Which of the following is not one of the flags used in the TCP three-step handshake?

a. SYN
b. PSH
c. SYN ACK
d. ACK


ANS: B

Computer Science & Information Technology

You might also like to view...

A variable whose meaning is confined to a method definition is called an/a

(a) instance variable (b) local variable (c) global variable (d) none of the above

Computer Science & Information Technology

The tools used to create a chart on a PowerPoint slide are somewhat different than those used in Excel

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following mitigations can help against MITM attacks?

A. ARP inspection B. ingress filtering C. stronger mutual authentication D. port security

Computer Science & Information Technology

What is the 7th Fibonacci number? (Hint: the 0th is 0 and the 1st is 1)

A. 5 B. 8 C. 13 D. 21

Computer Science & Information Technology