Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)

Please answer all questions.

1

One of the responsibilities of the transport layer protocol is to create a ______ communication.
A)host-to-host
B)process-to-process
C)node-to-node
D)none of the above
2

UDP is called a ________________transport protocol.
A)connectionless, reliable
B)connection-oriented, unreliable
C)connectionless, unreliable
D)none of the above
3

UDP does not add anything to the services of IP except for providing _______ communication.
A)node-to-node
B)process-to-process
C)host-to-host
D)none of the above
4

UDP is an acronym for _______.
A)User Delivery Protocol
B)User Datagram Procedure
C)User Datagram Protocol
D)none of the above
5

Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm.
A)client-server
B)client-client
C)server-server
D)none of the above
6

The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________.
A)UDP addresses
B)transport addresses
C)port addresses
D)none of the above
7

The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports.
A)well-known
B)registered
C)dynamic
D)none of the above
8

In the sending computer, UDP receives a data unit from the _______ layer.
A)application
B)transport
C)IP
D)none of the above
9

In the sending computer, UDP sends a data unit to the _______ layer.
A)application
B)transport
C)IP
D)none of the above
10

UDP and TCP are both _______ layer protocols.
A)data link
B)network
C)transport
D)none of the above
11

Which of the following functions does UDP perform?
A)process-to-process communication
B)host-to-host communication
C)end-to-end reliable data delivery
D)none of the above
12

When the IP layer of a receiving host receives a datagram, _______.
A)delivery is complete
B)a transport layer protocol takes over
C)a header is added
D)none of the above
13

UDP needs the _______ address to deliver the user datagram to the correct application process.
A)port
B)application
C)internet
D)none of the above
14

A port address in UDP is _______bits long.
A)8
B)16
C)32
D)any of the above
15

Which of the following does UDP guarantee?
A)flow control
B)connection-oriented delivery
C)flow control
D)none of the above
16

The source port address on the UDP user datagram header defines _______.
A)the sending computer
B)the receiving computer
C)the process running on the sending computer
D)none of the above
17

The combination of an IP address and a port number is called a ____________.
A)transport address
B)network address
C)socket address
D)none of the above
18

To use the services of UDP, we need ________ socket addresses.
A)four
B)two
C)three
D)none of the above
19

UDP packets are called __________.
A)user datagrams
B)segments
C)frames
D)none of the above
20

UDP packets have a fixed-size header of _______ bytes.
A)16
B)8
C)40
D)none of the above
21

UDP packets are encapsulated in ___________.
A)an Ethernet frame
B)an TCP segment
C)an IP datagram
D)none of the above
22

UDP uses ________ to handle outgoing user datagrams from multiple processes on one host.
A)flow control
B)multiplexing
C)demultiplexing
D)none of the above
23

UDP uses _______ to handle incoming user datagrams that go to different processes on the same host.
A)flow control
B)multiplexing
C)demultiplexing
D)none of the above
24

TCP is a __________protocol.
A)stream-oriented
B)message-oriented
C)block-oriented
D)none of the above
25

TCP allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes.
A)message; message
B)stream; stream
C)block; block
D)none of the above
26

Because the sending and the receiving processes may not write or read data at the same speed, TCP ________.
A)speeds up the slower process
B)slows down the faster process
C)uses buffers
D)none of the above
27

TCP groups a number of bytes together into a packet called a ___________.
A)user datagram
B)segment
C)datagram
D)none of the above
28

TCP is a ___________ protocol.
A)connection-oriented
B)connectionless
C)both a and b
D)none of the above
29

TCP is a(n) _______ transport protocol.
A)unreliable
B)best-effort delivery
C)reliable
D)none of the above
30

TCP uses _________________ to check the safe and sound arrival of data.
A)an acknowledgment mechanism
B)out-of-band signalling
C)the services of another protocol
D)none of the above
31

The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________.
A)0
B)1
C)randomly generated number
D)none of the above
32

TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.
A)first
B)last
C)middle
D)none of the above
33

Communication in TCP is ___________.
A)simplex
B)half-duplex
C)full-duplex
D)none of the above
34

The value of the acknowledgment field in a segment defines the number of the ______byte a party expects to receive.
A)first
B)last
C)next
D)none of the above
35

The acknowledgment number is ________.
A)independent
B)randomly generated
C)cumulative
D)none of the above
36

The value of the window size is determined by _________.
A)the sender
B)the receiver
C)both the sender and receiver
D)none of the above
37

The inclusion of the checksum in the TCP segment is ________.
A)optional
B)mandatory
C)at the discretion of the application program
D)none of the above
38

A TCP segment is encapsulated in __________.
A)an IP datagram
B)an Ethernet frame
C)a UDP user datagram
D)none of the above
39

Connection establishment in TCP is called __________ handshaking.
A)two-way
B)four-way
C)one-way
D)none of the above
40

A SYN segment cannot carry data; it consumes _____ sequence number(s).
A)no
B)one
C)two
D)none of the above
41

