block5.2.txt

Card Set Information

Author:
ralowery
ID:
275511
Filename:
block5.2.txt
Updated:
2014-05-27 21:13:15
Tags:
block5
Folders:

Description:
block5.2
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user ralowery on FreezingBlue Flashcards. What would you like to do?


    • author "me"
    • tags ""
    • folders ""
    • description ""
    • fileName "block5.2"
    • which RFC defines IPv6
    • RFC 2460
  1. how many bits in length are source and destination addresses in IPv6
    128
  2. what is different in regards to the fragmentation process in IPv6 vs. IPv4
    • IPv4 - fragmentation is performed by routers and the sending host
    • IPv6 - fragmention is only performed by the sending host
  3. in an IPv6 scheme, ARP has been replaced with what
    neighbor solicitation multicast messages
  4. IPv4 uses IGMP to manage local group membership. what has IGMP been replaced by in IPv6
    multicast listener discovery messages
  5. IPv4 had an optional method of determining the IP addrss of the default gateway. how is this accomplished in IPv6
    ICMPv6 router solicitation and router advertisement messages and is required
  6. IPv6 does not use broadcasts, how is information sent out to all nodes
    IPv6 uses inteligent multicast traffic
  7. IPv4 requires the use of DHCP or manual addressing. how does IPv6 differ from IPv4
    IPv6 does not require manual configuration or DHCP
  8. which type of DNS record is used in IPv6 to map names to IPv6 addresses
    AAAA
  9. what is the packet size supported by IPv6
    1280-bytes packet size
  10. what is leading zero suppression
    simplified by removing the leading zeros within each 16-bit block with just a zero
  11. what is zero compression
    simplifies by representing a contiguous sequence of 16-bit blocks set to 0 using a double colon
  12. how many times can zero compression be used in one address
    once
  13. what is an anycast
    one-to-one-of many communcation
  14. how many bits are contained in the global routing prefix of an IPv6 address
    45 bits
  15. how many bits are contained in the subnet ID protion of an IPv6 address
    16 bits
  16. how many bits are contained in the interface ID of an IPv6 address
    64 bits
  17. what are the two types of local use unicast addresses
    • link local
    • site local
  18. what is the loopback address in the IPv6 scheme
    • 0:0:0:0:0:0:0:1
    • ::1
  19. what does a multicast IPv6 address always start with
    FF
  20. what does QoS stand for
    quality of service
  21. what does IPSec stand for
    IP security
  22. what is the different between IPv4 and IPv6 when it comes to IPSec
    • IPv4 it is optional
    • IPv6 it is required
  23. what does IGMP stand for
    internet group management protocol
  24. what does MLD stand for
    multicast listener discovery
  25. what is multicast
    one-to-many communication
  26. what is unicast
    one-to-one communication
  27. which layers of the OSI model does the network interface layer of the TCP/IP stack correspond to
    • data link
    • physical
  28. what does FDDI stand for
    fiber distributed data interface
  29. which ISO standard references HDLC
    data link
  30. what ISO standard references PPP
    data link
  31. what does PPP stand for
    Point-to-Point protocol
  32. what does HDLC stand for
    high-level data link control
  33. which layers of the OSI model does the internetwork layer of the TCP/IP stack correspond to
    network
  34. is IP reliable or unreliable
    unreliable, dependant upon higher layer protocol to implement reliability
  35. what does ARP stand for
    address resolution protocol
  36. what is the purpose of ARP
    to resolve or "map" a known destination IP address to a MAC address
  37. what is the type field that indicates and ARP packet
    0x0806
  38. in an ARP packet, whtat is the destination MAC address set to
    FFFF FFFF FFFF
  39. what does ICMP stand for
    internet control message protocol
  40. what can ICMP traffic be used to identify
    • errors in routing traffic to the destination device
    • errors in locating the destination device
    • time-out for transmitted packets
    • dropped packets
  41. what does ping stand for
    a command that uses ICMP to verify connectivity to a remote host
  42. what does issuing a ping command generate
    echo requests
  43. which layers of the OSI reference model does the host-to-host layer of the TCP/IP stack correspond to
    transport
  44. what does TCP stand for
    transmission control protocol
  45. what does TCP use to establish a connection between hosts
    uses a three-way handshake
  46. can data be exchanged prior to the three-way handshake being completed
    no
  47. what does UDP stand for
    user datagram protocol
  48. which layers of the OSI reference model does the application layer of the TCP/IP stack correspond to
    • application
    • presentation
    • session
  49. how are application layer protocol identified to TCP/IP
    by numeric value called a port number
  50. what are the two types of port numbers and which RFC identifies them
    • well known
    • registered
    • RFC1340
  51. what port does telnet run on, and which RFC is it defined in
    • port 23
    • RFC 854
  52. what ports does FTP run on and which RFC defines it
    • ports 20, 21
    • RFC 959
  53. what port does SMTP use and which RFC defines it
    • port 25
    • RFC 2821
  54. what does ANSI stand for
    american national standards institute
  55. what does ITU-T stand for
    international telecommunication union-telecommunication services sector
  56. what are the well known ports and registered ports
    • well known 0-1023
    • registered 1024-65535
  57. what does Telnet stand for
    telecommunication network protocol
  58. what does FTP stand for
    file transfer protocol
  59. what does SMTP stand for
    simple mail transfer protocol
  60. what does HTTP stand for
    hypertext transfer protocol
  61. what prot does HTTP use and which RFC defines it
    • port 80
    • RFC 2616
  62. what does BOOTP stand for
    bootstrap protocol
  63. what port does BOOTP use and which RFC defines it
    • port 67 and 68
    • RFC 951
  64. what does DHCP stand for
    dynamic host configuration protocol
  65. what port does DHCP use and which RFC defines it
    • port 67 and 68
    • RFC 2131
  66. what does TFTP stand for
    trivial file transfer protocol
  67. what port does TFTP use and which RFC defines it
    • port 69
    • RFC 1350
  68. what does SNMP stand for
    simple network management protocol
  69. what port does SNMP use and which RFC defines it
    • port 161 and 162
    • RFC 1157
  70. what does RIP stand for
    routing information protocol
  71. what port does RIP use and which RFC defines it
    • port 520
    • version 1 RFC 1058
    • version 2 RFC 2453
  72. what does DNS stand for
    domain name system
  73. what port does DNS use and which RFC defines it
    • port 53
    • RFC 1035
  74. what is the purpose of a DHCPINFORM message
    . Client to server, asking only for local configuration parameters; client already has externally configured network address.
  75. what is the purpose of a DHCPRELEASE message
    Client to server relinquishing network address and cancelling remaining lease
  76. what is the purpose of a DHCPACK message
    Server to client with configuration parameters, including committed network address.
  77. what is the purpose of utilizing BOOTP
    BOOTP is a protocol designed for diskless networked devices, like printers and terminals, to obtain a remote bootstrap file in addition to IP addressing information
  78. what is the purpose of utilizing DHCP
    • is designed to centralize network administration by automatically assigning valid IP addresses and IP configuartion information to hosts that request it
    • is a client/server based protocol that can remove the requirement to statically configure all IP hosts with their required TCP/IP information
  79. what are the two components of DHCP
    • a protocol for delivering host-specific configuration parameters from a DHCP server to a host
    • a mechanism for allocation of network address to hosts
  80. what are the three mechanisms supported by DHCP for allocation of IP addresses
    • automatic allocation
    • dynamic allocation
    • manual allocation
  81. which allocation method is most useful to support clients that will be connected to the network only temporarily
    dynamic allocation
  82. which allocation method is most useful to support clients that will be connected to the network permanently
    automatic allocation
  83. what is the purpose of a DHCPDISCOVER message
    client broadcast to locate available servers
  84. what is the purpose of a DHCPOFFER message
    server to client in response to DHCPDISCOVER with offer of configuration parameters
  85. what is the purpose of a DHCPREQUEST message
    • clients message to servers either:
    • requesting offered parameters from one server
    • confirming correctness of previously allocated address
    • extending the lease on a particular network address
  86. what is the purpose of a DHCPRELEASE message
    client to server relinquishing network addrss and cancelling remaining lease
  87. if a client detects that an assigned IP address is already in use it will send a DHCPDECLINE message. what is the next message that the client will send
    DHCPREQUEST
  88. what is the purpose of a DHCPNAK message
    server to client indicating client's notion of network address is incorrect or client's lease as expired
  89. what is one security consideration when utilizing DHCP
    configurating such hosts with passwords or keys
  90. provide the proper syntax for connetcting to a device which has an IP address of 192.168.47.1 using telnet
    telnet 192.168.47.1
  91. what port does telnet utilize by default
    23
  92. what does NVT stand for
    network virtual terminal
  93. why is it important that a party not send out a "request" merely to announce what mode it is in
    prevent endless loops
  94. what can be the result of a party repeating rejected requests
    to prevent endless loops
  95. what is on of the security concerns with using telnet
    inherently transmits usernames and passwords in plain text accross the network
  96. what does SSH stand for
    secure shell
  97. what is one primary difference between telnet and SSH
    SSH provide stong encryption
  98. does RLOGIN use TCP or UDP
    TCP
  99. what port does RLOGIN use
    513
  100. when not using the -1 parameter with RLOGIN, what username is used
    same as the local username
  101. what would a control btye of hex 10 indicate to the recieving device
    the client to switch to "raw" mode, where the START and STOP characters are no longer handled by the client, but are instead treated as plain data
  102. what would a control byte of hex 20 indicate to the receiving device
    the client to resume interception and local processing of START and STOP flow control characters
  103. what mode would the receiving device be placed in after receiving a control byte of hex 10
    raw
  104. what is one security concern when utilizing RLOGIN
    weakening of security
  105. what does RSH stand for
    remote shell
  106. what port does the RSHD daemon typically use
    514
  107. what is one security concern regarding the use RSH
    not secure for network use
  108. what does TLS stand for
    transport layer security
  109. what does SASL stand for
    simple authentication and security layer
  110. what would a control byte of hex 02 indicate to the recieving device
    the clients to discard all buffered data received from the server that has not yet been written to the client user's screen
  111. what would a control byte of hex 80 indicate to the receiving device
    the client to respond by sending the current window size

What would you like to do?

Home > Flashcards > Print Preview