What identifies a subnet mask address?
Prefix Length
Explain the two rules for abbreviating IPv6 address notation
1. Omitting leading 0s
2. Using a double colon for consecutive 0s
Formula that indicates the number of created subnets
2n
What protocol is being used by a livestream?
UDP
Degree of weakness in a network or device
Vulnerability
What are the portions of an IPv4 address?
Network and Host
What would be the standard default-gateway for IPv6?
Link-local address (FE80)
Starting from a /19 network, how many subnets will be created to accommodate 500 hosts?
16
What protocol makes sure that delivery from the source to the destination is successful?
TCP
Needs user intervention to spread
Virus
What type of IPv4 address is 127.0.0.1?
Loopback address
What method allows devices to run Ipv4 and Ipv6 simultaneously?
Dual Stack
Enter the first valid host on the network that the host 10.131.253.129 255.255.0.0 is a part of:
10.131.0.1
What do you call port numbers that are short-lived and are automatically assigned by the OS?
Private/Dynamic/Ephemeral ports
A disguised software used as a backdoor
Trojan Horse
Under what class is the ip address 128.0.0.1 included in?
Class B
How many bits does the Global routing prefix have?
48
How many hosts per network are there if there are 9 bits in the host portion?
510
A command that presents the ongoing TCP processes
netstat
Takes note of the history and logs
Accounting
A technique used to partition the 32 bit IP address into different classes
(legacy) classful addressing
/64
How many usable host addresses does 255.255.255.240 contain?
14
What is the sequence of steps for establishing a connection in TCP
SYN, SYN ACK, ACK
An attack that does not need intervention with the system itself.
Reconnaissance Attack