Ethical Hacking Chapter 2 Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Connectionless Protocol

A protocol that does not need to verify whether the receiver is listening or ready to accept the packets

What IPv4 address class has the IP address 221.1.2.3?

Class C

A protocol where the sender doesn't send any data to the destination node until the destination node acknowledges that it's listening to the sender

Connection-oriented protocol

Protocol used to send messages related to network operations

ICMP

What TCP flag is responsible for delivering data directly and immediately to an application?

PSH Flag

What port does the Hypertext Transfer Protocol, or HTTP service use

80

What is the decimal equivalent of the binary number 11000001?

193

How many host computers can be assigned a valid IPv4 address when using a CIDR /24 prefix?

254

What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?

443

What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate?

Application

To retrieve e-mail from a mail server, you most likely access port 119.

False

Transport layer

Getting data to and from the application later by using ports. Verified packet delivery by using acknowledgements

A 32-bit number that tracks packets received by a node and allows reassembling large packets that have been broken up into smaller packets

ISN

What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address?

Internet

Network Layer

Physically moving bits across a medium

A common language used so computers can communicate with one another

Protocol

What TCP flag is responsible for synchronizing the beginning of a session?

SYN Flag

Occupies one bit of the TCP segment and can be set to 0 (off) or 1 (on)

TCP flag

What protocol is the most widely used and allows all computers on a network to communicate and function correctly?

TCP/IP

Application layer

This layer includes network services and client software. HTTP operates here

A TCP/IP process that is used to establish a connection before data is sent

Three-way-handshake

What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?

Transport Layer

No matter what medium connects computers on network-copper wires, fiber-optic cables, or a wireless setup; the same protocol must be running on all computers if communication is going to function correctly.

True

What TCP/IP protocol is fast, unreliable, and operates at the Transport layer?

UDP

Internet Layer

Uses IP addresses to route packets to the correct destination network

Attack that relies on guessing the ISNs of TCP packets

network session hijacking

What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?

port

Fast but unreliable delivery protocol that operates at the Transport layer

UDP

A logical component of a TCP connection that can be assigned to a process that requires network connectivity

port

What does the acronym TCP represent

Transmission Control Protocol

What port does the Trivial File Transfer Protocol, or TFTP service use?

69

UDP is an unreliable data delivery protocol. Why is UDP widely used on the Internet?

Although UDP is an unreliable data delivery protocol, it is used widely on the internet for its speed. UDP does not verify whether the receiver is ready to accept the packet, instead it just sends the packets.


Set pelajaran terkait

ARE PcM 5.0: Practice Management

View Set

Chapter 9: Legal Challenges for Entrepreneurial Ventures

View Set

PSYCH-Abnormal Behavior in Children- 2

View Set