• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/154

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

154 Cards in this Set

  • Front
  • Back
The rate at which a service is announced on a network is referred to as:
Advertising Rate
The amount of data that can be transferred across a link is referred to as:
Allowable Data Size
The process of automatically changing the configuration of a device is referred to as:
Auto-Reconfiguration
The known functional routes on an internetwork are known as ____.
Available Routes
Available routes are NOT necessarily the ____ routes.
Optimal
The median time required to reply to a query is referred to as:
Average Response Time
A feature that enables a device, process, or protocol to operate with earlier versions of software or hardware that do NOT support all the latest, up-to-date, or advanced features is known as ____.
Backward Compatibility
A router that can NOT forward packets for some reason and does NOT inform the source of the communication fault is known as a(n) ____.
Black Hole Router
Options added to a command issued at a prompt are known as
Command-Line Parameter
Tests to determine the reachability of a device are known as
Connectivity Tests
Name two utilities that can be used for connectivity testing.
IP PING

TRACEROUTE
ICMP packets that indicate a failure to reach a destination due to a fragmentation problem, parameter problem, or other problem are known as:
Destination Unreachable Packets
The smallest data size that can be sent from one host to another host on an internetwork is known as:
End-To-End Minimum MTU Size
Packets may be fragmented to reach the ____, or the PMTU process can be used to determine the minimum size.
End-To-End Minimum MTU Size
A route entry that is considered “too old” and won’t be used to forward data through an internetwork is known as
Expired Route Entry
A packet must have the “May Fragment bit” set in order to allow an IP packet to be ____ if necessary.
Fragmented
In the TCP/IP environment, the term ____ is used to refer to a Network layer forwarding device typically known as a router.
Gateway
The default ____ is the router a host sends a packet to when the host has NO specific route to a destination.
Gateway
A person who uses computer and communications knowledge to exploit information or functionality of a device is known as a(n) ____.
Hacker
A reconnaissance process used to determine which hosts are active on an IP network is known as
Host Probe
An ICMP process whereby a host sends an Echo packet to another host on an internetwork is known as:
ICMP Echo Communication
The process that a host can perform to learn of local routers is known as:
ICMP Router Solicitation
A key protocol in the TCP/IP protocol suite that provides error messages and the ability to query other devices
Internet Control Message Protocol
(ICMP)
A protocol that supports the formation of multicast groups is known as:
Internet Group Management Protocol
(IGMP)
Measurements that may be based on distance, time, or other values are known as ____.
Metrics
Another way to express one-thousandth of a second is:
Millisecond
A condition that occurs when the delivery time for packets increases beyond normal limits is called:
Network Congestion
List three ways in which congestion can be caused.
-Problems with Network Links
-Overloaded Hosts or Routers
-Unusually heavy network usage levels.
Name a time synchronization protocol defined in RFC 1305.
Network Time Protocol
(NTP)
The best route possible is known as the ____.
Optimal Route
The non-data bits or bytes required to move data from one location to another are referred to as:
Overhead
A Windows 2000/XP utility used to test router and path latency, as well as connectivity is known as
PATHPING
A reconnaissance process used to learn which processes are active on a host device is known as:
Port Probe
Typically, ____ used scripted programs to send out sequential queries to obtain all active port information.
Port Probes
The ability to find at least one transmission path between a pair of hosts so that they can exchange datagrams across an internetwork is known as
Reachability
The process of learning various characteristics about a network or host is known as
Reconnaissance Process
The term ____ means to point out another path.
Redirect
Using ____ a router can redirect a host to another, more optimal router.
Redirect
Notification of successful receipt of data is referred to as: ____.
Acknowledgment
The amount of data that a receiver states it can handle in its TCP buffer space is referred to as a(n) ____.
Advertised window
A measurement of the amount of information that can cross a network is known as: ____.
bandwidth
A simple network transport mechanism that relies on the delivery of PDUs from sender to receiver without adding additional robustness or reliability features is known as: ____.
best-effort delivery
A condition of overload on a network or at a receiver is known as: ____.
congestion
A defined method to avoid overloading a network is known as: ____.
