Chapter 7 covers TCP/IP and the Application Layer with 50 multiple-choice questions focusing on topics such as TCP segment headers, ICMP, SIP, IPv4/IPv6, VoIP, and HTTPS. The document includes an answer key for the questions, providing correct answers for each topic. Key concepts include the functionality of TCP headers, the role of ICMP, and the use of protocols in multimedia communication.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
20 views8 pages
Chapter 7 MCQ's
Chapter 7 covers TCP/IP and the Application Layer with 50 multiple-choice questions focusing on topics such as TCP segment headers, ICMP, SIP, IPv4/IPv6, VoIP, and HTTPS. The document includes an answer key for the questions, providing correct answers for each topic. Key concepts include the functionality of TCP headers, the role of ICMP, and the use of protocols in multimedia communication.
1. The TCP header’s “sequence number” field is used to:
a) Reassemble data in the correct order b) Identify the application layer protocol c) Encrypt the payload d) Prioritize traffic
2. ICMP is primarily used for:
a) Error reporting and diagnostics (e.g., ping) b) Routing packets between networks c) Encrypting emails d) Assigning IP addresses
3. SIP (Session Initiation Protocol) is associated with:
a) VoIP and video conferencing b) File transfers c) Network management d) DNS resolution
4. The IPv4 header’s “TTL” field prevents:
a) Infinite looping of packets b) Data corruption c) Unauthorized access d) IP spoofing
5. A Class A IPv4 address has a default subnet mask of:
a) 255.0.0.0 b) 255.255.0.0 c) 255.255.255.0 d) 255.255.255.255
6. VoIP typically uses _____ for real-time transmission.
a) UDP b) TCP c) ICMP d) SNMP
7. Media streaming uses _____ to buffer content.
a) Adaptive bitrate algorithms b) RAID arrays c) MAC address filtering d) Spanning Tree Protocol
8. Telnet is insecure because it sends data in:
a) Plaintext b) Encrypted packets c) Binary format d) Compressed files
9. HTTPS encrypts data using:
a) SSL/TLS b) SNMP c) ARP d) ICMP
10. An IPv6 address is _____ bits long.
a) 128 b) 32 c) 64 d) 256
11. ARP maps _____ to _____.
a) IP address → MAC address b) MAC address → IP address c) Domain name → IP address d) Port number → application
12. Packet-based multimedia protocols prioritize:
a) Low latency and jitter reduction b) High data compression c) Error correction d) MAC address filtering
13. The TCP header flag “SYN” is used to:
a) Initiate a connection b) Terminate a session c) Acknowledge data d) Request retransmission
14. ICMPv6 is used for:
a) IPv6 neighbor discovery and diagnostics b) Encrypting IPv6 traffic c) Assigning MAC addresses d) Routing tables
15. SIP messages include:
a) INVITE and BYE b) GET and POST c) SYN and ACK d) DHCP and DNS
16. The IPv4 “fragmentation offset” field helps:
a) Reassemble fragmented packets b) Prioritize traffic c) Encrypt data d) Assign IP addresses
17. A Class B IPv4 address range starts with:
a) 128.0.0.0 to 191.255.255.255 b) 1.0.0.0 to 126.255.255.255 c) 192.0.0.0 to 223.255.255.255 d) 224.0.0.0 to 239.255.255.255
18. VoIP’s “jitter buffer” compensates for:
a) Variable packet arrival times b) High bandwidth usage c) MAC address conflicts d) RAID failures
19. HTTP operates at the _____ layer of TCP/IP.
a) Application b) Transport c) Internet d) Link
20. The IPv6 loopback address is:
a) ::1 b) 127.0.0.1 c) FE80:: d) 2001::
21. ARP requests are _____ packets.
a) Broadcast b) Unicast c) Multicast d) Anycast
22. RTP (Real-Time Transport Protocol) is used with:
a) VoIP and video streaming b) File transfers c) Email encryption d) Network management
