Which fields are included in the TCP header? (Choose three).A. Source PortB. Acknowledgement NumberC. Request NumberD. Destination AddressE. WindowF. Data

Which fields are included in the TCP header? (Choose three).

A. Source Port

B. Acknowledgement Number

C. Request Number

D. Destination Address

E. Window

F. Data


相关考题:

Which two packet attributes contribute to the identification of a session? ()(Choose two.) A. destination portB. TTLC. IP optionsD. protocol number

Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.) A. data integrityB. data confidentialityC. data authenticationD. outer IP header confidentialityE. outer IP header authentication

In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.) A. IP protocolB. IP time-to-liveC. source and destination IP addressD. source and destination MAC addressE. source and destination TCP/UDP port

Which two statements are true when source/destination filters are enabled? ()(Choose two.) A. Excluded traffic is not accelerated.B. Excluded traffic is only compressed.C. Source/destination filter applies to all traffic sent from LAN to WAN.D. Source/destination filters work in packet interception mode using RIPv2.

An IPv6 host is configured to request a specific path through the network to reach a destination.Which IPv6 extension header should be used?() A. RoutingB. Hop-by-HopC. FragmentationD. Destination Options

Which three of the following options are NOT fields found in an Ethernet frame?() A.VersionB.TypeC.Source PortD.FlagsE.Data

Regarding PAR (Positive Acknowledgement and Re-transmission), which of the answer choices below are correct?() A. The source device will only retransmit lost packets on the request of the destination device.B. The source device starts a timer when it sends a segment and retransmits if an acknowledgment is not received before the timer expires.C. The destination device acknowledges receipt of a segment by sending a packet with a new sequence number and the ACK bit sent.D. The destination device acknowledges receipt of a segment by sending a packet that indicates the next sequence number it expects.E. If the destination device does not receive a segment, all segments are retransmitted.F. The source device keeps a record of all segments sent and expects and acknowledgment of each.

Which of one the following fields is contained within an IEEE Ethernet frame header?() A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address

Although TCP segments differ from UDP segments, they both contain some common fields. What two segments do they share in common?() A. source addressB. optionsC. sequence numberD. sourcesE. destination portF. checksum

What does a Layer 2 switch use to decide where to forward a received frame?() A. source MAC addressB. source IP addressC. source switch portD. destination IP addressE. destination port addressF. destination MAC address

A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?() A. The source and destination addressesB. The destination port numberC. The destination addressD. The source addressE. All of the above

Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?() A. source portB. output interfaceC. next-hop IP addressD. source MAC addressE. destination IP addressF. next-hop MAC address

What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。 A.protocolB.VLAN numberC.TCP or UDP port numbersD.source switch port numberE.source IP address and destination IP addressF.source MAC address and destination MAC address

Which of the following descriptions about IP spoofing is correct?()A、IP source address is forgedB、IP destination address is forgedC、IP TCP source port is forgedD、IP TCP destination port is forgedE、None of above

Which fields are included in the TCP header?()A、Source PortB、Acknowledgement NumberC、Request NumberD、Destination AddressE、WindowF、Data

What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。A、protocolB、VLAN numberC、TCP or UDP port numbersD、source switch port numberE、source IP address and destination IP addressF、source MAC address and destination MAC address

Server load balancing (SLB) is the process of deciding to which server a load-balancing device should send a client request for service. Which predictors are supported on ACE in order to select the best server to fulfill a client request? ()A、 Hash address: Selects the server by using a hash value based on either the source or destination IP address, or bothB、 Hash URL: Selects the server by using a hash value based on the requested URLC、 Hash MAC.Selects the server by using a hash value based on either the source or destination MAC address, or bothD、 Hash header: Selects the server by using a hash value based on the HTTP header nameE、 Hash IP: Selects the server using a hash value based on the IP address

Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address

In JUNOS Software, which three packet elements can be inspected to determine if asession already exists?()A、IP protocolB、IP time-to-liveC、source and destination IP addressD、source and destination MAC addressE、source and destination TCP/UDP port

Which three of the following options are NOT fields found in an Ethernet frame?()A、VersionB、TypeC、Source PortD、FlagsE、Data

In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)A、IP protocolB、IP time-to-liveC、source and destination IP addressD、source and destination MAC addressE、source and destination TCP/UDP port

Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication

Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication

多选题Which fields are included in the TCP header?()ASource PortBAcknowledgement NumberCRequest NumberDDestination AddressEWindowFData

多选题In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)AIP protocolBIP time-to-liveCsource and destination IP addressDsource and destination MAC addressEsource and destination TCP/UDP port

单选题Which of the following descriptions about IP spoofing is correct?()AIP source address is forgedBIP destination address is forgedCIP TCP source port is forgedDIP TCP destination port is forgedENone of above

单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()Asource and destination MAC addressBsource MAC address and destination network address onlyCsource and destination network address onlyDsource network address and destination MAC addressEsource and destination MAC address and source and destination network address