Congestion Avoidance algorithm
A protocol that simply sends datagrams WITHOUT establishing, managing, or otherwise handling a connection between sender and receiver is known as: ____.
connectionless protocol
Primary and key services used in TCP/IP networking are known as: ____.
core services
The actual window size being used at a particular time is known as ____.
current window
An attack that causes a system to refuse services because it is busy handling attack requests is known as: ____.
Denial of Service
(DoS)
A set of identical acknowledgments that is sent back to back to a TCP sender to indicate that out-of-order packets were received is known as: ____.
duplicate ACKs
What type of port number is used just for one communication process?
dynamic port number
A characteristic offered by connection-oriented services to guarantee that data arrives successfully at the desired destination is known as ____.
end-to-end reliability
The procedure for retransmitting missing or damaged data is known as: ____.
error recovery
A TCP connection that is NOT completed with a final acknowledgment is known as: ____.
half-open connection
The process of setting up a virtual connection between TCP peers is known as a(n) ____.
handshake process
A virtual connection between hosts, sometimes referred to as a circuit is known as: ____.
logical connection
A section of TCP data that does NOT arrive at the destination is known as a(n) ____.
lost segment
Which of the following algorithms refers to the maximum amount of data that can fit in a TCP packet after the TCP header?
Maximum Segment Size
(MSS)
Data that has distinct boundaries and command information within the packet are referred to as: ____.
messages
A method stating that when small packets are sent, but NOT acknowledged, NO further packets should be sent is known as the ____.
Nagle algorithm
An affirmative acknowledgment that data has been received is known as: ____.
positive response
A false header structure used to calculate a checksum is known as: ____.
pseudo-header
The time value that determines when a TCP host retransmits a packet after it was lost is referred to as: ____.
retransmission timeout
(RTO)
Which timer maintains the RTO value?
retransmission timer
The number of times a TCP peer resends data when NO acknowledgment is received is known as ____.
retries
A(n) ____ refers to a method for detecting communication problems and re-sending data across the network.
retry mechanism
Which type of acknowledgment defines how a TCP peer can identify specific segments that were successfully received?
Selective Acknowledgment
The process of following the current sequence number sent by a TCP peer, and sending an acknowledgment value to indicate the next-expected sequence number is known as: ____.
sequence number tracking
What acronym is used to refer to a TCP windowing problem caused by an application removing only small amounts of data from a full TCP receiver buffer, thereby causing a TCP peer to advertise a small window?
Silly Window Syndrome
(SWS)
A method for sending data in exponentially increasing increments, starting typically at twice the MSS value refers to: ____.
Slow Start Algorithm
What type of buffer area is a queuing area used to hold incoming and outgoing TCP packets?
TCP buffer area
A port that is used for the duration of a connection is known as: ____.
temporary port
The process of closing a TCP connection is known as: ____.
teardown sequence
The amount of time that a TCP host must NOT use connection parameters after closing down a connection is referred to as: ____.
Time Wait delay
A method for determining when to stop re-sending data across packets is known as a(n) ____.
timeout mechanism
A two-packet handshake that is NOT fully completed is known as ____.
two-way handshake
Data that follows the header but does NOT consist of any padding or extraneous data is referred to as: ____.
valid data
A logical connection between two TCP peers is known as: ____.
virtual connection
A process used by NetWare servers to determine whether the NetWare clients are still active and maintaining the connection between two devices is called: ____.
watchdog process
The process of acknowledging multiple packets with a single acknowledgment is referred to as ____.
windowing
A situation when a TCP peer advertises a window value of zero is called: ____.
zero-window state
In the case of HTTP communications, data flows from the server to the client, and requests flow from the client to the server; this is often referred to as which type of communication?
bidirectional
A basic TCP/IP service that uses TCP and UDP port 19 is: _____.
