CIW v5 Security Essentials 1D0-571 Question # 2 Topic 1 Discussion

CIW v5 Security Essentials 1D0-571 Question # 2 Topic 1 Discussion

1D0-571 Exam Topic 1 Question 2 Discussion:
Question #: 2
Topic #: 1

Consider the following diagram:

1D0-571 Question 2

Which of the following best describes the protocol activity shown in the diagram, along with the most likely potential threat that accompanies this protocol?


A.

The ICMP Time Exceeded message, with the threat of a denial-of-service attack


B.

The SIP three-way handshake, with the threat of a buffer overflow


C.

The TCP three-way handshake, with the threat of a man-in-the-middle attack


D.

The DNS name query, with the threat of cache poisoning


Get Premium 1D0-571 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.