What are the critical components of a TCP header?
What will be an ideal response?
The critical components of a TCP header are TCP flags, the initial sequence number (ISN), and source and destination port numbers. Hackers abuse many of these TCP header components; for example, when port scanning,many hackers use the method of sending a packet with a SYN-ACK flag set even though a SYN packet was not sent first.
You might also like to view...
Which of the following involves using various tools to find vulnerabilities in a system?
A) Port scanning B) Vulnerability scanning C) Enumeration D) Vulnerability assessment
Which of the following developmental policies can help an IT department address secure programming issues?
A) All code must be checked for back doors and Trojan horses. B) All buffers must have error handling to prevent buffer overruns. C) All communication must adhere to an organization's secure communications guidelines. D) All of the above
When using the Bing Image Search box, you can find various images that can be used under ________, which allows users to share and use their photos as long as the author is not profiting by selling the images
A) Microsoft Licensing B) Intellectual Property C) Free Information Act D) Creative Commons
You can install a copy of Windows 8.1 on a USB thumb drive and use this on a computer that meets the Windows 7 or Windows 8.1 hardware requirements regardless of the operating system installed on the computer. This enables an additional Windows Workspace that operates in a manner similar to an ordinary Windows installation with few exceptions. This feature is called _________
a. Client Hyper-V b. USBGo c. Windows To Go d. None of the above