Which of the following is the wildcard mask that will be used to filter your network segment?
You are a host in a network segment that has IP addresses in the range of 168.16.1~192.168.31.254. You need to create an access control list that will filter your segment of addresses. Which of the following is the wildcard mask that will be used to filter your network segment?
If you configure an access-list to block the following networks, what are you trying to protect against?
If you configure an access-list to block the following networks, what are you trying to protect against?
Network 127.0.0.0/8, Network 0.0.0.0, Network 10.0.0.0\8, Network 172.16.0.0\16, and Network 168.0.0\16.
In a TCP Header, what is the function of the first sixteen bits?
You are using Network Monitor to capture some traffic for later analysis. When you do begin to look at your captured data, you examine the TCP traffic you captured. In a TCP Header, what is the function of the first sixteen bits?
In regards to the 7-layer OSI model, what is the function of the Network Layer?
In order to properly manage the network traffic in your organization, you need a complete understanding of protocols and networking models. In regards to the 7-layer OSI model, what is the function of the Network Layer?
Which of the following is the IP Protocol ID for UDP?
You are introducing a co-worker to the security systems in place in your organization. Early in the discussion you begin talking about the network, and how it is implemented. You decide to run a packet capture to identify different aspects of network traffic for your co-worker. In the packet capture you are able to identify Protocol IDs. Which of the following is the IP Protocol ID for UDP?
In an ICMP Message, what is the function of the first eight bits?
In an ICMP Message, what is the function of the first eight bits?
What combination of the following is required to create a TCP/IP socket?
It is a given that two computers that communicate using TCP/IP as the protocol must use valid addresses and media to do so. What combination of the following is required to create a TCP/IP socket?
You tell him it identifies the IP Protocol known as?
Which of the following are parts of the TCP header?
During a security review of the network it is decided to run a full packet capture over a 24 hour period and log the packets for analysis. You have been chosen to analyze all the TCP packets. To prepare you study the RFC for TCP and have identified all the parts of the TCP header. Which of the following are parts of the TCP header?