Sie sind auf Seite 1von 10

Chapter 5 - Transport Layer Protocols Exam

Question1
Marks: 1

Dynamic ports are used as ____ for specific communications while they are underway. Choose one answer.
a. temporary ports

b. core services c. byte streams d. lost segments

Correct Marks for this submission: 1/1.

Question2
Marks: 1

TCP supports ____ - the process of sending numerous data packets in sequence without waiting for an intervening acknowledgment. Choose one answer.
a. retries

b. sequence number tracking c. windowing d. error recovery

Correct Marks for this submission: 1/1.

Question3
Marks: 1

By default, Windows 2000 and Windows XP support up to ____ ports. Choose one answer.

a. 200

b. 500 c. 2000 d. 5000

Correct Marks for this submission: 1/1.

Question4
Marks: 1

____ is a simple protocol that is used by applications that contain their own connection-oriented timeout values and retry counters, similar to those provided by TCP. Choose one answer.
a. UDP

b. DoS c. RTO d. MSS

Correct Marks for this submission: 1/1.

Question5
Marks: 1

When an out-of-order data segment is received, the Fast Retransmit process requires the receiver to immediately send ____. Choose one answer.
a. duplicate ACKs

b. core services c. byte streams

d. lost segments

Correct Marks for this submission: 1/1.

Question6
Marks: 1

____ is caused when enough data is sent to a TCP host to fill its receiver buffer, thereby putting the receiver in a zero-window state. Choose one answer.
a. DoS

b. Silly Window Syndrome c. Time Wait delay d. Retransmission timeout

Correct Marks for this submission: 1/1.

Question7
Marks: 1

The Fast Recovery process dictates that when a host receives three duplicate ACKs, it must immediately start retransmitting the ____, without waiting for the retransmission timer to expire. Choose one answer.
a. duplicate ACKs

b. core services c. byte streams d. lost segments

Correct Marks for this submission: 1/1.

Question8
Marks: 1

The TCP connection termination process requires ____ packets. Choose one answer.
a. 1

b. 2 c. 3 d. 4

Correct Marks for this submission: 1/1.

Question9
Marks: 1

____ is detected whenever three or more duplicate ACK packets (known as a triple-ACK) or timeout events occur, and timeout events are considered more serious than duplicate acknowledgements. Choose one answer.
a. Logical connection

b. Congestion c. Retransmission d. Windowing

Correct Marks for this submission: 1/1.

Question10
Marks: 1

____ provide the simplest kind of transport services because they simply package messages, taken as is from the TCP/IP Application layer, into datagrams. Choose one answer.
a. Core services

b. Port numbers

c. Logical connections d. Connectionless protocols

Correct Marks for this submission: 1/1.

Question11
Marks: 1

Once the TCP connection is established, a ____ can maintain the connection when there is no data sent across the wire. Choose one answer.
a. watchdog process

b. core service c. keep-alive process d. handshake process

Correct Marks for this submission: 1/1.

Question12
Marks: 1

UDP runs up to ____ percent faster than TCP, under some conditions, because it does next to nothing! Choose one answer.
a. 20

b. 30 c. 40 d. 50

Correct Marks for this submission: 1/1.

Question13

Marks: 1

Overloading a receiver occurs when the number of data bytes is greater than the ____. Choose one answer.
a. advertised window

b. bandwidth c. sliding window d. ephemeral port

Correct Marks for this submission: 1/1.

Question14
Marks: 1

UDP is the only connectionless TCP/IP protocol at the Transport layer. Answer: True False

Correct Marks for this submission: 1/1.

Question15
Marks: 1

TCP supports a ____ mechanism, which is a management method for data transmission used to determine the amount of unacknowledged data that can go out on the wire from any sender. Choose one answer.
a. congestion

b. retry c. sliding window d. watchdog

Correct Marks for this submission: 1/1.

Question16
Marks: 1

The ____ field value defines the destination application or process that uses the IP and UDP headers. Choose one answer.
a. Checksum

b. Dynamic Port Number c. Length d. Destination Port Number

Correct Marks for this submission: 1/1.

Question17
Marks: 1

The initial sequence number used in a TCP connection is defined by the ____ and, for security purposes, should be randomly assigned. Choose one answer.
a. host

b. packet c. port d. segment

Correct Marks for this submission: 1/1.

Question18
Marks: 1

____ is the overloading of the network or a receiver. Choose one answer.


a. Sequence number tracking

b. Buffering c. Congestion d. Windowing

Correct Marks for this submission: 1/1.

Question19
Marks: 1

TCP half-open connections occur when the handshake process does not end successfully with a final ACK. Answer: True False

Correct Marks for this submission: 1/1.

Question20
Marks: 1

TCP keep-alives are enabled by default on Windows 2000, Windows Server 2003, and Windows XP, although any application may disable TCP keep-alives, if desired by its programmer. Answer: True False

Correct Marks for this submission: 1/1.

Question21
Marks: 1

TCP hosts create a virtual connection with each other using a ____. Choose one answer.
a. sliding window

b. handshake process c. teardown sequence

d. retry mechanism

Correct Marks for this submission: 1/1.

Question22
Marks: 1

When the Protocol field of an IP header contains the value 17 (0x11), the UDP header follows the IP header. Answer: True False

Correct Marks for this submission: 1/1.

Question23
Marks: 1

UDP offers connection-oriented services with sequencing, error recovery, and a sliding window mechanism. Answer: True False

Correct Marks for this submission: 1/1.

Question24
Marks: 1

The ____ flag is used to indicate that the host completed a transaction. Choose one answer.
a. Reset

b. FIN c. SYN d. URG

Correct Marks for this submission: 1/1.

Question25
Marks: 1

The ____ field defines the length of the packet from the UDP header to the end of valid data(not including any data link padding, if padding is required). Choose one answer.
a. Checksum

b. Dynamic Port Number c. Length d. Destination Port Number

Correct Marks for this submission: 1/1.

Question26
Marks: 1

The ____ process guarantees that packets are ordered properly and protects against missing segments. Choose one answer.
a. watchdog

b. keep-alive c. handshake d. sequence and acknowledgement

Correct Marks for this submission: 1/1.


Top of Form Bottom of Form