Escolar Documentos
Profissional Documentos
Cultura Documentos
Question1
Marks: 1
Dynamic ports are used as ____ for specific communications while they are underway. Choose one answer.
a. temporary ports
Question2
Marks: 1
TCP supports ____ - the process of sending numerous data packets in sequence without waiting for an intervening acknowledgment. Choose one answer.
a. retries
Question3
Marks: 1
By default, Windows 2000 and Windows XP support up to ____ ports. Choose one answer.
a. 200
Question4
Marks: 1
____ is a simple protocol that is used by applications that contain their own connection-oriented timeout values and retry counters, similar to those provided by TCP. Choose one answer.
a. UDP
Question5
Marks: 1
When an out-of-order data segment is received, the Fast Retransmit process requires the receiver to immediately send ____. Choose one answer.
a. duplicate ACKs
d. lost segments
Question6
Marks: 1
____ is caused when enough data is sent to a TCP host to fill its receiver buffer, thereby putting the receiver in a zero-window state. Choose one answer.
a. DoS
Question7
Marks: 1
The Fast Recovery process dictates that when a host receives three duplicate ACKs, it must immediately start retransmitting the ____, without waiting for the retransmission timer to expire. Choose one answer.
a. duplicate ACKs
Question8
Marks: 1
The TCP connection termination process requires ____ packets. Choose one answer.
a. 1
b. 2 c. 3 d. 4
Question9
Marks: 1
____ is detected whenever three or more duplicate ACK packets (known as a triple-ACK) or timeout events occur, and timeout events are considered more serious than duplicate acknowledgements. Choose one answer.
a. Logical connection
Question10
Marks: 1
____ provide the simplest kind of transport services because they simply package messages, taken as is from the TCP/IP Application layer, into datagrams. Choose one answer.
a. Core services
b. Port numbers
Question11
Marks: 1
Once the TCP connection is established, a ____ can maintain the connection when there is no data sent across the wire. Choose one answer.
a. watchdog process
Question12
Marks: 1
UDP runs up to ____ percent faster than TCP, under some conditions, because it does next to nothing! Choose one answer.
a. 20
b. 30 c. 40 d. 50
Question13
Marks: 1
Overloading a receiver occurs when the number of data bytes is greater than the ____. Choose one answer.
a. advertised window
Question14
Marks: 1
UDP is the only connectionless TCP/IP protocol at the Transport layer. Answer: True False
Question15
Marks: 1
TCP supports a ____ mechanism, which is a management method for data transmission used to determine the amount of unacknowledged data that can go out on the wire from any sender. Choose one answer.
a. congestion
Question16
Marks: 1
The ____ field value defines the destination application or process that uses the IP and UDP headers. Choose one answer.
a. Checksum
Question17
Marks: 1
The initial sequence number used in a TCP connection is defined by the ____ and, for security purposes, should be randomly assigned. Choose one answer.
a. host
Question18
Marks: 1
Question19
Marks: 1
TCP half-open connections occur when the handshake process does not end successfully with a final ACK. Answer: True False
Question20
Marks: 1
TCP keep-alives are enabled by default on Windows 2000, Windows Server 2003, and Windows XP, although any application may disable TCP keep-alives, if desired by its programmer. Answer: True False
Question21
Marks: 1
TCP hosts create a virtual connection with each other using a ____. Choose one answer.
a. sliding window
d. retry mechanism
Question22
Marks: 1
When the Protocol field of an IP header contains the value 17 (0x11), the UDP header follows the IP header. Answer: True False
Question23
Marks: 1
UDP offers connection-oriented services with sequencing, error recovery, and a sliding window mechanism. Answer: True False
Question24
Marks: 1
The ____ flag is used to indicate that the host completed a transaction. Choose one answer.
a. Reset
Question25
Marks: 1
The ____ field defines the length of the packet from the UDP header to the end of valid data(not including any data link padding, if padding is required). Choose one answer.
a. Checksum
Question26
Marks: 1
The ____ process guarantees that packets are ordered properly and protects against missing segments. Choose one answer.
a. watchdog