What protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity?

Upgrade to remove ads

Only ₩37,125/year

  1. Science
  2. Computer Science

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (25)

How many host computers can be assigned a valid IPv4 address when using a CIDR /24 prefix?

254

In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header?

Transport

In the TCP/IP stack, what layer is concerned with physically moving bits across the network's medium?

Network

What 32-bit number tracks packets received by a node and allows the reassembling of large packets that have been broken up into smaller packets?

ISN

What connection-oriented protocol is utilized by the Transport layer?

TCP

What does the acronym TCP represent?

Transmission Control Protocol

What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network?

127 address

What IPv4 address class has the IP address 221.1.2.3?

Class C

What is the decimal equivalent of the binary number 11000001?

193

What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?

Port

What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack?

Application Layer

What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?

Transport layer

What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate?

Application

What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address?

Internet

What port does the Domain Name System, or DNS service use?

53

What port does the Hypertext Transfer Protocol, or HTTP service use?

80

What port does the Simple Mail Transfer Protocol, or SMTP service use?

25

What port does the Trivial File Transfer Protocol, or TFTP service use?

69

What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?

443

What protocol is the most widely used and allows all computers on a network to communicate and function correctly?

TCP/IP

What TCP flag is responsible for delivering data directly and immediately to an application?

PSH flag

What TCP flag is responsible for synchronizing the beginning of a session?

SYN flag

What TCP/IP protocol is fast, unreliable, and operates at the Transport layer?

UDP

What TCP/IP protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity?

ICMP

What type of network attack relies on guessing a TCP header's initial sequence number, or ISN?

Session hijacking

Recommended textbook solutions

What protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity?

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

What protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity?

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

720 solutions

What protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity?

Operating System Concepts

9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin

489 solutions

What protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity?

Python Programming: An Introduction to Computer Science

2nd EditionJohn M Zelle

484 solutions

Sets with similar terms

Networking OSI and Protocols

93 terms

Amanda_Joder

CIS 185: Chapter 2

38 terms

JamesCannalte

Chapt 5 Networking Models

52 terms

luzpeterson

Network+ Chapter 2

45 terms

estclair

Sets found in the same folder

Chapter 1 - Ethical Hacking Overview

24 terms

willtlee89

Chapter 3 - Network and Computer Attacks

25 terms

willtlee89

Ethical Hacking Test #1

90 terms

Logan_Dunlap

Hands-On Ethical Hacking and Network Defense 3rd E…

43 terms

l_allen_cosner

Other sets by this creator

Exam 3 - Chapter 13 Short Answers

3 terms

willtlee89

Exam 3 - Chapter 13 Matching

10 terms

willtlee89

Exam 3 - Chapter 12 Short Answers

3 terms

willtlee89

Exam 3 - Chapter 12 Matching Questions

10 terms

willtlee89

Verified questions

COMPUTER SCIENCE

Why do we bother setting the key of the inserted node to -∞ in line 2 of MAX-HEAP-INSERT when the next thing we do is increase its key to the desired value?

Verified answer

COMPUTER SCIENCE

How are network computers different from traditional personal computers? Describe some usage scenarios in which it is advantageous to use network computers.

Verified answer

COMPUTER SCIENCE

Below is a pseudocode algorithm that prints a set of output values: 1. Get value for n. 2. Set the value of k to 1. 3. While k is less than or equal to n, do Steps 4 through 8. 4. Set the value of j to one-half n. 5. While j is greater than or equal to 1, do Steps 6 through 7. 6. Print the value of j. 7. Set the value of j to one-half its former value. 8. Increase k by 1. 9. Stop. a. Let n have the value 4. Write the values printed out by this algorithm. b. Let n have the value 8. Write the values printed out by this algorithm. c. Which of the following best describes the efficiency of this algorithm, where the “work unit” is printing a value? $\Theta\left(n^{2}\right) \Theta(n \lg n) \Theta(n) \Theta(\lg n).$ d. How many work units would you expect this algorithm to do if n = 16?

Verified answer

COMPUTER SCIENCE

True/False An array in Java can change size as needed.

Verified answer

Other Quizlet sets

Biology 201

152 terms

jadenhernandez2024

Chemistry: - November Exam

50 terms

michelleehinojosa

CSI 101 TEST1

40 terms

bcnantoanthongtin

Related questions

QUESTION

Suppose you wanted to do a transaction from a remote client to a server as fast as possible Would you use UDP or TCP Why?

15 answers

QUESTION

what are the 3 forms of MIS infrastructures and what do they support?

2 answers

QUESTION

When using Web mail, you must use email client software.

10 answers

QUESTION

To make sure that all users are allowed access to only approved resources, Marie is auditing her public cloud identity systems. She wants to control specific access and operations. What should Marie define?

3 answers

Internet Control Message Protocol (ICMP) is used to send control messages to network devices and hosts. Routers and other network devices monitor the operation of the network. When an error occurs, these devices can send a message using ICMP.

What does TCP and IP stand for?

TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet. TCP/IP is also used as a communications protocol in a private computer network (an intranet or extranet).

What port does the Hypertext Transfer protocol or HTTP service use?

Port 80 is the port number assigned to commonly used internet communication protocol, Hypertext Transfer Protocol (HTTP).

What TCP means?

Transmission Control Protocol (TCP)