DumpsFiles
 Request Exam  Contact
  • Home
  • PRACTICE EXAMS
    Oracle
    Fortinet
    Juniper
    Microsoft
    Cisco
    Citrix
    CompTIA
    VMware
    SAP
    EMC
    PMI
    HP
    Salesforce
    Other
  • View All Exams
  • New Dumps Files
  • Upload
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. Fortinet
  3. ICS/SCADA Cyber Security Exam
  4. Fortinet.ICS-SCADA.v2025-05-06.q28
  5. Question 1

Join the discussion

Question 1/28

What type of protocol is considered connection-oriented?

Correct Answer: B
TCP (Transmission Control Protocol) is a connection-oriented protocol used in the majority of internet communications.
Connection-oriented protocols like TCP require a connection to be established between the communicating devices before data is transmitted. This ensures reliable and ordered delivery of data.
TCP manages this by establishing a handshake mechanism (TCP three-way handshake) to set up the connection prior to transmitting data and properly terminating the connection once the communication session has completed.
Reference
"TCP/IP Illustrated, Volume 1: The Protocols" by W. Richard Stevens.
Postel, J., "Transmission Control Protocol," RFC 793.

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.
Rating:
Other Question (28q)
Q1. What type of protocol is considered connection-oriented?...
Q2. Which of the following is a weakness of a vulnerability scanner?...
Q3. What does the SPI within IPsec identify?
Q4. Which of the following can be used to view entire copies of web sites?...
Q5. A Security Association is a __________ way connection?...
Q6. Which of the ICS/SCADA generations is considered monolithic?...
Q7. Which of the following names represents inbound filtering?...
Q8. Which component of the IT Security Model is the highest priority in ICS/SCADA Security?...
Q9. What type of communication protocol does Modbus RTU use?...
Q10. Which mode within IPsec provides secure connection between two endpoints but does NOT prot...
Q11. What version of SMB did the WannaCry ransomware attack?...
Q12. Which of the following is NOT an exploit tool?...
Q13. Which type of Intrusion Prevention System can monitor and validate encrypted data?...
Q14. Which of the following was attacked using the Stuxnet malware?...
Q15. What step of the malware infection installs the malware on the target?...
Q16. Which component of the IT Security Model is attacked with modification?...
Q17. How many main score areas are there in the CVSS?2...
Q18. Which of the following are NOT components of an ICS/SCADA network device?...
Q19. Which of the following is considered the best way to counter packet monitoring for a switc...
Q20. Which of the following is NOT ICS specific malware?...
Q21. In what default directory (fully qualified path) does nmap store scripts?...
Q22. Which of the CVSS metrics refer to the exploit quotient of the vulnerability?...
Q23. Which mode within IPsec provides a secure connection tunnel between two endpoints AND prot...
Q24. Which of the registrars contains the information for the domain owners in Europe?...
Q25. At what layer does a switch normally operate?
Q26. Which component of the IT Security Model is attacked with masquerade?...
Q27. When monitoring a network, you receive an ICMP type 8 packet. What does this represent?...
Q28. Which of the options in the netstat command show the routing table?...
[×]

Download PDF File

Enter your email address to download Fortinet.ICS-SCADA.v2025-05-06.q28.pdf

Email:

DumpsFiles

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 DumpsFiles

www.dumpsfiles.com materials do not contain actual questions and answers from Cisco's certification exams.