|
1 | | One of the responsibilities of the transport layer protocol is to create a ______ communication. |
|
| | A) | host-to-host |
| | B) | process-to-process |
| | C) | node-to-node |
| | D) | none of the above |
|
2 | | UDP is called a ________________transport protocol. |
|
| | A) | connectionless, reliable |
| | B) | connection-oriented, unreliable |
| | C) | connectionless, unreliable |
| | D) | none of the above |
|
3 | | UDP does not add anything to the services of IP except for providing _______ communication. |
|
| | A) | node-to-node |
| | B) | process-to-process |
| | C) | host-to-host |
| | D) | none of the above |
|
4 | | UDP is an acronym for _______. |
|
| | A) | User Delivery Protocol |
| | B) | User Datagram Procedure |
| | C) | User Datagram Protocol |
| | D) | none of the above |
|
5 | | Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm. |
|
| | A) | client-server |
| | B) | client-client |
| | C) | server-server |
| | D) | none of the above |
|
6 | | The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________. |
|
| | A) | UDP addresses |
| | B) | transport addresses |
| | C) | port addresses |
| | D) | none of the above |
|
7 | | The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports. |
|
| | A) | well-known |
| | B) | registered |
| | C) | dynamic |
| | D) | none of the above |
|
8 | | In the sending computer, UDP receives a data unit from the _______ layer. |
|
| | A) | application |
| | B) | transport |
| | C) | IP |
| | D) | none of the above |
|
9 | | In the sending computer, UDP sends a data unit to the _______ layer. |
|
| | A) | application |
| | B) | transport |
| | C) | IP |
| | D) | none of the above |
|
10 | | UDP and TCP are both _______ layer protocols. |
|
| | A) | data link |
| | B) | network |
| | C) | transport |
| | D) | none of the above |
|
11 | | Which of the following functions does UDP perform? |
|
| | A) | process-to-process communication |
| | B) | host-to-host communication |
| | C) | end-to-end reliable data delivery |
| | D) | none of the above |
|
12 | | When the IP layer of a receiving host receives a datagram, _______. |
|
| | A) | delivery is complete |
| | B) | a transport layer protocol takes over |
| | C) | a header is added |
| | D) | none of the above |
|
13 | | UDP needs the _______ address to deliver the user datagram to the correct application process. |
|
| | A) | port |
| | B) | application |
| | C) | internet |
| | D) | none of the above |
|
14 | | A port address in UDP is _______bits long. |
|
| | A) | 8 |
| | B) | 16 |
| | C) | 32 |
| | D) | any of the above |
|
15 | | Which of the following does UDP guarantee? |
|
| | A) | flow control |
| | B) | connection-oriented delivery |
| | C) | flow control |
| | D) | none of the above |
|
16 | | The source port address on the UDP user datagram header defines _______. |
|
| | A) | the sending computer |
| | B) | the receiving computer |
| | C) | the process running on the sending computer |
| | D) | none of the above |
|
17 | | The combination of an IP address and a port number is called a ____________. |
|
| | A) | transport address |
| | B) | network address |
| | C) | socket address |
| | D) | none of the above |
|
18 | | To use the services of UDP, we need ________ socket addresses. |
|
| | A) | four |
| | B) | two |
| | C) | three |
| | D) | none of the above |
|
19 | | UDP packets are called __________. |
|
| | A) | user datagrams |
| | B) | segments |
| | C) | frames |
| | D) | none of the above |
|
20 | | UDP packets have a fixed-size header of _______ bytes. |
|
| | A) | 16 |
| | B) | 8 |
| | C) | 40 |
| | D) | none of the above |
|
21 | | UDP packets are encapsulated in ___________. |
|
| | A) | an Ethernet frame |
| | B) | an TCP segment |
| | C) | an IP datagram |
| | D) | none of the above |
|
22 | | UDP uses ________ to handle outgoing user datagrams from multiple processes on one host. |
|
| | A) | flow control |
| | B) | multiplexing |
| | C) | demultiplexing |
| | D) | none of the above |
|
23 | | UDP uses _______ to handle incoming user datagrams that go to different processes on the same host. |
|
| | A) | flow control |
| | B) | multiplexing |
| | C) | demultiplexing |
| | D) | none of the above |
|
24 | | TCP is a __________protocol. |
|
| | A) | stream-oriented |
| | B) | message-oriented |
| | C) | block-oriented |
| | D) | none of the above |
|
25 | | TCP allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes. |
|
| | A) | message; message |
| | B) | stream; stream |
| | C) | block; block |
| | D) | none of the above |
|
26 | | Because the sending and the receiving processes may not write or read data at the same speed, TCP ________. |
