Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Network Application __________ |
|
Definition
|
|
Term
What are the initials of the company that created the first router? |
|
Definition
|
|
Term
What are the initials of the first router? |
|
Definition
|
|
Term
What was the name of the first router? |
|
Definition
Interface Message Processor |
|
|
Term
What was the first character that was routed over the first router? |
|
Definition
|
|
Term
Discribe the two types of Ethernet headers. |
|
Definition
|
|
Term
What network hardware did Bob Metcalfe create? |
|
Definition
|
|
Term
What company did Bob Metfacle create? |
|
Definition
|
|
Term
Why did Bob Metcalfe get fired from his own company? |
|
Definition
Made a bad deal with Bill Gates |
|
|
Term
List three protocol headers that the Ethernet header could encapsulate. |
|
Definition
|
|
Term
Ethernet users CSMA/CD (Carrier Sense and Multiple Access with Collision Detection). When should Ethernet not be used and why? |
|
Definition
It should not be used for Mission Critical Devices. |
|
|
Term
What was the telephony attitude towards packet switching when packet switching was first being developed? |
|
Definition
When it's connected it stays connected the whole time. |
|
|
Term
What are the names of who created the TCP/IP protocols? |
|
Definition
|
|
Term
|
Definition
|
|
Term
Describe when ARP would be used |
|
Definition
When you have the IP and you are looking for the MAC. |
|
|
Term
Describe when RARP would be used. |
|
Definition
When you have the MAC and your looking for the IP. |
|
|
Term
How many bits are in a MAC addresss? |
|
Definition
|
|
Term
Who controls the numbers assigned for protocols? |
|
Definition
|
|
Term
|
Definition
|
|
Term
Each option requires how many bytes? |
|
Definition
|
|
Term
|
Definition
Security, Record Route, Timestamp, Strict Source Routing, Loose Source Routing. |
|
|
Term
List two of the names of the TOS flags. |
|
Definition
Minimize Delay, Maximize Throughput, Maximize Reliability, Minimize Monetary Cost. |
|
|
Term
What is the IP header size without any options? |
|
Definition
|
|
Term
Whats the maximum number of options? |
|
Definition
|
|
Term
How many options are there? |
|
Definition
|
|
Term
|
Definition
|
|
Term
If the data size is 100 and there are two options, what is the header length field? |
|
Definition
|
|
Term
When the protocol field is set to 1, IP is ecapsulating what? |
|
Definition
|
|
Term
When the protocol field is set to 17, IP is ecapsulating what? |
|
Definition
|
|
Term
When the protocol field is set to 6, IP is ecapsulating what? |
|
Definition
|
|
Term
How can the ARP header be used for different type of addressing? |
|
Definition
Its not always used for MAC addressing. |
|
|
Term
What does ICMP stand for? |
|
Definition
Internet Control Message Protocol |
|
|
Term
Is ICMP reliable or unreliable? |
|
Definition
|
|
Term
A ping is sent in 3 fragments. When does the destination start timing out and what does it use as the time out value? |
|
Definition
It starts counting when it receives the first fragment and uses its TTL even if the fragments are received out of order. |
|
|
Term
Why would a router send an ICMP redirect message that states the following. “Don’t go through me, go through me”. |
|
Definition
A bad subnet mask, its trying to route remotely when it is local. |
|
|
Term
Describe how trace route works. |
|
Definition
Trace route sends a packet out with a TTL of 1, once it gets to the first router then it sends it back with an ICMP timeout code. After that it sends out a packet with a TTL of 2 once it hits the second router it sends it back with an ICMP timeout code. It continues to increment by one until it gets to the target. |
|
|
Term
An initial sequence number of 1415531521 is sent during connection establishment by the client. How will that ISN be acknowledged by the server? |
|
Definition
It increments the ISN by 1 (1415531522) |
|
|
Term
A client is trying to connect to a port on a server using UDP. The port number is not available on the server. How can the server inform the client that the port is not available? |
|
Definition
|
|
Term
A client is trying to connect to a port on a server using TCP. The port number is not available on the server. How can the server inform the client that the port is not available? |
|
Definition
|
|
Term
TCP port numbers are used to represent what on the server? |
|
Definition
|
|
Term
What are port numbers greater than 1024 called? |
|
Definition
|
|
Term
