Deck 9: Tcp/ip Transport Layer Protocols

Full screen (f)
exit full mode
Question
When the Protocol field of an IP header contains the value 17 (0x11), the UDP header follows the IP header.
Indicate the answer choice that best completes the statement or answers the question.
Use Space or
up arrow
down arrow
to flip the card.
Question
The initial sequence number used in a TCP connection is defined by the which of the following and, for security purposes, should be randomly assigned?

A)host
B)packet
C)port
D)segment
Question
TCP keep-alives are enabled by default on Windows XP, Windows Vista, Windows 7, Windows Server 2003, and Windows Server 2008, although any application may disable TCP keep-alives, if desired by its programmer.
Question
Which of the following defines the length of the packet from the UDP header to the end of valid data (not including any data link padding, if padding is required)?

A)Checksum field
B)Dynamic Port Number field
C)Length field
D)Destination Port Number field
Question
Which of the following is detected whenever three or more duplicate ACK packets (known as a triple-ACK) or timeout events occur, and timeout events are considered more serious than duplicate acknowledgments?

A)Logical connection
B)Congestion
C)Retransmission
D)Windowing
Question
UDP is the only connectionless TCP/IP protocol at the Transport layer.
Question
What is used in order for TCP hosts to create a virtual connection with each other?

A)sliding window
B)handshake process
C)teardown sequence
D)retry mechanism
Question
The TCP connection termination process requires how many packets?

A)one
B)two
C)three
D)four
Question
Which of the following processes guarantees that packets are ordered properly and protects against missing segments?

A)watchdog
B)keep-alive
C)handshake
D)sequence and acknowledgment
Question
Dynamic ports are used as which of the following for specific communications while they are underway?

A)temporary ports
B)core services
C)byte streams
D)lost segments
Question
Which of the following does TCP support, which is defined as the process of sending numerous data packets in sequence without waiting for an intervening acknowledgment?

A)retries
B)sequence number tracking
C)windowing
D)error recovery
Question
Once a TCP connection is established, which of the following can maintain the connection when there is no data sent across the wire?

A)watchdog process
B)core service
C)keep-alive process
D)handshake process
Question
UDP offers connection-oriented services with sequencing, error recovery, and a sliding window mechanism.
Question
TCP half-open connections occur when the handshake process does not end successfully with a final ACK.
Question
Which of the following does TCP support, which is a management method for data transmission used to determine the amount of unacknowledged data that can go out on the wire from any sender?

A)congestion mechanism
B)retry mechanism
C)sliding window mechanism
D)watchdog mechanism
Question
When an out-of-order data segment is received, the Fast Retransmit process requires the receiver to immediately send which of the following?

A)duplicate ACKs
B)core services
C)byte streams
D)lost segments
Question
Overloading a receiver occurs when the number of data bytes is greater than which of the following?

A)advertised window
B)bandwidth
C)sliding window
D)ephemeral port
Question
Which of the following is a simple protocol that is used by applications that contain their own connection-oriented timeout values and retry counters, similar to those provided by TCP?

A)UDP
B)DoS
C)RTO
D)MSS
Question
Which of the following is caused when enough data is sent to a TCP host to fill its receiver buffer, thereby putting the receiver in a zero-window state.

A)DoS
B)Silly Window Syndrome
C)Time Wait delay
D)Retransmission timeout
Question
The Fast Recovery process dictates that when a host receives three duplicate ACKs, it must immediately start retransmitting which of the following without waiting for the retransmission timer to expire.

A)duplicate ACKs
B)core services
C)byte streams
D)lost segments
Question
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a method for determining when to stop resending data across packets
Question
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
the process of following the current sequence number sent by a TCP peer and sending an acknowledgment value to indicate the next-expected sequence number
Question
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a method stating that when small packets are sent but not acknowledged, no further packets shall be sent
Question
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
notification of successful receipt of data
Question
A protocol that offers no built-in error-checking or retransmission capability uses which type of packet delivery?

A)low performance
B)connection-oriented
C)best-effort
D)high priority
Question
Which of the following is used to indicate that the host completed a transaction?

