Free Essay

It220 Unit 2-1

In: Computers and Technology

Submitted By garycredit
Words 524
Pages 3
1. What are the layers of the TCP/IP model?
Application Layer
Transport Layer
Network Layer
Network Access Layer

2. Which layer of the TCP/IP model processes requests from hosts to make sure a connection is made to the appropriate port?
Application Layer

3. What are well – known ports?
Ports reserved by ICANN

4. Identify the port numbers for the following applications.
a. Telnet: 23
b. HTTP: 80
c. FTP: 20, 21
d. DNS: 25
e. DHCP: 67, 68

5. Define the purpose of a connection oriented protocol.
Establishes a network connection, manages the delivery of data, and terminates the connection. (TCP)

6. What three packets are exchanged between two hosts when establishing a TCP connection?
SYN
SYN ACK
ACK

7. What is the purpose of a sequence number (SEQ=) in TCP data packets?
To initiate the TCP handshake

8. Explain how a host knows whether a data packet was not received.
Host responds with ACK packet

9. Describe how TCP connection is terminated?
Host A sends Host B a FIN packet indicating the connection has been terminated.

10. What is a connectionless protocol?
UDP(User Datagram Protocol)

11. What is the purpose of the Internet layer in the TCP/IP protocol suite?
Used for addressing and routing the data packets.

12. What is the purpose of an ARP request?
Asking which network has an IP address

13. What is the purpose of an ARP reply?
The protocol that contains the hardware address for a destination host

14. What important networking-troubleshooting tool is part of ICMP, and how does it test a network connection?
Ping, verifies connectivity with another host in the network.

15. When is IGMP used?
When one host needs to send data to many destination hosts

16. The network interface layer of the TCP/IP model defines how the host connects to what network?
Network interface layer

17. Convert the following 8-bit binary number to decimal.
18. 10010011:73
19. 11000000: 2359296
20. 11111100:252
21. 11111111:255
22. 192:11000000
23. 65:1000001
24. 96:1100000
25. 13: D
26. Ox5af3: 101101011110011

27. What is the IP address range for class C addresses? 192.0.0.0 to 223.255.255.255

28. What is the purpose of class D IP addresses? Used for multicasting

29. How many bits are in an IPv4 address? How many octets? Four 8-bit octets

30. The IP address is typically expressed in what format for the users? Dotted-decimal format

31. The IP address 192.168.12.2 is an example of what format? Dotted-decimal format

32. How many network bits are in each of the following classes?

Class A: 8
Class B: 16

33. How many network and host bits are in a class C network address? 24 and 8
34. What is the purpose of a private IP address? Intended to be used specifically on internal networks called intranets
35. Can private IP addresses be routed? No
36. How are private IP addresses handled on the internet? They are not routed to the internet
37. What organization a assigns IP addresses? ARIN(American Registry for Internet Numbers

Similar Documents

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms &......

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information......

Words: 4296 - Pages: 18