Preview

Netstat

Satisfactory Essays
Open Document
Open Document
481 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Netstat
Chapter 2 Solutions

Review Questions

1. The Netstat command indicates that POP3 is in use on a remote server. Which port is the remote server most likely using?

b. Port 110

2. On a Windows computer, what command can you enter to show all open ports being used?

a. Netstat

3. Which protocol uses UDP?

d. TFTP

4. Which protocol offers guaranteed delivery and is connection oriented?

c. TCP

5. TCP communication could be likened to which of the following?

d. Phone conversation

6. Which of the following protocols is connectionless? (Choose all that apply.)

a. UDP

b. IP

7. Which command verifies the existence of a node on a network?

a. Ping

8. FTP offers more security than TFTP. True or False?

True

9. List the three components of the TCP/IP three-way handshake.

SYN, SYN-ACK, and ACK

10. What protocol is used for reporting or informational purposes?

c. ICMP

11. List the six flags of a TCP packet.

SYN, ACK, PSH, URG, RST, FIN

12. A UDP packet is usually smaller than a TCP packet. True or False?

True

13. What port, other than port 110, is used to retrieve e-mail?

b. Port 143

14. What port does DNS use?

d. Port 53

15. What command is used to log on to a remote server, computer, or router?

c. Telnet

16. Which of the following is not a valid octal number?

c. 3482

17. The initial sequence number (ISN) is set at which step of the TCP three-way handshake?

d. 1 and 2

18. A Ping command initially uses which ICMP type code?

b. Type 8

19. “Destination Unreachable” is designated by which ICMP type code?

c. Type 3

20. What’s the hexadecimal equivalent of the binary number 1111 1111?

a. FF

Activities

Activity 2-4

1. Octal values

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    The 3 components of the 3-way handshake are SYN-SYN-ACK. There are 3 messages transmitted by TCP to negotiate and start a TCP session between the two computers. This is designed so that two computers attempting to communicate can negotiate the parameters of…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Port Scanning is the usage of software to find what ports are open on a network or on an individual computer, and which services are using those ports.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Click on the Advanced button and then the TCP/IP tab to see the IP address on the right of the…

    • 570 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    netw 240 week 7

    • 330 Words
    • 3 Pages

    What Field in the TCP header contains a well known port number that maps to the Application that will handle the segment Data Stream?…

    • 330 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    After reviewing the port scan results for the indicated hosts, one can readily see that some of these services must be disabled. Authentication services are necessary, I recommend configuring the system to pass or allow this service. The three services I know to be unnecessary, based on our network topology are the Secure Shell (SSH), Microsoft Remote Procedure Call (MSRPC), File Transfer Protocol (FTP). Simple Mail Transfer Protocol (SMTP) is essential to email communications in a Windows network, this service allows users within the network to send and receive emails. We do not allow remote users at this time, due to this MSRPC should be disabled, this protocol was heavily used in Windows 2000 environments, but is now highly vulnerable, and most networks have it disabled.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Router Simulation

    • 331 Words
    • 2 Pages

    9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. From a security standpoint, it is more desirable to use the numeric IP address of a static IP host, such as an e-mail server, than to allow the address to be looked up the Domain Name Service. True or False?…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Linux Interview Questions

    • 10428 Words
    • 42 Pages

    1. How do you take a single line of input from the user in a shell script?…

    • 10428 Words
    • 42 Pages
    Powerful Essays
  • Good Essays

    The first step that needed to be taken in order to start this project was the download of the program Wireshark. In order to download Wireshark all I had to do was access the Wireshark website which was located at http://www.wireshark.org/download.html. Once that the program was loaded I was able to run a session and capture network traffic. When you first run a capture you have to choose which interface you are using. For this situation, I am running off of a wireless access card so I had to choose the “wireless” interface.…

    • 967 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Post Office Protocol

    • 3337 Words
    • 14 Pages

    BGP · DHCP · DNS · FTP · HTTP ·IMAP · IRC · LDAP · MGCP · NNTP ·NTP · POP · RIP · RPC · RTP · SIP ·SMTP · SNMP · SSH · Telnet ·TLS/SSL · XMPP ·(more)…

    • 3337 Words
    • 14 Pages
    Better Essays
  • Satisfactory Essays

    Webdriver

    • 427 Words
    • 2 Pages

    1. Identify the port number - this is the port number written in code (and it can be any 4 digit number).…

    • 427 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Holiday Assignment(Perl)

    • 1582 Words
    • 7 Pages

    A program that wishes to receive a connection from another program, asks the operating system to create a socket and bind it to some port. Then the program sits and listens on the socket it has created to receive incoming connections. The other program also creates a socket for communicating with the receiver. The caller needs to specify the IP address and the port number of the receiving end. The two programs may exchange information, each by writing to and reading from the socket it has created.…

    • 1582 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    your remote directory structure to the left, and an active set of terminals at the bottom. Most (but not…

    • 841 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Telnet Server

    • 257 Words
    • 2 Pages

    Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 14

    • 750 Words
    • 4 Pages

    1. You can check by going to Control Panel>System and Security>Windows Firewall>Advanced Settings, locate the rule you are checking, Double click the rule and click the Protocols and Ports tab. The port used is located under this tab.…

    • 750 Words
    • 4 Pages
    Satisfactory Essays