|
| | A) | speeds up the slower process |
| | B) | slows down the faster process |
| | C) | uses buffers |
| | D) | none of the above |
|
27 | | TCP groups a number of bytes together into a packet called a ___________. |
|
| | A) | user datagram |
| | B) | segment |
| | C) | datagram |
| | D) | none of the above |
|
28 | | TCP is a ___________ protocol. |
|
| | A) | connection-oriented |
| | B) | connectionless |
| | C) | both a and b |
| | D) | none of the above |
|
29 | | TCP is a(n) _______ transport protocol. |
|
| | A) | unreliable |
| | B) | best-effort delivery |
| | C) | reliable |
| | D) | none of the above |
|
30 | | TCP uses _________________ to check the safe and sound arrival of data. |
|
| | A) | an acknowledgment mechanism |
| | B) | out-of-band signalling |
| | C) | the services of another protocol |
| | D) | none of the above |
|
31 | | The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________. |
|
| | A) | 0 |
| | B) | 1 |
| | C) | randomly generated number |
| | D) | none of the above |
|
32 | | TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment. |
|
| | A) | first |
| | B) | last |
| | C) | middle |
| | D) | none of the above |
|
33 | | Communication in TCP is ___________. |
|
| | A) | simplex |
| | B) | half-duplex |
| | C) | full-duplex |
| | D) | none of the above |
|
34 | | The value of the acknowledgment field in a segment defines the number of the ______byte a party expects to receive. |
|
| | A) | first |
| | B) | last |
| | C) | next |
| | D) | none of the above |
|
35 | | The acknowledgment number is ________. |
|
| | A) | independent |
| | B) | randomly generated |
| | C) | cumulative |
| | D) | none of the above |
|
36 | | The value of the window size is determined by _________. |
|
| | A) | the sender |
| | B) | the receiver |
| | C) | both the sender and receiver |
| | D) | none of the above |
|
37 | | The inclusion of the checksum in the TCP segment is ________. |
|
| | A) | optional |
| | B) | mandatory |
| | C) | at the discretion of the application program |
| | D) | none of the above |
|
38 | | A TCP segment is encapsulated in __________. |
|
| | A) | an IP datagram |
| | B) | an Ethernet frame |
| | C) | a UDP user datagram |
| | D) | none of the above |
|
39 | | Connection establishment in TCP is called __________ handshaking. |
|
| | A) | two-way |
| | B) | four-way |
| | C) | one-way |
| | D) | none of the above |
|
40 | | A SYN segment cannot carry data; it consumes _____ sequence number(s). |
|
| | A) | no |
| | B) | one |
| | C) | two |
| | D) | none of the above |
|
41 | | A SYN + ACK segment cannot carry data; it consumes _____ sequence number(s). |
|
| | A) | no |
| | B) | three |
| | C) | two |
| | D) | none of the above |
|
42 | | An ACK segment, if carrying no data, consumes ______ sequence number(s). |
|
| | A) | no |
| | B) | one |
| | C) | two |
| | D) | none of the above |
|
43 | | The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack. |
|
| | A) | ACK flooding |
| | B) | FIN flooding |
| | C) | SYN flooding |
| | D) | none of the above |
|
44 | | The SYN flooding attack belongs to a group of security attacks known as a _____ attack. |
|
| | A) | denial of service |
| | B) | replay |
| | C) | man-in-the middle |
| | D) | none of the above |
|
45 | | The FIN segment consumes ____ sequence numbers if it does not carry data. |
|
| | A) | two |
| | B) | three |
| | C) | no |
| | D) | none of the above |
|
46 | | The FIN + ACK segment consumes _____ sequence number(s) if it does not carry data. |
|
| | A) | two |
| | B) | three |
| | C) | one |
| | D) | none of the above |
|
47 | | In TCP, one end can stop sending data while still receiving data. This is called a ______. |
|
| | A) | half-close |
| | B) | half-open |
| | C) | one-way termination |
| | D) | none of the above |
|
48 | | A(n) _________ machine is a machine that goes through a limited number of states. |
|
| | A) | infinite state |
| | B) | finite state |
| | C) | both a and b |
| | D) | none of the above |
|
49 | | __________ control regulates the amount of data a source can send before receiving an acknowledgment from the destination. |
|
| | A) | Error |
| | B) | Flow |
| | C) | Congestion |
| | D) | none of the above |
|
50 | | To accomplish flow control, TCP uses a ___________ window protocol. |
|
| | A) | limited-size |
| | B) | sliding |
| | C) | fixed-size |
| | D) | none of the above |
|
51 | | TCP sliding windows are __________ oriented. |
|
| | A) | packet |
| | B) | segment |
| | C) | byte |
| | D) | none of the above |
|
52 | | ACK segments consume _______ sequence number(s) and _______ acknowledged. |
|
| | A) | no; are not |
| | B) | one; are not |
