Sunteți pe pagina 1din 13

Forouzan: MCQ in Process-to-Process Delivery: Solution:

UDP, TCP, and SCTP


4. In TCP, one end can stop sending data while
still receiving data. This is called a ______.
1. Urgent data requires the urgent pointer field
as well as the URG bit in the _______ field.
A) half-close
A) control
B) half-open
B) offset
C) one-way termination
C) sequence number
D) none of the above
D) none of the above
View Answer:
Answer: Option A
View Answer:
Answer: Option A
Solution:
Solution:
5. In SCTP, the acknowledgment number and
window size are part of each ________.
2. To accomplish flow control, TCP uses a
___________ window protocol.
A) data chunk
A) limited-size
B) control chunk
B) sliding
C) a or b
C) fixed-size
D) none of the above
D) none of the above
View Answer:
Answer: Option B
View Answer:
Answer: Option B
Solution:
Solution:
6. A connection in SCTP is called an ____________.
3. UDP and TCP are both _______ layer protocols.
A) negotiation
A) data link
B) association
B) network
C) transmission
C) transport
D) none of the above
D) none of the above
View Answer:
Answer: Option B
View Answer:
Answer: Option C
Solution: Solution:

7. An ACK segment, if carrying no data, 10. The bytes of data being transferred in each
consumes ______ sequence number(s). connection are numbered by TCP. The
numbering starts with a __________________.
A) no
A) 0
B) one
B) 1
C) two
C) randomly generated number
D) none of the above
D) none of the above
View Answer:
Answer: Option A View Answer:
Answer: Option C
Solution:
Solution:
8. The association identifier in SCTP is
__________________. 11. In the sending computer, UDP receives a
data unit from the _______ layer.
A) a unique verification tag
A) application
B) a combination of logical and port addresses
B) transport
C) either a or b
C) IP
D) none of the above
D) none of the above
View Answer:
Answer: Option A View Answer:
Answer: Option A
Solution:
Solution:
9. In SCTP, a data chunk is numbered using
________. 12. SCTP allows __________ service in each
association.
A) a TSN
A) single stream
B) an SI
B) multistream
C) an SSN
C) double stream
D) none of the above
D) none of the above
View Answer:
Answer: Option A View Answer:
Answer: Option B View Answer:
Answer: Option C
Solution:
Solution:
13. TCP is a ___________ protocol.
16. SCTP association allows _____________ for each
A) connection-oriented end.

B) connectionless A) only one IP address

C) both a and b B) multiple IP addresses

D) none of the above C) only two IP address

View Answer: D) none of the above


Answer: Option A
View Answer:
Solution: Answer: Option B

14. UDP uses ________ to handle outgoing user Solution:


datagrams from multiple processes on one host.
17. UDP needs the _______ address to deliver the
A) flow control user datagram to the correct application process.

B) multiplexing A) port

C) demultiplexing B) application

D) none of the above C) internet

View Answer: D) none of the above


Answer: Option B
View Answer:
Solution: Answer: Option A

15. Because the sending and the receiving Solution:


processes may not write or read data at the
same speed, TCP ________. 18. In an SCTP packet, control chunks come
___________ data chunks.
A) speeds up the slower process
A) after
B) slows down the faster process
B) before
C) uses buffers
C) a or b
D) none of the above
D) none of the above
View Answer: View Answer:
Answer: Option B Answer: Option B

Solution: Solution:

19. TCP is a(n) _______ transport protocol. 22. Which of the following does UDP guarantee?

A) unreliable A) flow control

B) best-effort delivery B) connection-oriented delivery

C) reliable C) either a or b

D) none of the above D) none of the above

View Answer: View Answer:


Answer: Option C Answer: Option D

Solution: Solution:

20. TCP delivers _______ out-of-order segments 23. TCP allows the sending process to deliver
to the process. data as a _______of bytes and allows the receiving
process to obtain data as a _________ of bytes.
A) all
A) message; message
B) no
B) stream; stream
C) some
C) block; block
D) none of the above
D) none of the above
View Answer:
Answer: Option B View Answer:
Answer: Option B
Solution:
Solution:
21. Multiply the header length field by _______ to
find the total number of bytes in the TCP header. 24. To distinguish between different data chunks
belonging to the same stream, SCTP uses
A) 2 ___________.

B) 4 A) TSNs

C) 6 B) SIs

D) none of the above C) SSNs


D) none of the above C) socket address

View Answer: D) none of the above


Answer: Option C
View Answer:
Solution: Answer: Option C

25. The ports ranging from 49,152 to 65,535 can Solution:


be used as temporary or private port numbers.
They are called the ________ ports. 28. The options field of the TCP header ranges
from 0 to _______ bytes.
A) well-known
A) 10
B) registered
B) 20
C) dynamic
C) 40
D) none of the above
D) none of the above
View Answer:
Answer: Option C View Answer:
Answer: Option C
Solution:
Solution:
26. UDP does not add anything to the services of
IP except for providing _______ communication. 29. A port address in UDP is _______bits long.

A) node-to-node A) 8

B) process-to-process B) 16

C) host-to-host C) 32

D) none of the above D) none of the above

View Answer: View Answer:


Answer: Option B Answer: Option B

Solution: Solution:

27. The combination of an IP address and a port 30. The FIN segment consumes ____ sequence
number is called a ____________. numbers if it does not carry data.

A) transport address A) two

B) network address B) three


C) no C) the services of another protocol

D) none of the above D) none of the above

View Answer: View Answer:


Answer: Option D Answer: Option A

Solution: Solution:

31. The inclusion of the checksum in the TCP 34. ACK segments consume _______ sequence
segment is ________. number(s) and _______ acknowledged.

A) optional A) no; are not

B) mandatory B) one; are not

C) at the discretion of the application program C) no; are

D) none of the above D) none of the above

View Answer: View Answer:


Answer: Option B Answer: Option A

Solution: Solution:

32. The FIN + ACK segment consumes _____ 35. In SCTP, acknowledgment numbers are used
sequence number(s) if it does not carry data. to acknowledge _____________.

A) two A) both data chunks and control chunks

B) three B) only control chunks

C) one C) only data chunks

D) none of the above D) none of the above

View Answer: View Answer:


Answer: Option C Answer: Option C

Solution: Solution:

33. TCP uses _________________ to check the safe 36. The source port address on the UDP user
and sound arrival of data. datagram header defines _______.

A) an acknowledgment mechanism A) the sending computer

B) out-of-band signaling B) the receiving computer


C) the process running on the sending computer B) the receiver

D) none of the above C) both the sender and receiver

View Answer: D) none of the above


Answer: Option C
View Answer:
Solution: Answer: Option B

37. __________ control regulates the amount of Solution:


data a source can send before receiving an
acknowledgment from the destination. 40. TCP assigns a sequence number to each
segment that is being sent. The sequence
A) Error number for each segment is the number of the
_______ byte carried in that segment.
B) Flow
A) first
C) Congestion
B) last
D) none of the above
C) middle
View Answer:
Answer: Option B D) none of the above

Solution: View Answer:


Answer: Option A
38. To use the services of UDP, we need ________
socket addresses. Solution:

A) four 41. An SCTP packet can carry __________.

B) two A) only one data chunk

C) three B) several data chunks

D) none of the above C) no data chunks

View Answer: D) none of the above


Answer: Option B
View Answer:
Solution: Answer: Option B

39. The value of the window size is determined Solution:


by _________.
42. UDP is an acronym for _______.
A) the sender
A) User Delivery Protocol
B) User Datagram Procedure B) the size of the header is fixed

C) User Datagram Protocol C) both a and b

D) none of the above D) none of the above

View Answer: View Answer:


Answer: Option C Answer: Option C

Solution: Solution:

43. A SYN + ACK segment cannot carry data; it 46. Connection establishment in TCP is called
consumes _____ sequence number(s). __________ handshaking.

A) no A) two-way

B) three B) four-way

C) two C) one-way

D) none of the above D) none of the above

View Answer: View Answer:


Answer: Option D Answer: Option D

Solution: Solution:

44. TCP groups a number of bytes together into 47. UDP packets are encapsulated in ___________.
a packet called a ___________.
A) an Ethernet frame
A) user datagram
B) an TCP segment
B) segment
C) an IP datagram
C) datagram
D) none of the above
D) none of the above
View Answer:
View Answer: Answer: Option C
Answer: Option B
Solution:
Solution:
48. The checksum in SCTP is ________ bits.
45. There is no need for a header length field in
SCTP because ________________. A) 16

A) there are no options in the general header B) 32


C) 64 C) 201

D) none of the above D) none of the above

View Answer: View Answer:


Answer: Option B Answer: Option A

Solution: Solution:

49. TCP sliding windows are __________ oriented. 52. A TCP segment is encapsulated in __________.

A) packet A) an IP datagram

B) segment B) an Ethernet frame

C) byte C) a UDP user datagram

D) none of the above D) none of the above

View Answer: View Answer:


Answer: Option C Answer: Option A

Solution: Solution:

50. If a segment carries data along with an 53. TCP is a __________protocol.


acknowledgment, this is called _______.
A) stream-oriented
A) backpacking
B) message-oriented
B) piggybacking
C) block-oriented
C) piggypacking
D) none of the above
D) none of the above
View Answer:
View Answer: Answer: Option A
Answer: Option B
Solution:
Solution:
54. UDP packets are called __________.
51. If the ACK value is 200, then byte _______ has
been received successfully. A) user datagrams

A) 199 B) segments

B) 200 C) frames
D) none of the above D) none of the above

View Answer: View Answer:


Answer: Option A Answer: Option B

Solution: Solution:

55. In the sending computer, UDP sends a data 58. One of the responsibilities of the transport
unit to the _______ layer. layer protocol is to create a ______
communication.
A) application
A) host-to-host
B) transport
B) process-to-process
C) IP
C) node-to-node
D) none of the above
D) none of the above
View Answer:
Answer: Option C View Answer:
Answer: Option B
Solution:
Solution:
56. In SCTP, control information and data
information are carried in _______ chunks. 59. The control information in SCTP is included
in the ________.
A) the same chunk
A) header control field
B) different chunks
B) control chunks
C) either a or b
C) data chunks
D) none of the above
D) none of the above
View Answer:
Answer: Option B View Answer:
Answer: Option B
Solution:
Solution:
57. TCP has ____________; SCTP has ____________.
60. Communication in TCP is ___________.
A) packets; segments
A) simplex
B) segments; packets
B) half-duplex
C) segments; frames
C) full-duplex
D) none of the above D) none of the above

View Answer: View Answer:


Answer: Option C Answer: Option A

Solution: Solution:

61. Stream Control Transmission Protocol (SCTP) 64. IP is responsible for _______ communication
is a new _____________protocol. while TCP is responsible for _______
communication.
A) reliable, character-oriented
A) host-to-host; process-to-process
B) reliable, message-oriented
B) process-to-process; host-to-host
C) unreliable, message-oriented
C) process-to-process; network-to-network
D) none of the above
D) none of the above
View Answer:
Answer: Option B View Answer:
Answer: Option A
Solution:
Solution:
62. To distinguish between different streams,
SCTP uses ___________. 65. The connection establishment procedure in
TCP is susceptible to a serious security problem
A) a TSN called the _________ attack.

B) an SI A) ACK flooding

C) an SSN B) FIN flooding

D) none of the above C) SYN flooding

View Answer: D) none of the above


Answer: Option B
View Answer:
Solution: Answer: Option C

63. Which of the following functions does UDP Solution:


perform?
66. UDP is called a _____________transport
A) process-to-process communication protocol.

B) host-to-host communication A) connectionless, reliable

C) end-to-end reliable data delivery B) connection-oriented, unreliable


C) connectionless, unreliable C) man-in-the middle

D) none of the above D) none of the above

View Answer: View Answer:


Answer: Option C Answer: Option A

Solution: Solution:

67. In SCTP, ___________ can be carried in a packet 70. When the IP layer of a receiving host receives
that carries an INIT chunk. a datagram, _______.

A) only data chunks A) delivery is complete

B) only control chunks B) a transport layer protocol takes over

C) no other chunk C) a header is added

D) none of the above D) none of the above

View Answer: View Answer:


Answer: Option C Answer: Option B

Solution: Solution:

68. UDP packets have a fixed-size header of 71. The value of the acknowledgment field in a
_______ bytes. segment defines the number of the ______byte a
party expects to receive.
A) 16
A) first
B) 8
B) last
C) 40
C) next
D) none of the above
D) none of the above
View Answer:
Answer: Option B View Answer:
Answer: Option C
Solution:
Solution:
69. The SYN flooding attack belongs to a group
of security attacks known as a _____ attack. 72. A SYN segment cannot carry data; it
consumes _____ sequence number(s).
A) denial of service
A) no
B) replay
B) one A) client-server

C) two B) client-client

D) none of the above C) server-server

View Answer: D) none of the above


Answer: Option B
View Answer:
Solution: Answer: Option A

73. The acknowledgment number is ________. Solution:

A) independent 76. A(n) _________ machine is a machine that goes


through a limited number of states.
B) randomly generated
A) infinite state
C) cumulative
B) finite state
D) none of the above
C) both a and b
View Answer:
Answer: Option C D) none of the above

Solution: View Answer:


Answer: Option B
74. The local host and the remote host are
defined using IP addresses. To define the Solution:
processes, we need second identifiers called
____________. 77. UDP uses _______ to handle incoming user
datagrams that go to different processes on the
A) UDP addresses same host.

B) transport addresses A) flow control

C) port addresses B) multiplexing

D) none of the above C) demultiplexing

View Answer: D) none of the above


Answer: Option C
View Answer:
Solution: Answer: Option C

75. Although there are several ways to achieve


process-to-process communication, the most
common is through the __________ paradigm.

S-ar putea să vă placă și