Documente Academic
Documente Profesional
Documente Cultură
7. An ACK segment, if carrying no data, 10. The bytes of data being transferred in each
consumes ______ sequence number(s). connection are numbered by TCP. The
numbering starts with a __________________.
A) no
A) 0
B) one
B) 1
C) two
C) randomly generated number
D) none of the above
D) none of the above
View Answer:
Answer: Option A View Answer:
Answer: Option C
Solution:
Solution:
8. The association identifier in SCTP is
__________________. 11. In the sending computer, UDP receives a
data unit from the _______ layer.
A) a unique verification tag
A) application
B) a combination of logical and port addresses
B) transport
C) either a or b
C) IP
D) none of the above
D) none of the above
View Answer:
Answer: Option A View Answer:
Answer: Option A
Solution:
Solution:
9. In SCTP, a data chunk is numbered using
________. 12. SCTP allows __________ service in each
association.
A) a TSN
A) single stream
B) an SI
B) multistream
C) an SSN
C) double stream
D) none of the above
D) none of the above
View Answer:
Answer: Option A View Answer:
Answer: Option B View Answer:
Answer: Option C
Solution:
Solution:
13. TCP is a ___________ protocol.
16. SCTP association allows _____________ for each
A) connection-oriented end.
B) multiplexing A) port
C) demultiplexing B) application
Solution: Solution:
19. TCP is a(n) _______ transport protocol. 22. Which of the following does UDP guarantee?
C) reliable C) either a or b
Solution: Solution:
20. TCP delivers _______ out-of-order segments 23. TCP allows the sending process to deliver
to the process. data as a _______of bytes and allows the receiving
process to obtain data as a _________ of bytes.
A) all
A) message; message
B) no
B) stream; stream
C) some
C) block; block
D) none of the above
D) none of the above
View Answer:
Answer: Option B View Answer:
Answer: Option B
Solution:
Solution:
21. Multiply the header length field by _______ to
find the total number of bytes in the TCP header. 24. To distinguish between different data chunks
belonging to the same stream, SCTP uses
A) 2 ___________.
B) 4 A) TSNs
C) 6 B) SIs
A) node-to-node A) 8
B) process-to-process B) 16
C) host-to-host C) 32
Solution: Solution:
27. The combination of an IP address and a port 30. The FIN segment consumes ____ sequence
number is called a ____________. numbers if it does not carry data.
Solution: Solution:
31. The inclusion of the checksum in the TCP 34. ACK segments consume _______ sequence
segment is ________. number(s) and _______ acknowledged.
Solution: Solution:
32. The FIN + ACK segment consumes _____ 35. In SCTP, acknowledgment numbers are used
sequence number(s) if it does not carry data. to acknowledge _____________.
Solution: Solution:
33. TCP uses _________________ to check the safe 36. The source port address on the UDP user
and sound arrival of data. datagram header defines _______.
Solution: Solution:
43. A SYN + ACK segment cannot carry data; it 46. Connection establishment in TCP is called
consumes _____ sequence number(s). __________ handshaking.
A) no A) two-way
B) three B) four-way
C) two C) one-way
Solution: Solution:
44. TCP groups a number of bytes together into 47. UDP packets are encapsulated in ___________.
a packet called a ___________.
A) an Ethernet frame
A) user datagram
B) an TCP segment
B) segment
C) an IP datagram
C) datagram
D) none of the above
D) none of the above
View Answer:
View Answer: Answer: Option C
Answer: Option B
Solution:
Solution:
48. The checksum in SCTP is ________ bits.
45. There is no need for a header length field in
SCTP because ________________. A) 16
Solution: Solution:
49. TCP sliding windows are __________ oriented. 52. A TCP segment is encapsulated in __________.
A) packet A) an IP datagram
Solution: Solution:
A) 199 B) segments
B) 200 C) frames
D) none of the above D) none of the above
Solution: Solution:
55. In the sending computer, UDP sends a data 58. One of the responsibilities of the transport
unit to the _______ layer. layer protocol is to create a ______
communication.
A) application
A) host-to-host
B) transport
B) process-to-process
C) IP
C) node-to-node
D) none of the above
D) none of the above
View Answer:
Answer: Option C View Answer:
Answer: Option B
Solution:
Solution:
56. In SCTP, control information and data
information are carried in _______ chunks. 59. The control information in SCTP is included
in the ________.
A) the same chunk
A) header control field
B) different chunks
B) control chunks
C) either a or b
C) data chunks
D) none of the above
D) none of the above
View Answer:
Answer: Option B View Answer:
Answer: Option B
Solution:
Solution:
57. TCP has ____________; SCTP has ____________.
60. Communication in TCP is ___________.
A) packets; segments
A) simplex
B) segments; packets
B) half-duplex
C) segments; frames
C) full-duplex
D) none of the above D) none of the above
Solution: Solution:
61. Stream Control Transmission Protocol (SCTP) 64. IP is responsible for _______ communication
is a new _____________protocol. while TCP is responsible for _______
communication.
A) reliable, character-oriented
A) host-to-host; process-to-process
B) reliable, message-oriented
B) process-to-process; host-to-host
C) unreliable, message-oriented
C) process-to-process; network-to-network
D) none of the above
D) none of the above
View Answer:
Answer: Option B View Answer:
Answer: Option A
Solution:
Solution:
62. To distinguish between different streams,
SCTP uses ___________. 65. The connection establishment procedure in
TCP is susceptible to a serious security problem
A) a TSN called the _________ attack.
B) an SI A) ACK flooding
Solution: Solution:
67. In SCTP, ___________ can be carried in a packet 70. When the IP layer of a receiving host receives
that carries an INIT chunk. a datagram, _______.
Solution: Solution:
68. UDP packets have a fixed-size header of 71. The value of the acknowledgment field in a
_______ bytes. segment defines the number of the ______byte a
party expects to receive.
A) 16
A) first
B) 8
B) last
C) 40
C) next
D) none of the above
D) none of the above
View Answer:
Answer: Option B View Answer:
Answer: Option C
Solution:
Solution:
69. The SYN flooding attack belongs to a group
of security attacks known as a _____ attack. 72. A SYN segment cannot carry data; it
consumes _____ sequence number(s).
A) denial of service
A) no
B) replay
B) one A) client-server
C) two B) client-client