Page 1

Full file at http://testbank360.eu/test-bank-penetration-testing-security-analysis-1st-edition-ec-council

Book 1 Security Analysis and Advanced Tools Chapter 2 MULTIPLE CHOICE 1. The TCP/IP ____ is a four-layer model for interconnection and data transfer. a. protocol suite c. connection model b. reference model d. reference suite ANS: B

PTS: 1

REF: 2-2

2. The ____ layer is where flow-control and connection protocols, such as TCP and UDP, exist. a. Application c. Internet b. Transport d. Network access ANS: B

PTS: 1

REF: 2-2

3. The ____ layer describes the physical equipment necessary for communications, such as twisted-pair cables; the signaling used on that equipment; and the low-level protocols using that signaling. a. Application c. Internet b. Transport d. Network access ANS: D

PTS: 1

REF: 2-2

4. This layer is also called the Internet working layer. It is the second layer in TCP/IP, and it is responsible for providing machine-to-machine communication. a. Internet c. Application b. Transport d. Network access ANS: A

PTS: 1

REF: 2-3

5. ____ ensures data integrity and is a connection-oriented protocol that follows the handshake methodology before the beginning of the session to exchange data between two intended parties. a. UDP c. IP b. TCP d. ICMP ANS: B

PTS: 1

REF: 2-4

6. ____ in networking means the quantity of data segments, which is measured in bytes, that a machine can transmit on the network without receiving an acknowledgment. a. Windowing c. Fragmentation b. Segmentation d. MTU ANS: A

PTS: 1

REF: 2-7

7. ____ is a data-transfer protocol (using a 32-bit address space) that works in the network or Internet layer to transmit data packets (called datagrams at this layer) using the source and destination addresses. a. ICMP c. TCP b. UDP d. IP ANS: D

PTS: 1

REF: 2-10

8. ____ is a framework of open standards developed by the Internet Engineering Task Force (IETF). It provides secure transmission of sensitive data over an unprotected medium like the Internet.


Full file at http://testbank360.eu/test-bank-penetration-testing-security-analysis-1st-edition-ec-council

a. IPv6 b. ICMP ANS: C

c. IPSec d. TCP/IP PTS: 1

REF: 2-14

9. ____ is a process of controlling network traffic by checking incoming packets against a predefined security policy. a. Packet filtering c. Flow control b. Firewalling d. Windowing ANS: A

PTS: 1

REF: 2-17

10. ____ is an unreliable method for the delivery of data over the network because it does not notify the sender about failures in the transmission of ICMP packets. a. UDP c. ICMP b. IP d. TCP ANS: C

PTS: 1

REF: 2-21

Test bank penetration testing security analysis 1st edition ec council  

test bank penetration testing security analysis 1st edition ec council. Full file at http://testbank360.eu/test-bank-penetration-testin...

Read more
Read more
Similar to
Popular now
Just for you