Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16
bits, Data
* Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data
* Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16
bits, Data
* Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits,
Data

1 Answer

Answer :

Correct answer: A
The UDP format for a segment is as follows:
Source Port 16 bits
Destination Port 16 bits
Length 16 bits
Checksum 16 bits
Data xx bits

Related questions

Description : Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? * ICMP * UDP * TCP * TFTP

Last Answer : Correct answer: A ICMP (Internet Control Message Protocol) is a network layer internet protocol described in RFC # 792. ICMP reports IP packet information such as destination Unreachable, Time ... Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply.

Description : Which processes does TCP, but not UDP, use? a. Windowing b. Acknowledgements c. Both a and b d. Destination Port

Last Answer : c. Both a and b

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : What do you mean by TCP and UDP?

Last Answer : TCP stands for Transfer control protocol and UDP stands for User Datagrams protocol and TCP is a connection-oriented protocol and UDP is a Connectionless protocol.

Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP

Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : When using access lists, what does a Cisco router check first? * To see if the packet is routable or bridgeable * The destination address * The source address * The packet contents

Last Answer : Correct answer: A The first thing checked is to see if the packet is routable or bridgeable. If it is not, the packet will be dropped.

Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP

Last Answer : C. port

Description : In the TCP/IP protocol suite, which one of the following is NOT part of the IP header? a. Fragment Offset b. Source IP address c. Destination IP address d. Destination port number

Last Answer : d. Destination port number

Description : Explain the different Layers of TCP/IP Model.

Last Answer : Application Layer, Transport Layer, Network or Internet Layer, Network interface layer.

Description : What do you mean by the TCP/IP Model?

Last Answer : TCP/IP stands for Transmission control protocol and Internet protocol. It describes how the data will get transmitted and routed from end to end communication. 

Description : hosts per subnet. What subnet mask will you use? * 255.255.255.248 * 255.255.255.128 * 255.255.255.192 * 255.255.255.240

Last Answer : Correct answer: A By borrowing 5 bits from the last octet, you can. have 30 subnets. If you borrowed only 4 bits you could only have 14 subnets. The formula is (2 to the power of n)-2. By borrowing ... To get 20 subnets, you would need to borrow 5 bits so the subnet mask would be 255.255.255.248.

Description : The............. layer change bits onto electromagnetic signals.

Last Answer : A) Physical

Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25

Last Answer : b. TCP, 80

Description : Port no.(6346,6347) Gnutella service having which protocols ….. a. TCP b. UDP c. TCP, UDP d. NONE

Last Answer : c. TCP, UDP

Description : . As an ethical hacker, you should scan all ________ UDP and TCP port on each network host that’s found by your scanner. a. 65535 b. 65353 c. 65333 d. 65555

Last Answer : a. 65535

Description : Can i port forward to my entire subnet ?

Last Answer : What are you forwarding? A specific port? DHCP dynamicly assigns IPs to all hosts on the subnet? Is assume this is a home network w\ one NAT\router inbetween all computers and a DSL\cable modem ... to a specific 192. I assume you are port forwarding to allow incomming connections on a specific port?

Description : how can i connect my usb & parallel port printers onto my existing LAN without using any pc and under very low costing.

Last Answer : how can i connect my usb & parallel port printers onto my existing LAN without using any pc and under very low costing. Can u help me?

Description : How many access lists are allowed per interface? * One per port, per protocol * Two per port, per protocol * Unlimited * Router interface +1 per port.

Last Answer : Correct answer: A Only one access list is allowed per interface. An access list must have conditions that test true for all packets that use the access list.

Description : ____ is a process-to-process protocol that adds only port addresses, checksum error control, and length information to the data from the upper layer.

Last Answer : UDP

Description : There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address? * RARP * ARP * RIP * IGRP

Last Answer : Correct answer: A ARP (Address Resolution Protocol) maps an IP address to the MAC address, RARP (Reverse Address Resolution Protocol) maps the MAC address to the IP address. ARP and RARP work at the internet layer of the Internet Model or the network layer of the OSI model.