A)Reset flag
B)FIN flag
C)SYN flag
D)URG flag
Question
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
the process of acknowledging multiple packets with a single acknowledgment
Question
Which of the following is the overloading of the network or a receiver?

A)Sequence number tracking
B)Buffering
C)Congestion
D)Windowing
Question
The ____________________ pseudo-header consists of three fields taken from the IP header: the IP Source Address field value, the IP Destination Address field value, and the Protocol field value.
Question
By default, Windows Vista, Windows 7, and Windows Server 2008 support a port range of 49152 to which port number?

A)55874
B)58314
C)61000
D)65535
Enter the appropriate word(s) to complete the statement.
Question
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
an amount of time that a TCP host must not use connection parameters after closing down that connection
Question
Because of ____________________'s end-to-end reliability and flexibility, it is the preferred transport method for applications that transfer large quantities of data and require reliable delivery services.
Question
____________________ defines the range of numbers that identifies dynamic ports.
Question
TCP has four defined congestion control mechanisms to ensure the most efficient use of ____________________ along with quick error and congestion recovery.
Question
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a port that is used for the duration of the connection
Question
Which of the following provide the simplest kind of transport services because they simply package messages, taken as is from the TCP/IP Application layer, into datagrams?

A)Core services
B)Port numbers
C)Logical connections
D)Connectionless protocols
Question
Which of the following defines the destination application or process that uses the IP and UDP headers?

A)Checksum field value
B)Dynamic Port Number field value
C)Length field value
D)Destination Port Number field value
Question
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
the timer that maintains the RTO value
Question
The ____________________ window is always the lesser of what the network and receiver can handle.
Question
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a queuing area used to hold incoming and outgoing TCP packets
Question
Briefly describe the TCP startup connection process.
Question
What is the difference between the window size field and the urgent pointer field?
Question
What is the order of the half-open connection communication sequence?
Question
List the two TCP control mechanisms, as defined in RFC 5681.
Question
Briefly discuss the type of tasks typically handled by connectionless protocols.
Question
List the fields contained in the UDP header.
Question
Briefly define the following TCP flag settings: URG (Urgent), ACK (Acknowledgment), and PSH(Push).
Question
Briefly discuss four limitations of UDP.
Question
Briefly describe the following TCP connection states: LISTEN, SYN SENT, SYN RECD, AND CLOSE WAIT.
Question
What are the functions of a connection-oriented protocol?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Tcp/ip Transport Layer Protocols
1
When the Protocol field of an IP header contains the value 17 (0x11), the UDP header follows the IP header.
Indicate the answer choice that best completes the statement or answers the question.
True
2
The initial sequence number used in a TCP connection is defined by the which of the following and, for security purposes, should be randomly assigned?

A)host
B)packet
C)port
D)segment
A
3
TCP keep-alives are enabled by default on Windows XP, Windows Vista, Windows 7, Windows Server 2003, and Windows Server 2008, although any application may disable TCP keep-alives, if desired by its programmer.
False
4
Which of the following defines the length of the packet from the UDP header to the end of valid data (not including any data link padding, if padding is required)?

A)Checksum field
B)Dynamic Port Number field
C)Length field
D)Destination Port Number field
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is detected whenever three or more duplicate ACK packets (known as a triple-ACK) or timeout events occur, and timeout events are considered more serious than duplicate acknowledgments?

A)Logical connection
B)Congestion
C)Retransmission
D)Windowing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
UDP is the only connectionless TCP/IP protocol at the Transport layer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What is used in order for TCP hosts to create a virtual connection with each other?

A)sliding window
B)handshake process
C)teardown sequence
D)retry mechanism
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The TCP connection termination process requires how many packets?

A)one
B)two
C)three
D)four
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following processes guarantees that packets are ordered properly and protects against missing segments?

A)watchdog
B)keep-alive
C)handshake
D)sequence and acknowledgment
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Dynamic ports are used as which of the following for specific communications while they are underway?

A)temporary ports
B)core services
C)byte streams
D)lost segments
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following does TCP support, which is defined as the process of sending numerous data packets in sequence without waiting for an intervening acknowledgment?

A)retries
B)sequence number tracking
C)windowing
D)error recovery
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Once a TCP connection is established, which of the following can maintain the connection when there is no data sent across the wire?

A)watchdog process
B)core service
C)keep-alive process
D)handshake process
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
UDP offers connection-oriented services with sequencing, error recovery, and a sliding window mechanism.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
TCP half-open connections occur when the handshake process does not end successfully with a final ACK.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following does TCP support, which is a management method for data transmission used to determine the amount of unacknowledged data that can go out on the wire from any sender?

A)congestion mechanism
B)retry mechanism
C)sliding window mechanism
D)watchdog mechanism
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
When an out-of-order data segment is received, the Fast Retransmit process requires the receiver to immediately send which of the following?

A)duplicate ACKs
B)core services
C)byte streams
D)lost segments
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Overloading a receiver occurs when the number of data bytes is greater than which of the following?

A)advertised window
B)bandwidth
C)sliding window
D)ephemeral port
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is a simple protocol that is used by applications that contain their own connection-oriented timeout values and retry counters, similar to those provided by TCP?

A)UDP
B)DoS
C)RTO
D)MSS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is caused when enough data is sent to a TCP host to fill its receiver buffer, thereby putting the receiver in a zero-window state.

A)DoS
B)Silly Window Syndrome
C)Time Wait delay
D)Retransmission timeout
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The Fast Recovery process dictates that when a host receives three duplicate ACKs, it must immediately start retransmitting which of the following without waiting for the retransmission timer to expire.

A)duplicate ACKs
B)core services
C)byte streams
D)lost segments
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a method for determining when to stop resending data across packets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
the process of following the current sequence number sent by a TCP peer and sending an acknowledgment value to indicate the next-expected sequence number
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a method stating that when small packets are sent but not acknowledged, no further packets shall be sent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
notification of successful receipt of data
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A protocol that offers no built-in error-checking or retransmission capability uses which type of packet delivery?

A)low performance
B)connection-oriented
C)best-effort
D)high priority
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is used to indicate that the host completed a transaction?

A)Reset flag
B)FIN flag
C)SYN flag
D)URG flag
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
the process of acknowledging multiple packets with a single acknowledgment
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is the overloading of the network or a receiver?

A)Sequence number tracking
B)Buffering
C)Congestion
D)Windowing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The ____________________ pseudo-header consists of three fields taken from the IP header: the IP Source Address field value, the IP Destination Address field value, and the Protocol field value.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
By default, Windows Vista, Windows 7, and Windows Server 2008 support a port range of 49152 to which port number?

A)55874
B)58314
C)61000
D)65535
Enter the appropriate word(s) to complete the statement.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
an amount of time that a TCP host must not use connection parameters after closing down that connection
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Because of ____________________'s end-to-end reliability and flexibility, it is the preferred transport method for applications that transfer large quantities of data and require reliable delivery services.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
____________________ defines the range of numbers that identifies dynamic ports.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
TCP has four defined congestion control mechanisms to ensure the most efficient use of ____________________ along with quick error and congestion recovery.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a port that is used for the duration of the connection
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following provide the simplest kind of transport services because they simply package messages, taken as is from the TCP/IP Application layer, into datagrams?

A)Core services
B)Port numbers
C)Logical connections
D)Connectionless protocols
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following defines the destination application or process that uses the IP and UDP headers?

A)Checksum field value
B)Dynamic Port Number field value
C)Length field value
D)Destination Port Number field value
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
the timer that maintains the RTO value
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
The ____________________ window is always the lesser of what the network and receiver can handle.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a queuing area used to hold incoming and outgoing TCP packets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Briefly describe the TCP startup connection process.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is the difference between the window size field and the urgent pointer field?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What is the order of the half-open connection communication sequence?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
List the two TCP control mechanisms, as defined in RFC 5681.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Briefly discuss the type of tasks typically handled by connectionless protocols.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
List the fields contained in the UDP header.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Briefly define the following TCP flag settings: URG (Urgent), ACK (Acknowledgment), and PSH(Push).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Briefly discuss four limitations of UDP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Briefly describe the following TCP connection states: LISTEN, SYN SENT, SYN RECD, AND CLOSE WAIT.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What are the functions of a connection-oriented protocol?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.