Exam 5: TCP/IP Vulnerabilities

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

IP packets often arrive out of sequence because they are not all taking the same route in sequence.

Free
(True/False)
4.7/5
(47)
Correct Answer:
Verified

True

____ is the common language of networked computers and makes transferring information fast and efficient.

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

A

TCP is responsible for safe and reliable data transfer between host computers.

Free
(True/False)
4.8/5
(42)
Correct Answer:
Verified

True

TCP uses a connectionless design,meaning the participants in a TCP session must initially create a connection.

(True/False)
4.9/5
(40)

____ is a collection of Internet Engineering Task Force (IETF) standards that define an architecture at the Internet Protocol (IP) layer that protects IP traffic by using various security services.

(Multiple Choice)
4.7/5
(38)

A(n) ____________________ attack takes advantage of the way that most hosts implement the TCP three-way handshake.

(Short Answer)
4.8/5
(36)

During the development of TCP/IP in the 1980s, security was a priority.

(True/False)
4.8/5
(41)

The ____ timer waits for FIN packets. Its default value is 10 minutes.

(Multiple Choice)
5.0/5
(39)

Explain how to setup a TCP connection.

(Essay)
4.8/5
(24)

Explain how to release a TCP connection.

(Essay)
4.7/5
(40)

A(n) ____________________ attack is an assault on a network that floods it with so many additional requests that regular traffic is either slowed or completely interrupted.

(Short Answer)
4.9/5
(34)

_________________________ is the theoretical time when the number of unallocated IP addresses equals zero.

(Short Answer)
4.9/5
(38)

The ____ is responsible for transmitting data from the source computer to the final destination computer.

(Multiple Choice)
4.8/5
(29)

____________________ is the process of enclosing higher-level protocol information in lower-level protocol information.

(Short Answer)
4.9/5
(39)

What are the TCP flags?

(Essay)
4.7/5
(38)

____________________ is a suite of protocols that underlie the Internet. The TCP/IP suite comprises many protocols and applications that focus on two main objectives.

(Short Answer)
4.9/5
(32)

The OSI Model and the TCP/IP Model are entirely aligned.

(True/False)
4.9/5
(43)

When a large IP packet is sent over a network, it is broken down. This process is called ____.

(Multiple Choice)
4.8/5
(30)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)