Description : Length of Port address in TCP/IP is A. 8 bit long B. 4 bit long C. 32 bit long D. 16 bit long

Last Answer : D. 16 bit long

Description : Length of Port address in TCP/IP is a. 8 bit long b. 4 bit long c. 32 bit long d. 16 bit long

Last Answer : d. 16 bit long

Description : Which IP Address Class can have 16 million subnets but support 254 hosts? * Class C * Class A * Class B * Class D

Last Answer : Correct answer: A Possible Subnets IP Address Class Possible Hosts

Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above

Last Answer : C. port addresses

Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams

Last Answer : d. Datagrams

Description : You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary? * 10101100 00010000 * 00000010 10100000 * 10101100 00000000 * 11100000 11110000

Last Answer : Correct answer: A To find the network address, convert the IP address to binary-10101100 000100000 00000010 10100000-then ANDed it with the subnet mask-11111111 11111111 00000000 00000000. The rest is ... that the class of an address can be determined by the numerical value of the first octet

Description : Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many hosts are available? * 254 * 510 * 126 * 16,372

Last Answer : 254

Description : You are given the following address: 15.16.193.6/21. Determine the subnet mask, address class, subnet address, and broadcast address. * 255.255.248.0, A, 15.16.192.0, 15.16.199.255 * 255.255.248.0, B, 15.16.192.0, ... 0, A, 15.16.199.255, 14.15.192.0 * 255.255.242.0, A, 15.16.192.0, 15.16.199.255

Last Answer : Correct answer: A,B & D Subnet addresses in this situation are all in multiples of 8. In this example, 201.222.5.16 is the subnet, 201.22.5.31 is the broadcast address. The rest are valid host IDs on subnet 201.222.5.16.

Description : You are given the following address: 128.16.32.13/30. Determine the subnet mask, address class, subnet address, and broadcast address. * 255.255.255.252, B,128.16.32.12, 128.16.32.15 * 255.255.255.252, C,128.16.32.12 ... , B,128.16.32.15, 128.16.32.12 * 255.255.255.248, B,128.16.32.12, 128.16.32.15

Last Answer : Correct answer: A * 255.255.255.248,

Description : When the router runs out of buffer space, this is called ________. * Source Quench * Redirect * Information Request * Low Memory

Last Answer : Correct answer: A Source quench is the process where the destination router, or end internetworking device will “quench” the date from the “source”, or the source router. This usually happens when the destination router runs out of buffer space to process packets.

Description : What is the maximum segment length of a 100Base-FX network?

Last Answer : The maximum segment length will be 412 meters. 

Description : Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? * Identification * Flags * Frag Offset * Type of Service * Total Length

Last Answer : Correct answer: A, B & C The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) ... Address (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Suppose transmission rate of a channel is 32 kbps. If there are ‘8’ routes from source to destination and each packet p contains 8000 bits. Total end to end delay in sending packet P is _____. a. 2 sec b. 3 sec c. 4 sec d. 1 sec

Last Answer : a. 2 sec

Description : ______________ is useful for time-sensitive application that have very small data units to exchange and do not want the overhead of connection setup. A. TCP B. UDP C. Transport layer D. None of the above.

Last Answer : B. UDP 

Description : Which of the following is not a field in TCP header? a. Sequence number b. Fragment offset c. Checksum d. Window size

Last Answer : b. Fragment offset

Description : In IPv4 header, the field is needed to allow the destination host to determine which datagram a newly arrived fragment belongs to. (A) identification (B) fragment offset (C) time to live (D) header checksum

Last Answer : (A) identification

Description : How many bits internet address isassigned to eachhost on a TCP/IP internet which is used in all communications withthehost? A. 16 - bits B. 32 - bits C. 48 - bits D. 64 - bits E. None of the above

Last Answer : 32 - bits

Description : Which of the following summation operations is performed onthe bits to checkanerror-detecting code? A. Codec B. Coder-decoder C. Checksum D. Attenuation

Last Answer : Checksum

Description : Which one of the following fields of an IP header is NOT modified by a typical IP router? a. Checksum b. Source address c. Time to Live (TTL) d. Length

Last Answer : b. Source address

Description : I haven't networked anything but am going to do that to my computers and printers, plus a tv later. Can I get a good reference book or where should I go to get this done?

Last Answer : answer:Hi @igottaknow, welcome to Fluther! Your network will be built around a router. Everything will connect to that device. And instruction manuals for routers usually give a pretty good introduction, as ... - Home Networking 101 PCWorld - Step-By-Step: How to Build a Safe, Secure Network

Description : Ok, i was host in Modern Warfare 2 today, and people say they lagg but i dont. please help?

Last Answer : it means that they had a sub-par connection to your computer. Because the game is hosted on your computer, you have little to no lagg. I’d suggest stopping any downloads you have going on if you’re going to host, as that tends to hog your bandwidth. Or, you could just let someone else host.

Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : DNS can obtain the ................. of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : DNS can obtain the ..................of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall

Last Answer : 2) Packet Filtering Firewall

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall

Last Answer : 2 Packet Filtering Firewall

Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP

Last Answer : c. TCP

Description : Which protocol does switch use at the layer 2 for finding MAC address? a. ICMP b. UDP c. ARP d. TCP

Last Answer : c. ARP