_________ does not provide reliable end to
end communication.
a. TCP
b. UDP
c. Both TCP and UDP
d. Neither TCP nor UDP

1 Answer

Answer :

b. UDP

Related questions

Description : Generally TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP because a. UDP is slower b. DNS servers has to keep connections c. DNS requests are generally very small and fit well within UDP segments d. None of these

Last Answer : c. DNS requests are generally very small and fit well within UDP segments

Description : State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new transport protocol at the same layer as TCP and ... , 3. false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : D. 1.false, 2. true, 3. true

Description : Which processes does TCP, but not UDP, use? a. Windowing b. Acknowledgements c. Both a and b d. Destination Port

Last Answer : c. Both a and b

Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server

Last Answer : A. electronic mail, server (storage)

Description : IGMP isa companion to the ______protocol. A) UDP B) TCP C) ICM D) noneof the above

Last Answer : noneof the above

Description : Which of the following TCP/IP protocolallows an application program on one machine to senda datagram to anapplicationprogram onanother machine? A. UDP B. VMTP C. X.25 D. SMTP E. None of the above

Last Answer : UDP

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP

Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25

Last Answer : b. TCP, 80

Description : Which of the following transport layer protocols is used to support electronic mail? a. SMTP b. IP c. TCP d. UDP

Last Answer : c. TCP

Description : The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are: a. TCP, UDP, UDP and TCP b. UDP, TCP, TCP and UDP c. UDP, TCP, UDP and TCP d. TCP, UDP, TCP and UDP

Last Answer : c. UDP, TCP, UDP and TCP

Description : TCP and UDP are called ________ a. Application protocols b. Session protocols c. Transport protocols d. Network protocols

Last Answer : c. Transport protocols

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP

Last Answer : c. TCP

Description : Which protocol does switch use at the layer 2 for finding MAC address? a. ICMP b. UDP c. ARP d. TCP

Last Answer : c. ARP

Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP

Last Answer : C. port

Description : TCP and UDP are called ________ A. Application protocols B. Session protocols C. Transport protocols D. Network protocols

Last Answer : C. Transport protocols

Description : Which of the following are used as transport layer protocols in networking? A. TCP and FTP B. UDP and HTTP C. TCP and UDP D. HTTP and FTP

Last Answer : C. TCP and UDP

Description : Which of the following are transport layer protocols used in networking? a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP

Last Answer : c) TCP and UDP

Description : Explain UDP & TCP.

Last Answer : Source port address ∙ Destination port address ∙ Total length ∙ Checksum Transmission Control Protocol(TCP) ∙ Source port address ∙ Destination port address ∙ Sequence number ∙ Acknowledgement ... ∙ Control ∙ Window size ∙ Check sum ∙ Urgent pointer ∙ Options and padding

Description : In IEEE 802.11, a BSS without an AP is called an _________. A) an ad hocarchitecture B) an infrastructurenetwork C) either (a) or (b) D) neither (a) nor (b)

Last Answer : an ad hocarchitecture

Description : A(n)_________ signal is a composite analogsignal with an infinite bandwidth. A) digital B) analog C) either (a)or (b) D) neither (a) nor (b

Last Answer : digital

Description : A ring SONET network can be _________. A) unidirectional B) bidirectional. C) either (a) or (b) D) neither (a) nor (b)

Last Answer : bidirectional.

Description : UDP packets are called as _________ a. Segments b. Checksum c. Frames d. Datagrams

Last Answer : d. Datagrams

Description : The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. A. UDP B. Transport layer C. ESP D. SSL

Last Answer : C. ESP

Description : State whether the following statements are true/false: 1) The standards of TCP/IP are published in a series of documents called NFC. 2) A Protocol is an agreement between the communicating parties on how communication is to proceed. a. 1.F,2.T b. 1.F, 2.F c. 1.T, 2.T d. 1.T, 2.F

Last Answer : a. 1.F,2.T

Description : A data terminal serves as an a. Effector b. sensor c. both a and b d. neither a nor b

Last Answer : both a and b

Description : In__________, eachstation is forced to send only at the beginning of the time slot. A) pure ALOHA B) slotted ALOHA C) both (a) and (b) D) neither (a) nor (b)

Last Answer : slotted ALOHA

Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)

Last Answer : both (a) and (b)

Description : In___________ thereis alwaysa transition at the middle of the bit, but thebit values are determined at the beginningof the bit. If the nextbit is 0, there is a transition; if the next bit is 1, there is none. A) Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)

Last Answer : differential Manchester

Description : In_______encoding, the duration of the bit is divided into twohalves. Thevoltage remains at one level during thefirst half and moves to the other level in the second half. The transition at the middle of the bit ... Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)

Last Answer : both (a) and (b)

Description : The idea of RZ andthe ideaof NRZ-I are combined into the ________ scheme. A) Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)

Last Answer : differential Manchester

Description : The idea of RZ andthe ideaof NRZ-L are combined into the ________ scheme. A) Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)

Last Answer : Manchester

Description : In______, the changeor lackof change in the level of the voltagedetermines the value of the bit. A) NRZ-I B) NRZ-L C) both (a)and (b) D) neither (a) nor (b)

Last Answer : NRZ-I

Description : In_____, the level of the voltagedetermines the valueof the bit. A) NRZ-I B) NRZ-L C) both (a) and (b) D) neither (a) nor (b)

Last Answer : NRZ-L

Description : A ……………………….. is built from the information exchanged by routing protocols. A. static routing table B. dynamic routing table C. both a and b D. neither a nor b

Last Answer : B. dynamic routing table

Description : . A ………………………... is constructed manually by the system administrator using the route command. A. static routing table B. dynamic routing table C. both a and b D. neither a nor b

Last Answer : A. static routing table

Description : Oral testimony of a witness can be a) Wholly reliable b) Wholy unreliable  c) Neither A nor B d) Both the A and B

Last Answer : a) Wholly reliable

Description : What do you mean by TCP and UDP?

Last Answer : TCP stands for Transfer control protocol and UDP stands for User Datagrams protocol and TCP is a connection-oriented protocol and UDP is a Connectionless protocol.

Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits

Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP

Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? * ICMP * UDP * TCP * TFTP

Last Answer : Correct answer: A ICMP (Internet Control Message Protocol) is a network layer internet protocol described in RFC # 792. ICMP reports IP packet information such as destination Unreachable, Time ... Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply.

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP

Description : Which is a link layer protocol? a) ARP b) TCP c) UDP d) HTTP

Last Answer : b) TCP

Description : Which transport layer protocols is used by DHCP? a. RSVP b. TCP c. DCCP d. UDP

Last Answer : d. UDP

Description : Which transport layer protocols is used by DHCP:- a. RSVP b.TCP c. DCCP d. UDP

Last Answer : d. UDP

Description : Port no.(6346,6347) Gnutella service having which protocols ….. a. TCP b. UDP c. TCP, UDP d. NONE

Last Answer : c. TCP, UDP

Description : . As an ethical hacker, you should scan all ________ UDP and TCP port on each network host that’s found by your scanner. a. 65535 b. 65353 c. 65333 d. 65555

Last Answer : a. 65535