0% found this document useful (0 votes)
13 views5 pages

PART 4 - Transport Layer

Uploaded by

nguyenducanh277
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views5 pages

PART 4 - Transport Layer

Uploaded by

nguyenducanh277
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

PART 4: TRANSPORT LAYER

Question 1.127: Which of the following protocols belong to the Transport Layer in the
TCP/IP model:
A. UDP
B. IP
C. TCP
D. Both A and C are correct

Question 1.128: Which protocol provides reliable packet transport:


A. UDP
B. TCP
C. ARP
D. IP

Question 1.129: The Window field in the TCP packet header refers to:
A. Available memory size
B. Operating system
C. Screen size
D. All are incorrect

Question 1.130: A TCP packet that requires a connection will have the flag values:
A. RST=1, SYN=1
B. ACK=1, SYN=1
C. ACK=0, SYN=1
D. FIN=1, SYN=0

Question 1.131: TCP and UDP operate at which layer in the OSI model:
A. Session (Layer 5)
B. Transport (Layer 4)
C. Network (Layer 3)
D. Data Link (Layer 2)

Question 1.132: Which of the following statements is true regarding techniques for efficient
bandwidth usage:
A. Static window flow control
B. Guaranteed rate flow control
C. Dynamic window flow control
D. Dynamic rate flow control

Question 1.133: Which protocols does TCP operate with at the same layer:
A. ARP, RARP
B. UDP
C. TELNET, FTP
D. IP, ARP

Question 1.134: TCP and UDP operate at which layer:


A. Application
B. Network
C. Transport
D. Presentation
Question 1.135: UDP is used for applications that:
A. Require a connection
B. Demand high reliability
C. Require low latency
D. Do not require high reliability

Question 1.136: The Host to Host transport layer operates with the protocol:
A. TCP
B. IP
C. ICMP
D. ARP

Question 1.137: In a UDP packet, the actual data starts from byte:
A. 4
B. 5
C. 8
D. 9

Question 1.138: Which equation best describes the UDP protocol:


A. UDP = IP
B. UDP = TCP - (reliability)
C. UDP = ICMP + (multiplexing by port address)
D. UDP = TCP - IP

Question 1.139: To detect errors in a packet, the technique used is:


A. Sequence number
B. Acknowledgement number
C. Timer
D. Checksum

Question 1.140: When a TCP entity sends a SYNACK segment with an Acknowledgement
Number = 100, it means:
A. The data packet it sends starts with byte 100 in the data stream
B. The first byte of data in the data stream to be sent has sequence number 100
C. It will send from byte 100
D. It expects to receive data starting with byte number 100

Question 1.141: The transport protocol that operates above IP without requiring a connection
before transmission is:
A. UDP
B. TCP
C. HTTP
D. FTP

Question 1.142: The TCP protocol can handle:


A. Lost packets
B. Duplicate packets
C. Out-of-order packets
D. All of the above

Question 1.143: The checksum in a UDP data packet is of length:


A. 4 bits
B. 8 bits
C. 16 bits
D. 32 bits

Question 1.144: The position of the actual data in a TCP data packet starts from byte:
A. 40
B. 32
C. 5
D. Undefined

Question 1.145: Suppose TCP entity A needs to send 1500 bytes to transport entity B. The
first packet contains 1000 bytes of data, and the Sequence Number of this packet is 100. The
Sequence Number of the second packet will be:
A. 1101
B. 1100
C. 500
D. 501

Question 1.146: For TCP, the receiver will inform the sender about the maximum amount of
data it can receive. This value is determined in the field:
A. Sequence Number
B. Acknowledgement Number
C. Rcvr Number
D. Header length

Question 1.147: After TCP entity sends a SYN segment with Sequence Number = 100, it
receives an ACKSYN packet with Sequence Number = 200. The Acknowledgment Number
field of this ACKSYN packet will be:
A. 100
B. 101
C. 200
D. 201

Question 1.148: Suppose an application creates a 60-byte message. This message is placed in
a TCP segment and then in an IP datagram. Assuming both the TCP and IP packets do not
have special data fields (Optional = 0), what percentage of actual data will be contained in
each IP datagram:
A. 20%
B. 40%
C. 60%
D. 80%

Question 1.149: The default TCP port used for an FTP server is:
A. 20 and 21
B. 80 and 8080
C. 110 and 80
D. 8080 and 1080

Question 1.150: In a UDP data packet, the address used to identify the receiving process is
located at:
A. Byte 1 and 2
B. Byte 3 and 4
C. Byte 5 and 6
D. Undefined

Question 1.151: The TCP and UDP protocols operate at which layer in the following layers:
A. Transport
B. Network
C. Application
D. Presentation

Question 1.152: The TCP protocol works at which layer in the OSI model:
A. Application layer
B. Transport layer
C. Network layer
D. Data Link layer

Question 1.153: Which of the following protocols does not guarantee that the sent data will
reach the receiver completely:
A. TCP
B. ASP
C. UDP
D. ARP

Question 1.154: Transport layer protocols:


A. Control the transmission of data between two processes on a computer network
B. Control the content of exchanged messages between two processes and the behavior of
each side upon receiving the message
C. Control the transmission of data between two computers on a network
D. Control the transmission of data between two computers on the same transmission medium

Question 1.155: Suppose the Length field of a UDP data packet has a value of 150. The
actual data will have:
A. 67 bytes
B. 142 bytes
C. 150 bytes
D. 158 bytes

Question 1.156: Observing a person accessing a webpage and typing the following path:
http://www.tomang.net:3000. How does the Web server for this page use the TCP port:
A. Uses the default port
B. Does not use the default port
C. Uses the standard port
D. Uses a specific port for the Web server

Question 1.157: A UDP socket is identified by:


A. Source IP address, destination IP address
B. Source IP address, source port number
C. Destination IP address, destination port number
D. Source IP address, destination IP address, source port number, destination port number

Question 1.158: A TCP socket is identified by:


A. Source IP address, destination IP address
B. Source IP address, source port number, destination IP address
C. Source IP address, destination IP address, destination port number
D. Source IP address, source port number, destination IP address, destination port number

Question 1.159: A reliable data transfer protocol (rdt) needs to be used on:
A. High-reliability channels
B. Unreliable channels
C. Both of the above
D. Neither of the above

Question 1.160: The complexity of the reliable data transfer protocol (rdt) depends on:
A. Network architecture
B. Network devices (routers, switches, hubs, etc.)
C. Characteristics of the transmission channel
D. The distance between hosts

You might also like