Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP
Last Answer : C. port
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : Port no.(6346,6347) Gnutella service having which protocols ….. a. TCP b. UDP c. TCP, UDP d. NONE
Last Answer : c. TCP, UDP
Description : TCP and UDP are called ________ a. Application protocols b. Session protocols c. Transport protocols d. Network protocols
Last Answer : c. Transport protocols
Description : TCP and UDP are called ________ A. Application protocols B. Session protocols C. Transport protocols D. Network protocols
Last Answer : C. Transport protocols
Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25
Last Answer : b. TCP, 80
Description : Which processes does TCP, but not UDP, use? a. Windowing b. Acknowledgements c. Both a and b d. Destination Port
Last Answer : c. Both a and b
Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies
Last Answer : B)Ethical Hacker
Description : A parallel port is most often used by ________ A. Scanner B. Printer C. Keyboard D. Mouse
Last Answer : B. Printer
Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above
Last Answer : C. port addresses
Description : TCP and UDP are called? A. Application protocols B. Session protocols C. Transport protocols D. Network protocols
Description : Which protocol is used to link all the devices in the IoT? A. TCP/IP B. Network C. UDP D. HTTP
Last Answer : A. TCP/IP
Description : Which protocol does hackers use to make their system seems as your system or another allowed host on your network? a. SNMP protocol b. TCP protocol c. ARP protocol d. ICMP protocol
Last Answer : c. ARP protocol
Description : Which transport layer protocols is used by DHCP:- a. RSVP b.TCP c. DCCP d. UDP
Last Answer : d. UDP
Description : What is the primary goal of an Ethical Hacker? a. Avoiding Detection b. Determining return on investment (ROI) for security measure c. Resolving security vulnerabilities d. Testing Security Controls
Last Answer : a. Avoiding Detection
Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting
Last Answer : c) penetration testing
Description : 2 A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker
Last Answer : A)Phreaker
Description : 0 White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Last Answer : B)Ethical
Description : . What is the required education to be an ethical hacker ? a. Diploma holder b. 10+2 passed c. Bachelor’s degree in the related field d. Nothing needed
Last Answer : c. Bachelor’s degree in the related field
Description : What is the required education to be an ethical hacker ? a. Diploma holder b. 10+2 passed c. Bachelor’s degree in the related field d. Nothing needed
Description : what is the primary goal of an Ethical Hacker ? Avoiding detection Testing security controls Resolving security vulnerabilities Determining return on investment for security measures
Last Answer : Resolving security vulnerabilities
Description : After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting
Description : An ethical hacker must ensure that proprietary information of the firm does not get leaked. a) True b) False
Last Answer : a) True
Description : Which hacker refers to ethical hacker? A. Black hat hacker. B. White hat hacker. C. Grey hat hacker. D. None of the above.
Last Answer : B. White hat hacker.
Description : A Hacker who identifies and exploits weakness in telephones instead of computers is known as: A)Phreaker B)Hacktivist C)Ethical hacker D)Grey Hat hacker
Last Answer : A)Phreake
Description : White hat Hacker is known as the A)Cracker B)Ethical C)Grey Hat D)Script Kiddies
Description : Which Nmap scan is does not completely open a TCP connection? A. SYN stealth scan B. TCP scan C. XMAS tree scan D. ACK scan
Last Answer : A. SYN stealth scan
Description : Tools used by ethical hackers……….. a. Scanner b. Decoder c. Proxy d. All of these
Last Answer : a. Scanner
Description : Tool(s) used by ethical hacker_____. A. Scanner B. Decoder C. Proxy D. All of these.
Last Answer : D. All of these.
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? A. Remote attack B. Physical access C. Local access D. Internal attack
Last Answer : A. Remote attack
Last Answer : D. Internal attack
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? Local access Remote attack Internal attack Physical access
Last Answer : Remote attack
Description : hen a hacker attempts to attack a host via the Internet it is known as what type of attack? a. Local access b. Remote attack c. Internal attack d. Physical access
Last Answer : b. Remote attack
Description : When a hacker attempts to attack a host via the Internet it is known as what type of attack? ∙ A. Remote attack ∙ B. Physical access ∙ C. Local access ∙ D. Internal attack
Description : What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? a. Internet b. Host to host c. Network Access d. Application
Last Answer : b. Host to host
Description : In TCP/IP Reference model, the job of ............... layer is to permit hosts to inject packets into any network and travel them independently to the destination. (A) Physical (B) Transport (C) Application (D) Host-to-network
Last Answer : Answer: Marks to all
Description : What do you mean by TCP and UDP?
Last Answer : TCP stands for Transfer control protocol and UDP stands for User Datagrams protocol and TCP is a connection-oriented protocol and UDP is a Connectionless protocol.
Description : IGMP isa companion to the ______protocol. A) UDP B) TCP C) ICM D) noneof the above
Last Answer : noneof the above
Description : Which of the following TCP/IP protocolallows an application program on one machine to senda datagram to anapplicationprogram onanother machine? A. UDP B. VMTP C. X.25 D. SMTP E. None of the above
Last Answer : UDP
Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt
Last Answer : A) UDP
Description : Generally TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP because a. UDP is slower b. DNS servers has to keep connections c. DNS requests are generally very small and fit well within UDP segments d. None of these
Last Answer : c. DNS requests are generally very small and fit well within UDP segments