|
1 | | TCP is a __________protocol. |
| | A) | stream-oriented |
| | B) | message-oriented |
| | C) | block-oriented |
| | D) | None of the choices are correct |
|
|
2 | | TCP groups a number of bytes together into a packet called a ___________. |
| | A) | user datagram |
| | B) | segment |
| | C) | datagram |
| | D) | None of the choices are correct |
|
|
3 | | TCP is a(n) ___________ protocol. |
| | A) | connection-oriented |
| | B) | connectionless |
| | C) | unreliable |
| | D) | None of the choices are correct |
|
|
4 | | TCP is a(n) _______ transport protocol. |
| | A) | unreliable |
| | B) | best-effort delivery |
| | C) | reliable |
| | D) | None of the choices are correct |
|
|
5 | | TCP uses _________________ to check the safe and sound arrival of data. |
| | A) | an acknowledgment mechanism |
| | B) | out-of-band signalling |
| | C) | the services of another protocol |
| | D) | None of the choices are correct |
|
|
6 | | The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________. |
| | A) | 0 |
| | B) | 1 |
| | C) | randomly generated number |
| | D) | None of the choices are correct |
|
|
7 | | TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment. |
| | A) | first |
| | B) | last |
| | C) | middle |
| | D) | None of the choices are correct |
|
|
8 | | Communication in TCP is ___________. |
| | A) | simplex |
| | B) | half-duplex |
| | C) | full-duplex |
| | D) | None of the choices are correct |
|
|
9 | | The value of the acknowledgment field in a segment defines the sequence number related to the ______byte a party expects to receive. |
| | A) | first |
| | B) | last |
| | C) | next |
| | D) | None of the choices are correct |
|
|
10 | | The inclusion of the checksum in the TCP segment is ________. |
| | A) | optional |
| | B) | mandatory |
| | C) | at the discretion of the application program |
| | D) | None of the choices are correct |
|
|
11 | | A TCP segment is encapsulated in __________. |
| | A) | an IP datagram |
| | B) | an Ethernet frame |
| | C) | a UDP user datagram |
| | D) | None of the choices are correct |
|
|
12 | | A SYN segment cannot carry data; it consumes _____ sequence number(s). |
| | A) | no |
| | B) | one |
| | C) | two |
| | D) | None of the choices are correct |
|
|
13 | | A SYN + ACK segment cannot carry data; it consumes _____ sequence numbers. |
| | A) | no |
| | B) | three |
| | C) | two |
| | D) | None of the choices are correct |
|
|
14 | | An ACK segment, if carrying no data, consumes ______ sequence number(s). |
| | A) | no |
| | B) | one |
| | C) | two |
| | D) | None of the choices are correct |
|
|
15 | | The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack. |
| | A) | ACK flooding |
| | B) | FIN flooding |
| | C) | SYN flooding |
| | D) | None of the choices are correct |
|
|
16 | | The SYN flooding attack belongs to a group of security attacks known as a _____ attack. |
| | A) | denial of service |
| | B) | replay |
| | C) | man-in-the middle |
| | D) | None of the choices are correct |
|
|
17 | | The FIN segment consumes ____ sequence numbers if it does not carry data. |
| | A) | two |
| | B) | three |
| | C) | no |
| | D) | None of the choices are correct |
|
|
18 | | The FIN + ACK segment consumes _____ sequence number(s) if it does not carry data. |
| | A) | two |
| | B) | three |
| | C) | one |
| | D) | None of the choices are correct |
|
|
19 | | In TCP, one end can stop sending data while still receiving data. This is called a ______. |
| | A) | half-close |
| | B) | half-open |
| | C) | one-way termination |
| | D) | None of the choices are correct |
|
|
20 | | A(n) _________ machine is a machine that goes through a limited number of states. |
| | A) | infinite state |
| | B) | finite state |
| | C) | both a and b |
| | D) | None of the choices are correct |
|
|
21 | | A common value for MSL is between___ seconds and ___ minute(s). |
| | A) | 30: 2 |
| | B) | 30; 1 |
| | C) | 50; 1 |
| | D) | None of the choices are correct |
|
|
22 | | To accomplish flow control, TCP uses a ___________ window protocol. |
| | A) | limited-size |
| | B) | sliding |
| | C) | fixed-size |
| | D) | None of the choices are correct |
|
|
23 | | TCP sliding windows are __________ oriented. |
| | A) | packet |
| | B) | segment |
| | C) | byte |
| | D) | None of the choices are correct |
|
|
24 | | In TCP, the size of the send window is the ________ of rwnd and cwnd. |
| | A) | maximum |
| | B) | sum of |
| | C) | minimum |
| | D) | None of the choices are correct |
|
|
25 | | In TCP, the window should not be _________. |
| | A) | opened |
| | B) | closed |
| | C) | shrunk |
| | D) | None of the choices are correct |
|
|
26 | | In TCP, the receiver can temporarily shut down the window; the sender, however, can always send a segment of _____ byte(s) after the window is shut down. |
| | A) | ten |
| | B) | zero |
| | C) | one |
| | D) | None of the choices are correct |
|
|
