Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Florida Gulf Coast University GEB 3250 Chapter 12 Quiz 1) TCP is a__protocol

Florida Gulf Coast University GEB 3250 Chapter 12 Quiz 1) TCP is a__protocol

Business

Florida Gulf Coast University

GEB 3250

Chapter 12 Quiz

1) TCP is a__protocol.

  1. stream-oriented
  2. message-oriented
  3. block-oriented
  4. none of the above
  1. ) TCP allows the sending process to deliver data as a                                  of bytes and allows the receiving process

to obtain data as a                               of bytes..

  1. message; message
  2. stream; stream
  3. block; block
  4. none of the above
  1. ) Because the sending and the receiving processes may not write or read data at the same speed, TCP

                .

  1. speeds up the slower process
  2. slows down the faster process
  3. uses buffers
  4. none of the above
  1. ) TCP groups a number of bytes together into a packet called a                                               .
  1. user datagram
  2. segment
  3. datagram
  4. none of the above
  1. ) TCP is a                                     protocol..
  1. connection-oriented
  2. connectionless
  3. both a and b
  4. none of the above
  1. ) TCP is a(n)                           transport protocol.
  1. unreliable
  2. best-effort delivery
  3. reliable
  4. none of the above
  1. ) TCP uses                                                     to check the safe and sound arrival of data.
  1. an acknowledgment mechanism

 

  1. out-of-band signalling
  2. the services of another protocol
  3. none of the above
  1. ) The bytes of data being transferred in each connection are numbered by TCP. The numbering starts

with a                                                    .

  1. 0
  2. 1
  3. randomly generated number
  4. none of the above
  1. ) TCP assigns a sequence number to each segment that is being sent. The sequence number for each

segment is the number of the                          byte carried in that segment.

  1. first
  2. last
  3. middle
  4. none of the above
  1. ) Communication in TCP is                                         .
  1. simplex
  2. half-duplex
  3. full-duplex
  4. none of the above
  1. ) The value of the acknowledgment field in a segment defines the number of the

                byte a party expects to receive.

  1. first
  2. last
  3. next
  4. none of the above
  1. ) The acknowledgment number is                               .
  1. independent
  2. randomly generated
  3. cumulative
  4. none of the above
  1. ) The value of window size is determined by                                   .
  1. the sender
  2. the receiver
  3. both the sender and receiver
  4. none of the above
  1. ) The inclusion of the checksum in the TCP segment is                                     .
  1. optional
  2. mandatory
  3. at the discretion of the application program
  4. none of the above
  1. ) A TCP segment is encapsulated in                                      .
  1. an IP datagram

 

  1. an Ethernet frame
  2. a UDP user datagram
  3. none of the above
  1. ) Connection establishment in TCP is called                                          handshaking.
  1. two-way
  2. four-way
  3. one-way
  4. none of the above
  1. ) A SYN segment cannot carry data; it consumes                              sequence number(s).
  1. no
  2. one
  3. two
  4. none of the above
  1. ) A SYN + ACK segment cannot carry data; it consumes                                   sequence numbers.
  1. no
  2. three
  3. two
  4. none of the above
  1. ) An ACK segment, if carrying no data, consumes                                 sequence number(s).
  1. no
  2. one
  3. two
  4. none of the above
  1. ) The connection establishment procedure in TCP is susceptible to a serious security problem called

the                           attack.

  1. ACK flooding
  2. FIN flooding
  3. SYN flooding
  4. none of the above
  1. ) The SYN flooding attack belongs to a group of security attacks known as a                                     

attack.

  1. denial of service
  2. replay
  3. man-in-the middle
  4. none of the above
  1. ) The FIN segment consumes                    sequence numbers if it does not carry data.
  1. two
  2. three
  3. no
  4. none of the above
  1. ) The FIN + ACK segment consumes                           sequence number(s) if it does not carry data.
  1. two
  2. three
  3. one
  4. none of the above

 

  1. ) In TCP, one end can stop sending data while still receiving data. This is called a                                          

.

  1. half-close
  2. half-open
  3. one-way termination
  4. none of the above
  1. ) A(n)                            machine is a machine that goes through a limited number of states.
  1. infinite state
  2. finite state
  3. both a and b
  4. none of the above
  1. ) A common value for MSL is between                   seconds and             minute(s). A) 30: 2

B) 30; 1

C) 50; 1

D) none of the above

  1. )                           control regulates the amount of data a source can send before receiving an acknowledgment from the destination. .
  1. Error
  2. Flow
  3. Congestion
  4. none of the above
  1. )To accomplish flow control, TCP uses a                                            window protocol.
  1. limited-size
  2. sliding
  3. fixed-size
  4. none of the above

 

  1. )TCP sliding windows are
  1. packet
  2. segment
  3. byte
  4. none of the above
  1. )In TCP, the size of the window is the
  1. maximum
  2. sum of
  3. minimum
  4. none of the above
 

oriented.

 

 

 

 

 

 

 

 

 

 

 

 

of rwnd and cwnd.

 

  1. )In TCP, the window should not be                                   .
  1. opened
  2. closed
  3. shrunk
  4. none of the above
  1. )In TCP, the receiver can temporarily shut down the window; the sender, however, can always send a

segment of                 byte(s) after the window is shut down.

  1. ten

 

  1. zero
  2. one
  3. none of the above
  1. )A serious problem can arise in the sliding window operation when either the sending application

program creates data slowly or the receiving application program consumes data slowly, or both. This

problem is called the                      .

  1. silly window syndrome
  2. unexpected syndrome
  3. window bug
  4. none of the above
  1. )Nagle's algorithm can solve the silly window syndrome created by the                                          .
  1. sender
  2. receiver
  3. both sender and receiver
  4. none of the above
  1. )Clark's solution can solve the silly window syndrome created by the                                           .
  1. sender
  2. receiver
  3. both sender and receiver
  4. none of the above
  1. )Delayed acknowledgment can solve the silly window syndrome created by the

                        .

  1. sender
  2. receiver
  3. both sender and receiver
  4. none of the above
  1. ) CK segments consume                           sequence number(s) and                         acknowledged.
  1. no; are not
  2. one; are not
  3. no; are
  4. none of the above
  1. )In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or

                    duplicate ACK segments have arrived.

  1. one
  2. two
  3. three
  4. none of the above
  1. )In TCP,                            retransmission timer is set for an ACK segment.
  1. one
  2. a previous
  3. no
  4. none of the above
  1. )TCP delivers                          out-of-order segments to the process.

 

  1. all
  2. no
  3. some
  4. none of the above
  1. )Lost acknowledgments may create a                              if they are not handled properly.
  1. livelock
  2. deadlock
  3. retransmission
  4. none of the above
  1. 0In the                          algorithm the size of the congestion window increases exponentially until it reaches a

threshold.

  1. congestion avoidance
  2. congestion detection
  3. slow start
  4. none of the above
  1. )In the                               algorithm the size of the congestion window increases additively until congestion is

detected.

  1. congestion avoidance
  2. congestion detection
  3. slow start
  4. none of the above
  1. )In the congestion detection algorithm, if detection is by a time-out, a new                                     phase starts.
  1. slow start
  2. congestion avoidance
  3. congestion detection
  4. none of the above
  1. )In the congestion detection algorithm, if detection is by three ACKs, a new                                       

phase starts.

  1. slow start
  2. congestion avoidance
  3. congestion detection
  4. none of the above
  1. )In TCP, there can be                         RTT measurement( s) in progress at any time.
  1. two
  2. only one
  3. several
  4. none of the above
  1. )The value of the window scale factor can be determined during                                           .
  1. data transmission
  2. connection establishment
  3. connection termination
  4. none of the above

 

  1. )IP is responsible for                           communication while TCP is responsible for                                 

communication.

  1. host-to-host; process-to-process
  2. process-to-process; host-to-host
  3. process-to-process; network-to-network
  4. none of the above
  1. )If a segment carries data along with an acknowledgment, this is called                                      .
  1. backpacking
  2. piggybacking
  3. piggypacking
  4. none of the above
  1. )Multiply the header length field by                              to find the total number of bytes in the TCP header.
  1. 2
  2. 4
  3. 6
  4. none of the above
  1. )Urgent data requires the urgent pointer field as well as the URG bit in the                                        

field.

  1. control
  2. offset
  3. sequence number
  4. none of the above
  1. )Which of the following is not a valid acknowledgment number?
  1. 0
  2. 1

C) 232

D) none of the above

  1. )The options field of the TCP header ranges from 0 to                                   bytes.
  1. 10
  2. 20
  3. 40
  4. none of the above
  1. )Which option defines the maximum number of bytes in a TCP segment?
  1. maximum segment size
  2. window scale factor
  3. timestamp
  4. none of the above
  1. )If the ACK value is 200, then byte                                has been received successfully. A) 199

B) 200

C) 201

D) none of the above

  1. )The                      timer prevents a long idle connection between two TCPs.
  1. retransmission
  2. persistence

 

  1. keepalive
  2. none of the above
  1. )The                      timer is needed to handle the zero window-size advertisement.
  1. retransmission
  2. persistence
  3. keepalive
  4. none of the above
  1. )Karn's algorithm is used in calculations by the                                    timer.
  1. retransmission
  2. persistence
  3. keepalive
  4. none of the above
  1. )In the                       state, the client TCP has closed its connection to the server.
  1. CLOSED
  2. FIN-WAIT-1
  3. FIN-WAIT-2
  4. none of the above
  1. )A special segment called a probe is sent by a sending TCP when the                                      timer goes off.
  1. transmission
  2. persistence
  3. keepalive
  4. none of the above

 

 

 

 

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

10.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions