Deck 9: Tcp/ip Transport Layer Protocols
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 9: Tcp/ip Transport Layer Protocols
1
When the Protocol field of an IP header contains the value 17 (0x11), the UDP header follows the IP header.
Indicate the answer choice that best completes the statement or answers the question.
Indicate the answer choice that best completes the statement or answers the question.
True
2
The initial sequence number used in a TCP connection is defined by the which of the following and, for security purposes, should be randomly assigned?
A)host
B)packet
C)port
D)segment
A)host
B)packet
C)port
D)segment
A
3
TCP keep-alives are enabled by default on Windows XP, Windows Vista, Windows 7, Windows Server 2003, and Windows Server 2008, although any application may disable TCP keep-alives, if desired by its programmer.
False
4
Which of the following defines the length of the packet from the UDP header to the end of valid data (not including any data link padding, if padding is required)?
A)Checksum field
B)Dynamic Port Number field
C)Length field
D)Destination Port Number field
A)Checksum field
B)Dynamic Port Number field
C)Length field
D)Destination Port Number field
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is detected whenever three or more duplicate ACK packets (known as a triple-ACK) or timeout events occur, and timeout events are considered more serious than duplicate acknowledgments?
A)Logical connection
B)Congestion
C)Retransmission
D)Windowing
A)Logical connection
B)Congestion
C)Retransmission
D)Windowing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
UDP is the only connectionless TCP/IP protocol at the Transport layer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What is used in order for TCP hosts to create a virtual connection with each other?
A)sliding window
B)handshake process
C)teardown sequence
D)retry mechanism
A)sliding window
B)handshake process
C)teardown sequence
D)retry mechanism
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The TCP connection termination process requires how many packets?
A)one
B)two
C)three
D)four
A)one
B)two
C)three
D)four
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following processes guarantees that packets are ordered properly and protects against missing segments?
A)watchdog
B)keep-alive
C)handshake
D)sequence and acknowledgment
A)watchdog
B)keep-alive
C)handshake
D)sequence and acknowledgment
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Dynamic ports are used as which of the following for specific communications while they are underway?
A)temporary ports
B)core services
C)byte streams
D)lost segments
A)temporary ports
B)core services
C)byte streams
D)lost segments
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following does TCP support, which is defined as the process of sending numerous data packets in sequence without waiting for an intervening acknowledgment?
A)retries
B)sequence number tracking
C)windowing
D)error recovery
A)retries
B)sequence number tracking
C)windowing
D)error recovery
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Once a TCP connection is established, which of the following can maintain the connection when there is no data sent across the wire?
A)watchdog process
B)core service
C)keep-alive process
D)handshake process
A)watchdog process
B)core service
C)keep-alive process
D)handshake process
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
UDP offers connection-oriented services with sequencing, error recovery, and a sliding window mechanism.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
TCP half-open connections occur when the handshake process does not end successfully with a final ACK.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following does TCP support, which is a management method for data transmission used to determine the amount of unacknowledged data that can go out on the wire from any sender?
A)congestion mechanism
B)retry mechanism
C)sliding window mechanism
D)watchdog mechanism
A)congestion mechanism
B)retry mechanism
C)sliding window mechanism
D)watchdog mechanism
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
When an out-of-order data segment is received, the Fast Retransmit process requires the receiver to immediately send which of the following?
A)duplicate ACKs
B)core services
C)byte streams
D)lost segments
A)duplicate ACKs
B)core services
C)byte streams
D)lost segments
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Overloading a receiver occurs when the number of data bytes is greater than which of the following?
A)advertised window
B)bandwidth
C)sliding window
D)ephemeral port
A)advertised window
B)bandwidth
C)sliding window
D)ephemeral port
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is a simple protocol that is used by applications that contain their own connection-oriented timeout values and retry counters, similar to those provided by TCP?
A)UDP
B)DoS
C)RTO
D)MSS
A)UDP
B)DoS
C)RTO
D)MSS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is caused when enough data is sent to a TCP host to fill its receiver buffer, thereby putting the receiver in a zero-window state.
A)DoS
B)Silly Window Syndrome
C)Time Wait delay
D)Retransmission timeout
A)DoS
B)Silly Window Syndrome
C)Time Wait delay
D)Retransmission timeout
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
The Fast Recovery process dictates that when a host receives three duplicate ACKs, it must immediately start retransmitting which of the following without waiting for the retransmission timer to expire.
