Which one of the following terms is not normally used to describe the Transmission Control Protocol (TCP)?
a. Reliable
b. Connectionless
c. Error-checking
d. Guaranteed delivery
Answer: b. Connectionless
Computer Science & Information Technology
You might also like to view...
Pinterest is like Facebook but with only ________
A) pictures B) music C) themes D) categories
Computer Science & Information Technology
Sam is a security risk analyst for an insurance company. He is currently examining a scenario where a hacker might use a SQL injection attack to deface a web server due to a missing patch in the company's web application. In this scenario, what is the vulnerability?
A. Unpatched web application B. Web defacement C. Hacker D. Operating system
Computer Science & Information Technology