1.
When a host receives a data segment, what allows the host to
determine which application should receive the segment? | |
IP source address | |
IP destination address | |
PAR | |
sliding window | |
port number | |
SYN packet |
What is the purpose of using port numbers in the transport layer?
| |
to identify the segment as being either TCP or UDP | |
to provide reliability during data transport | |
to identify the interface port number used by the router when forwarding data | |
to track multiple conversations that occur between hosts |
Why is TCP considered a connection-oriented protocol?
| |
It establishes a virtual connection between hosts using a two-way handshake. | |
It uses IP to guarantee delivery of packets between hosts. | |
It requires hosts to go through a synchronization process prior to data transmission. | |
It creates a connection that depends on application layer protocols for error detection. |
Which of the following would an administrator do to defend against
a denial of service SYN flooding attack? (Choose two.) | |
Hide the source of incoming IP addresses. | |
Decrease the connection timeout period. | |
Synchronize all host communication. | |
Increase the connection queue size. | |
Flood the network with false SYN requests. |
Which of the following protocols uses UDP for transport layer
services? | |
SMTP | |
HTTP | |
DNS | |
FTP |
How are originating source port numbers assigned during the data
encapsulation process? | |
assigned manually by the user when starting the application | |
assigned dynamically by the source host | |
assigned by the routing protocol during the lookup process | |
assigned by the destination host during session negotiation |
What is used by UDP to determine if the data or header has been
transferred without corruption? | |
lower layer protocols | |
checksum | |
PAR | |
sliding window | |
acknowledgment and retransmission | |
IP |
|
At which point in the transmission process are segments numbered?
| |
when received | |
when reassembling | |
before transmission | |
while negotiating window size |
A computer programmer is developing software that requires a
reliable stream of data. Which protocol can be used in the software design to
eliminate the need for building error detection and recovery into the
application program? | |
TCP | |
IP | |
ICMP | |
UDP | |
HTTP |
Which of the following are functions of the TCP protocol? (Choose
three.) | |
translation of data | |
synchronization | |
path determination | |
flow control | |
data representation | |
reliability |
Which of the following describe types of port numbers that can be
represented in the headers of TCP and UDP segments? (Choose three.)
| |
connectionless | |
well-known | |
operational | |
dynamic | |
registered | |
static |
What is dynamically assigned by the source host when forwarding
data? | |
destination IP address | |
destination port number | |
default gateway address | |
source IP address | |
source port number |
Which of the following describe how TCP adds reliability to
communication? (Choose three.) | |
Hosts using TCP set up virtual circuits at the beginning of the transmission using the three-way handshake. | |
Hosts using TCP set the error-checking frequency at the beginning of the transmission and maintain this frequency for the duration of the data transfer. | |
When a sending host does not receive an acknowledgment within a timed interval it retransmits data. | |
The receiving host acknowledges that it has received the expected number of segments and requests additional data. | |
The receiving host acknowledges any incorrectly received data and requests retransmission of damaged or missing bytes. | |
The sending host transmits each segment twice to ensure that |
|
In the TCP header, which of the following determines the amount of
data that can be sent before receiving an acknowledgment? | |
segment number | |
priority number | |
window size | |
value in the length field | |
value in the port field | |
acknowledgment number |
VnVista I-Shine
© http://vnvista.com