CHAPTER 25Perimeter Security: Review Questions and Hands-On Exercises

Review the summary points before proceeding to the “Review Questions” and “Exam Questions” sections to make sure you are comfortable with each point. After completing the review, answer the review questions that follow to verify your knowledge of the material covered in this chapter.

Summary Points

  • There are two kinds of Internet Protocol traffic: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). When a TCP connection is established, data can be sent bidirectionally. This connection is highly reliable and features error checking but adds some bulk to the transmission. UDP is a much simpler, connectionless protocol where multiple messages are sent ...

Get Cybersecurity Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.