| | C) | no; are |
| | D) | none of the above |
|
53 | | TCP delivers _______ out-of-order segments to the process. |
|
| | A) | all |
| | B) | no |
| | C) | some |
| | D) | none of the above |
|
54 | | IP is responsible for _______ communication while TCP is responsible for _______ communication. |
|
| | A) | host-to-host; process-to-process |
| | B) | process-to-process; host-to-host |
| | C) | process-to-process; network-to-network |
| | D) | none of the above |
|
55 | | If a segment carries data along with an acknowledgment, this is called _______. |
|
| | A) | backpacking |
| | B) | piggybacking |
| | C) | piggypacking |
| | D) | none of the above |
|
56 | | Multiply the header length field by _______ to find the total number of bytes in the TCP header. |
|
| | A) | 2 |
| | B) | 4 |
| | C) | 6 |
| | D) | none of the above |
|
57 | | Urgent data requires the urgent pointer field as well as the URG bit in the _______ field. |
|
| | A) | control |
| | B) | offset |
| | C) | sequence number |
| | D) | none of the above |
|
58 | | The options field of the TCP header ranges from 0 to _______ bytes. |
|
| | A) | 10 |
| | B) | 20 |
| | C) | 40 |
| | D) | none of the above |
|
59 | | If the ACK value is 200, then byte _______ has been received successfully. |
|
| | A) | 199 |
| | B) | 200 |
| | C) | 201 |
| | D) | none of the above |
|
60 | | Stream Control Transmission Protocol (SCTP) is a new _____________protocol. |
|
| | A) | reliable, character-oriented |
| | B) | reliable, message-oriented |
| | C) | unreliable, message-oriented |
| | D) | none of the above |
|
61 | | SCTP allows __________ service in each association. |
|
| | A) | single stream |
| | B) | multistream |
| | C) | double stream |
| | D) | none of the above |
|
62 | | SCTP association allows _____________ for each end. |
|
| | A) | only one IP address |
| | B) | multiple IP addresses |
| | C) | only two IP address |
| | D) | none of the above |
|
63 | | In SCTP, a data chunk is numbered using ________. |
|
| | A) | a TSN |
| | B) | an SI |
| | C) | an SSN |
| | D) | none of the above |
|
64 | | To distinguish between different streams, SCTP uses ___________. |
|
| | A) | a TSN |
| | B) | an SI |
| | C) | an SSN |
| | D) | none of the above |
|
65 | | To distinguish between different data chunks belonging to the same stream, SCTP uses ___________. |
|
| | A) | TSNs |
| | B) | SIs |
| | C) | SSNs |
| | D) | none of the above |
|
66 | | TCP has ____________; SCTP has ____________. |
|
| | A) | packets; segments |
| | B) | segments; packets |
| | C) | segments; frames |
| | D) | none of the above |
|
67 | | The control information in SCTP is included in the ________. |
|
| | A) | header control field |
| | B) | control chunks |
| | C) | data chunks |
| | D) | none of the above |
|
68 | | An SCTP packet can carry __________. |
|
| | A) | only one data chunk |
| | B) | several data chunks |
| | C) | no data chunks |
| | D) | none of the above |
|
69 | | In SCTP, the acknowledgment number and window size are part of each ________. |
|
| | A) | data chunk |
| | B) | control chunk |
| | C) | a or b |
| | D) | none of the above |
|
70 | | There is no need for a header length field in SCTP because ________________. |
|
| | A) | there are no options in the general header |
| | B) | the size of the header is fixed |
| | C) | both a and b |
| | D) | none of the above |
|
71 | | The checksum in SCTP is ________ bits. |
|
| | A) | 16 |
| | B) | 32 |
| | C) | 64 |
| | D) | none of the above |
|
72 | | The association identifier in SCTP is __________________. |
|
| | A) | a unique verification tag |
| | B) | a combination of logical and port addresses |
| | C) | either a or b |
| | D) | none of the above |
|
73 | | In SCTP, control information and data information are carried in _______ chunks. |
|
| | A) | the same chunk |
| | B) | different chunks |
| | C) | either a or b |
| | D) | none of the above |
|
74 | | In SCTP, acknowledgment numbers are used to acknowledge _____________. |
|
| | A) | both data chunks and control chunks |
| | B) | only control chunks |
| | C) | only data chunks |
| | D) | none of the above |
|
75 | | In an SCTP packet, control chunks come ___________ data chunks. |
|
| | A) | after |
| | B) | before |
| | C) | a or b |
| | D) | none of the above |
|
76 | | In SCTP, ___________ can be carried in a packet that carries an INIT chunk. |
|
| | A) | only data chunks |
| | B) | only control chunks |
| | C) | no other chunk |
| | D) | none of the above |
|
77 | | A connection in SCTP is called an ____________. |
|
| | A) | negotiation |
| | B) | association |
| | C) | transmission |
| | D) | none of the above |