System Administrator 2026
In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is ___________
  • A. Mutual open
  • B. Mutual close
  • C. Simultaneous open
  • D. Simultaneous close
SYNC flooding attack belongs to a type of security attack known as ___________
  • A. Sync flooding attack
  • B. Active attack
  • C. Passive attack
  • D. Denial-of-service attack
The sizes of source and destination port address in TCP header are ___________ respectively.
  • A. 16-bits and 32-bits
  • B. 16-bits and 16-bits
  • C. 32-bits and 16-bits
  • D. 32-bits and 32-bits
What allows TCP to detect lost segments and in turn recover from that loss?
  • A. Sequence number
  • B. Acknowledgment number
  • C. Checksum
  • D. Both sequence & acknowledgment number
When were VPNs introduced into the commercial world?
  • A. Early 80€?s
  • B. Late 80€?s
  • C. Early 90€?s
  • D. Late 90€?s
What protocol is NOT used in the operation of a VPN?
  • A. Pptp
  • B. Ipsec
  • C. Ymum
  • D. L2tp