Exam 7: Understanding Transport Layer Protocols and UDP
Exam 1: Communication Exchange and Network Topologies25 Questions
Exam 2: Networking and Physical Layer Protocols25 Questions
Exam 3: Data Link Layer and Error Control Protocols25 Questions
Exam 4: Data Link and Network25 Questions
Exam 5: Tcpip, Routing Tables, and Addressing25 Questions
Exam 6: Network Layer and IP Addressing25 Questions
Exam 7: Understanding Transport Layer Protocols and UDP25 Questions
Exam 8: Cryptography and Network Protocols25 Questions
Select questions type
________ means to prove the identity of the entity that tries to access the system's resources.
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
B
Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm.
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
A
In the sending computer, UDP sends a data unit to the _______ layer.
Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
C
UDP does not add anything to the services of IP except for providing _______ communication.
(Multiple Choice)
4.9/5
(33)
Transport layer protocols are useful for ensuring ______________ delivery.
(Multiple Choice)
4.8/5
(34)
One of the responsibilities of the transport layer protocol is to create a ______ communication.
(Multiple Choice)
4.8/5
(27)
The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________.
(Multiple Choice)
4.8/5
(36)
_________ means that a sender must not be able to deny sending a message that he sent.
(Multiple Choice)
4.9/5
(29)
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.
(Multiple Choice)
4.7/5
(34)
UDP needs the _______ address to deliver the user datagram to the correct application process.
(Multiple Choice)
4.8/5
(25)
When the IP layer of a receiving host receives a datagram, _______.
(Multiple Choice)
4.8/5
(31)
In the sending computer, UDP receives a data unit from the _______ layer.
(Multiple Choice)
4.8/5
(41)
The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports.
(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)