IT forensics

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

If you were to see the subnet mask 255.255.252.0, what CIDR notation (prefix) would you use to indicate the same thing? A. /23 B. /22 C. /21 D. /20

/22

Which of these addresses would be considered a private address (RFC 1918 address)? A. 172.128.10.5 B. 9.10.10.7 C. 172.20.128.240 D. 250.28.17.10

172.20.128.240

What is a MAC address used for? A. Addressing systems over a VPN B. Addressing systems through a tunnel C. Addressing systems over TCP D. Addressing systems on the local network

Addressing systems on the local network

The UDP headers contain which of the following fields? A. Source address, destination address, checksum, length B. Destination port, sourceport, checksum, length C. Flags, source port, destination port, checksum D. Length, checksum, flags, address

Destination port, sourceport, checksum, length

If you were looking for the definitive documentation on a protocol, what would you consult? A. Request for Comments B. Manual pages C. Standards D. IEEE

Request for Comments

What are the three steps in the TCP handshake as described by the flags set? A. SYN, SYN/URG, RST B. RST, SYN, ACK C. SYN, SYN/ACK, ACK D. SYN, SYN/ACK, ACK/URG

SYN, SYN/ACK, ACK

The Protocol Data Unit (PDU) for TCP is called a _____________. A. Packet B. Datagram C. Frame D. Segment

Segment

Which of these devices would not be considered part of the internet of things? A. Smartphone B. Thermostat C. Light Bulb D. Set-top cable box

Smartphone

Which network topology are you most likely to run across in a large enterprise network? A. Ring topology B. Bus topology C. Full mesh D. Star-bus hybrid

Star-bus hybrid

If you wanted a lightweight protocol to send real-time data over, which of these would you use? A. TCP B. HTTP C. ICMP D. UDP

UDP

Which of these services would be considered a storage as a service solution? A. Microsoft Azure B. iCloud C. Google Compute D. DropLeaf

iCloud

Which of these protocols would be used to communicatie with an IoT device? A. ICMP B. SMTP C. Telnet D. HTTP

HTTP

Which protocol is necessary to enable the functionality of traceroute? A. HTTP B. SNMP C. ICMP D. IP

ICMP

Which header field is used to reassemble fragmented IP packets? A. Source address B. IP identification C. Don't fragment bit D. Acknowledgment field

IP identification

What order, from bottom to top, does the TCP/IP architecture use? A. Network Access, Network, Transport, Application B. Link, Internet, Transport, Session, Application C. Physical, Network, Session, Application D. Data Link, Internet, Transport, Application

Link, Internet, Transport, Session, Application


Ensembles d'études connexes

PC Pro 4.6.7 Device Driver Installation Facts

View Set

Physics Module 4: Section 1 - Resistance, Resistivity and Ohm's Law

View Set

Unit 2 Test STA 2023 McGraw Hill

View Set

PEDS-Nursing Care of Children ATI (Dynamics test bank):

View Set

Unit 2 L2 Discussions quick check

View Set

Polymers: Combinations of Monomers: Tutorial

View Set

14 differential reinforcement live action

View Set