Exam 2: Tcpip Concepts Review
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
What port does the Domain Name System,or DNS service use?
Free
(Multiple Choice)
4.9/5
(27)
Correct Answer:
B
What port does the Trivial File Transfer Protocol,or TFTP service use?
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
C
What connection-oriented protocol is utilized by the Transport layer?
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
C
What 32-bit number tracks packets received by a node and allows the reassembling of large packets that have been broken up into smaller packets?
(Multiple Choice)
4.9/5
(38)
How many host computers can be assigned a valid IPv4 address when using a CIDR /24 prefix?
(Multiple Choice)
4.8/5
(36)
UDP is an unreliable data delivery protocol.Why is UDP widely used on the Internet?
(Essay)
4.9/5
(42)
Match each item with a statement below.
-Occupies one bit of the TCP segment and can be set to 0 (off)or 1 (on)
(Multiple Choice)
4.9/5
(37)
Match each item with a statement below.
-A common language used so computers can communicate with one another
(Multiple Choice)
4.7/5
(37)
How many host addresses can be assigned with a subnet mask of 255.255.255.0? Explain how you calculated the result.
(Essay)
4.7/5
(36)
Match each item with a statement below.
-Fast but unreliable delivery protocol that operates at the Transport layer
(Multiple Choice)
4.9/5
(31)
What layer,in the TCP/IP stack,do applications and protocols,such as HTTP and Telnet,operate?
(Multiple Choice)
4.9/5
(44)
Match each item with a statement below.
-Attack that relies on guessing the ISNs of TCP packets
(Multiple Choice)
4.9/5
(29)
What layer,in the TCP/IP protocol stack,is responsible for encapsulating data into segments?
(Multiple Choice)
4.8/5
(43)
What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?
(Multiple Choice)
4.9/5
(39)
What layer,in the TCP/IP stack,is responsible for routing a packet to a destination address?
(Multiple Choice)
4.9/5
(33)
Match each item with a statement below.
-A logical component of a TCP connection that can be assigned to a process that requires network connectivity
(Multiple Choice)
4.7/5
(37)
In the TCP/IP stack,what layer is concerned with controlling the flow of data,sequencing packets for reassembly,and encapsulating the segment with a TCP or UDP header?
(Multiple Choice)
4.8/5
(39)
What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network?
(Multiple Choice)
4.9/5
(31)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)