• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/158

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

158 Cards in this Set

  • Front
  • Back
4- The rate at which a service is announced on a network is referred to as:
Advertising Rate
4- The amount of data that can be transferred across a link is referred to as:
Allowable Data Size
4- The process of automatically changing the configuration of a device is referred to as:
Auto-Reconfiguration
4- The known functional routes on an internetwork are known as ____.
Available Routes
4- Available routes are NOT necessarily the ____ routes.
Optimal
4- The median time required to reply to a query is referred to as:
Average Response Time
4- A feature that enables a device, process, or protocol to operate with earlier versions of software or hardware that do NOT support all the latest, up-to-date, or advanced features is known as ____.
Backward Compatibility
4- A router that can NOT forward packets for some reason and does NOT inform the source of the communication fault is known as a(n) ____.
Black Hole Router
4- Options added to a command issued at a prompt are known as
Command-Line Parameter
4- Tests to determine the reachability of a device are known as
Connectivity Tests
4- Name two utilities that can be used for connectivity testing.
IP PING & TRACEROUT
4- ICMP packets that indicate a failure to reach a destination due to a fragmentation problem, parameter problem, or other problem are known as:
Destination Unreachable Packets
4- The smallest data size that can be sent from one host to another host on an internetwork is known as:
End-to-End Minimum MTU Size
4- Packets may be fragmented to reach the ____, or the PMTU process can be used to determine the minimum size.
End-to-End Minimum MTU Size
4- A route entry that is considered “too old” and won’t be used to forward data through an internetwork is known as
Expired Route Entry
4- A packet must have the “May Fragment bit” set in order to allow an IP packet to be ____ if necessary.
Fragmented
4- In the TCP/IP environment, the term ____ is used to refer to a Network layer forwarding device typically known as a router.
Gateway
4- The default ____ is the router a host sends a packet to when the host has NO specific route to a destination.
Gateway
4- A person who uses computer and communications knowledge to exploit information or functionality of a device is known as a(n) ____.
Hacker
4- A reconnaissance process used to determine which hosts are active on an IP network is known as
Host Probe
4- An ICMP process whereby a host sends an Echo packet to another host on an internetwork is known as:
ICMP Echo Communication
4- The process that a host can perform to learn of local routers is known as:
ICMP Router Solicitation
4- A key protocol in the TCP/IP protocol suite that provides error messages and the ability to query other devices
ICMP - Internet Control Message Protocol
4- A protocol that supports the formation of multicast groups is known as:
IGMP - Internet Group Management Protocol
4- Measurements that may be based on distance, time, or other values are known as ____.
Metrics
4- Another way to express one-thousandth of a second is:
Millisecond
4- A condition that occurs when the delivery time for packets increases beyond normal limits is called:
Network Congestion
4- List three ways in which congestion can be caused.
"Problems with network links, Overload hosts or routers, or Unusually heavy network usage levels"
4- Name a time synchronization protocol defined in RFC 1305.
Network Time Protocol (NTP)
4- The best route possible is known as the ____.
Optimal Route
4- The non-data bits or bytes required to move data from one location to another are referred to as:
Overhead
4- A Windows utility used to test router and path latency, as well as connectivity is known as
PATHPING
4- A reconnaissance process used to learn which processes are active on a host device is known as:
Port Probe
4- Typically, ____ used scripted programs to send out sequential queries to obtain all active port information.
Port Probe
4- The ability to find at least one transmission path between a pair of hosts so that they can exchange datagrams across an internetwork is known as
Reachability
4- The process of learning various characteristics about a network or host is known as
Reconnaissance Process
4- The term ____ means to point out another path.
Redirect
4- Using ____, a router can redirect a host to another, more optimal router.
ICMP
4- A _______ is a link that does not support forwarding based on the current packet format and configuration.
Restricting Link
4- A ________ is a counter that tracks the number of retransmissions on the network.
Retry Counter
4- _______ is a technique for documenting which hosts and routers a datagram traverses in its path from the sender to the receiver.
Route Tracing
5- Notification of successful receipt of data is referred to as: ____.
Acknowledgment
5- The amount of data that a receiver states it can handle in its TCP buffer space is referred to as a(n) ____.
Advertised Window
5- A measurement of the amount of information that can cross a network is known as: ____.
