Ethical Hacking Chapter 2 Review
Connectionless Protocol
A protocol that does not need to verify whether the receiver is listening or ready to accept the packets
What IPv4 address class has the IP address 221.1.2.3?
Class C
A protocol where the sender doesn't send any data to the destination node until the destination node acknowledges that it's listening to the sender
Connection-oriented protocol
Protocol used to send messages related to network operations
ICMP
What TCP flag is responsible for delivering data directly and immediately to an application?
PSH Flag
What port does the Hypertext Transfer Protocol, or HTTP service use
80
What is the decimal equivalent of the binary number 11000001?
193
How many host computers can be assigned a valid IPv4 address when using a CIDR /24 prefix?
254
What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?
443
What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate?
Application
To retrieve e-mail from a mail server, you most likely access port 119.
False
Transport layer
Getting data to and from the application later by using ports. Verified packet delivery by using acknowledgements
A 32-bit number that tracks packets received by a node and allows reassembling large packets that have been broken up into smaller packets
ISN
What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address?
Internet
Network Layer
Physically moving bits across a medium
A common language used so computers can communicate with one another
Protocol
What TCP flag is responsible for synchronizing the beginning of a session?
SYN Flag
Occupies one bit of the TCP segment and can be set to 0 (off) or 1 (on)
TCP flag
What protocol is the most widely used and allows all computers on a network to communicate and function correctly?
TCP/IP
Application layer
This layer includes network services and client software. HTTP operates here
A TCP/IP process that is used to establish a connection before data is sent
Three-way-handshake
What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?
Transport Layer
No matter what medium connects computers on network-copper wires, fiber-optic cables, or a wireless setup; the same protocol must be running on all computers if communication is going to function correctly.
True
What TCP/IP protocol is fast, unreliable, and operates at the Transport layer?
UDP
Internet Layer
Uses IP addresses to route packets to the correct destination network
Attack that relies on guessing the ISNs of TCP packets
network session hijacking
What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?
port
Fast but unreliable delivery protocol that operates at the Transport layer
UDP
A logical component of a TCP connection that can be assigned to a process that requires network connectivity
port
What does the acronym TCP represent
Transmission Control Protocol
What port does the Trivial File Transfer Protocol, or TFTP service use?
69
UDP is an unreliable data delivery protocol. Why is UDP widely used on the Internet?
Although UDP is an unreliable data delivery protocol, it is used widely on the internet for its speed. UDP does not verify whether the receiver is ready to accept the packet, instead it just sends the packets.