACK (response to the request); ACK (connection established).

Which terminal emulation protocol is similar to RDP but is open source?

VNC (Virtual Network Computing) is similar in concept to RDP but uses the cross-platform protocol RFB (remote frame buffer) to remotely control a workstation or server... VNC is open source.

Which terminal emulation protocol is similar to RDP but is open source?

VNC (virtual network computing) is similar in concept to RDP but uses the cross-platform protocol RFB (remote frame buffer) to remotely control a workstation or server... VNC is open source

Which two protocols manage neighbor discovery processes on IPv4 networks? a. ICMP (internet control message protocol) and ARP (address resolution protocol) b. IPv4 and IPv6 c. TCP and UDP d. NDP (neighbor discovery protocol) and Ethernet

a. ICMP and ARP

What is one advantage offered by VDI (virtual desktop infrastructure) over RDS (remote desktop services) and VNC (virtual network computing)? a. Offers access to multiple OSs in VMs b. Supports remote access to mobile devices c. Allows multiple users to sign in at once d. Provides open source flexibility

a. Offers access to multiple OSs in VMs

Which remote file access protocol is an extension of SSH? a. SFTP (SSH File Transfer Protocol) b. TFTP (Trivial File Transfer Protocol) c. FTPS (File Transfer Protocol Secure) d. HTTPS (Hypertext Transfer Protocol Secure)

a. SFTP

You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address?

arp-a

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received? a. Confidentiality b. Integrity c. Availability d. Symmetric

b. Integrity

Which protocol's header would a layer 4 device read and process? a. IP b. TCP c. ARP (address resolution protocol) d. HTTP

b. TCP

What is the Internet standard MTU (maximum transmission unit)? a. 65,535 bytes b. 1,522 bytes c. 1,500 bytes d. 9,198 bytes

c. 1,500 bytes

Which encryption protocol does GRE (generic route encapsulation) use to increase the security of its transmission? a. SSL b. SFTP c. IPsec d. SSH

c. IPsec

At which OSI layer does IP operate? a. Application layer b. Transport layer c. Network layer d. Data link layer

c. Network layer

What is one advantage offered by VDI (virtual desktop infrastructure) over RDS (Remote Desktop services) and VNC (virtual network computing)?

Offers access to multiple OSs in VMs

Which secured tunneling protocol might be able to cross firewalls where IPsec is blocked?

OpenVPN can cross many firewalls where IPsec might be blocked.

Which secured tunneling protocol might be able to cross firewalls where IPsec is blocked?

- OpenVPN, is an open-source VPN protocol that uses a custom security protocol called OpenSSL for encryption. OpenVPN has the ability to cross many firewalls where IPsec might be blocked.

When surfing online, you get some strange data on an apparently secure website, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates for websites?

- The digital certificate is issued, maintained, and validated by an organization called a CA (certificate authority).

What is the Internet standard MTU?

1,500 bytes

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

Integrity

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

Checksum

At which OSI layer does IP operate?

Layer 3 - Network Layer

Which two protocols manage neighbor discovery processes on IPv4 networks?

ICMP and ARP

Which encryption protocol does GRE use to increase the security of its transmissions?

IPsec

You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which mac address is mapped to that IP address? a. telnet 192.168.1.56 b. tracert 192.168.1.56 c. arp -a d. netstat -n

c. arp -a

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source? a. Source port b. Acknowledgement number c. DiffServ d. Checksum

d. Checksum

What tcpdump command will capture data on the eth0 interface and redirect output to a text file named checkme.txt for further analysis?

tcpdump -i eth0 -w checkme.txt


Ensembles d'études connexes

CHAPTER 9: Cellular Respiration & Fermentation

View Set

Chapter 11 (11.1, 11.2), Gaddis, Starting... Java, 6th edition

View Set

Chapter 1.1: What is the Internet?

View Set

SOCI210 The Real World: Introduction to Sociology Chapters 1-7 (Ch. 2 omitted) MIDTERM Study Guide

View Set