Character Generator
(Chargen)
A connection that carries ONLY commands and their associated replies is called: _____.
Command Connection
A numerical count that indicates the number of bits or bytes within a field, or the payload in which specific information of interest begins is called: _____.
data offset value
A(n) _____ connection is typically established after a command connection is set up.
data transfer connection
A basic TCP/IP service that silently disposes of all incoming traffic is called:_____.
Discard
Name a UDP- or TCP-based connection-testing protocol.
Echo
_____ is an 8-bit character set.
Extended Binary Coded Decimal Interchange Code
(EBCDIC)
______ provides information about individual users or hosts on the Internet.
Finger
_____ traffic is seldom permitted from outside a host's local area network because of past security exploits using it.
Finger
What type of media includes the ability to link to graphics, sound and video elements, as well as text elements?
hypermedia
An interface that is self-explanatory, requiring little or no training to navigate is known as:_____.
intuitive interface
A method of distributing the processing load for service requests by directing individual requests for service to multiple machines in a way that causes the numbers of such requests per machine to be nearly equal is referred to as:_____.
load balancing
A set of request/reply messages defined to enable the Application layer API, to work with TCP/IP transport and network protocols is known as:_____.
NetBios over TCP/IP
(NetBT or NBT)
What type of service is an Application layer service in which the roles of client and server are fluid so that a host that is a client to a server for one request/reply stream could potentially be the server to the other host acting instead as a client for another request/reply stream?
Peer - to - Peer Services
A method of replicating server data in which the receiver initiates the transfer is called:_____.
Pull
A method of replicating server data in which the sender initiates the transfer is called:_____.
Push
A method of replicating data in which the sender initiates data transfer when server data changes, but where receivers also initiate periodic data transfer to maintain ongoing database consistency is called:_____.
Push-Pull
Name a basic TCP/IP service that delivers a short stream of text in response to a request for service.
Quote of the Day
(QOD)
What permits a procedure running within a process on one host to use TCP/IP transport and network protocols to invoke and communicate with another procedure in some other process?
Remote Procedure Call
(RPC)
Name an Application layer service packet sent from one host to another that requests the target host to provide some service.
request message
What term refers to the collection of messages that an Application layer protocol supports?
request/reply message
What acronym refers to a programming interface that encrypts outgoing data before passing it to the Transport layer and decrypts incoming data before passing it to the Application layer?
Secure Sockets Layer
(SSL)
_____ is a special implementation of Telnet that uses SSL, or a secure shell to encrypt outgoing traffic and decrypt incoming traffic to prevent such traffic from being snooped en route between sender and receiver.
Secure Telnet
(Stelnet)
Traffic between servers that provide an identical service, usually to replicate and synchronize copies of the same data across multiple servers is known as ______ traffic.
Server-to-Server traffic
Name a technique whereby e-mail messages are delivered to a particular server.
store and forward
A secondary process of negotiation that allows for the exchange of parameter information is known as:_____.
Subnegotiation
An unintelligent terminal in which all the data, storage, program processing, and so forth are handled by the remote host is known as:_____.
terminal access
Name a TCP/IP Application layer service that supports lightweight file transfer from a local host to a remote host.
Trivial File Transfer Protocol
(TFTP)
A generic term for all types of names and addresses that refer to objects on the Web.
Uniform Resource Identifier
(URI)
A URI with a commitment to persistence and availability is known as:_____.
Uniform Resource Name
(URN)
Name a client utility used to access a remote server database of domain or IP address registries.