Where each part of the handshake is a segment the MSS option can only appear in a ___ segment. |
|
Definition
|
|
Term
TCP provides the ability for one end of a connection to terminate its output, while still receiving data from the other end. This is called _______-_______. |
|
Definition
|
|
Term
|
Definition
|
|
Term
How many Top Level Root Servers are there? |
|
Definition
|
|
Term
What is the difference between a top level root server and a top level domain name server? |
|
Definition
The top level root server is the end of the line and has all of the Domain names |
|
|
Term
List four top level domain names. |
|
Definition
|
|
Term
|
Definition
|
|
Term
What steps does it take to resolve the domain name www.dmacc.cc.ia.us? (Forward Zone Lookup) |
|
Definition
HOST file Primary DNS SOA Top Level Root Servers US IA CC DMACC WWW |
|
|
Term
What steps does it take to resolve the IP address 161.210.253.8? (Reverse Zone Lookup) |
|
Definition
HOST SOA Top Level Root Servers ARPA INADDER 161 210 253 PTR |
|
|
Term
When resolving www.dmacc.cc.ia.us the “www” resolves to what type of record for IPV4? |
|
Definition
|
|
Term
When resolving 161.210.253.8 the .8 resolves to what type of record for IPV4? |
|
Definition
|
|
Term
From the lecture name 3 different firewall types given. List them and what they do. |
|
Definition
Application Firewall: Filters at the data of the file application. Proxy Server: NAT Packet Filteing: Filters using MAC,IP, or Port numbers. |
|
|
Term
Which came first IPTABLES or IPCHAINS? |
|
Definition
|
|
Term
True or False IPCHAINS have tables? |
|
Definition
|
|
Term
True or False IPTABLES have chains? |
|
Definition
|
|
Term
A windows folder has the following files. P1.exe P1.com P1.bat From the folder that contains the 3 files a user executes P1 with no extension, which file will execute? |
|
Definition
|
|
Term
When you turn on a PC, it first executes a set of instructions that initialize the hardware and allows the system to boot. The code that implements these actions is part of the _______ program that is embedded in the machine’s chips by the manufacturer. |
|
Definition
|
|
Term
Virus scanners may use a heuristics-based detection engine that scans the file for what? |
|
Definition
Attempts to access the boot sector. Attempts to locate all documents in a current directory. Attempts to write to an EXE file. Attempts to delete hard drive contents. |
|
|
Term
Tripwire is a popular program that performs integrity verification. How is that done? |
|
Definition
It checks for differences in the checksum to determine if it’s been modified. |
|
|
Term
Explain how document files may or may not be infected by a virus. |
|
Definition
|
|
Term
While phone freaking, Captain Crunch made a long distance call very early in the morning to a religious leader. Who was the religious leader that was called? |
|
Definition
|
|
Term
True or False Steve Jobs and Steve Wozniak both spent time in jail for phone freaking. |
|
Definition
|
|
Term
How did Steve Wozniak make phone freaking easier? |
|
Definition
|
|
Term
True or False Captain Crunch spent time in jail for phone freaking. |
|
Definition
|
|
Term
Kevin Mitnick when to jail ____ times for phone freaking? |
|
Definition
0 but he has been to jail twice for hacking |
|
|
Term
True or False you can still phone freak but no one does it because of the severe consequences. |
|
Definition
|
|
Term
The word “user” in a user level root kit refers to what? |
|
Definition
The user level in the OS. |
|
|
Term
The very first worm was used to do what? |
|
Definition
Patch software on a network. |
|
|
Term
When performing a buffer overflow what gets changed on the “stack” that makes a compromise possible? |
|
Definition
It modifies the return address. |
|
|
Term
If Bob has 70131 emails, how many files would they take up? |
|
Definition
1, It keeps adding them to the bottom of the file. |
|
|
Term
What does SMTP stand for? |
|
Definition
Simple Mail Transport Protocol |
|
|
Term
What does MTA stand for and what does it do? |
|
Definition
Mail Transfer Agent: Delivers the mail or relays them to another MTA. |
|
|
Term
What does MUA stand for and what does it do? |
|
Definition
Mail User Agent: It's the user interface to the protocol. |
|
|
Term
What does MSA stand for and what does it do? |
|
Definition
Mail Submission Agent: acts as a submission server to accept messages from MUAs, and either delivers them or acts as an SMTP client to relay them to an MTA. |
|
|
Term
Who lives in a pineapple, under the sea? |
|
Definition
|
|