Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

CP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together. a) True

CP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.

a) True

b) False

2. TCP/IP is composed of _______ number of layers.

a) 2

b) 3

c) 4

d) 5

3. Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command?

a) ftp

b) rexec

c) tcpexec

d) telnet

4. Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _________

a) address, name

b) address, location

c) network, name

d) network, location

5. Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).

a) True

b) False

6. TLS vulnerability is also known as Return of Bleichenbacher's Oracle Threat.

a) True

b) False

7. RoBOT is abbreviated as ___________

a) Return of Bleichenbacher's Oracle Team

b) Rise of Bleichenbacher's Oracle Threat

c) Return of Bleichenbacher's Operational Threat

d) Return of Bleichenbacher's Oracle Threat

8. There are __________ different versions of IP popularly used.

a) 2

b) 3

c) 4

d) 5

9. ____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number.

a) TCP Spoofing

b) TCP Blind Spoofing

c) IP Spoofing

d) IP Blind Spoofing

10. ___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.

a) SYN flooding attack

b) ACK flooding attack

c) SYN & ACK flooding attack

d) Packet flooding attack

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Marketing The Core

Authors: Roger Kerin

8th Edition

1260483517, 9781260483512

More Books

Students also viewed these Marketing questions