Whois
What type of record maps domain names to IP addresses?
address (A) record
The DNS service request for an IP address that matches a domain name is called: _____.
address request
What type of response is a reply to a query from the name server that's authoritative for the zone in which the requested name or address resides?
authoritative response
What type of server is responsible for one or more particular zones in the DNS database environment?
authoritative server
What term refers to the quality of quickly responding to user requests for service?
available
_____ is the most popular implementation of DNS server software on the Internet today.
BIND (Berkeley Internet Name Domain)
Storing remote information locally once obtained, so that if it is needed again, it may be accessed much more quickly is known as:_____.
caching
What type of server stores valid name and address pairs already looked up, along with invalid names and addresses already detected.
caching server
What type of server does NOT have primary or secondary zone database responsibilities?
caching-only server
What type of record is used to define database aliases, primarily to make it quicker and easier to edit and manage DNS zone files?
canonical name (CNAME) record
The principal whereby one name server designates another name server to handle some or all of the zone files for the domain or subdomains under its purview is referred to as:_____.
delegation of authority
What type of database technology refers to a database that is managed by multiple database servers, each of which has responsibility for some distinct portion of a global database?
distributed database technology
Name a distinct and autonomous subset of data from the DNS name and address hierarchy.
DNS database segment
A(n) _____ is considered a method of managing server congestion in which a DNS server keeps track of which IP addresses it has provided most recently for a specific translation and rotates them within the pool or list or addresses available.
DNS round robin
The entire global namespace for the domain names that DNS manages on the Internet is known as a(n)_____.
domain name hierarchy
The process whereby DNS translates a domain name into a corresponding numeric IP address is known as _____.
domain name resolution
A special form of a domain name that ends with a period to indicate the root of the domain name hierarchy is called:_____.
fully qualified domain name
(FQDN)
Name a type of DNS resource record that provides information about some specific host, as specified by its domain name.
host information (HINFO) record
Name a special type of file that lists known domain names and corresponding IP addresses?
HOSTS
Name a DNS query that supplies an IP address for conversion to a corresponding domain name.
inverse DNS query
A technique whereby a programmer constructs an IP packet that presents domain name credentials that differ from the IP address in the packet header is known as _____.
IP Spoofing
What type of query targets one specific DNS server and terminates with whatever response may be forthcoming, whether that response is a definite answer, an error message, a null reply, or a pointer to another name server?
iterative query
Multiple network interfaces capable of attaching to multiple subnets is referred to as:_____.
multi-homed
Name an inverse DNS query that seeks to obtain a domain name for a corresponding numeric IP address.
name query
A client-side software component, usually part of a TCP/IP stack implementation, that is responsible for issuing DNS queries for applications, and relaying whatever responses come back to those applications is known as:_____.
name resolver
What type of record identifies name servers that are authoritative for some particular domain or subdomain?
name server (NS) record
A technique for storing error messages in a local cache so that repeating a query that previously produced an error can be satisfied more quickly is referred to as:_____.
negative caching
What type of authoritative response refers to a name, address, or RR information from a DNS server that is NOT authoritative for the DNS zone being queried?
non-authoritative response
A widely implemented command-line program that supports DNS lookup and reporting capabilities is called:_____.
NSLOOKUP
What type of record is used by inverse lookups to map numeric IP addresses to domain names?
Pointer (PTR) record
What type of name server is authoritative for some particular domain or subdomain?
Primary DNS Server
What type of query continues until a definitive answer is forthcoming?
recursive query
A(n)_____ is one of a series of pre-defined record types in a DNS database or a DNS zone file.
resource record (RR)
The condition of being ready for use under almost any circumstances is referred to as _____.
robust
The highest level in the domain name hierarchy is often called a(n) _____.
root
the root is symbolized by a(n) _____ in a fully qualified domain name.
final period
What record is mandatory in every DNS zone file?
State of Authority (SOA) record
A named element within a specific domain name, denoted by adding an additional name and period before the parent domain name is called: _____.
subdomain
What type of record can accommodate arbitrary ASCII text data, often used to describe a DNS database segment?
text (TXT) record
Name two examples of a tree structure.
taxonomy or a disk drive listing
A portion of the domain name hierarchy that corresponds to the database segment managed by some particular name server or collection of name servers is called:_____.
zone
Any of several specific files used to capture DNS database information for static storage when DNS server is shut down is known as a(n) _____.
zone data file