Exam 2: Tcpip Concepts Review
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
MATCHING
Match each term with the correct statement below.
-the main protocol for transmitting e-mail messages across the Internet
(Multiple Choice)
4.9/5
(38)
____ was the standard for moving or copying large files and is still used today, although to a lesser extent because of the popularity of HTTP.
(Multiple Choice)
4.8/5
(29)
In TCP, the ______________________________ is a 32-bit number that tracks the packets received by the node and allows reassembling of large packets that have been broken up into smaller packets.
(Essay)
4.8/5
(31)
Each Class C IP address supports up to ____ host computers.
(Multiple Choice)
4.8/5
(31)
How does the octal numbering system relate to network security? You may answer this question by providing an example.
(Essay)
4.9/5
(32)
MATCHING
Match each term with the correct statement below.
-TCP header flag that is used to signify urgent data
(Multiple Choice)
4.8/5
(35)
In the TCP/IP stack, the ____ layer is where applications and protocols, such as HTTP and Telnet, operate.
(Multiple Choice)
4.7/5
(34)
MATCHING
Match each term with the correct statement below.
-enables a remote user to log on to a server and issue commands
(Multiple Choice)
4.8/5
(37)
What is the binary numbering system and why was it chosen by computer engineers to be used in computers?
(Essay)
4.8/5
(30)
In the TCP/IP stack, the Transport layer includes network services and client software.
(True/False)
4.8/5
(30)
In the TCP/IP stack, the ____ layer is concerned with physically moving electrons across a medium.
(Multiple Choice)
4.8/5
(37)
TCP is a(n) ____________________ protocol, which means the sender doesn't send any data to the destination node until the destination node acknowledges that it's listening to the sender.
(Short Answer)
4.8/5
(41)
How many host addresses can be assigned with a subnet mask of 255.255.255.0? Give a brief description of how you calculated the result.
(Essay)
4.8/5
(31)
In the TCP/IP stack, the ____________________ layer is responsible for getting data packets to and from the Application layer by using port numbers.
(Short Answer)
4.9/5
(33)
Showing 21 - 40 of 57
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)