Join the discussion
Question 1/28
What type of protocol is considered connection-oriented?
Correct Answer: B
TCP (Transmission Control Protocol) is a connection-oriented protocol used in the majority of internet communications.
Connection-oriented protocols like TCP require a connection to be established between the communicating devices before data is transmitted. This ensures reliable and ordered delivery of data.
TCP manages this by establishing a handshake mechanism (TCP three-way handshake) to set up the connection prior to transmitting data and properly terminating the connection once the communication session has completed.
Reference
"TCP/IP Illustrated, Volume 1: The Protocols" by W. Richard Stevens.
Postel, J., "Transmission Control Protocol," RFC 793.
Connection-oriented protocols like TCP require a connection to be established between the communicating devices before data is transmitted. This ensures reliable and ordered delivery of data.
TCP manages this by establishing a handshake mechanism (TCP three-way handshake) to set up the connection prior to transmitting data and properly terminating the connection once the communication session has completed.
Reference
"TCP/IP Illustrated, Volume 1: The Protocols" by W. Richard Stevens.
Postel, J., "Transmission Control Protocol," RFC 793.
Add Comments
- Other Question (28q)
- Q1. What type of protocol is considered connection-oriented?...
- Q2. Which of the following is a weakness of a vulnerability scanner?...
- Q3. What does the SPI within IPsec identify?
- Q4. Which of the following can be used to view entire copies of web sites?...
- Q5. A Security Association is a __________ way connection?...
- Q6. Which of the ICS/SCADA generations is considered monolithic?...
- Q7. Which of the following names represents inbound filtering?...
- Q8. Which component of the IT Security Model is the highest priority in ICS/SCADA Security?...
- Q9. What type of communication protocol does Modbus RTU use?...
- Q10. Which mode within IPsec provides secure connection between two endpoints but does NOT prot...
- Q11. What version of SMB did the WannaCry ransomware attack?...
- Q12. Which of the following is NOT an exploit tool?...
- Q13. Which type of Intrusion Prevention System can monitor and validate encrypted data?...
- Q14. Which of the following was attacked using the Stuxnet malware?...
- Q15. What step of the malware infection installs the malware on the target?...
- Q16. Which component of the IT Security Model is attacked with modification?...
- Q17. How many main score areas are there in the CVSS?2...
- Q18. Which of the following are NOT components of an ICS/SCADA network device?...
- Q19. Which of the following is considered the best way to counter packet monitoring for a switc...
- Q20. Which of the following is NOT ICS specific malware?...
- Q21. In what default directory (fully qualified path) does nmap store scripts?...
- Q22. Which of the CVSS metrics refer to the exploit quotient of the vulnerability?...
- Q23. Which mode within IPsec provides a secure connection tunnel between two endpoints AND prot...
- Q24. Which of the registrars contains the information for the domain owners in Europe?...
- Q25. At what layer does a switch normally operate?
- Q26. Which component of the IT Security Model is attacked with masquerade?...
- Q27. When monitoring a network, you receive an ICMP type 8 packet. What does this represent?...
- Q28. Which of the options in the netstat command show the routing table?...
