CH. 8 Test

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which switch is used with the Windows netstat utility to show name of a running program?

-b

Which switch is used with the Windows netstat utility to show the process ID?

-o

Which free Web server was originally created for the UNIX/Linux platforms, but now runs on multiple operating systems (including Windows)?

Apache HTTP server

Which protocol is by far the most common type of session on a typical TCP/IP network?

TCP

Which protocol enables you to control a remote computer from a local computer over a network?

TELNET

What file transfer protocol uses UDP port 69?

TFTP

Which protocol is popular for moving files between computers on the same LAN, where the chances of losing packets are very small?

TFTP

Which Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?

UDP

Which term refers to ports in the 49152 to 65535 range?

dynamic port numbers

A Web client's source port number, generated pseudo-randomly by the Web client computer, is classically assigned as a(n) __________.

ephemeral port number

Which term describes the status of a port that is part of an active working endpoint pair?

established port

A port number is an 8-bit value between 0 and 65535.

false

Apache HTTP Server is will only run on Unix/Linux-based operating systems.

false

At any given time, your computer can only have one communication session open.

false

Connectionless sessions are designed to check for errors. Group of answer choices

false

The Internet Control Message Protocol (ICMP) works at Layer 3 to deliver connection-oriented packets.

false

A(n) ____________________ is a device or software that filters all the packets between two computers (or groups of computers) and decides what gets in and what gets blocked. Group of answer choices

firewall

Which protocol is the underlying protocol used by the World Wide Web?

http

The Internet Control Message Protocol (ICMP) works at __________ to deliver connectionless packets.

layer 3

Many years ago, the ping command had a bug that allowed malicious users to send malformed ping packets to a destination causing the __________ issue.

ping of death

Telnet runs on TCP __________.

port 23

Which term defines a number used by the operating system to track all the running programs?

process ID

Which type of port has a number in the 1024 to 49151 range?

registered port

If you ping a device and no echo reply comes back before the default time, ping will respond with a __________ message.

request timed out

Google Chrome and Mozilla Firefox are examples of __________ applications.

web client

What function uses port 80?

web server

What name is given to the port numbers in the range of 0 to 1023?

well known port numbers

Which protocol is used to send e-mail over TCP port 25 and is used by clients to send messages?

SMTP

What is the binary representation of the decimal number 252?

11111100

What is the network ID of 150.5.5.5 /24?

150.5.5.0

Which TCP ports does the old active File Transfer Protocol (FTP) use by default?

20 / 21

A CIDR block (prefix) of /26 is equivalent to what subnet mask below?

255.255.255.192

If you borrow 3 bits in a class C network, how many usable hosts will be on each subnet?

30

What is the increment if your subnet mask is 255.255.255.248?

8

Web servers use port number ____________________.

80

Which email server type has over 50 percent market share and runs on just about everything, from Unix/Linux to Windows?

EXIM

Which protocol is the secure counterpart of HTTP?

HTTPS

Which protocol does the ping application use?

ICMP

Which protocol is the preferred alternative to POP3 and runs on TCP port 143?

IMAP4

A particular multicast called an IGMP group is assigned an address in which class range?

class D

Which term refers to another name for a session?

connection

Two computers first acknowledge the other, after which they conduct their communication. They end by closing the communication. Which term describes this communication process?

connection oriented

Using the ping command, which message is displayed if your computer has no route to the address listed?

destination host unreachable

Which command is universally known as the "show me the endpoint" utility?

netstat

Which term describes the status for a socket that is prepared to respond to any IP packets destined for that socket's port number?

open port

Every serving application has an open port.

true

Secure Shell (SSH) is a more secure replacement for Telnet.

true

There is a strong movement toward using the term Internet Protocol instead of the term TCP/IP.

true

Using TCP, if a receiving computer detects a missing segment, the lack of acknowledgement of receipt results in a resend.

true

Web browsers are designed to request HTML pages from Web servers and then open them.

true


Set pelajaran terkait

CAPS 391: Reproductive System (B)

View Set

Chapter 42: Animal Reproduction and Development

View Set

ECON 2302 - Ch. 7 Production & Costs (LC & HW)

View Set

Med Law and Ethics - Mod 6 - HIPAA Privacy Rule

View Set

Computer Programming I - C++ WEEK 7 QUIZ

View Set

Chapter 13: Conquest and Exile - Study ?s

View Set

Ethnocentrism, Cultural Relativism, and Xenocentrism

View Set