Upgrade to remove ads Show Only ₩37,125/year
Terms in this set (25)How many host computers can be assigned a valid IPv4 address when using a CIDR /24 prefix? 254 In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header? Transport In the TCP/IP stack, what layer is concerned with physically moving bits across the network's medium? Network What 32-bit number tracks packets received by a node and allows the reassembling of large packets that have been broken up into smaller packets? ISN What connection-oriented protocol is utilized by the Transport layer? TCP What does the acronym TCP represent? Transmission Control Protocol What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network? 127 address What IPv4 address class has the IP address 221.1.2.3? Class C What is the decimal equivalent of the binary number 11000001? 193 What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?
Port What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack? Application Layer What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments? Transport layer What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate? Application What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address? Internet What port does the Domain Name System, or DNS service use? 53 What port does the Hypertext Transfer Protocol, or HTTP service use? 80 What port does the Simple Mail Transfer Protocol, or SMTP service use? 25 What port does the Trivial File Transfer Protocol, or TFTP service use? 69 What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server? 443 What protocol is the most widely used and allows all computers on a network to communicate and function correctly? TCP/IP What TCP flag is responsible for delivering data directly and immediately to an application? PSH flag What TCP flag is responsible for synchronizing the beginning of a session? SYN flag What TCP/IP protocol is fast, unreliable, and operates at the Transport layer? UDP What TCP/IP protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity? ICMP What type of network attack relies on guessing a TCP header's initial sequence number, or ISN? Session hijacking Recommended textbook solutionsComputer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 720 solutions Operating System Concepts9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin 489 solutions
Python Programming: An Introduction to Computer Science2nd EditionJohn M Zelle 484 solutions Sets with similar termsNetworking OSI and Protocols93 terms Amanda_Joder CIS 185: Chapter 238 terms JamesCannalte Chapt 5 Networking Models52 terms luzpeterson Network+ Chapter 245 terms estclair Sets found in the same folderChapter 1 - Ethical Hacking Overview24 terms willtlee89 Chapter 3 - Network and Computer Attacks25 terms willtlee89 Ethical Hacking Test #190 terms Logan_Dunlap Hands-On Ethical Hacking and Network Defense 3rd E…43 terms l_allen_cosner Other sets by this creatorExam 3 - Chapter 13 Short Answers3 terms willtlee89 Exam 3 - Chapter 13 Matching10 terms willtlee89 Exam 3 - Chapter 12 Short Answers3 terms willtlee89 Exam 3 - Chapter 12 Matching Questions10 terms willtlee89 Verified questionsCOMPUTER SCIENCE Why do we bother setting the key of the inserted node to -∞ in line 2 of MAX-HEAP-INSERT when the next thing we do is increase its key to the desired value? Verified answer
COMPUTER SCIENCE How are network computers different from traditional personal computers? Describe some usage scenarios in which it is advantageous to use network computers. Verified answer COMPUTER SCIENCE Below is a pseudocode algorithm that prints a set of output values: 1. Get value for n. 2. Set the value of k to 1. 3. While k is less than or equal to n, do Steps 4 through 8. 4. Set the value of j to one-half n. 5. While j is greater than or equal to 1, do Steps 6 through 7. 6. Print the value of j. 7. Set the value of j to one-half its former value. 8. Increase k by 1. 9. Stop. a. Let n have the value 4. Write the values printed out by this algorithm. b. Let n have the value 8. Write the values printed out by this algorithm. c. Which of the following best describes the efficiency of this algorithm, where the “work unit” is printing a value? $\Theta\left(n^{2}\right) \Theta(n \lg n) \Theta(n) \Theta(\lg n).$ d. How many work units would you expect this algorithm to do if n = 16? Verified answer COMPUTER SCIENCE True/False An array in Java can change size as needed. Verified answer Other Quizlet setsBiology 201152 terms jadenhernandez2024 Chemistry: - November Exam50 terms michelleehinojosa CSI 101 TEST140 terms bcnantoanthongtin Related questionsQUESTION Suppose you wanted to do a transaction from a remote client to a server as fast as possible Would you use UDP or TCP Why? 15 answers QUESTION what are the 3 forms of MIS infrastructures and what do they support? 2 answers QUESTION When using Web mail, you must use email client software. 10 answers QUESTION To make sure that all users are allowed access to only approved resources, Marie is auditing her public cloud identity systems. She wants to control specific access and operations. What should Marie define? 3 answers What TCP IP protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity?Internet Control Message Protocol (ICMP) is used to send control messages to network devices and hosts. Routers and other network devices monitor the operation of the network. When an error occurs, these devices can send a message using ICMP.
What does TCP and IP stand for?TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet. TCP/IP is also used as a communications protocol in a private computer network (an intranet or extranet).
What port does the Hypertext Transfer protocol or HTTP service use?Port 80 is the port number assigned to commonly used internet communication protocol, Hypertext Transfer Protocol (HTTP).
What TCP means?Transmission Control Protocol (TCP)
|