Which of the following is not one of the flags used in the TCP three-step handshake?
a. SYN
b. PSH
c. SYN ACK
d. ACK
ANS: B
Computer Science & Information Technology
You might also like to view...
A variable whose meaning is confined to a method definition is called an/a
(a) instance variable (b) local variable (c) global variable (d) none of the above
Computer Science & Information Technology
The tools used to create a chart on a PowerPoint slide are somewhat different than those used in Excel
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following mitigations can help against MITM attacks?
A. ARP inspection B. ingress filtering C. stronger mutual authentication D. port security
Computer Science & Information Technology
What is the 7th Fibonacci number? (Hint: the 0th is 0 and the 1st is 1)
A. 5 B. 8 C. 13 D. 21
Computer Science & Information Technology