Product Description
Question 1 |
The Internet is a packet based network that uses TCP and UDP protocols to send information from a source computer to a destination computer.
True | ||
False | ||
Question 2 |
UDP establishes sessions between the two end points of a connection and uses flow control to manage network congestion.
True | ||
False | ||
Question 3 |
Wireshark can be used by attackers to capture encryption keys for an SSL session during an Internet Key Exchange.
True | ||
False | ||
Question 4 |
Nmap can be used by attackers to discover the BIOS types and versions used by computer systems connected to a local area network.
True | ||
False | ||
Question 5 |
Match the well known ports to the protocols which use them.
|
|
|||||||||||||||||||||||||||||||
Question 6 |
Match the concept or term with its definition.
|
|
|||||||||||||||||||||||||||||||
Question 7 |
Address Resolution Protocol (ARP) is used to associate MAC addresses to IP addresses and is an important part of the TCP/IP network packet delivery process.
True | ||
False |