27 | | A serious problem can arise in the sliding window operation when either the sending application program creates data slowly or the receiving application program consumes data slowly, or both. This problem is called the ______. |
| | A) | silly window syndrome |
| | B) | unexpected syndrome |
| | C) | window bug |
| | D) | None of the choices are correct |
|
|
28 | | Nagle's algorithm can solve the silly window syndrome created by the _________. |
| | A) | sender |
| | B) | receiver |
| | C) | both sender and receiver |
| | D) | None of the choices are correct |
|
|
29 | | Clark's solution can solve the silly window syndrome created by the _________. |
| | A) | sender |
| | B) | receiver |
| | C) | both sender and receiver |
| | D) | None of the choices are correct |
|
|
30 | | Delayed acknowledgment can solve the silly window syndrome created by the _________. |
| | A) | sender |
| | B) | receiver |
| | C) | both sender and receiver |
| | D) | None of the choices are correct |
|
|
31 | | ACK segments consume _______ sequence number(s) and _______ acknowledged. |
| | A) | no; are not |
| | B) | one; are not |
| | C) | no; are |
| | D) | None of the choices are correct |
|
|
32 | | In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ________ duplicate ACK segments have arrived. |
| | A) | one |
| | B) | two |
| | C) | three |
| | D) | None of the choices are correct |
|
|
33 | | In TCP, ________ retransmission timer is set for an ACK segment. |
| | A) | one |
| | B) | a previous |
| | C) | no |
| | D) | None of the choices are correct |
|
|
34 | | Lost acknowledgments may create a _______ if they are not handled properly. |
| | A) | livelock |
| | B) | deadlock |
| | C) | retransmission |
| | D) | None of the choices are correct |
|
|
35 | | In the ________ algorithm the size of the congestion window increases exponentially until it reaches a threshold. |
| | A) | congestion avoidance |
| | B) | congestion detection |
| | C) | slow start |
| | D) | None of the choices are correct |
|
|
36 | | In the __________ algorithm the size of the congestion window increases additively until congestion is detected. |
| | A) | congestion avoidance |
| | B) | congestion detection |
| | C) | slow start |
| | D) | None of the choices are correct |
|
|
37 | | In the congestion detection algorithm, if detection is by a time-out, a new _______ phase starts. |
| | A) | slow start |
| | B) | congestion avoidance |
| | C) | congestion detection |
| | D) | None of the choices are correct |
|
|
38 | | In the congestion detection algorithm, if detection is by three ACKs, a new _______ phase starts. |
| | A) | slow start |
| | B) | congestion avoidance |
| | C) | congestion detection |
| | D) | None of the choices are correct |
|
|
39 | | In TCP, there can be ______ RTT measurement(s) in progress at any time. |
| | A) | two |
| | B) | only one |
| | C) | several |
| | D) | None of the choices are correct |
|
|
40 | | The value of the window scale factor can be determined during __________. |
| | A) | data transmission |
| | B) | connection establishment |
| | C) | connection termination |
| | D) | None of the choices are correct |
|
|
41 | | Multiply the header length field by _______ to find the total number of bytes in the TCP header. |
| | A) | 2 |
| | B) | 4 |
| | C) | 6 |
| | D) | None of the choices are correct |
|
|
42 | | Urgent data requires the urgent pointer field as well as the URG bit in the _______ field. |
| | A) | control |
| | B) | offset |
| | C) | sequence number |
| | D) | None of the choices are correct |
|
|
43 | | The options field of the TCP header ranges from 0 to _______ bytes. |
| | A) | 10 |
| | B) | 20 |
| | C) | 40 |
| | D) | None of the choices are correct |
|
|
44 | | Which option defines the maximum number of bytes in a TCP segment? |
| | A) | maximum segment size |
| | B) | window scale factor |
| | C) | timestamp |
| | D) | None of the choices are correct |
|
|
45 | | If the ACK value is 200, then byte _______ has been received successfully. |
| | A) | 199 |
| | B) | 200 |
| | C) | 201 |
| | D) | None of the choices are correct |
|
|
46 | | The _______ timer prevents a long idle connection between two TCPs. |
| | A) | retransmission |
| | B) | persistence |
| | C) | keepalive |
| | D) | None of the choices are correct |
|
|
47 | | The _______ timer is needed to handle the zero window-size advertisement. |
| | A) | retransmission |
| | B) | persistence |
| | C) | keepalive |
| | D) | None of the choices are correct |
|
|
48 | | Karn's algorithm is used in calculations by the _______ timer. |
| | A) | retransmission |
| | B) | persistence |
| | C) | keepalive |
| | D) | None of the choices are correct |
|
|
49 | | A special segment called a probe is sent by a sending TCP when the _______ timer goes off. |
| | A) | transmission |
| | B) | persistence |
| | C) | keepalive |
| | D) | None of the choices are correct |
|