Deck 7: Understanding Transport Layer Protocols and UDP

Full screen (f)
exit full mode
Question
Transport layer protocols are useful for ensuring ______________ delivery.

A)H-2-H
B)H-2-R
C)N/W-2-N/W
D)End-2-End
Use Space or
up arrow
down arrow
to flip the card.
Question
_______________is a reliable delivery mechanism.

A)IP
B)TCP
C)UDP
D)ARP
Question
Transport layer is _____________ the data link layer.

A)Above
B)Below
C)Depended on
D)None of the above
Question
When a packet is lost in transit, it should be handled by _____________.

A)Sequence control
B)Loss control
C)Error control
D)Duplication control
Question
Internet is

A)a local computer network
B)a worldwide network of computers
C)an interconnected network of computers
D)a worldwide interconnected network of computers which use a common protocol
Question
World Wide Web

A)is another name for internet
B)worldwide connection for computers
C)a collection of linked information residing on computers connected by the internet
D)a collection of worldwide information
Question
HTML tags define

A)The data types of elements of document
B)Presentation of specified elements of a document
C)The contents of the document
D)The structure of the document
Question
One of the responsibilities of the transport layer protocol is to create a ______ communication.

A)host-to-host
B)process-to-process
C)node-to-node
D)none of the above
Question
UDP is called a ________________transport protocol.

A)connectionless, reliable
B)connection-oriented, unreliable
C)connectionless, unreliable
D)none of the above
Question
UDP does not add anything to the services of IP except for providing _______ communication.

A)node-to-node
B)process-to-process
C)host-to-host
D)none of the above
Question
UDP is an acronym for _______.

A)User Delivery Protocol
B)User Datagram Procedure
C)User Datagram Protocol
D)None of the above
Question
Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm.

A)client-server
B)client-client
C)server-server
D)none of the above
Question
The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________.

A)UDP addresses
B)transport addresses
C)port addresses
D)none of the above
Question
The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports.

A)well-known
B)registered
C)dynamic
D)none of the above
Question
In the sending computer, UDP receives a data unit from the _______ layer.

A)application
B)transport
C)IP
D)none of the above
Question
In the sending computer, UDP sends a data unit to the _______ layer.

A)application
B)transport
C)IP
D)none of the above
Question
UDP and TCP are both _______ layer protocols.

A)data link
B)network
C)transport
D)none of the above
Question
Which of the following functions does UDP perform?

A)process-to-process communication
B)host-to-host communication
C)end-to-end reliable data delivery
D)none of the above
Question
When the IP layer of a receiving host receives a datagram, _______.

A)delivery is complete
B)a transport layer protocol takes over
C)a header is added
D)none of the above
Question
UDP needs the _______ address to deliver the user datagram to the correct application process.

A)port
B)application
C)internet
D)none of the above
Question
A port address in UDP is _______bits long.

A)8
B)16
C)32
D)any of the above
Question
Which of the following does UDP guarantee?

A)flow control
B)connection-oriented delivery
C)flow control.
D)none of the above
Question
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

A)confidentiality
B)integrity
C)authentication
D)none of the above
Question
_________ means that a sender must not be able to deny sending a message that he sent.

A)Confidentiality
B)Integrity
C)Authentication
D)Non-repudiation
Question
________ means to prove the identity of the entity that tries to access the system's resources.

A)Message authentication
B)Entity authentication
C)Message confidentiality
D)none of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Understanding Transport Layer Protocols and UDP
1
Transport layer protocols are useful for ensuring ______________ delivery.

A)H-2-H
B)H-2-R
C)N/W-2-N/W
D)End-2-End
H-2-H
2
_______________is a reliable delivery mechanism.

A)IP
B)TCP
C)UDP
D)ARP
TCP
3
Transport layer is _____________ the data link layer.

A)Above
B)Below
C)Depended on
D)None of the above
Above
4
When a packet is lost in transit, it should be handled by _____________.

A)Sequence control
B)Loss control
C)Error control
D)Duplication control
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Internet is

A)a local computer network
B)a worldwide network of computers
C)an interconnected network of computers
D)a worldwide interconnected network of computers which use a common protocol
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
World Wide Web

A)is another name for internet
B)worldwide connection for computers
C)a collection of linked information residing on computers connected by the internet
D)a collection of worldwide information
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
HTML tags define

A)The data types of elements of document
B)Presentation of specified elements of a document
C)The contents of the document
D)The structure of the document
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
One of the responsibilities of the transport layer protocol is to create a ______ communication.

A)host-to-host
B)process-to-process
C)node-to-node
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
UDP is called a ________________transport protocol.

A)connectionless, reliable
B)connection-oriented, unreliable
C)connectionless, unreliable
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
UDP does not add anything to the services of IP except for providing _______ communication.

A)node-to-node
B)process-to-process
C)host-to-host
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
UDP is an acronym for _______.

A)User Delivery Protocol
B)User Datagram Procedure
C)User Datagram Protocol
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm.

A)client-server
B)client-client
C)server-server
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________.

A)UDP addresses
B)transport addresses
C)port addresses
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports.

A)well-known
B)registered
C)dynamic
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
In the sending computer, UDP receives a data unit from the _______ layer.

A)application
B)transport
C)IP
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
In the sending computer, UDP sends a data unit to the _______ layer.

A)application
B)transport
C)IP
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
UDP and TCP are both _______ layer protocols.

A)data link
B)network
C)transport
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following functions does UDP perform?

A)process-to-process communication
B)host-to-host communication
C)end-to-end reliable data delivery
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
When the IP layer of a receiving host receives a datagram, _______.

A)delivery is complete
B)a transport layer protocol takes over
C)a header is added
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
UDP needs the _______ address to deliver the user datagram to the correct application process.

A)port
B)application
C)internet
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
A port address in UDP is _______bits long.

A)8
B)16
C)32
D)any of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following does UDP guarantee?

A)flow control
B)connection-oriented delivery
C)flow control.
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

A)confidentiality
B)integrity
C)authentication
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
_________ means that a sender must not be able to deny sending a message that he sent.

A)Confidentiality
B)Integrity
C)Authentication
D)Non-repudiation
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
________ means to prove the identity of the entity that tries to access the system's resources.

A)Message authentication
B)Entity authentication
C)Message confidentiality
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.