CISCO Cyberops Security Fundamentals Section 01: TCP/IP Protocol Suite (Q 31-40)

10 Questions | Total Attempts: 66

SettingsSettingsSettings
CISCO Quizzes & Trivia

.


Questions and Answers
  • 1. 
    Which three of the following fields are found in a TCP segment? (Choose three.)
    • A. 

      Source port

    • B. 

      Window size

    • C. 

      Source IP address

    • D. 

      Payload length

    • E. 

      Checksum

  • 2. 
    Which three of the following are TCP applications? (Choose three.)
    • A. 

      Telnet

    • B. 

      SSH

    • C. 

      ARP

    • D. 

      FTP

    • E. 

      NTP

  • 3. 
    In a TCP header, which field identifies the number of octets that the device is willing to accept?
    • A. 

      TTL field

    • B. 

      Window field

    • C. 

      TOS field

    • D. 

      Source IP address field

  • 4. 
    Which one of the following options describes the three steps in the TCP 3-way handshake?
    • A. 

      1. SYN; 2. SYN, ACK; 3. ACK

    • B. 

      1. SYN; 2. ACK; 3. SYN

    • C. 

      1. SYN; 2. SYN; 3. ACK

    • D. 

      1. SYN; 2. ACK; 3. ACK

  • 5. 
    For TCP connection establishment, which one of the following statements is true?
    • A. 

      Only the sender generates a sequence number.

    • B. 

      Both the sender and receiver generate sequence numbers.

    • C. 

      The sequence numbers for both the sender and the receiver must match.

    • D. 

      Only the receiver generates a sequence number.

  • 6. 
    UDP has which two of the following characteristics? (Choose two.)
    • A. 

      Operates at Layer 3 of the OSI model

    • B. 

      Uses IP protocol number 17

    • C. 

      Connection oriented to provide reliability

    • D. 

      UDP header contains the sequence number field

    • E. 

      Does not guarantee data delivery

  • 7. 
    Which one of the following options is a valid field in the UDP header?
    • A. 

      Window size

    • B. 

      Options

    • C. 

      Checksum

    • D. 

      Reserved

  • 8. 
    At which layer of the OSI model does UDP operate?
    • A. 

      Layer 2

    • B. 

      Layer 4

    • C. 

      Layer 1

    • D. 

      Layer 5

  • 9. 
    Which two of the following are UDP applications? (Choose two.)
    • A. 

      SMTP

    • B. 

      TFTP

    • C. 

      FTP

    • D. 

      SNMP

  • 10. 
    Which one of these source ports does a client dynamically use when it connects to a server that is listening on a well-known port?
    • A. 

      Ephemeral

    • B. 

      Registered

    • C. 

      Well-known

    • D. 

      First available port on the client system