Exam 11: Module A: Networking Concepts
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
The main TCP/IP interior dynamic routing protocol for large networks is ________.
(Multiple Choice)
4.9/5
(26)
In e-mail, the ________ protocol is fused or downloading new mail from the recipient's mail server to the recipient's PC.
(Multiple Choice)
4.7/5
(43)
To do TCP session hijacking, the attacker has to be able to predict the sequence number of the TCP segment currently being sent.
(True/False)
4.8/5
(41)
TCP segment carries octets 4321 through 4371. The next segment carries no data. What is that segment's sequence number?
(Multiple Choice)
4.9/5
(33)
Attackers can read signals traveling over UTP without tapping the cord.
(True/False)
4.8/5
(40)
In TCP, if a receiver receives a damaged TCP segment, it ________.
(Multiple Choice)
4.8/5
(23)
A route is the path a frame takes across a single network, from the source host to the destination host, across multiple switches.
(True/False)
4.8/5
(33)
An organization with a ________ domain name must maintain one or more DNS servers.
(Multiple Choice)
4.9/5
(32)
In this book, when internet is spelled with a capital I, it means the global Internet.
(True/False)
4.7/5
(51)
A Windows host sends a TCP segment with source port number 1200 and destination port number 25. The sending host is a(n) ________.
(Multiple Choice)
4.9/5
(32)
A mask is needed to identify the size of the network part or of the combined network and subnet parts.
(True/False)
5.0/5
(38)
Showing 41 - 60 of 91
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)