Chapter 1

Ace your homework & exams now with Quizwiz!

When analyzing captured TCP/IP packets, which of the following control bits must you look for in the Transmission Control Protocol (TCP) header to determine whether the receiving host has successfully received the sending host's data?

ACK

Which of the following DHCP address allocation methods enables the server to reclaim IP addresses when they are no longer in use by clients?

Dynamic

Which of the following Transmission Control Protocol (TCP) control bits is set to 1 to initiate the termination of a session?

FIN

Which of the following protocols generate messages that are carried directly within Internet Protocol (IP) datagrams, with no intervening transport layer protocol? (Choose all correct answers.)

ICMP and IGMP

Which of the following protocols use(s) the term datagram to describe the data transfer unit it creates?

IP and UDP

Which of the following topologies enables wireless devices to access resources on a wired network?

Infrastructure

What field in the Transmission Control Protocol (TCP) Option subheader specifies the size of the largest segment a system can receive?

MSS - The Maximum Segment Size

Which of the following services enables computers on a private IPv4 network to access the Internet using a registered IP address?

NAT

Which of the following features enables an intrusion detection system (IDS) to monitor all of the traffic on a switched network?

Port mirroring

A client on a TCP/IP network is attempting to establish a session with a server. Which of the following correctly lists the order of Transmission Control Protocol (TCP) session establishment messages?

SYN, SYN/ACK, ACK

What is the native file sharing protocol used on all Microsoft Windows operating systems?

Server Message Block (SMB)

What firewall feature that enables the device to examine network and transport layer header fields, looking for patterns that indicate damaging behaviors, such as IP spoofing, SYN floods, and teardrop attacks?

Stateful Packet Inspection

What communication technique splits a frequency into multiple time slots, enabling it to carry multiple data streams and is commonly used in 2G cellular systems? This communication technique is no longer used in the U.S. carriers in their 3G systems

TDMA - Time Division Multiple Access

Which of the following is a cellular communication technology that is virtually obsolete in the United States?

TDMA - Time Division Multiple Access

Which of the following terms describes the Transmission Control Protocol (TCP) exchange that establishes a connection prior to the transmission of any data?

Three-way handshake

A switch feature that enables administrators to create VLANs that span multiple switches is called ......

Trunking

Which of the following protocols is limited to use on the local subnet only?

Address Resolution Protocol (ARP)

Which of the following components does the port number in a transport layer protocol header identify?

An application

This DHCP feature permanently assigns an IP address from the scope to a client.

Automatic

Which of the following explanations best describes the function of a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number?

B. The port number is used by both the sender and the receiver to identify the application that generated the information in the datagram.

Which of the following is the most accurate description of the subnetting process on a TCP/IP network?

Which of the following is the most accurate description of the subnetting process on a TCP/IP network?


Related study sets

Exam 3 -- Chapter 11 KCQs and Quiz

View Set

PRACTICE Qs [M17] Corticosteroids + Immunosuppressants

View Set

Chemistry Unit Test (Atomic Structure and Electron Configurations Multiple Choice)

View Set

Enteral Nutrition Administration, Monitoring, and Clinical Issues

View Set

Chemistry - Acid-Base Metabolism

View Set

RHIT Practice Questions: Domain 3 (Data Analytics and Use)

View Set

Texas Health and Life Insurance ExamFX

View Set