Bandwidth
5- A simple network transport mechanism that relies on the delivery of PDUs from sender to receiver without adding additional robustness or reliability features is known as: ____.
Best-Effort Delivery
5- A condition of overload on a network or at a receiver is known as: ____.
Congestion
5- A defined method to avoid overloading a network is known as: ____.
Congestion Avoidance Algorithm
5- A protocol that simply sends datagrams WITHOUT establishing, managing, or otherwise handling a connection between sender and receiver is known as: ____.
Connectionless Protocol
5- Primary and key services used in TCP/IP networking are known as: ____.
Core services
5- The actual window size being used at a particular time is known as ____.
Current Window
5- An attack that causes a system to refuse services because it is busy handling attack requests is known as: ____.
Denial of Service (DOS)
5- A set of identical acknowledgements that is sent back to back to a TCP sender to indicate that out-of-order packets were received is known as: ____.
Duplicate ACKs
5- What type of port number is used just for one communication process?
Dynamic
5- A characteristic offered by connection-oriented services to guarantee that data arrives successfully at the desired destination is known as ____.
End-to-End Reliability
5- The procedure for retransmitting missing or damaged data is known as: ____.
Error Recovery
5- A TCP connection that is NOT completed with a final acknowledgement is known as: ____.
Half-Open Connections
5- The process of setting up a virtual connection between TCP peers is known as a(n) ____.
Handshake Process
5- A virtual connection between hosts, sometimes referred to as a circuit is known as: ____.
Logical Connection
5- A section of TCP data that does NOT arrive at the destination is known as a(n) ____.
Lost Segment
5- Which of the following algorithms refers to the maximum amount of data that can fit in a TCP packet after the TCP header?
Maximum Segment Size (MSS)
5- Data that has distinct boundaries and command information within the packet are referred to as: ____.
Messages
5- A method stating that when small packets are sent, but NOT acknowledged, NO further packets should be sent is known as the ____.
Nagle Algorithm
5- An affirmative acknowledgement that data has been received is known as: ____.
Positive Response
5- A false header structure used to calculate a checksum is known as: ____.
Pseudo-Header
5- The time value that determines when a TCP host retransmits a packet after it was lost is referred to as: ____.
Retransmission Timeout (RTO)
5- Which timer maintains the RTO value?
Retransmission Timer
5- The number of times a TCP peer resends data when NO acknowledgement is received is known as ____.
Retries
5- A(n) ____ refers to a method for detecting communication problems and re-sending data across the network.
Retry Mechanism
5- Which type of acknowledgement defines how a TCP peer can identify specific segments that were successfully received?
Selective Acknowledgment
5- The process of following the current sequence number sent by a TCP peer, and sending an acknowledgement value to indicate the next-expected sequence number is known as: ____.
Sequence Number Tracking
5- What acronym is used to refer to a TCP windowing problem caused by an application removing only small amounts of data from a full TCP receiver buffer, thereby causing a TCP peer to advertise a small window?
Silly Window Syndrom (SWS)
5- A method for sending data in exponentially increasing increments, starting typically at twice the MSS value refers to: ____.
Slow Start Algorithm
5- What type of buffer area is a queuing area used to hold incoming and outgoing TCP packets?
TCP Buffer Area
5- A port that is used for the duration of a connection is known as: ____.
Temporary Port
5- The process of closing a TCP connection is known as: ____.
Teardown Sequence
5- The amount of time that a TCP host must NOT use connection parameters after closing down a connection is referred to as: ____.
Time Wait Delay
5- A method for determining when to stop re-sending data across packets is known as a(n) ____.
Timeout Mechanism
5- A two-packet handshake that is NOT fully completed is known as ____.
Two-Way Handshake
5- Data that follows the header but does NOT consist of any padding or extraneous data is referred to as: ____.
Valid Data
5- A logical connection between two TCP peers is known as: ____.
Virtual Connection
5- A process used by NetWare servers to determine whether the NetWare clients are still active and maintaining the connection between two devices is called: ____.
Watchdog Process
5- The process of acknowledging multiple packets with a single acknowledgement is referred to as ____.
Windowing
5- A situation when a TCP peer advertises a window value of zero is called: ____.
Zero-Window State
6- In the case of HTTP communications, data flows from the server to the client, and requests flow from the client to the server; this is often referred to as which type of communication?
Bidirectional
6- A basic TCP/IP service that uses TCP and UDP port 19 is: ____.
