DispersedNet
SiteMap
Network Admin
Unix Admin
System Admin
Network Security
Securing Protocol Layers
«Prev
Next»
Network Security Overview
Security Standards
Security Characteristics
Security System Threat
Social Engineering
Effective Security Systems
Planning Security Policy
System Security Policy
Creating Policy
Organizational Training
Security Standards
Security Basics - Quiz
Effective Security Structure
Important Security Elements
Security Services Standards
Security Definitions
Security Standards
Key Authentification Techniques
Authentication Methods - Quiz
Access Control
Encrypting Decrypting Data
Encryption Methods-
Applied Encryption Processes
Encryption Authentication Processes
Overall Security Plan
Security Elements Conclusion
Securing Protocol Layers
TCP/IP Network
Physical Data Link
IP Internet Layer
TCP/UDP
Application Layer
TCP/IP Applications
Packet Construction
IP Datagrams
TPC/IP Stack Conclusion
Protocol Layers - Quiz
Securing Resources
Securing Resources Services
OS Security
OS Security Quiz
Protecting TCP/IP
CGI Scripts
Securing Email
Testing Evaluating Network
Security Tools
Security Implementation Conclusion
Firewalls in Depth
What is Firewall
Packet Filters
Circuit Level Gateways
Application Gateway
Bastion Host Firewall
Common Firewall Designs
Strategies Goals
Firewall Types
TCP/IP Protocol Layers - Quiz
Each question is worth one point. Select the best answer or answers for each question.
1.
What is the portion of the operating system that transmits and receives information on a network?
Please select the best answer.
A.
Internet protocol
B.
TCP/UDP layers
C.
TCP/IP protocol stack
D.
Transport layer
2.
What is the protocol used to send and receive files over a TCP/IP connection?
Please select the best answer.
A.
File transfer protocol
B.
Simple network management protocol
C.
Transmission control protocol
D.
Point to point protocol
3.
What is the protocol that uses TCP port 25 to transfer email from one server to another?
Please select the best answer.
A.
Address resolution protocol
B.
Simple network management protocol
C.
Transmission control protocol
D.
Simple mail transfer protocol
4.
For different applications running at the same time to communicate simultaneously, information is directed by the use of
Please select the best answer.
A.
Network packets
B.
Ports
C.
Mail servers
D.
Daemons
5.
When an email message is sent, the TCP packet is packaged in an IP datagram that includes the
Please select all the correct answers.
A.
Sender’s IP address
B.
Destination IP address
C.
Ethernet packet
D.
Body of the message
6.
Viruses and trojan horses may be carried in an email message’s
Please select the best answer.
A.
Header
B.
Attachment
C.
Body
D.
Datagram
7.
What are the two common ways that programs such as Java, CGI, and Active Server Pages are used to exploit a Web server?
Please select the best answer.
A.
Placing a Trojan horse in an executable file and by modifying the HTTP server program files
B.
Replacing executable files on the HTTP server and by creating a link to a Trojan horse
C.
Modifying how the HTTP server's program is executed and by placing a Trojan horse on the server
D.
Having the HTTP server execute a Trojan horse and by modifying the HTML files on the server