Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
39 Cards in this Set
- Front
- Back
DDoS attacks are attacks on |
Availability |
|
In the TC/IP architecture, which layer is responsible for transmission of packets between networks |
Internet layer |
|
How will a stateful packet inspection (SPI) firewall handle an incoming packet containing a TCP SYN segment? |
Process it through the Access Control List (ACL) |
|
Transport Layer: Host P transmits a SYN to Host Q. If host Q is willing to open the connection, it will transmit a _________ segment |
SYN/ACK |
|
A message always has a ___________ |
Header |
|
In an Ethernet frame, the IP packet is carried in the _________ field |
Data |
|
In the TCP/IP architecture, which layer is responsible for facilitating communication within a single network? |
Data link layer |
|
In the TCP/IP architecture, which layer is responsible for the bit-by-bit transmission of the data? |
Physical layer |
|
In the TCP/IP architecture, which layer is responsible for facilitating communication between two computers, regardless of their platforms or internal hardware? |
Transport layer |
|
Transport Layer: If the destination host does not receive the segment, it will ___________ |
Transmit nothing |
|
Alice is going to make an online purchase at petsmart.com. She wants to ensure that her credit card number will be encrypted when she places the order. Where does Alice's computer obtain petsmart.com's public key? |
From the petsmart.com digital certificate |
|
Jitter is a problem for _________ |
VoIP and Streaming Media |
|
Transmission speed is normally measured in __________ |
Bits per second |
|
Which of the following places a heavier burden on the internet? TCP or UDP or both |
TCP |
|
The most popular symmetric key encryption cipher today is ____________ |
AES |
|
Source and destination port numbers are found in the header of ___________ |
TCP segments |
|
In the TCP/IP architecture, which layer is responsible for facilitating communication between two applications? |
Application layer |
|
An attacker must break through two firewalls to get to a host. This illustrates the principle called __________ |
Defense in depth |
|
Passwords are widely used because they offer very strong authentication |
False |
|
B2-CC-67-0D-5E is a valid MAC address |
False |
|
Packet switching saves money by multiplexing conversations over a single line |
True |
|
If an Ethernet frame passes from a source computer through two Ethernet switches, then to the destination computer, how many data links will there be? |
One |
|
Abigail and Bert are using a public-private key encryption to exchange information. They want to ensure all of their communications remain confidential. Abigail will use __________ to encrypt a message for Bert. Bert will use __________ to decrypt the message. Bert will use _________ to encrypt a message for Abigail. |
Bert's public key, Bert's private key, Abigail's public key |
|
How long are IPv6 addresses? |
128 bits |
|
One of the major protocols discussed in class thus far, __________ is (are) connection-oriented |
TCP |
|
When a user is trying to visit a webpage, before the user PC can contact the webserver it must first contact the DNS server. What information does the user PC send to the DNS server? What information does the DNS server send back? |
The user sends the URL of the webpage in a DNS request. The DNS server sends the IP address of the webpage in a DNS response |
|
When I want to view the webpage for Barnes & Noble, a process occurs but it is not visible to me through my web browser interface. Describe the steps that occur in a TCP session for such an example. Be sure to mention how error detection and correction might occur during this session. |
The TCP session beings with my computer sending a SYN to the B&N webserver, to start the 3-way Open. Once the TCP connection is open, the HTTP request/response cycle occurs, followed by the 4-way Close. Error detection: if a host receives an ACK, then it knows the segment was received. If a host does not receive an ACK, then it retransmits the segment (error correction). |
|
Applications that must flow in real time (ex. voice over IP) typically use _________ as the standard at the Transport layer |
UDP |
|
When messages of different users share a transmission line, this is _________ |
Mutliplexing |
|
How long are IPv4 addresses? |
32 bits |
|
Social Engineering is an old hacker technique, and therefore it does not work well today. |
False |
|
A client is attempting to send an HTTP request. After the internet layer process on the client does encapsulation, it passes the IP packet to the _______ layer process |
Data link |
|
Throughput is __________ |
The speed a network actually provides to users |
|
What is (are) the well-known port number(s) for HTTP? |
80 |
|
An attack in which an authentic-looking email or website entices a used to enter his or her username, password, or other sensitive information is called ___________ |
Phishing |
|
Overprovisioning means ____________ |
Adding much more switching and transmission line capacity than will be needed most of the time |
|
UDP checks messages for errors but does not correct them. UDP is ___________ |
Unreliable |
|
In TCP, the receiver sends ___________ |
An ACK if the message is received correctly |
|
At what layer is the EUI-48 address added to an outgoing message? |
Data link |