Character Generator (Chargen)
6- A connection that carries ONLY commands and their associated replies is called: ____.
Command Connection
6- A numerical count that indicates the number of bits or bytes within a field, or the payload in which specific information of interest begins is called: ____.
Data Offset Field
6- A(n) ____ connection is typically established after a command connection is set up.
Data Transfer Connection
6- A basic TCP/IP service that silently disposes of all incoming traffic is called: ____.
Discard
6- Name a UDP- or TCP-based connection-testing protocol.
Echo
6- ____ is an 8-bit character set.
"(EBCDIC) Extended Binary Coded Decimal Interchange Code"
6- ____ provides information about individual users or hosts on the Internet.
Finger
6- ____ traffic is seldom permitted from outside a host’s local area network because of past security exploits using it.
Finger
6- What type of media includes the ability to link to graphics, sound, and video elements, as well as text elements?
Hypermedia
6- An interface that is self-explanatory, requiring little or no training to navigate is known as: ____.
Intuitive Interface
6- A method of distributing the processing load for service requests by directing individual requests for service to multiple machines in a way that causes the numbers of such requests per machine to be as nearly equal is referred to as: ____.
Load Balancing
6- A set of request/reply messages defined to enable the Application layer API, to work with TCP/IP transport and network protocols is known as: ____.
Multiple Control Unit (MCU)
6- What type of service is an Application layer service in which the roles of client and server are fluid so that a host that is a client to a server for one request/reply stream could potentially be the server to the other host acting instead as a client for another request/reply stream?
Peer-to-Peer Services
6- A method of replicating server data in which the receiver initiates the transfer is called: ____.
Pull
6- A method of replicating server data in which the sender initiates the transfer is called: ____.
Push
6- A method of replicating data in which the sender initiates data transfer when server data changes, but where receivers also initiate periodic data transfer to maintain ongoing database consistency is called: ____.
Push-Pull
6- Name a basic TCP/IP service that delivers a short stream of text in response to a request for service.
Quote Of the Day (QOD)
6- What permits a procedure running within a process on one host to use TCP/IP transport and network protocols to invoke and communicate with another procedure in some other process?
Remote Procedure Protocol (RPC)
6- Name an Application layer service packet sent from one host to another that responds to the other host’s request for service.
Reply Message
6- Name an Application layer service packet sent from one host to another that requests the target host to provide some service.
Request Message
6- What term refers to the collection of messages that an Application layer protocol supports?
Request/Reply Message
6- What acronym refers to a programming interface that encrypts outgoing data before passing it to the Transport layer and decrypts incoming data before passing it to the Application layer?
Secure Socket Layer (SSL)
6- ____ is a special implementation of Telnet that uses SSL, or a secure shell to encrypt outgoing traffic and decrypt incoming traffic to prevent such traffic from being snooped en route between sender and receiver.
Secure Telnet (Stelnet)
6- Traffic between servers that provide an identical service, usually to replicate and synchronize copies of the same data across multiple servers is known as ____ traffic.
Server-to-Server Traffic
6- Name a technique whereby e-mail messages are delivered to a particular server.
Store and Forward
6- A secondary process of negotiation that allows for the exchange of parameter information is known as: ____.
Subnegotiation
6- An unintelligent terminal in which all the data, storage, program processing, and so forth are handled by the remote host is known as: ____.
Terminal Access
6- Name a TCP/IP Application layer service that supports lightweight file transfer from a local host to a remote host.
Trivial File Transfer Protocol (TFTP)
6- A generic term for all types of names and addresses that refer to objects on the Web.
Uniform Resource Identifier (URi)
6- A URI with a commitment to persistence and availability is known as: ____.
Uniform Resource Name (URN)
6- Name a client utility used to access a remote server database of domain or IP address registries.
6- Whois
7- What type of record maps domain names to IP addresses?
Address (A) Record
or
DNS Resource Record
7- The DNS service request for an IP address that matches a domain name is called: ____.
Address Request
7- What type of response is a reply to a query from the name server that’s authoritative for the zone in which the requested name or address resides?
Authoritative Response
7- What type of server is responsible for one or more particular zones in the DNS database environment?
Authoritative Server
7- What term refers to the quality of quickly responding to user requests for service?
Available
7- ____ is the most popular implementation of DNS server software on the Internet today.
"BIND (Berkeley Internet Name Domain)"
7- Storing remote information locally once obtained, so that if it is needed again, it may be accessed much more quickly is known as: ____.
Caching
7- What type of server stores valid name and address pairs already looked up, along with invalid names and addresses already detected?
Caching Server
7- What type of server does NOT have primary or secondary zone database responsibilities?
Caching-Only Server
7- What type of record is used to define database aliases, primarily to make it quicker and easier to edit and manage DNS zone files?
Canonical Name (CNAME) Record
7- The principle whereby one name server designates another name server to handle some or all of the zone files for the domain or subdomains under its purview is referred to as: ____.
Delegation of Authority
7- What type of database technology refers to a database that is managed by multiple database servers, each of which has responsibility for some distinct portion of a global database?
Distributed Database Technology
7- Name a distinct and autonomous subset of data from the DNS name and address hierarchy.
DNS Database Segment
7- A(n) ____ is considered a method of managing server congestion in which a DNS server keeps track of which IP addresses it has provided most recently for a specific translation and rotates them within the pool or list of addresses available.
DNS Round Robin
7- The entire global namespace for the domain names that DNS manages on the Internet is known as a(n) ____.
Domain Name Hierarchy
7- The process whereby DNS translates a domain name into a corresponding numeric IP address is known as: ____.
Domain Name Resolution
7- A special form of a domain name that ends with a period to indicate the root of the domain name hierarchy is called: ____.
Fully Qualified Domain Name (FQDN)
7- Ngame a type of DNS resource record that provides information about some specific host, as specified by its domain name.
Host Information (HINFO) Record
7- Name a special type of file that lists known domain names and corresponding IP addresses?
HOSTS (Text File)
7- Name a DNS query that supplies an IP address for conversion to a corresponding domain name.
Inverse DNS Query
7- A technique whereby a programmer constructs an IP packet that presents domain name credentials that differ from the IP address in the packet header is known as ____.
IP Spoofing
7- What type of query targets one specific DNS server and terminates with whatever response may be forthcoming, whether that response is a definite answer, an error message, a null reply, or a pointer to another name server?
Iterative Query
7- Multiple network interfaces capable of attaching to multiple subnets is referred to as: ____.
Multi-Homed
7- Name an inverse DNS query that seeks to obtain a domain name for a corresponding numeric IP address.
Name Query
7- A client-side software component, usually part of a TCP/IP stack implementation, that is responsible for issuing DNS queries for applications, and relaying whatever responses come back to those applications is known as: ____.
Name Resolver
7- What type of record identifies name servers that are authoritative for some particular domain or subdomain?
Name Server (NS) Record
7- A technique for storing error messages in a local cache so that repeating a query that previously produced an error can be satisfied more quickly is referred to as: ____.
Negative Caching
7- What type of authoritative response refers to a name, address, or RR information from a DNS server that is NOT authoritative for the DNS zone being queried?
Non-Authoratative Response
7- A widely implemented command-line program that supports DNS lookup and reporting capabilities is called: ____.
NSLOOKUP
7- What type of record is used by inverse lookups to map numeric IP addresses to domain names?
Pointer (PTR) record
7- What type of name server is authoritative for some particular domain or subdomain?
Primary DNS Server
7- What type of query continues until a definitive answer is forthcoming?
Recursive Query
7- A(n) ____ is one of a series of pre-defined record types in a DNS database or a DNS zone file.
Resource Record (RR)
7- The condition of being ready for use under almost any circumstances is referred to as ____.
Robust
7- The highest level in the domain name hierarchy is often called a(n) ____.
Root
7- The root is symbolized by a(n) ____ in a fully qualified domain name.
Final Period
7- What record is mandatory in every DNS zone file?
Start of Authority (SOA) Record
7- A named element within a specific domain name, denoted by adding an additional name and period before the parent domain name is called: ____.
Subdomain
7- What type of record can accommodate arbitrary ASCII text data, often used to describe a DNS database segment?
Text (TXT) Record
7- Name two examples of a tree structure.
"Taxonomy or Disk Drive Listing"
7- A portion of the domain name hierarchy that corresponds to the database segment managed by some particular name server or collection of name servers is called: ____.
Zone
7- Any of several specific files used to capture DNS database information for static storage when a DNS server is shut down is known as a(n) ____.
Zone Data File