A)duplicate ACKs
B)core services
C)byte streams
D)lost segments
A)duplicate ACKs
B)core services
C)byte streams
D)lost segments
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a method for determining when to stop resending data across packets
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a method for determining when to stop resending data across packets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
the process of following the current sequence number sent by a TCP peer and sending an acknowledgment value to indicate the next-expected sequence number
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
the process of following the current sequence number sent by a TCP peer and sending an acknowledgment value to indicate the next-expected sequence number
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a method stating that when small packets are sent but not acknowledged, no further packets shall be sent
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a method stating that when small packets are sent but not acknowledged, no further packets shall be sent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
notification of successful receipt of data
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
notification of successful receipt of data
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A protocol that offers no built-in error-checking or retransmission capability uses which type of packet delivery?
A)low performance
B)connection-oriented
C)best-effort
D)high priority
A)low performance
B)connection-oriented
C)best-effort
D)high priority
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is used to indicate that the host completed a transaction?
A)Reset flag
B)FIN flag
C)SYN flag
D)URG flag
A)Reset flag
B)FIN flag
C)SYN flag
D)URG flag
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
the process of acknowledging multiple packets with a single acknowledgment
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
the process of acknowledging multiple packets with a single acknowledgment
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is the overloading of the network or a receiver?
A)Sequence number tracking
B)Buffering
C)Congestion
D)Windowing
A)Sequence number tracking
B)Buffering
C)Congestion
D)Windowing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The ____________________ pseudo-header consists of three fields taken from the IP header: the IP Source Address field value, the IP Destination Address field value, and the Protocol field value.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
By default, Windows Vista, Windows 7, and Windows Server 2008 support a port range of 49152 to which port number?
A)55874
B)58314
C)61000
D)65535
Enter the appropriate word(s) to complete the statement.
A)55874
B)58314
C)61000
D)65535
Enter the appropriate word(s) to complete the statement.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
an amount of time that a TCP host must not use connection parameters after closing down that connection
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
an amount of time that a TCP host must not use connection parameters after closing down that connection
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Because of ____________________'s end-to-end reliability and flexibility, it is the preferred transport method for applications that transfer large quantities of data and require reliable delivery services.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
____________________ defines the range of numbers that identifies dynamic ports.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
TCP has four defined congestion control mechanisms to ensure the most efficient use of ____________________ along with quick error and congestion recovery.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a port that is used for the duration of the connection
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a port that is used for the duration of the connection
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following provide the simplest kind of transport services because they simply package messages, taken as is from the TCP/IP Application layer, into datagrams?
A)Core services
B)Port numbers
C)Logical connections
D)Connectionless protocols
A)Core services
B)Port numbers
C)Logical connections
D)Connectionless protocols
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following defines the destination application or process that uses the IP and UDP headers?
A)Checksum field value
B)Dynamic Port Number field value
C)Length field value
D)Destination Port Number field value
A)Checksum field value
B)Dynamic Port Number field value
C)Length field value
D)Destination Port Number field value
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
the timer that maintains the RTO value
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
the timer that maintains the RTO value
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
The ____________________ window is always the lesser of what the network and receiver can handle.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match each item with a statement below.
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a queuing area used to hold incoming and outgoing TCP packets
a.timeout mechanism
b.temporary port
c.Time Wait delay
d.TCP buffer area
e.retransmission timer
f.Nagle algorithm
g.Sequence number tracking
h.acknowledgment
i.windowing
a queuing area used to hold incoming and outgoing TCP packets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Briefly describe the TCP startup connection process.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is the difference between the window size field and the urgent pointer field?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What is the order of the half-open connection communication sequence?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
List the two TCP control mechanisms, as defined in RFC 5681.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Briefly discuss the type of tasks typically handled by connectionless protocols.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
List the fields contained in the UDP header.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Briefly define the following TCP flag settings: URG (Urgent), ACK (Acknowledgment), and PSH(Push).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Briefly discuss four limitations of UDP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Briefly describe the following TCP connection states: LISTEN, SYN SENT, SYN RECD, AND CLOSE WAIT.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What are the functions of a connection-oriented protocol?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck