Description : The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. A. UDP B. Transport layer C. ESP D. SSL
Last Answer : C. ESP
Description : The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer
Last Answer : a) network layer
Description : Breaking physical memory into fixed-sized bloclcs called as: (1) Packets (2) Page (3) Frames (4) Segments
Last Answer : Frames
Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above
Last Answer : Provision of sequence number in the header of message
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly
Last Answer : a. all UDP packets are treated independently by transport layer
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____
Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly
Last Answer : A. all UDP packets are treated independently by transport layer
Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly
Last Answer : all UDP packets are treated independently by transport layer
Description : Generally TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP because a. UDP is slower b. DNS servers has to keep connections c. DNS requests are generally very small and fit well within UDP segments d. None of these
Last Answer : c. DNS requests are generally very small and fit well within UDP segments
Description : The network layer is concerned with __________ of data. a. bits b. frames c. packets d. bytes
Last Answer : c. packets
Description : The network layer encapsulates the data into _______of data. A. bits B. frames C. packets D. bytes
Last Answer : C. packets
Description : The network layer is concerned with __________ of data. a) bits b) frames c) packets d) bytes
Last Answer : c) packets
Description : The size limit for datagrams in UDP is A) 128 B) 16 C) 64 D) 4
Last Answer : The size limit for datagrams in UDP is 16
Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits
Description : _________ does not provide reliable end to end communication. a. TCP b. UDP c. Both TCP and UDP d. Neither TCP nor UDP
Last Answer : b. UDP
Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b
Last Answer : C. Congestion
Description : Network layer protocol exits in _________ a. Host b. Switches c. Packets d. Bridges
Last Answer : a. Host
Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A) Thedo not fragment bit is set to 1 for all three datagrams. B) The more fragment bit ... Theidentification fieldis the same for all three datagrams. D) Theoffset field is thesame for all three datagrams
Last Answer : Theidentification fieldis the same for all three datagrams.
Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications
Last Answer : b. It does three way handshake before sending datagrams
Description : What are the problems involved in an IP Fragmentation Process? A. Loss of any fragment results in rejection of all datagrams B. Management of buffer space is essential to handle reassembly process C. No necessity of initializing ... -oriented IP service a. A & B b. C & D c. B& C d. A & D
Last Answer : a. A & B
Description : An IPv4 datagram is fragmented into three smaller datagrams. Which of the following is true? A. The do not fragment bit is set to 1 for all three datagrams. B. The more fragment bit is set to 0 ... field is the same for all three datagrams. D. The offset field is the same for all three datagrams
Last Answer : C. The identification field is the same for all three datagrams.
Description : Inthe _________ protocol weavoid unnecessary transmissionby sending only frames that are corrupted. A) Stop-and-Wait ARQ B) Go-Back-N ARQ C) Selective-Repeat ARQ D) none of the above
Last Answer : Selective-Repeat ARQ
Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ a. piggybacking b. cyclic redundancy check c. fletcher’s checksum d. parity check
Last Answer : a. piggybacking
Description : The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ A. piggybacking B. cyclic redundancy check C. fletcher’s checksum D. parity check
Last Answer : A. piggybacking
Description : The checksum of0000 and0000 is__________. A) 1111 B) 0000 C) 1110 D) 0111
Last Answer : 0111
Description : The checksum of1111 and1111 is_________. A) 1111 B) 0000 C) 1110 D) 0111
Last Answer : 1110
Description : Which error detection method consists of just one redundant bit per data unit? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Simple parity check
Description : Which error detection method usesone's complement arithmetic? A) Simple parity check B) Two-dimensionalparity check C) CRC D) Checksum
Last Answer : Checksum
Description : The IPv4header field formerly knownas the service type field is now calledthe _______ field. A) IETF B) checksum C) differentiatedservices D) noneof the above
Last Answer : differentiatedservices
Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above
Last Answer : Frame check sequence
Description : Which of the following summation operations is performed onthe bits to checkanerror-detecting code? A. Codec B. Coder-decoder C. Checksum D. Attenuation
Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum
Last Answer : B) IP address
Description : Which of the following is not a field in TCP header? a. Sequence number b. Fragment offset c. Checksum d. Window size
Last Answer : b. Fragment offset
Description : Using which method in transport layer data integrity can be ensured? a. Checksum b. Repetition codes c. Cyclic redundancy checks d. Error correcting codes
Last Answer : a. Checksum
Description : Which one of the following fields of an IP header is NOT modified by a typical IP router? a. Checksum b. Source address c. Time to Live (TTL) d. Length
Last Answer : b. Source address
Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields
Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field
Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above
Last Answer : c. Checksum
Description : If the frame to be transmitted is 1101011011 and the CRC polynomial to be used for generating checksum is x 4+ x + 1, then what is the transmitted frame? a. 11010110111011 b. 11010110111101 c. 11010110111110 d. 11010110111001
Last Answer : c. 11010110111110
Description : Which error detection method uses one's complement arithmetic? A. Simple parity check B. Two-dimensional parity check C. CRC D. Checksum
Last Answer : D. Checksum
Description : Define checksum. What are the steps followedinchecksumgenerator?
Last Answer : The error detection method used by the higher layer protocol iscalledchecksum. Checksumisbased on redundancy. a) Units are divided into k sections eachof n bits. b) All sectionsareaddedtogetherusing ... get the sum. c) The sumis complemented andbecomethechecksum.d)Thechecksumissent with the data.
Description : Checksum is used in Internet by several protocols although not at the _________ a) Session layer b) Transport layer c) Network layer d) Data link layer
Last Answer : d) Data link layer
Description : TCP and UDP are called ________ a. Application protocols b. Session protocols c. Transport protocols d. Network protocols
Last Answer : c. Transport protocols
Description : The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________ A. UDP addresses B. transport addresses C. port addresses D. none of the above
Last Answer : C. port addresses
Description : TCP and UDP are called ________ A. Application protocols B. Session protocols C. Transport protocols D. Network protocols
Last Answer : C. Transport protocols
Description : An IGMP packet is carried in an __________ packet. A) UDP B) IP C) Ethernet frame D) noneof the above
Last Answer : IP
Description : IGMP isa companion to the ______protocol. A) UDP B) TCP C) ICM D) noneof the above
Last Answer : noneof the above
Description : Which of the following TCP/IP protocolallows an application program on one machine to senda datagram to anapplicationprogram onanother machine? A. UDP B. VMTP C. X.25 D. SMTP E. None of the above
Last Answer : UDP
Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt
Last Answer : A) UDP
Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25
Last Answer : b. TCP, 80
Description : Which one of the following uses UDP as the transport protocol? a. HTTP b. Telnet c. DNS d. SMTP
Last Answer : c. DNS