Deck 5: TCP/IP Vulnerabilities

Full screen (f)
exit full mode
Question
TCP is responsible for safe and reliable data transfer between host computers.
Use Space or
up arrow
down arrow
to flip the card.
Question
The OSI Model and the TCP/IP Model are entirely aligned.
Question
IP packets often arrive out of sequence because they are not all taking the same route in sequence.
Question
TCP uses a connectionless design,meaning the participants in a TCP session must initially create a connection.
Question
During the development of TCP/IP in the 1980s, security was a priority.
Question
____ is the common language of networked computers and makes transferring information fast and efficient.

A)TCP/IP
B)IPX
C)X)25
D)RIP
Question
The ____ is responsible for transmitting data from the source computer to the final destination computer.

A)Transport Control Protocol (TCP)
B)Internet Protocol (IP)
C)Routing Internet Protocol (RIP)
D)Address Resolution Protocol (ARP)
Question
When a large IP packet is sent over a network, it is broken down. This process is called ____.

A)separation
B)division
C)breaking
D)fragmentation
Question
The ____ timer waits for FIN packets. Its default value is 10 minutes.

A)TIME_WAIT
B)KEEP_ALIVE
C)FIN_WAIT
D)Connection establishment
Question
____ is a collection of Internet Engineering Task Force (IETF) standards that define an architecture at the Internet Protocol (IP) layer that protects IP traffic by using various security services.

A)RIP
B)IPSec
C)TCP/IP
D)ARP
Question
____________________ is a suite of protocols that underlie the Internet. The TCP/IP suite comprises many protocols and applications that focus on two main objectives.
Question
A(n) ____________________ attack is an assault on a network that floods it with so many additional requests that regular traffic is either slowed or completely interrupted.
Question
____________________ is the process of enclosing higher-level protocol information in lower-level protocol information.
Question
_________________________ is the theoretical time when the number of unallocated IP addresses equals zero.
Question
A(n) ____________________ attack takes advantage of the way that most hosts implement the TCP three-way handshake.
Question
What are the TCP flags?
Question
Explain how to setup a TCP connection.
Question
Explain how to release a TCP connection.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: TCP/IP Vulnerabilities
1
TCP is responsible for safe and reliable data transfer between host computers.
True
2
The OSI Model and the TCP/IP Model are entirely aligned.
False
3
IP packets often arrive out of sequence because they are not all taking the same route in sequence.
True
4
TCP uses a connectionless design,meaning the participants in a TCP session must initially create a connection.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
During the development of TCP/IP in the 1980s, security was a priority.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
____ is the common language of networked computers and makes transferring information fast and efficient.

A)TCP/IP
B)IPX
C)X)25
D)RIP
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ is responsible for transmitting data from the source computer to the final destination computer.

A)Transport Control Protocol (TCP)
B)Internet Protocol (IP)
C)Routing Internet Protocol (RIP)
D)Address Resolution Protocol (ARP)
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
When a large IP packet is sent over a network, it is broken down. This process is called ____.

A)separation
B)division
C)breaking
D)fragmentation
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ timer waits for FIN packets. Its default value is 10 minutes.

A)TIME_WAIT
B)KEEP_ALIVE
C)FIN_WAIT
D)Connection establishment
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
____ is a collection of Internet Engineering Task Force (IETF) standards that define an architecture at the Internet Protocol (IP) layer that protects IP traffic by using various security services.

A)RIP
B)IPSec
C)TCP/IP
D)ARP
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
____________________ is a suite of protocols that underlie the Internet. The TCP/IP suite comprises many protocols and applications that focus on two main objectives.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
A(n) ____________________ attack is an assault on a network that floods it with so many additional requests that regular traffic is either slowed or completely interrupted.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
____________________ is the process of enclosing higher-level protocol information in lower-level protocol information.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
_________________________ is the theoretical time when the number of unallocated IP addresses equals zero.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
A(n) ____________________ attack takes advantage of the way that most hosts implement the TCP three-way handshake.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
What are the TCP flags?
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
Explain how to setup a TCP connection.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
Explain how to release a TCP connection.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 18 flashcards in this deck.