Chapter 1
When analyzing captured TCP/IP packets, which of the following control bits must you look for in the Transmission Control Protocol (TCP) header to determine whether the receiving host has successfully received the sending host's data?
ACK
Which of the following DHCP address allocation methods enables the server to reclaim IP addresses when they are no longer in use by clients?
Dynamic
Which of the following Transmission Control Protocol (TCP) control bits is set to 1 to initiate the termination of a session?
FIN
Which of the following protocols generate messages that are carried directly within Internet Protocol (IP) datagrams, with no intervening transport layer protocol? (Choose all correct answers.)
ICMP and IGMP
Which of the following protocols use(s) the term datagram to describe the data transfer unit it creates?
IP and UDP
Which of the following topologies enables wireless devices to access resources on a wired network?
Infrastructure
What field in the Transmission Control Protocol (TCP) Option subheader specifies the size of the largest segment a system can receive?
MSS - The Maximum Segment Size
Which of the following services enables computers on a private IPv4 network to access the Internet using a registered IP address?
NAT
Which of the following features enables an intrusion detection system (IDS) to monitor all of the traffic on a switched network?
Port mirroring
A client on a TCP/IP network is attempting to establish a session with a server. Which of the following correctly lists the order of Transmission Control Protocol (TCP) session establishment messages?
SYN, SYN/ACK, ACK
What is the native file sharing protocol used on all Microsoft Windows operating systems?
Server Message Block (SMB)
What firewall feature that enables the device to examine network and transport layer header fields, looking for patterns that indicate damaging behaviors, such as IP spoofing, SYN floods, and teardrop attacks?
Stateful Packet Inspection
What communication technique splits a frequency into multiple time slots, enabling it to carry multiple data streams and is commonly used in 2G cellular systems? This communication technique is no longer used in the U.S. carriers in their 3G systems
TDMA - Time Division Multiple Access
Which of the following is a cellular communication technology that is virtually obsolete in the United States?
TDMA - Time Division Multiple Access
Which of the following terms describes the Transmission Control Protocol (TCP) exchange that establishes a connection prior to the transmission of any data?
Three-way handshake
A switch feature that enables administrators to create VLANs that span multiple switches is called ......
Trunking
Which of the following protocols is limited to use on the local subnet only?
Address Resolution Protocol (ARP)
Which of the following components does the port number in a transport layer protocol header identify?
An application
This DHCP feature permanently assigns an IP address from the scope to a client.
Automatic
Which of the following explanations best describes the function of a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number?
B. The port number is used by both the sender and the receiver to identify the application that generated the information in the datagram.
Which of the following is the most accurate description of the subnetting process on a TCP/IP network?
Which of the following is the most accurate description of the subnetting process on a TCP/IP network?