Exam 5: TCP/IP Vulnerabilities
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
IP packets often arrive out of sequence because they are not all taking the same route in sequence.
Free
(True/False)
4.7/5
(47)
Correct Answer:
True
____ is the common language of networked computers and makes transferring information fast and efficient.
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
A
TCP is responsible for safe and reliable data transfer between host computers.
Free
(True/False)
4.8/5
(42)
Correct Answer:
True
TCP uses a connectionless design,meaning the participants in a TCP session must initially create a connection.
(True/False)
4.9/5
(40)
____ is a collection of Internet Engineering Task Force (IETF) standards that define an architecture at the Internet Protocol (IP) layer that protects IP traffic by using various security services.
(Multiple Choice)
4.7/5
(38)
A(n) ____________________ attack takes advantage of the way that most hosts implement the TCP three-way handshake.
(Short Answer)
4.8/5
(36)
During the development of TCP/IP in the 1980s, security was a priority.
(True/False)
4.8/5
(41)
The ____ timer waits for FIN packets. Its default value is 10 minutes.
(Multiple Choice)
5.0/5
(39)
A(n) ____________________ attack is an assault on a network that floods it with so many additional requests that regular traffic is either slowed or completely interrupted.
(Short Answer)
4.9/5
(34)
_________________________ is the theoretical time when the number of unallocated IP addresses equals zero.
(Short Answer)
4.9/5
(38)
The ____ is responsible for transmitting data from the source computer to the final destination computer.
(Multiple Choice)
4.8/5
(29)
____________________ is the process of enclosing higher-level protocol information in lower-level protocol information.
(Short Answer)
4.9/5
(39)
____________________ is a suite of protocols that underlie the Internet. The TCP/IP suite comprises many protocols and applications that focus on two main objectives.
(Short Answer)
4.9/5
(32)
When a large IP packet is sent over a network, it is broken down. This process is called ____.
(Multiple Choice)
4.8/5
(30)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)