Which of the following best describes Integrity?
You have been hired at a large company to manage network. Prior to your arrival, there was no
one dedicated to security, so you are starting at the beginning. You hold a meeting and are
discussing the main functions and features of network security. One of your assistants asks what
the function of Integrity in network security is. Which of the following best describes Integrity?
what will the responding computer use as an ACK?
During your packet capture of traffic to check if your network is getting hit by a Denial of Service
attack, you analyze TCP headers. You notice there are many headers that seem to have the same
SEQ number, with the responding computer using different SEQ and ACK numbers in response. If
you are analyzing a normal three-way handshake between two Windows 2000 nodes, and the first
packet has a SEQ of
0xD36077AF, what will the responding computer use as an ACK?
What is the sequence number used by TCP for the second part of the three way handshake?
Which of the following are parts of the TCP header?
During a security review of the network it is decided to run a full packet capture over a 24 hour
period and log the packets for analysis. You have been chosen to analyze all the TCP packets. To
prepare you study the RFC for TCP and have identified all the parts of the TCP header. Which of
the following are parts of the TCP header?
You tell him it identifies the IP Protocol known as?
What combination of the following is required to create a TCP/IP socket?
It is a given that two computers that communicate using TCP/IP as the protocol must use valid
addresses and media to do so. What combination of the following is required to create a TCP/IP
socket?
what is the function of the first eight bits?
In an ICMP Message, what is the function of the first eight bits?
Which of the following is the IP Protocol ID for UDP?
You are introducing a co-worker to the security systems in place in your organization. Early in the
discussion you begin talking about the network, and how it is implemented. You decide to run a
packet capture to identify different aspects of network traffic for your co-worker. In the packet
capture you are able to identify Protocol IDs. Which of the following is the IP Protocol ID for UDP?
what is the function of the Network Layer?
In order to properly manage the network traffic in your organization, you need a complete
understanding of protocols and networking models. In regards to the 7-layer OSI model, what is
the function of the Network Layer?
what is the function of the first sixteen bits?
You are using Network Monitor to capture some traffic for later analysis. When you do begin to
look at your captured data, you examine the TCP traffic you captured. In a TCP Header, what is
the function of the first sixteen bits?