Which pieces of information can be found in the ip header

Assignment Help C/C++ Programming
Reference no: EM13939575

There are eight network security questions. I have answered the questions however, I am unclear if I am correct. Please review and if I am wrong, please provide the correct answer along with your explanation.

1. Which of the following pieces of information can be found in the IP header?

a. Source address of the IP packet

b. Destination address for the IP packet

c. Sequence number of the IP packet

d. Both (A) and (B) only.

My answer is d.

2. We also don't want our undeliverable packets to hop around forever. What feature/flag limits the life of an IP packet on the network?

a. Time to Live counter

b. Subnet Mask

c. Header Checksum

d. Wackamole field

My answer is a.

3. I bank online. Which of the following are application-level encryption protocols that I would most likely use to securely bank online?

a. SSL and SET

b. Verisign and SHA1

c. READY, SET, and GO

d. PGP, PEM, and SSL

My answer is a.

4. We don't want our packets to get lost in transit. Which OSI layer is responsible for ordered delivery of packets?

a. Network

b. Link

c. Transport

d. Physical

my answer is b but I am not sure

5. When my teleconference data packets reach the destination computer, what information in the packet is used by the destination computer to figure out that the packets belong to the teleconferencing application?

a. Firewall rules

b. Port numbers in the TCP/UDP header

c. Three-way handshake initiated at the start of the communication.

d. IANA subnet class number in the first octet of the IP address

my answer would be c...but this is a far guess for me.

6. I want to request secure web pages using https://. What port will I need to open on my firewall to allow these SSL-encrypted packets to flow?

a. 161

b. 53

c. 6000

d. 443

e. 137

I thought for web pages uses port 80...

7. Based on what we have learned about TCP and UDP packet accounting mechanisms, which transport control protocol would I most likely use for Internet Telephony/Teleconferencing (Voice over IP)?

a. UDP - Because I don't want to retransmit if some of the packets get lost.

b. UDP - Because I want to make sure that no packets get lost.

c. TCP - Because I don't want to retransmit if some of the packets get lost.

d. TCP - Because I want to retransmit lost voice IP packets later on in the conversation.

I am not sure what they are asking

8. What is the standard IANA port number used for requesting web pages?

a. 80

b. 53

c. 21

d. 25

My answer is a.

Reference no: EM13939575

Questions Cloud

What are data declaration statements : I need an example of a flow chart and specification sheet of a C program.
Discuss and critically analyse court or tribunal decision : Outline the Trade Practices Act / Australian Competition and Consumer Act have been breached and explain why they were breached and Discuss and critically ANALYSE the court/tribunal decision and the reason for the decision
Explain why mutations of the framework region of an antibody : Give one reason why this might be important for the efficacy of the antibody response. Explain why mutations of the framework region of an antibody might be more detrimental to the antibody than mutations in CDR's
Compare dry heat and moist heat methods of microbial control : Describe each of the following in terms of its chemical nature, mechanism of action, mode of application, common uses and effectiveness, and advantages and disadvantages: heavy metals, phenolics, halogens
Which pieces of information can be found in the ip header : There are eight network security questions. I have answered the questions however, I am unclear if I am correct. Please review and if I am wrong, please provide the correct answer along with your explanation.
Writing a promotional sales letter : You have decided to write a promotional sales letter to deliver to the homes and apartments in the area. Your letter should be attractive and include details that you think is necessary to boost business and attract more customers.
Fixed manufacturing overhead cost : Using the annual expected sales for these products, determine the weighted-average unit contribution margin for these three products (Round to two decimal places.
Business report format with an executive summary : Adopt a business report format with an executive summary not exceeding 500 words. Executive summary is included in the word count of 2500.
Mechanisms recognition of potentially dangerous molecules : While limiting the expression of MHC class II to so-called "professional" APCs partially ameliorates the problem of self non self recognition among CD4+ T cells, it remains difficult to understand how it is possible that even these cells' class II..

Reviews

Write a Review

C/C++ Programming Questions & Answers

  Optimization is to add a sorting algorithm

The second optimization is to add a sorting algorithm. Each time you add an item to the array (from disk or from keyboard), you call a function called SortMyArray(), which use the bubble sorting algorithm to sort the array in the ascending order, ..

  File containing a series of integers is named

Assume that a file containing a series of integers is named numbers.dat and exists on the computer's disk. Design a java program that reads all the numbers stored in the file and calculates and displays on the console

  Aimsthe main purpose of the assignment is to let you

aimsthe main purpose of the assignment is to let you practice the following programming techniques read data from

  Prepare a cc program that uses the pthread library to

prepare a cc program that uses the pthread library to create threads and mutexes to synchronize them. the program must

  Write a program to find the average value

Write a program to find the average value, the largest value, and the smallest value of a set of numbers supplied as input from the keyboard. The number of values in the data set must be in the range 0 to 20, inclusive.

  Statements that return container data only return container

Make sure all return statements that return container data only return container data.  If a return statement returns container data under certain conditions, but another return statement returns something that is not container data under other condi..

  Write a loop that will step through the array

Write a loop that will step through the array you defined in question 1, displaying the contents of each element that doesn't contain a NULL pointer

  What is taylor rule

What is Taylor rule ?  please write very short paragraph.

  Computer programming techniques

Construct a program from a design and use appropriate functions

  How does polymorphism promote extensibility

What is the difference between static binding and dynamic binding? What is polymorphism? How does polymorphism promote extensibility?

  What function must a file management system perform

Which of the conceptual design steps identifies the main processes: insert, update, and delete rules?

  The compiler to send the exception

When the throw keyword is written by itself, it is a way of asking the compiler to send the exception to another handler. If there is no other handler written by you, what happens?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd