Exam 2: Tcpip Concepts Review
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
What TCP/IP protocol is fast,unreliable,and operates at the Transport layer?
(Multiple Choice)
4.8/5
(37)
What protocol is the most widely used and allows all computers on a network to communicate and function correctly?
(Multiple Choice)
4.8/5
(36)
To retrieve e-mail from a mail server,you most likely access port 119.
(True/False)
4.7/5
(33)
An octal digit can be represented with only three bits because the largest digit in octal is seven.
(True/False)
4.9/5
(34)
Match each item with a statement below.
-A protocol where the sender doesn't send any data to the destination node until the destination node acknowledges that it's listening to the sender
(Multiple Choice)
4.9/5
(29)
Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or firewall can protect a network from attack.Why is this solution ?
(Essay)
4.8/5
(33)
What TCP flag is responsible for delivering data directly and immediately to an application?
(Multiple Choice)
4.8/5
(33)
What is the binary numbering system and why was it chosen by computer engineers to be used in computers?
(Essay)
4.9/5
(35)
A hex number is written with two characters,each representing a byte.
(True/False)
4.8/5
(27)
In the TCP/IP stack,what layer is concerned with physically moving bits across the network's medium?
(Multiple Choice)
4.9/5
(35)
Match each item with a statement below.
-A protocol that does not need to verify whether the receiver is listening or ready to accept the packets
(Multiple Choice)
4.8/5
(41)
In the TCP/IP stack,the Transport layer includes network services and client software.
(True/False)
4.9/5
(32)
What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack?
(Multiple Choice)
4.8/5
(35)
What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?
(Multiple Choice)
4.9/5
(30)
Why should a security professional fully understand the TCP header components?
(Essay)
4.8/5
(36)
What TCP flag is responsible for synchronizing the beginning of a session?
(Multiple Choice)
4.9/5
(26)
What is the decimal equivalent of the binary number 11000001?
(Multiple Choice)
4.8/5
(35)
No matter what medium connects computers on network-copper wires,fiber-optic cables,or a wireless setup; the same protocol must be running on all computers if communication is going to function correctly.
(True/False)
4.8/5
(34)
Showing 21 - 40 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)