23. The TCP header’s “window size” field manages:
a) Flow control b) Error correction c) Encryption strength d) Port numbers
24. ICMP “Destination Unreachable” messages are generated
by: a) Routers b) Switches c) Hubs d) End-user devices
25. SIP works in conjunction with:
a) RTP and SDP b) TCP and UDP c) ARP and DNS d) RAID and VLAN
26. The IPv4 “protocol” field identifies the _____ layer
protocol. a) Transport b) Network c) Application d) Data Link
27. VoIP codecs like G.711 are used for:
a) Audio compression b) Packet routing c) Error checking d) MAC addressing
28. HTTPS uses port _____ by default.
a) 443 b) 80 c) 22 d) 53
29. An IPv6 address with FF00::/8 is a _____ address.
a) Multicast b) Unicast c) Anycast d) Link-local
30. ARP spoofing attacks exploit:
a) Falsified MAC-IP mappings b) Weak SSL certificates c) Unencrypted Telnet sessions d) RAID vulnerabilities
31. TCP’s “three-way handshake” involves:
a) SYN, SYN-ACK, ACK b) GET, POST, RESPONSE c) INVITE, BYE, ACK d) REQUEST, REPLY, CLOSE
32. ICMP “Time Exceeded” messages are used in:
a) Traceroute b) Ping c) VoIP d) RAID rebuilds
33. SIP’s “REGISTER” method is used for:
a) User location registration b) File transfers c) Network scanning d) Encryption
34. The IPv4 “checksum” field verifies the integrity of the:
a) Header b) Payload c) Entire packet d) MAC address
35. A /24 subnet mask allows _____ host addresses.
a) 254 b) 255 c) 256 d) 512
36. VoIP’s “QoS” (Quality of Service) prioritizes:
a) Voice traffic over data b) RAID redundancy c) MAC address filtering d) Backup processes
37. The “Host” header in HTTP specifies the:
a) Requested domain name b) Source IP address c) MAC address d) Port number
38. An IPv6 link-local address starts with:
a) FE80:: b) 2001:: c) FF00:: d) ::1
39. ARP tables are stored in:
a) Device memory b) RAID arrays c) Cloud servers d) DNS servers
40. RTCP (Real-Time Control Protocol) works with RTP to:
a) Monitor QoS and synchronization b) Encrypt streaming data c) Assign IP addresses d) Manage VLANs
41. TCP’s “PSH” flag instructs the receiver to:
a) Deliver data immediately to the application b) Prioritize the packet c) Encrypt the payload d) Reassemble fragments
42. ICMP “Echo Request” is used in:
a) Ping b) Traceroute c) ARP d) SIP
43. SIP proxies are responsible for:
a) Routing SIP messages b) Encrypting VoIP calls c) Assigning MAC addresses d) Managing RAID arrays
44. The IPv4 “options” field is:
a) Rarely used in modern networks b) Mandatory for all packets c) Used for encryption d) Part of the payload
45. A Class C IPv4 network supports _____ hosts per subnet.
a) 254 b) 65,534 c) 16,777,214 d) 255
46. VoIP’s “latency” refers to:
a) Delay in voice transmission b) Packet loss c) Jitter buffer size d) Bandwidth capacity
47. HTTP/2 improves performance using:
a) Multiplexing and header compression b) Larger packet sizes c) MAC address filtering d) RAID 10
48. The IPv6 “::” notation represents:
a) Consecutive zeros b) Multicast addresses c) Encryption d) Anycast groups
49. Gratuitous ARP is used to:
a) Update ARP tables proactively b) Encrypt data c) Assign IP addresses d) Detect RAID failures
50. TCP’s “MSS” (Maximum Segment Size) is negotiated
during: a) Three-way handshake b) Flow control c) Error correction d) VLAN tagging
Answer Key (Chapter 7):
1. a | 2. a | 3. a | 4. a | 5. a | 6. a | 7. a | 8. a | 9. a | 10. a | 11. a | 12. a |
13. a | 14. a | 15. a | 16. a | 17. a | 18. a | 19. a | 20. a | 21. a | 22. a | 23. a | 24. a | 25. a | 26. a | 27. a | 28. a | 29. a | 30. a | 31. a | 32. a | 33. a | 34. a | 35. a | 36. a | 37. a | 38. a | 39. a | 40. a | 41. a | 42. a | 43. a | 44. a | 45. a | 46. a | 47. a | 48. a | 49. a | 50. a