978-0840020932 Chapter 5

subject Type Homework Help
subject Pages 4
subject Words 966
subject Authors Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 5: TCP/IP Vulnerabilities
TRUE/FALSE
1. TCP is responsible for safe and reliable data transfer between host computers.
2. The OSI Model and the TCP/IP Model are entirely aligned.
3. IP packets often arrive out of sequence because they are not all taking the same route in sequence.
4. TCP uses a connectionless design,meaning the participants in a TCP session must initially create a
connection.
5. During the development of TCP/IP in the 1980s, security was a priority.
MULTIPLE CHOICE
1. ____ is the common language of networked computers and makes transferring information fast and
efficient.
a.
TCP/IP
c.
X.25
b.
IPX
d.
RIP
2. The ____ is responsible for transmitting data from the source computer to the final destination computer.
a.
Transport Control Protocol (TCP)
c.
Routing Internet Protocol (RIP)
b.
Internet Protocol (IP)
d.
Address Resolution Protocol (ARP)
3. When a large IP packet is sent over a network, it is broken down. This process is called ____.
a.
separation
c.
breaking
b.
division
d.
fragmentation
4. The ____ timer waits for FIN packets. Its default value is 10 minutes.
a.
TIME_WAIT
c.
FIN_WAIT
b.
KEEP_ALIVE
d.
Connection establishment
page-pf2
5. ____ is a collection of Internet Engineering Task Force (IETF) standards that define an architecture at
the Internet Protocol (IP) layer that protects IP traffic by using various security services.
a.
RIP
c.
TCP/IP
b.
IPSec
d.
ARP
COMPLETION
1. ____________________ is a suite of protocols that underlie the Internet. The TCP/IP suite comprises
many protocols and applications that focus on two main objectives.
2. A(n) ____________________ attack is an assault on a network that floods it with so many additional
requests that regular traffic is either slowed or completely interrupted.
3. ____________________ is the process of enclosing higher-level protocol information in lower-level
protocol information.
4. _________________________ is the theoretical time when the number of unallocated IP addresses
equals zero.
5. A(n) ____________________ attack takes advantage of the way that most hosts implement the TCP
three-way handshake.
SHORT ANSWER
1. What are the TCP flags?
page-pf3
2. Explain how to setup a TCP connection.
3. Explain how to release a TCP connection.
4. Briefly describe IP spoofing attacks.
5. Briefly describe RIP attacks.
page-pf4

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.