CISCO Cyberops Security Fundamentals Section 01: TCP/IP Protocol Suite (Q 31-40)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Paranormalrob
P
Paranormalrob
Community Contributor
Quizzes Created: 6 | Total Attempts: 1,723
| Attempts: 204
SettingsSettings
Please wait...
  • 1/10 Questions

    At which layer of the OSI model does UDP operate?

    • Layer 2
    • Layer 4
    • Layer 1
    • Layer 5
Please wait...
CISCO Cyberops Security Fundamentals Section 01: TCP/IP Protocol Suite (Q 31-40) - Quiz
About This Quiz

This section of the Cisco CyberOps quiz focuses on the TCP\/IP Protocol Suite, assessing knowledge on TCP segment fields, TCP applications, and the TCP 3-way handshake. It is designed to test foundational security fundamentals crucial for professionals in network security.


Quiz Preview

  • 2. 

    Which one of the following options describes the three steps in the TCP 3-way handshake?

    • 1. SYN; 2. SYN, ACK; 3. ACK

    • 1. SYN; 2. ACK; 3. SYN

    • 1. SYN; 2. SYN; 3. ACK

    • 1. SYN; 2. ACK; 3. ACK

    Correct Answer
    A. 1. SYN; 2. SYN, ACK; 3. ACK
    Explanation
    The correct answer is 1. SYN; 2. SYN, ACK; 3. ACK. The three steps in the TCP 3-way handshake are as follows: 1) The client sends a SYN (synchronize) packet to the server to initiate a connection request. 2) The server responds with a SYN-ACK (synchronize-acknowledge) packet, indicating that it received the client's request and is willing to establish a connection. 3) The client acknowledges the server's response by sending an ACK (acknowledge) packet, confirming the establishment of the connection. This completes the 3-way handshake and both parties can now start exchanging data.

    Rate this question:

  • 3. 

    In a TCP header, which field identifies the number of octets that the device is willing to accept?

    • TTL field

    • Window field

    • TOS field

    • Source IP address field

    Correct Answer
    A. Window field
    Explanation
    The window field in a TCP header identifies the number of octets that the device is willing to accept. This field is used for flow control, allowing the receiving device to inform the sender about the amount of data it can receive and process at a given time. By adjusting the window size, the sender can optimize the transmission rate and prevent overwhelming the receiver.

    Rate this question:

  • 4. 

    For TCP connection establishment, which one of the following statements is true?

    • Only the sender generates a sequence number.

    • Both the sender and receiver generate sequence numbers.

    • The sequence numbers for both the sender and the receiver must match.

    • Only the receiver generates a sequence number.

    Correct Answer
    A. Both the sender and receiver generate sequence numbers.
    Explanation
    Both the sender and receiver generate sequence numbers during TCP connection establishment. This is because TCP uses a mechanism called the "three-way handshake" to establish a connection. In this process, the sender sends a SYN packet with a sequence number, and the receiver responds with a SYN-ACK packet containing its own sequence number. Finally, the sender acknowledges the receipt of the SYN-ACK packet by sending an ACK packet with another sequence number. Therefore, both the sender and receiver generate sequence numbers to ensure reliable communication and synchronization between the two ends of the connection.

    Rate this question:

  • 5. 

    UDP has which two of the following characteristics? (Choose two.)

    • Operates at Layer 3 of the OSI model

    • Uses IP protocol number 17

    • Connection oriented to provide reliability

    • UDP header contains the sequence number field

    • Does not guarantee data delivery

    Correct Answer(s)
    A. Uses IP protocol number 17
    A. Does not guarantee data delivery
    Explanation
    UDP is a transport layer protocol that operates at Layer 4 of the OSI model. It uses IP protocol number 17 to identify itself. Unlike TCP, UDP is connectionless and does not establish a reliable connection between the sender and receiver. Therefore, it does not guarantee data delivery.

    Rate this question:

  • 6. 

    Which one of the following options is a valid field in the UDP header?

    • Window size

    • Options

    • Checksum

    • Reserved

    Correct Answer
    A. Checksum
    Explanation
    The correct answer is "checksum". The UDP header includes a checksum field, which is used to ensure the integrity of the data being transmitted. The checksum value is calculated by the sender and then verified by the receiver to detect any errors or corruption in the data. This helps to ensure that the data is delivered accurately and without any errors.

    Rate this question:

  • 7. 

    Which three of the following are TCP applications? (Choose three.)

    • Telnet

    • SSH

    • ARP

    • FTP

    • NTP

    Correct Answer(s)
    A. Telnet
    A. SSH
    A. FTP
    Explanation
    Telnet, SSH, and FTP are all TCP applications because they utilize the Transmission Control Protocol (TCP) as the underlying transport protocol for communication. Telnet is a protocol that allows remote terminal access to a computer, SSH is a secure network protocol used for secure remote login and file transfer, and FTP is a standard network protocol used to transfer files between a client and a server over a TCP-based network. Therefore, these three options are TCP applications.

    Rate this question:

  • 8. 

    Which two of the following are UDP applications? (Choose two.)

    • SMTP

    • TFTP

    • FTP

    • SNMP

    Correct Answer(s)
    A. TFTP
    A. SNMP
    Explanation
    TFTP (Trivial File Transfer Protocol) and SNMP (Simple Network Management Protocol) are both examples of UDP (User Datagram Protocol) applications. UDP is a connectionless protocol that provides fast and lightweight communication, making it suitable for applications that require low latency and minimal overhead. TFTP is a simple file transfer protocol commonly used for transferring small files, while SNMP is used for managing and monitoring network devices. SMTP (Simple Mail Transfer Protocol) and FTP (File Transfer Protocol) are both examples of TCP (Transmission Control Protocol) applications, which provide reliable and ordered data delivery.

    Rate this question:

  • 9. 

    Which one of these source ports does a client dynamically use when it connects to a server that is listening on a well-known port?

    • Ephemeral

    • Registered

    • Well-known

    • First available port on the client system

    Correct Answer
    A. Ephemeral
    Explanation
    When a client connects to a server that is listening on a well-known port, it dynamically uses an ephemeral port as its source port. Ephemeral ports are temporary ports that are randomly assigned by the client's operating system from a range of available ports. These ports are used for the duration of the connection and are typically higher in number to avoid conflicts with well-known ports. Using ephemeral ports allows multiple client-server connections to coexist on the same client system.

    Rate this question:

  • 10. 

    Which three of the following fields are found in a TCP segment? (Choose three.)

    • Source port

    • Window size

    • Source IP address

    • Payload length

    • Checksum

    Correct Answer(s)
    A. Source port
    A. Window size
    A. Checksum
    Explanation
    A TCP segment is a unit of data sent over a TCP connection. The source port is a field in the TCP segment that identifies the sending application or process. The window size field specifies the number of bytes that can be sent before requiring an acknowledgment. The checksum field is used for error detection in the TCP segment. Therefore, the correct answer is source port, window size, and checksum.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 26, 2017
    Quiz Created by
    Paranormalrob
Back to Top Back to top
Advertisement