Exam 2: Tcpip Concepts Review
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
An octet is equal to ____________________ bits, which equals one byte.
Free
(Short Answer)
4.9/5
(35)
Correct Answer:
eight
UDP is an unreliable data delivery protocol. Why is it widely used on the Internet?
Free
(Essay)
4.9/5
(33)
Correct Answer:
UDP is a widely used protocol on the Internet because of its speed.UDP doesn't need to verify whether the receiver is listening or ready to accept the packets.The sender doesn't care-it just sends,even if the receiver isn't ready to accept the packet.
The Network News Transport Protocol service uses port ____.
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
B
____ is a fast but unreliable delivery protocol that operates on the Transport layer.
(Multiple Choice)
4.8/5
(38)
MATCHING
Match each term with the correct statement below.
-TCP header flag that signifies the beginning of a session
(Multiple Choice)
4.9/5
(30)
____ is an attack that relies on guessing the ISNs of TCP packets.
(Multiple Choice)
4.9/5
(36)
No matter what medium connects computers on a network-copper wires, fiber-optic cables, or a wireless setup-the same protocol must be running on all computers if communication is going to function correctly.
(True/False)
4.9/5
(31)
MATCHING
Match each term with the correct statement below.
-enables multiple users to communicate over the Internet in discussion forums
(Multiple Choice)
4.8/5
(26)
The ____-layer protocols are the front ends to the lower-layer protocols in the TCP/IP stack.
(Multiple Choice)
4.8/5
(45)
An octal digit can be represented with only three bits because the largest digit in octal is seven.
(True/False)
4.9/5
(45)
A hex number is written with two characters, each representing a byte.
(True/False)
4.9/5
(35)
MATCHING
Match each term with the correct statement below.
-primarily used to monitor devices on a network, such as remotely monitoring a router's state
(Multiple Choice)
4.7/5
(35)
What are the critical components of a TCP header? How may hackers abuse them?
(Essay)
4.9/5
(36)
Showing 1 - 20 of 57
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)