Exam 2: Tcpip Concepts Review

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What TCP/IP protocol is fast,unreliable,and operates at the Transport layer?

(Multiple Choice)
4.8/5
(37)

What protocol is the most widely used and allows all computers on a network to communicate and function correctly?

(Multiple Choice)
4.8/5
(36)

To retrieve e-mail from a mail server,you most likely access port 119.

(True/False)
4.7/5
(33)

An octal digit can be represented with only three bits because the largest digit in octal is seven.

(True/False)
4.9/5
(34)

Match each item with a statement below. -A protocol where the sender doesn't send any data to the destination node until the destination node acknowledges that it's listening to the sender

(Multiple Choice)
4.9/5
(29)

Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or firewall can protect a network from attack.Why is this solution ?

(Essay)
4.8/5
(33)

What TCP flag is responsible for delivering data directly and immediately to an application?

(Multiple Choice)
4.8/5
(33)

What is a Class B IP address?

(Essay)
4.8/5
(33)

What is the binary numbering system and why was it chosen by computer engineers to be used in computers?

(Essay)
4.9/5
(35)

A hex number is written with two characters,each representing a byte.

(True/False)
4.8/5
(27)

In the TCP/IP stack,what layer is concerned with physically moving bits across the network's medium?

(Multiple Choice)
4.9/5
(35)

What does the acronym TCP represent?

(Multiple Choice)
4.8/5
(32)

Match each item with a statement below. -A protocol that does not need to verify whether the receiver is listening or ready to accept the packets

(Multiple Choice)
4.8/5
(41)

In the TCP/IP stack,the Transport layer includes network services and client software.

(True/False)
4.9/5
(32)

What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack?

(Multiple Choice)
4.8/5
(35)

What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web server?

(Multiple Choice)
4.9/5
(30)

Why should a security professional fully understand the TCP header components?

(Essay)
4.8/5
(36)

What TCP flag is responsible for synchronizing the beginning of a session?

(Multiple Choice)
4.9/5
(26)

What is the decimal equivalent of the binary number 11000001?

(Multiple Choice)
4.8/5
(35)

No matter what medium connects computers on network-copper wires,fiber-optic cables,or a wireless setup; the same protocol must be running on all computers if communication is going to function correctly.

(True/False)
4.8/5
(34)
Showing 21 - 40 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)