Upgrade to remove ads
Only ₩37,125/year
- Science
- Computer Science
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (25)
How many host computers can be assigned a valid IPv4 address when using a CIDR /24 prefix?
254
In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header?
Transport
In the TCP/IP stack, what layer is concerned with physically moving bits across the network's medium?
Network
What 32-bit number tracks packets received by a node and allows the reassembling of large packets that have been broken up into smaller packets?
ISN
What connection-oriented protocol is utilized by the Transport layer?
TCP
What does the acronym TCP represent?
Transmission Control Protocol
What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network?
127 address
What IPv4 address class has the IP address 221.1.2.3?
Class C
What is the decimal equivalent of the binary number 11000001?
193
What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?
Port
What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack?
Application Layer
What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?
Transport layer
What layer, in the TCP/IP stack, do applications and protocols, such as HTTP and Telnet, operate?
Application
What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address?
Internet
What port does the Domain Name System, or DNS service use?
53
What port does the Hypertext Transfer Protocol, or HTTP service use?
80
What port does the Simple Mail Transfer Protocol, or SMTP service use?
25
What port does the Trivial File Transfer Protocol, or TFTP service use?
69
What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?
443
What protocol is the most widely used and allows all computers on a network to communicate and function correctly?
TCP/IP
What TCP flag is responsible for delivering data directly and immediately to an application?
PSH flag
What TCP flag is responsible for synchronizing the beginning of a session?
SYN flag
What TCP/IP protocol is fast, unreliable, and operates at the Transport layer?
UDP
What TCP/IP protocol is used to send messages related to network operations and can be used to troubleshoot network connectivity?
ICMP
What type of network attack relies on guessing a TCP header's initial sequence number, or ISN?
Session hijacking
Recommended textbook solutionsComputer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
720 solutions
Operating System Concepts
9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin
489 solutions
Python Programming: An Introduction to Computer Science
2nd EditionJohn M Zelle
484 solutions
Sets with similar termsNetworking OSI and Protocols
93 terms
Amanda_Joder
CIS 185: Chapter 2
38 terms
JamesCannalte
Chapt 5 Networking Models
52 terms
luzpeterson
Network+ Chapter 2
45 terms
estclair
Sets found in the same folderChapter 1 - Ethical Hacking Overview
24 terms
willtlee89
Chapter 3 - Network and Computer Attacks
25 terms
willtlee89
Ethical Hacking Test #1
90 terms
Logan_Dunlap
Hands-On Ethical Hacking and Network Defense 3rd E…
43 terms
l_allen_cosner
Other sets by this creatorExam 3 - Chapter 13 Short Answers
3 terms
willtlee89
Exam 3 - Chapter 13 Matching
10 terms
willtlee89
Exam 3 - Chapter 12 Short Answers
3 terms
willtlee89
Exam 3 - Chapter 12 Matching Questions
10 terms
willtlee89
Verified questionsCOMPUTER SCIENCE
Why do we bother setting the key of the inserted node to -∞ in line 2 of MAX-HEAP-INSERT when the next thing we do is increase its key to the desired value?
Verified answer
COMPUTER SCIENCE
How are network computers different from traditional personal computers? Describe some usage scenarios in which it is advantageous to use network computers.
Verified answer
COMPUTER SCIENCE
Below is a pseudocode algorithm that prints a set of output values: 1. Get value for n. 2. Set the value of k to 1. 3. While k is less than or equal to n, do Steps 4 through 8. 4. Set the value of j to one-half n. 5. While j is greater than or equal to 1, do Steps 6 through 7. 6. Print the value of j. 7. Set the value of j to one-half its former value. 8. Increase k by 1. 9. Stop. a. Let n have the value 4. Write the values printed out by this algorithm. b. Let n have the value 8. Write the values printed out by this algorithm. c. Which of the following best describes the efficiency of this algorithm, where the “work unit” is printing a value? $\Theta\left(n^{2}\right) \Theta(n \lg n) \Theta(n) \Theta(\lg n).$ d. How many work units would you expect this algorithm to do if n = 16?
Verified answer
COMPUTER SCIENCE
True/False An array in Java can change size as needed.
Verified answer
Other Quizlet setsBiology 201
152 terms
jadenhernandez2024
Chemistry: - November Exam
50 terms
michelleehinojosa
CSI 101 TEST1
40 terms
bcnantoanthongtin
Related questionsQUESTION
Suppose you wanted to do a transaction from a remote client to a server as fast as possible Would you use UDP or TCP Why?
15 answers
QUESTION
what are the 3 forms of MIS infrastructures and what do they support?
2 answers
QUESTION
When using Web mail, you must use email client software.
10 answers
QUESTION
To make sure that all users are allowed access to only approved resources, Marie is auditing her public cloud identity systems. She wants to control specific access and operations. What should Marie define?
3 answers