• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/39

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

39 Cards in this Set

  • Front
  • Back

DDoS attacks are attacks on

Availability

In the TC/IP architecture, which layer is responsible for transmission of packets between networks

Internet layer

How will a stateful packet inspection (SPI) firewall handle an incoming packet containing a TCP SYN segment?

Process it through the Access Control List (ACL)

Transport Layer: Host P transmits a SYN to Host Q. If host Q is willing to open the connection, it will transmit a _________ segment

SYN/ACK

A message always has a ___________

Header

In an Ethernet frame, the IP packet is carried in the _________ field

Data

In the TCP/IP architecture, which layer is responsible for facilitating communication within a single network?

Data link layer

In the TCP/IP architecture, which layer is responsible for the bit-by-bit transmission of the data?

Physical layer

In the TCP/IP architecture, which layer is responsible for facilitating communication between two computers, regardless of their platforms or internal hardware?

Transport layer

Transport Layer: If the destination host does not receive the segment, it will ___________

Transmit nothing

Alice is going to make an online purchase at petsmart.com. She wants to ensure that her credit card number will be encrypted when she places the order. Where does Alice's computer obtain petsmart.com's public key?

From the petsmart.com digital certificate

Jitter is a problem for _________

VoIP and Streaming Media

Transmission speed is normally measured in __________

Bits per second

Which of the following places a heavier burden on the internet? TCP or UDP or both

TCP

The most popular symmetric key encryption cipher today is ____________

AES

Source and destination port numbers are found in the header of ___________

TCP segments

In the TCP/IP architecture, which layer is responsible for facilitating communication between two applications?

Application layer

An attacker must break through two firewalls to get to a host. This illustrates the principle called __________

Defense in depth

Passwords are widely used because they offer very strong authentication

False

B2-CC-67-0D-5E is a valid MAC address

False

Packet switching saves money by multiplexing conversations over a single line

True

If an Ethernet frame passes from a source computer through two Ethernet switches, then to the destination computer, how many data links will there be?

One

Abigail and Bert are using a public-private key encryption to exchange information. They want to ensure all of their communications remain confidential. Abigail will use __________ to encrypt a message for Bert. Bert will use __________ to decrypt the message. Bert will use _________ to encrypt a message for Abigail.

Bert's public key, Bert's private key, Abigail's public key

How long are IPv6 addresses?

128 bits

One of the major protocols discussed in class thus far, __________ is (are) connection-oriented

TCP

When a user is trying to visit a webpage, before the user PC can contact the webserver it must first contact the DNS server. What information does the user PC send to the DNS server? What information does the DNS server send back?

The user sends the URL of the webpage in a DNS request. The DNS server sends the IP address of the webpage in a DNS response

When I want to view the webpage for Barnes & Noble, a process occurs but it is not visible to me through my web browser interface. Describe the steps that occur in a TCP session for such an example. Be sure to mention how error detection and correction might occur during this session.

The TCP session beings with my computer sending a SYN to the B&N webserver, to start the 3-way Open. Once the TCP connection is open, the HTTP request/response cycle occurs, followed by the 4-way Close. Error detection: if a host receives an ACK, then it knows the segment was received. If a host does not receive an ACK, then it retransmits the segment (error correction).

Applications that must flow in real time (ex. voice over IP) typically use _________ as the standard at the Transport layer

UDP

When messages of different users share a transmission line, this is _________

Mutliplexing

How long are IPv4 addresses?

32 bits

Social Engineering is an old hacker technique, and therefore it does not work well today.

False

A client is attempting to send an HTTP request. After the internet layer process on the client does encapsulation, it passes the IP packet to the _______ layer process

Data link

Throughput is __________

The speed a network actually provides to users

What is (are) the well-known port number(s) for HTTP?

80

An attack in which an authentic-looking email or website entices a used to enter his or her username, password, or other sensitive information is called ___________

Phishing

Overprovisioning means ____________

Adding much more switching and transmission line capacity than will be needed most of the time

UDP checks messages for errors but does not correct them. UDP is ___________

Unreliable

In TCP, the receiver sends ___________

An ACK if the message is received correctly

At what layer is the EUI-48 address added to an outgoing message?

Data link