In Step 2 of a normal three-way handshake, the server is said to be performing:
The three-way handshake utilizes three steps, identified as: Step 1, 2 and 3, that take place
between a client and a server in order to establish a TCP connection.
In Step 2 of a normal three-way handshake, the server is said to be performing:
which of the following?
A significant function of TCP is the ability to guarantee session information. The method used by
TCP to guarantee the uniqueness of a session between two hosts is which of the following?
what is the function of the first sixteen bits?
You are capturing network traffic in Wireshark, for in-depth analysis. When looking at a TCP
Header, what is the function of the first sixteen bits?
What will the new subnet mask be for these new networks?
Your office branch has been assigned the network address of 10.10.0.0/16 by the Corporate HQ.
Presently your network addressing scheme has these addresses split into eight networks as
shown below:
1: 10.10.0.0/19
2: 10.10.32.0/19
3: 10.10.64.0/19
4: 10.10.96.0/19
5: 10.10.128.0/19
6: 10.10.160.0/19
7: 10.10.192.0/19
8: 10.10.224.0/19
You need to take the currently unused block of network 10.10.160.0/19 and further divide it into
eight networks for use by a satellite branch that is being designed on the fourth floor of your
building. What will the new subnet mask be for these new networks?
what is the function of the first sixteen bits?
During a network capture in Network Monitor, you capture some UDP traffic. In a UDP Header,
what is the function of the first sixteen bits?
what is the function of the Protocol field?
During a network capture in Wireshark, you capture some IP traffic. In the IP Datagram, what is
the function of the Protocol field?
What is the network ID to which this host belongs?
You are configuring the IP addressing for your network. One of the subnets has been defined with
addresses already. You run ifconfig on a host and determine that it has an address of
172.18.32.54 with a mask of 255.255.254.0. What is the network ID to which this host belongs?
What kind of problems can be introduced by adding file encryption to the computers in your network?
As you increase the layers of security in your organization you watch the network behavior closely.
What kind of problems can be introduced by adding file encryption to the computers in your
network?
Examine the details as shown for a frame and identify which of the statements that follow best describes it.
what combination of IP Protocol and Application Layer Protocol have been captured here?
Network Monitor was run on the Windows Server 2003 during a network session. The exhibit
shows the actual contents of the Network Monitor capture file.
The Hexadecimal value for the IP protocol and source ports have been circled in the exhibit. The
contents of what combination of IP Protocol and Application Layer Protocol have been captured here?