In the image shown here, what does system B send to system A at step 2 of the three-way TCP handshake?

A. SYN
B. ACK
C. FIN/ACK
D. SYN/ACK


Answer: D. SYN/ACK

Computer Science & Information Technology

You might also like to view...

Expression _________ returns the largest index in the array.

a) arrayName.getUpperBound b) arrayName.getUpperLimit c) arrayName.length d) arrayName.length - 1

Computer Science & Information Technology

A command that searches your document for hidden data or personal information that you might not want to share publicly

a. Synchronization b. Trusted Documents c. Inspect Document

Computer Science & Information Technology

What are all of the connections in a network considered, including the cables and their connectors?

A. telecommunications closet B. horizontal wiring C. work area D. cable plant

Computer Science & Information Technology

In_______ attacks, a network’s resources are taken up by unauthorized traffic, restricting the access of legitimate users.

a) denial-of-service. b) resource. c) flooding. d) None of the above.

Computer Science & Information Technology