Which processes does TCP, but not UDP,
use?
a. Windowing
b. Acknowledgements
c. Both a and b
d. Destination Port

1 Answer

Answer :

c. Both a and b

Related questions

Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25

Last Answer : b. TCP, 80

Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP

Last Answer : C. port

Description : In the TCP/IP protocol suite, which one of the following is NOT part of the IP header? a. Fragment Offset b. Source IP address c. Destination IP address d. Destination port number

Last Answer : d. Destination port number

Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above

Last Answer : C. port addresses

Description : Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? * ICMP * UDP * TCP * TFTP

Last Answer : Correct answer: A ICMP (Internet Control Message Protocol) is a network layer internet protocol described in RFC # 792. ICMP reports IP packet information such as destination Unreachable, Time ... Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply.

Description : _________ does not provide reliable end to end communication. a. TCP b. UDP c. Both TCP and UDP d. Neither TCP nor UDP

Last Answer : b. UDP

Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server

Last Answer : A. electronic mail, server (storage)

Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP

Last Answer : c. TCP

Description : Which protocol does switch use at the layer 2 for finding MAC address? a. ICMP b. UDP c. ARP d. TCP

Last Answer : c. ARP

Description : IGMP isa companion to the ______protocol. A) UDP B) TCP C) ICM D) noneof the above

Last Answer : noneof the above

Description : Which of the following TCP/IP protocolallows an application program on one machine to senda datagram to anapplicationprogram onanother machine? A. UDP B. VMTP C. X.25 D. SMTP E. None of the above

Last Answer : UDP

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP

Description : Generally TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP because a. UDP is slower b. DNS servers has to keep connections c. DNS requests are generally very small and fit well within UDP segments d. None of these

Last Answer : c. DNS requests are generally very small and fit well within UDP segments

Description : Which of the following transport layer protocols is used to support electronic mail? a. SMTP b. IP c. TCP d. UDP

Last Answer : c. TCP

Description : The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are: a. TCP, UDP, UDP and TCP b. UDP, TCP, TCP and UDP c. UDP, TCP, UDP and TCP d. TCP, UDP, TCP and UDP

Last Answer : c. UDP, TCP, UDP and TCP

Description : TCP and UDP are called ________ a. Application protocols b. Session protocols c. Transport protocols d. Network protocols

Last Answer : c. Transport protocols

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new transport protocol at the same layer as TCP and ... , 3. false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : D. 1.false, 2. true, 3. true

Description : TCP and UDP are called ________ A. Application protocols B. Session protocols C. Transport protocols D. Network protocols

Last Answer : C. Transport protocols

Description : Which of the following are used as transport layer protocols in networking? A. TCP and FTP B. UDP and HTTP C. TCP and UDP D. HTTP and FTP

Last Answer : C. TCP and UDP

Description : Which of the following are transport layer protocols used in networking? a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP

Last Answer : c) TCP and UDP

Description : Explain UDP & TCP.

Last Answer : Source port address ∙ Destination port address ∙ Total length ∙ Checksum Transmission Control Protocol(TCP) ∙ Source port address ∙ Destination port address ∙ Sequence number ∙ Acknowledgement ... ∙ Control ∙ Window size ∙ Check sum ∙ Urgent pointer ∙ Options and padding

Description : Port no.(6346,6347) Gnutella service having which protocols ….. a. TCP b. UDP c. TCP, UDP d. NONE

Last Answer : c. TCP, UDP

Description : . As an ethical hacker, you should scan all ________ UDP and TCP port on each network host that’s found by your scanner. a. 65535 b. 65353 c. 65333 d. 65555

Last Answer : a. 65535

Description : In SMTP mail transaction flow, the sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ………. a. 220 service ready message b. 421 service not available message c. Both of the above d. None of the above

Last Answer : c. Both of the above

Description : The sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ____ Service ready message.. A. 420 B. 320 C. 220 D. 120

Last Answer : C. 220

Description : A _____ is a TCP name for a transport service access point. a. port b. pipe c. node d. protocol

Last Answer : a. port

Description : A _____ is a TCP name for a transport service access point. a. port b. pipe c. node d. protocol

Last Answer : a. port

Description : The client code recognizes the SSL request and establishes a connection through TCP port ____ to the SSL code on the server A. 1023 B. 402 C. 443 D. 8080

Last Answer : C. 443

Description : Typically the TCP port used by SMTP is A. 25 B. 35 C. 50 D. 15

Last Answer : A. 25

Description : Length of Port address in TCP/IP is A. 8 bit long B. 4 bit long C. 32 bit long D. 16 bit long

Last Answer : D. 16 bit long

Description : Length of Port address in TCP/IP is a. 8 bit long b. 4 bit long c. 32 bit long d. 16 bit long

Last Answer : d. 16 bit long

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check

Last Answer : a. piggybacking

Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check

Last Answer : A. piggybacking

Description : What do you mean by TCP and UDP?

Last Answer : TCP stands for Transfer control protocol and UDP stands for User Datagrams protocol and TCP is a connection-oriented protocol and UDP is a Connectionless protocol.

Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP

Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP

Description : Which is a link layer protocol? a) ARP b) TCP c) UDP d) HTTP

Last Answer : b) TCP

Description : Which transport layer protocols is used by DHCP? a. RSVP b. TCP c. DCCP d. UDP

Last Answer : d. UDP

Description : Which transport layer protocols is used by DHCP:- a. RSVP b.TCP c. DCCP d. UDP

Last Answer : d. UDP

Description :  TCP and UDP are called? A. Application protocols B. Session protocols C. Transport protocols D. Network protocols

Last Answer : C. Transport protocols  

Description : Which protocol is used to link all the devices in the IoT? A. TCP/IP B. Network C. UDP D. HTTP

Last Answer : A. TCP/IP 

Description : ______________ is useful for time-sensitive application that have very small data units to exchange and do not want the overhead of connection setup. A. TCP B. UDP C. Transport layer D. None of the above.

Last Answer : B. UDP 

Description : Compare TCP and UDP

Last Answer : Characteristics TCP UDP Connection TCP is connection oriented Protocol UDP is connection less Protocol  Reliability It provides reliable delivery of messages It provides unreliable delivery of ... FTP, Telnet, SMTP, DNS, HTTP, POP DNS, BOOTP, DHCP, TFTP, RIP

Description : List two advantages of using UDP over TCP.

Last Answer : Advantages of using UDP over TCP : 1) UDP is connection less and unreliable transport layer protocol. i.e. It does not require to maintain a connection. 2) UDP is transaction oriented and ... UDP is faster since it does not require acknowledgment. 4) Useful when time sensitivity is more important

Description : What is Onion diagram illustrates? a) It illustrates the connection between the layers in communications protocols, such as the International Standards Organization Open Systems Interconnection (ISO OSI) model,or the ... with the kernel at the core c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned