You tell him it identifies the IP Protocol known as?
What combination of the following is required to create a TCP/IP socket?
It is a given that two computers that communicate using TCP/IP as the protocol must use valid
addresses and media to do so. What combination of the following is required to create a TCP/IP
socket?
what is the function of the first eight bits?
In an ICMP Message, what is the function of the first eight bits?
Which of the following is the IP Protocol ID for UDP?
You are introducing a co-worker to the security systems in place in your organization. Early in the
discussion you begin talking about the network, and how it is implemented. You decide to run a
packet capture to identify different aspects of network traffic for your co-worker. In the packet
capture you are able to identify Protocol IDs. Which of the following is the IP Protocol ID for UDP?
what is the function of the Network Layer?
In order to properly manage the network traffic in your organization, you need a complete
understanding of protocols and networking models. In regards to the 7-layer OSI model, what is
the function of the Network Layer?
what is the function of the first sixteen bits?
You are using Network Monitor to capture some traffic for later analysis. When you do begin to
look at your captured data, you examine the TCP traffic you captured. In a TCP Header, what is
the function of the first sixteen bits?
what are you trying to protect against?
If you configure an access-list to block the following networks, what are you trying to protect
against?
Network 127.0.0.0/8, Network 0.0.0.0, Network 10.0.0.0\8, Network 172.16.0.0\16, and Network
168.0.0\16.
Which of the following is the wildcard mask that will be used to filter your network segment?
You are a host in a network segment that has IP addresses in the range of
168.16.1~192.168.31.254. You need to create an access control list that will filter your segment of
addresses. Which of the following is the wildcard mask that will be used to filter your network
segment?
what will the capture reveal is the source MAC address?
The exhibit represents a simple routed network. Node 7 is a Windows NT 4.0 Workstation that
establishes a TCP communication with Node 10, a Windows 2000 Professional host. The routers
are Cisco 2500 series running IOS 11.2.
While working at Node 10, you run a packet capture. When Node 10 receives a packet sent by
Node 7, what will the capture reveal is the source MAC address?
what is the function of the first eight bits?
During a network capture, using Wireshark, you capture some ICMP traffic for analysis. In an
ICMP
Message, what is the function of the first eight bits?