A SYN + ACK segment cannot carry data; it consumes _____ sequence number(s).
A)no
B)three
C)two
D)none of the above
42

An ACK segment, if carrying no data, consumes ______ sequence number(s).
A)no
B)one
C)two
D)none of the above
43

The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.
A)ACK flooding
B)FIN flooding
C)SYN flooding
D)none of the above
44

The SYN flooding attack belongs to a group of security attacks known as a _____ attack.
A)denial of service
B)replay
C)man-in-the middle
D)none of the above
45

The FIN segment consumes ____ sequence numbers if it does not carry data.
A)two
B)three
C)no
D)none of the above
46

The FIN + ACK segment consumes _____ sequence number(s) if it does not carry data.
A)two
B)three
C)one
D)none of the above
47

In TCP, one end can stop sending data while still receiving data. This is called a ______.
A)half-close
B)half-open
C)one-way termination
D)none of the above
48

A(n) _________ machine is a machine that goes through a limited number of states.
A)infinite state
B)finite state
C)both a and b
D)none of the above
49

__________ control regulates the amount of data a source can send before receiving an acknowledgment from the destination.
A)Error
B)Flow
C)Congestion
D)none of the above
50

To accomplish flow control, TCP uses a ___________ window protocol.
A)limited-size
B)sliding
C)fixed-size
D)none of the above
51

TCP sliding windows are __________ oriented.
A)packet
B)segment
C)byte
D)none of the above
52

ACK segments consume _______ sequence number(s) and _______ acknowledged.
A)no; are not
B)one; are not
C)no; are
D)none of the above
53

TCP delivers _______ out-of-order segments to the process.
A)all
B)no
C)some
D)none of the above
54

IP is responsible for _______ communication while TCP is responsible for _______ communication.
A)host-to-host; process-to-process
B)process-to-process; host-to-host
C)process-to-process; network-to-network
D)none of the above
55

If a segment carries data along with an acknowledgment, this is called _______.
A)backpacking
B)piggybacking
C)piggypacking
D)none of the above
56

Multiply the header length field by _______ to find the total number of bytes in the TCP header.
A)2
B)4
C)6
D)none of the above
57

Urgent data requires the urgent pointer field as well as the URG bit in the _______ field.
A)control
B)offset
C)sequence number
D)none of the above
58

The options field of the TCP header ranges from 0 to _______ bytes.
A)10
B)20
C)40
D)none of the above
59

If the ACK value is 200, then byte _______ has been received successfully.
A)199
B)200
C)201
D)none of the above
60

Stream Control Transmission Protocol (SCTP) is a new _____________protocol.
A)reliable, character-oriented
B)reliable, message-oriented
C)unreliable, message-oriented
D)none of the above
61

SCTP allows __________ service in each association.
A)single stream
B)multistream
C)double stream
D)none of the above
62

SCTP association allows _____________ for each end.
A)only one IP address
B)multiple IP addresses
C)only two IP address
D)none of the above
63

In SCTP, a data chunk is numbered using ________.
A)a TSN
B)an SI
C)an SSN
D)none of the above
64

To distinguish between different streams, SCTP uses ___________.
A)a TSN
B)an SI
C)an SSN
D)none of the above
65

To distinguish between different data chunks belonging to the same stream, SCTP uses ___________.
A)TSNs
B)SIs
C)SSNs
D)none of the above
66

TCP has ____________; SCTP has ____________.
A)packets; segments
B)segments; packets
C)segments; frames
D)none of the above
67

The control information in SCTP is included in the ________.
A)header control field
B)control chunks
C)data chunks
D)none of the above
68

An SCTP packet can carry __________.
A)only one data chunk
B)several data chunks
C)no data chunks
D)none of the above
69

In SCTP, the acknowledgment number and window size are part of each ________.
A)data chunk
B)control chunk
C)a or b
D)none of the above
70

There is no need for a header length field in SCTP because ________________.
A)there are no options in the general header
B)the size of the header is fixed
C)both a and b
D)none of the above
71

The checksum in SCTP is ________ bits.
A)16
B)32
C)64
D)none of the above
72

The association identifier in SCTP is __________________.
A)a unique verification tag
B)a combination of logical and port addresses
C)either a or b
D)none of the above
73

In SCTP, control information and data information are carried in _______ chunks.
A)the same chunk
B)different chunks
C)either a or b
D)none of the above
74

In SCTP, acknowledgment numbers are used to acknowledge _____________.
A)both data chunks and control chunks
B)only control chunks
C)only data chunks
D)none of the above
75

In an SCTP packet, control chunks come ___________ data chunks.
A)after
B)before
C)a or b
D)none of the above
76

In SCTP, ___________ can be carried in a packet that carries an INIT chunk.
A)only data chunks
B)only control chunks
C)no other chunk
D)none of the above
77

A connection in SCTP is called an ____________.
A)negotiation
B)association
C)transmission
D)none of the above







forouzan4Online Learning Center

Home > Chapter 23 > Multiple Choice Quiz