Which protocol is described as a reliable, message-oriented transport layer protocol?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which protocol is described as a reliable, message-oriented transport layer protocol?

Explanation:
The main idea is identifying a transport protocol that guarantees delivery and keeps message boundaries intact as data is transmitted. Stream Control Transmission Protocol fits this because it is designed to deliver data reliably while preserving the boundaries of each message. Data is sent in discrete messages (chunks) within an association, and SCTP can enforce reliability, ordering, or unordered delivery as needed. This combination—reliable delivery plus message-oriented transmission—is what sets SCTP apart from a pure stream protocol like TCP, where data is a continuous byte stream and message boundaries aren’t preserved unless the application implements its own framing. The other options aren’t transport protocols at all; they describe scanning techniques used in security assessments, not mechanisms for reliable, message-oriented data transport.

The main idea is identifying a transport protocol that guarantees delivery and keeps message boundaries intact as data is transmitted. Stream Control Transmission Protocol fits this because it is designed to deliver data reliably while preserving the boundaries of each message. Data is sent in discrete messages (chunks) within an association, and SCTP can enforce reliability, ordering, or unordered delivery as needed. This combination—reliable delivery plus message-oriented transmission—is what sets SCTP apart from a pure stream protocol like TCP, where data is a continuous byte stream and message boundaries aren’t preserved unless the application implements its own framing. The other options aren’t transport protocols at all; they describe scanning techniques used in security assessments, not mechanisms for reliable, message-oriented data transport.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy