COMPUTER NETWORKS QUESTIONS-04
TCP is a __________protocol.
TCP is a __________protocol.
This is the correct answer.
A) stream-oriented
B) message-oriented
C) block-oriented
D) None of the choices are correct
TCP groups a number of bytes together into a packet called a ___________.
A) user datagram
This is the correct answer.
B) segment
C) datagram
D) None of the choices are correct
TCP is a(n) ___________ protocol.
This is the correct answer.
A) connection-oriented
B) connectionless
C) unreliable
D) None of the choices are correct
TCP is a(n) _______ transport protocol.
A) unreliable
B) best-effort delivery
This is the correct answer.
C) reliable
D) None of the choices are correct
TCP uses _________________ to check the safe and sound arrival of data.
This is the correct answer.
A) an acknowledgment mechanism
B) out-of-band signalling
C) the services of another protocol
D) None of the choices are correct
The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________.
A) 0
B) 1
This is the correct answer.
C) randomly generated number
D) None of the choices are correct
TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.
This is the correct answer.
A) first
B) last
C) middle
D) None of the choices are correct
Communication in TCP is ___________.
A) simplex
B) half-duplex
This is the correct answer.
C) full-duplex
D) None of the choices are correct
The value of the acknowledgment field in a segment defines the sequence number related to the ______byte a party expects to receive.
A) first
B) last
This is the correct answer.
C) next
D) None of the choices are correct
The inclusion of the checksum in the TCP segment is ________.
A) optional
This is the correct answer.
B) mandatory
C) at the discretion of the application program
D) None of the choices are correct
A TCP segment is encapsulated in __________.
This is the correct answer.
A) an IP datagram
B) an Ethernet frame
C) a UDP user datagram
D) None of the choices are correct
A SYN segment cannot carry data; it consumes _____ sequence number(s).
A) no
This is the correct answer.
B) one
C) two
D) None of the choices are correct
A SYN + ACK segment cannot carry data; it consumes _____ sequence numbers.
A) no
B) three
C) two
This is the correct answer.
D) None of the choices are
An ACK segment, if carrying no data, consumes ______ sequence number(s).
This is the correct answer.
A) no
B) one
C) two
D) None of the choices are correct
The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.
A) ACK flooding
B) FIN flooding
This is the correct answer.
C) SYN flooding
D) None of the choices are correct
The SYN flooding attack belongs to a group of security attacks known as a _____ attack.
This is the correct answer.
A) denial of service
B) replay
C) man-in-the middle
D) None of the choices are correct
The FIN segment consumes ____ sequence numbers if it does not carry data.
A) two
B) three
C) no
This is the correct answer.
D) None of the choices are correct
The FIN + ACK segment consumes _____ sequence number(s) if it does not carry data.
A) two
B) three
This is the correct answer.
C) one
D) None of the choices are correct
In TCP, one end can stop sending data while still receiving data. This is called a ______.
This is the correct answer.
A) half-close
B) half-open
C) one-way termination
D) None of the choices are correct
A_____ machine is a machine that goes through a limited number of states.
A) infinite state
This is the correct answer.
B) finite state
C) both a and b
D) None of the choices are correct
A common value for MSL is between___ seconds and ___ minute(s).
A) 30: 2
This is the correct answer.
B) 30; 1
C) 50; 1
D) None of the choices are correct
To accomplish flow control, TCP uses a ___________ window protocol.
A) limited-size
This is the correct answer.
B) sliding
C) fixed-size
D) None of the choices are correct
TCP sliding windows are __________ oriented.
A) packet
B) segment
This is the correct answer.
C) byte
D) None of the choices are correct
In TCP, the size of the send window is the ________ of rwnd and cwnd.
A) maximum
B) sum of
This is the correct answer.
C) minimum
D) None of the choices are correct
In TCP, the window should not be _________.
A) opened
B) closed
This is the correct answer.
C) shrunk
D) None of the choices are
In TCP, the receiver can temporarily shut down the window; the sender, however, can always send a segment of _____ byte(s) after the window is shut down.
A) ten
B) zero
This is the correct answer.
C) one
D) None of the choices are correct
A serious problem can arise in the sliding window operation when either the sending application program creates data slowly or the receiving application program consumes data slowly, or both. This problem is called the ______.
This is the correct answer.
A) silly window syndrome
B) unexpected syndrome
C) window bug
D) None of the choices are correct
Nagle's algorithm can solve the silly window syndrome created by the _________.
This is the correct answer.
A) sender
B) receiver
C) both sender and receiver
D) None of the choices are correct
Clark's solution can solve the silly window syndrome created by the _________.
A) sender
This is the correct answer.
B) receiver
C) both sender and receiver
D) None of the choices are correct
Delayed acknowledgment can solve the silly window syndrome created by the _________.
A) sender
This is the correct answer.
B) receiver
C) both sender and receiver
D) None of the choices are correct
ACK segments consume _______ sequence number(s) and _______ acknowledged.
This is the correct answer.
A) no; are not
B) one; are not
C) no; are
D) None of the choices are correct
In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or ________ duplicate ACK segments have arrived.
A) one
B) two
This is the correct answer.
C) three
D) None of the choices are correct
In TCP, ________ retransmission timer is set for an ACK segment.
A) one
B) a previous
This is the correct answer.
C) no
D) None of the choices are correct
Lost acknowledgments may create a _______ if they are not handled properly.
A) livelock
This is the correct answer.
B) deadlock
C) retransmission
D) None of the choices are correct
In the ________ algorithm the size of the congestion window increases exponentially until it reaches a threshold.
A) congestion avoidance
B) congestion detection
This is the correct answer.
C) slow start
D) None of the choices are correct
In the __________ algorithm the size of the congestion window increases additively until congestion is detected.
This is the correct answer.
A) congestion avoidance
B) congestion detection
C) slow start
D) None of the choices are correct
In the congestion detection algorithm, if detection is by a time-out, a new _______ phase starts.
This is the correct answer.
A) slow start
B) congestion avoidance
C) congestion detection
D) None of the choices are correct
In the congestion detection algorithm, if detection is by three ACKs, a new _______ phase starts.
A) slow start
This is the correct answer.
B) congestion avoidance
C) congestion detection
D) None of the choices are correct
In TCP, there can be ______ RTT measurement(s) in progress at any time.
A) two
This is the correct answer.
B) only one
C) several
D) None of the choices are correct
The value of the window scale factor can be determined during __________.
A) data transmission
This is the correct answer.
B) connection establishment
C) connection termination
D) None of the choices are correct
Multiply the header length field by _______ to find the total number of bytes in the TCP header.
A) 2
This is the correct answer.
B) 4
C) 6
D) None of the choices are correct
Urgent data requires the urgent pointer field as well as the URG bit in the _______ field.
This is the correct answer.
A) control
B) offset
C) sequence number
D) None of the choices are correct
The options field of the TCP header ranges from 0 to _______ bytes.
A) 10
B) 20
This is the correct answer.
C) 40
D) None of the choices are correct
Which option defines the maximum number of bytes in a TCP segment?
This is the correct answer.
A) maximum segment size
B) window scale factor
C) timestamp
D) None of the choices are correct
If the ACK value is 200, then byte _______ has been received successfully.
This is the correct answer.
A) 199
B) 200
C) 201
D) None of the choices are correct
The _______ timer prevents a long idle connection between two TCPs.
A) retransmission
B) persistence
This is the correct answer.
C) keepalive
D) None of the choices are
The _______ timer is needed to handle the zero window-size advertisement.
A) retransmission
This is the correct answer.
B) persistence
C) keepalive
D) None of the choices are correct
Karn's algorithm is used in calculations by the _______ timer.
This is the correct answer.
A) retransmission
B) persistence
C) keepalive
D) None of the choices are correct
A special segment called a probe is sent by a sending TCP when the _______ timer goes off.
A) transmission
This is the correct answer.
B) persistence
C) keepalive
D) None of the choices are
Read More:-http://everythingispossiblec.blogspot.in/2013/09/computer-networks-questions-05.html
Read More:-http://everythingispossiblec.blogspot.in/2013/09/computer-networks-questions-05.html
No comments:
Post a Comment