0% found this document useful (0 votes)
211 views7 pages

TCP Udp Mcqs

Uploaded by

hashimalmusalam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
211 views7 pages

TCP Udp Mcqs

Uploaded by

hashimalmusalam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 7

Lecture 07: UDP

1. What is the main characteristic of UDP?


A) Reliable and in-order delivery
B) Connection-oriented
C) Connectionless and unreliable
D) Provides flow control and congestion control
Answer: C
2. Which of the following protocols is not typically built on UDP?
A) DNS
B) SNMP
C) HTTP/3
D) TCP
Answer: D
3. The UDP header length is:
A) 4 bytes
B) 8 bytes
C) 16 bytes
D) 20 bytes
Answer: B
4. In UDP, the checksum is used to:
A) Ensure ordered delivery of packets
B) Provide error detection
C) Control congestion in the network
D) Set up a connection before data transmission
Answer: B
5. Multiplexing and demultiplexing in the transport layer are primarily based on:
A) IP addresses only
B) Port numbers only
C) Source IP and port numbers only
D) IP addresses and port numbers
Answer: D
6. Which layer provides services directly to the application layer?
A) Physical Layer
B) Data Link Layer
C) Network Layer
D) Transport Layer
Answer: D
7. UDP is commonly used for which of the following applications?
A) Web browsing
B) Streaming multimedia
C) Email
D) File transfer
Answer: B
8. What does MUX stand for in transport layer services?
A) Multiple User Exchange
B) Multiplexing
C) Multiple Usage Xchange
D) Mixed Utility Exchange
Answer: B
9. Which transport layer service allows distinguishing data for different
applications?
A) Multiplexing
B) Encapsulation
C) Checksum
D) Error Correction
Answer: A
10. The size of a UDP segment is limited to:
A) 64 KB
B) 8 KB
C) 32 KB
D) 128 KB
Answer: A
11. UDP is referred to as 'no-frills' protocol because:
A) It requires handshaking
B) It is a connectionless protocol
C) It offers built-in reliability
D) It supports flow control
Answer: B
12. UDP is preferred over TCP for:
A) Secure transactions
B) Reliable data transfer
C) Fast and lightweight communication
D) Encrypted communication
Answer: C
13. Which field in the UDP header helps detect errors?
A) Source Port
B) Checksum
C) Length
D) Destination Port
Answer: B
14. In UDP, lost segments are:
A) Retransmitted automatically
B) Reordered upon receipt
C) Discarded without retransmission
D) Stored in a buffer
Answer: C
15. UDP can handle multiple data flows between applications by:
A) Using different IP addresses
B) Assigning port numbers
C) Sequencing packets
D) Increasing segment size
Answer: B
16. The primary advantage of UDP over TCP is:
A) Reliable data transfer
B) No delay from connection setup
C) Connection-oriented nature
D) Error correction
Answer: B
17. The header field that indicates the length of the UDP segment is:
A) Checksum
B) Source Port
C) Length
D) Destination Port
Answer: C
18. UDP is categorized as:
A) Transport layer, connection-oriented
B) Transport layer, connectionless
C) Network layer, connection-oriented
D) Network layer, connectionless
Answer: B
19. Which of these protocols is used over UDP?
A) SMTP
B) DNS
C) FTP
D) HTTPS
Answer: B
20. UDP is often referred to as:
A) Guaranteed delivery protocol
B) Best-effort service
C) Acknowledgment-based protocol
D) Control-based service
Answer: B

Lecture 08: TCP Basics

1. TCP provides all the following services except:


A) Reliable transport
B) In-order delivery
C) Flow control
D) Timing guarantees
Answer: D
2. The RDT 3.0 protocol is designed for:
A) Error-free channels
B) Channels with bit errors only
C) Channels with packet loss and errors
D) High-speed channels without errors
Answer: C
3. Which mechanism prevents the TCP sender from overwhelming the receiver?
A) Congestion control
B) Flow control
C) Demultiplexing
D) Multiplexing
Answer: B
4. The TCP 3-way handshake involves all the following states except:
A) SYN
B) SYN-ACK
C) FIN
D) ACK
Answer: C
5. What is cumulative acknowledgment in TCP?
A) Acknowledgment for each received packet
B) A single acknowledgment for all packets up to a specific sequence number
C) A retransmission request
D) A signal to close the connection
Answer: B
6. TCP establishes a connection before data transfer using:
A) 3-way handshake
B) SYN Flooding
C) Packet sequencing
D) Multiplexing
Answer: A
7. The field in TCP header that shows the next byte expected by the receiver is:
A) Sequence number
B) Acknowledgment number
C) Window size
D) Data offset
Answer: B
8. In TCP, MSS stands for:
A) Maximum Segment Size
B) Minimum Segment Size
C) Main Segment Size
D) Multiple Segment Size
Answer: A
9. Which protocol does TCP use to handle lost packets?
A) Retransmit all packets
B) Fast Retransmit
C) Demultiplexing
D) None of the above
Answer: B
10. TCP�s congestion control has a phase called:
A) Fast Start
B) Slow Start
C) Immediate Start
D) Congestion Start
Answer: B
11. The TCP header contains all of the following fields except:
A) Source port
B) Window size
C) Sequence number
D) Data check
Answer: D
12. In TCP, flow control is provided by:
A) The IP layer
B) The window size field
C) The sequence numbers
D) The congestion window
Answer: B
13. Which of these indicates a request to terminate a TCP connection?
A) SYN
B) ACK
C) FIN
D) PSH
Answer: C
14. The minimum size of a TCP header is:
A) 8 bytes
B) 12 bytes
C) 20 bytes
D) 24 bytes
Answer: C
15. The field that handles urgent data in TCP is:
A) Data offset
B) Urgent pointer
C) Window size
D) Sequence number
Answer: B
16. TCP protocol is primarily responsible for providing:
A) Connectionless data transfer
B) Reliable data transfer
C) Unreliable data transfer
D) Security
Answer: B
17. In TCP, pipelining allows:
A) Only one packet in the network at a time
B) Multiple packets in transit
C) Only two packets
D) Blocking all packets
Answer: B
18. TCP segments are:
A) Only acknowledged by the receiver
B) Transmitted without any header
C) Delivered in sequence
D) Delivered out-of-sequence
Answer: C
19. ACK in TCP represents:
A) Acknowledgment
B) Ack Packet
C) Ack Transmission
D) Acknowledgment Control
Answer: A
20. The size of a TCP header with no options is:
A) 12 bytes
B) 16 bytes
C) 20 bytes
D) 32 bytes
Answer: C

Lecture 09: TCP Flow & Congestion Control

1. TCP congestion control primarily addresses:


A) Packet reordering
B) Packet loss due to congestion
C) Packet duplication
D) Flow control at the application level
Answer: B
2. Which phase in TCP congestion control exponentially increases the congestion
window?
A) Congestion Avoidance
B) Slow Start
C) Fast Retransmit
D) Multiplicative Decrease
Answer: B
3. The 'rwnd' field in the TCP header is used for:
A) Congestion control
B) Flow control
C) Demultiplexing
D) Multiplexing
Answer: B
4. When TCP detects three duplicate ACKs, it performs:
A) Slow start
B) Fast retransmit and congestion avoidance
C) Flow control adjustment
D) Immediate close
Answer: B
5. If congestion is detected by timeout, TCP will:
A) Perform slow start
B) Retransmit immediately
C) Ignore the event
D) Use a larger window size
Answer: A
6. What is the 'ssthresh' parameter in TCP?
A) Maximum segment size
B) Initial congestion window
C) Threshold for slow start
D) Timeout interval
Answer: C
7. TCP's congestion avoidance increases the congestion window by:
A) Exponential growth
B) Multiplicative growth
C) Additive increase
D) Constant size
Answer: C
8. TCP enters congestion avoidance when:
A) It detects three duplicate ACKs
B) The congestion window reaches ssthresh
C) The flow control window is zero
D) The window size is too small
Answer: B
9. In the slow start phase, the congestion window increases:
A) Linearly
B) Exponentially
C) Logarithmically
D) Randomly
Answer: B
10. TCP's congestion control approach includes:
A) Two phases
B) Three phases
C) Four phases
D) Five phases
Answer: B
11. The process of gradually increasing the congestion window in TCP is called:
A) Multiplicative decrease
B) Additive increase
C) Immediate restart
D) Slow start
Answer: B
12. A 2-way handshake is inadequate in TCP because:
A) It cannot handle variable delays
B) It cannot detect retransmissions
C) It can lead to incorrect states
D) All of the above
Answer: D
13. The receive buffer advertised by TCP is called:
A) Rwnd
B) Swnd
C) Cwnd
D) None of the above
Answer: A
14. In TCP, the term 'fast retransmit' refers to:
A) Immediate retransmission upon timeout
B) Retransmission after three duplicate ACKs
C) Retransmission after single ACK
D) None of the above
Answer: B
15. TCP uses RTT samples to:
A) Set the window size
B) Calculate the timeout interval
C) Determine packet ordering
D) Set the header size
Answer: B
16. TCP congestion window is reduced when:
A) The sender gets a duplicate ACK
B) The receiver requests it
C) A timeout or triple ACK occurs
D) Only at session start
Answer: C
17. Which mechanism is used by TCP to detect congestion?
A) Duplicate ACKs
B) Timeout
C) Both A and B
D) None of the above
Answer: C
18. TCP�s exponential weighted moving average (EWMA) is used for:
A) Setting initial timeout
B) Estimating RTT
C) Determining congestion window
D) Calculating MSS
Answer: B
19. In TCP, congestion control and flow control are:
A) The same
B) Different mechanisms
C) Both managed by the receiver
D) Only needed in UDP
Answer: B
20. The TCP phase after congestion is detected by duplicate ACKs is:
A) Slow Start
B) Congestion Avoidance
C) Fast Recovery
D) Fast Start
Answer: C

You might also like