Securing Protocol Layers   «Prev  Next»

TCP/IP Protocol Layers - Quiz

Each question is worth one point. Select the best answer or answers for each question.
 
1. What is the portion of the operating system that transmits and receives information on a network?
Please select the best answer.
  A. Internet protocol
  B. TCP/UDP layers
  C. TCP/IP protocol stack
  D. Transport layer

2. What is the protocol used to send and receive files over a TCP/IP connection?
Please select the best answer.
  A. File transfer protocol
  B. Simple network management protocol
  C. Transmission control protocol
  D. Point to point protocol

3. What is the protocol that uses TCP port 25 to transfer email from one server to another?
Please select the best answer.
  A. Address resolution protocol
  B. Simple network management protocol
  C. Transmission control protocol
  D. Simple mail transfer protocol

4. For different applications running at the same time to communicate simultaneously, information is directed by the use of
Please select the best answer.
  A. Network packets
  B. Ports
  C. Mail servers
  D. Daemons

5. When an email message is sent, the TCP packet is packaged in an IP datagram that includes the
Please select all the correct answers.
  A. Sender’s IP address
  B. Destination IP address
  C. Ethernet packet
  D. Body of the message

6. Viruses and trojan horses may be carried in an email message’s
Please select the best answer.
  A. Header
  B. Attachment
  C. Body
  D. Datagram

7. What are the two common ways that programs such as Java, CGI, and Active Server Pages are used to exploit a Web server?
Please select the best answer.
  A. Placing a Trojan horse in an executable file and by modifying the HTTP server program files
  B. Replacing executable files on the HTTP server and by creating a link to a Trojan horse
  C. Modifying how the HTTP server's program is executed and by placing a Trojan horse on the server
  D. Having the HTTP server execute a Trojan horse and by modifying the HTML files on the server