The following are the questions that will be on the quiz. TF are true/false questions. FIB are fill in the blank. They will be displayed in a random order, different for everyone. You should figure out the answers before you take the quiz in blackboard. TF SSL is generally considered to be more secure than TLS. TF Public-key (aka asymmetric) encryption is typically slower than symmetric encryption. TF Establishing a secure connection with amazon.com results in your browser having amazon.com's private key. TF As part of the TCP protocol, if an ACK is not received for a packet that was sent, the packet will be sent again. TF Establishing a TCP socket connection can be accomplished with 2 packes - one from client to server and another from server to client. TF When browsing a site with https, everything is encrypted, including which particular links your browser is asking for. TF An initial TCP sequence number is normally set to 0 or 1. TF The header of an IPv4 packet contains sufficient information to determine the size of the data in the packet. TF Most website certificates are self-signed. TF Operating systems or browsers are normally preconfigured with certificates for certain trusted high level certificate authorities. TF Security was a key consideration in design decisions for the internet as it was originally developed. TF TCP is a stateful protocol, and this fact can be used as part of denial of service attacks (overwhelm server with number of TCP connections it is maintaining state for). TF UDP is a more reliable version of IPv4. FIB Number of bytes for a MAC address FIB Number of bytes for an IPv4 address FIB Number of bytes for a TCP or UDP port FIB Number of bytes for the IPv6 address FIB What is the numerical HTTP response code for: Continue FIB What is the numerical HTTP response code for: OK FIB What is the numerical HTTP response code for: Moved Permanently FIB What is the numerical HTTP response code for: Found / Moved Temporarily FIB What is the numerical HTTP response code for: Not Modified FIB What is the numerical HTTP response code for: Bad Request FIB What is the numerical HTTP response code for: Not Found FIB What is the numerical HTTP response code for: Internal Server Error FIB What is the HTTP header name for the following (and use capitalization/hyphening just like you would see in the raw headers): which domain name is the request for. FIB What is the HTTP header name for the following (and use capitalization/hyphening just like you would see in the raw headers): will the server keep the socket connection open. FIB What is the HTTP header name for the following (and use capitalization/hyphening just like you would see in the raw headers): modification date of the file being. sent. FIB What is the HTTP header name for the following (and use capitalization/hyphening just like you would see in the raw headers): document type that the response is. FIB What is the HTTP header name for the following (and use capitalization/hyphening just like you would see in the raw headers): # bytes in the response. FIB What is the HTTP header name for the following (and use capitalization/hyphening just like you would see in the raw headers): return the requested resource only if modified since a given date. FIB What is the HTTP header name for the following (and use capitalization/hyphening just like you would see in the raw headers): which browser/application is sending the request. FIB What is the HTTP header name for the following (and use capitalization/hyphening just like you would see in the raw headers): current date. FIB What is the HTTP header name for the following (and use capitalization/hyphening just like you would see in the raw headers): which server is responding to the request. FIB Three main HTTP methods we discussed in class (listed in alphabetical order, capitalized, with commas in between). TF https in current browsers establishes an SSL connection. TF AES is a symmetric encryption algorithm. TF For PKI to work, public-key encryption is needed. TF Man in the middle attacks are not possible with public-key encryption. TF Any application running on a system can register a callback to see all network traffic going out of and coming into the system. TF The write and read system calls can be used with open file descriptors as well as with open sockets. TF A stream/tcp server process uses the following sequence of system calls: socket, bind, connect. TF When reading a string from a file or socket you cannot assume that a \0 character is included in the buffer read. TF The listen system call returns a file descriptor. TF When done with a file descriptor you should call the close system call to close the file or socket. TF If the read system call returns 0 this indicates an error. TF You should generally use strncpy rather than strcpy, snprintf rather than sprintf, etc. because of potential buffer overflows. TF Data send and received using telnet is normally encrypted. TF pipes use a different close function than other file descriptors (files or sockets).