What do you mean by TCP and UDP?

1 Answer

Answer :

TCP stands for Transfer control protocol and UDP stands for User Datagrams protocol and TCP is a connection-oriented protocol and UDP is a Connectionless protocol.

Related questions

Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits

Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP

Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? * ICMP * UDP * TCP * TFTP

Last Answer : Correct answer: A ICMP (Internet Control Message Protocol) is a network layer internet protocol described in RFC # 792. ICMP reports IP packet information such as destination Unreachable, Time ... Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply.

Description : What do you mean by the TCP/IP Model?

Last Answer : TCP/IP stands for Transmission control protocol and Internet protocol. It describes how the data will get transmitted and routed from end to end communication. 

Description : Explain the different Layers of TCP/IP Model.

Last Answer : Application Layer, Transport Layer, Network or Internet Layer, Network interface layer.

Description : What do you mean by Decoder?

Last Answer : A decoder is a program which converts the encrypted data into its actual format. 

Description : What do you mean by SLIP protocol?

Last Answer : SLIP stands for Serial Line Interface Protocol. It is used for sending IP datagram over a network in a single line.

Description : What do you mean by ASCII?

Last Answer : ASCII is the American Standard Code for Information Interchange. 

Description : What do you mean by NIC?

Last Answer : NIC stands for Network interface card. It is an adapter that will be installed on the computer and because of that NIC, only that computer will interact with the network.

Description : What do you mean by Proxy server?

Last Answer : Proxy server prevents the external users which are unauthorized to access the network.

Description : What do you mean by DNS?

Last Answer : DNS Stands for Domain Name System. It’s an internet address mapping process with the local name. We can also can it as an internet phonebook. 

Description : What do you mean by a Firewall?

Last Answer : Firewall is a concept of a security system that will helps computers to protect it with unauthorized access or any cyber-attack.

Description : What do you mean by HTTP?

Last Answer : HTTP stands for Hyper Text Transfer Protocol and the port for this is 80. This protocol is responsible for web content.

Description : What do you mean by Network Topology?

Last Answer : A network topology is a physical structure of the network which defines how the computers or node will be connected to each other.

Description : What do you mean by Node?

Last Answer : In the computer network, the node is known as a device.

Description : What do you mean by Network?

Last Answer : Set of devices connected to each other over the physical medium is known as a computer network. For example the Internet.

Description : What does it mean when a computer is "low on resources?"

Last Answer : The resources a computer has are mainly processing speed, hard disk storage, and memory. The phrase "low on resources" usually means the computer is running out of memory. The best way to prevent this error from coming up is to install more RAM on your machine.

Description : Q.What does it mean to "power cycle" a device?

Last Answer : Power cycling an electronic device is a technical way of saying "resetting" it. When you power cycle a device, you turn it off and then turn it back on again. Pretty high-tech, ... them from functioning correctly. Resetting them typically fixes the errors and allows them to work correctly again.

Description : IGMP isa companion to the ______protocol. A) UDP B) TCP C) ICM D) noneof the above

Last Answer : noneof the above

Description : Which of the following TCP/IP protocolallows an application program on one machine to senda datagram to anapplicationprogram onanother machine? A. UDP B. VMTP C. X.25 D. SMTP E. None of the above

Last Answer : UDP

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP

Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25

Last Answer : b. TCP, 80

Description : Generally TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP because a. UDP is slower b. DNS servers has to keep connections c. DNS requests are generally very small and fit well within UDP segments d. None of these

Last Answer : c. DNS requests are generally very small and fit well within UDP segments

Description : Which of the following transport layer protocols is used to support electronic mail? a. SMTP b. IP c. TCP d. UDP

Last Answer : c. TCP

Description : The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are: a. TCP, UDP, UDP and TCP b. UDP, TCP, TCP and UDP c. UDP, TCP, UDP and TCP d. TCP, UDP, TCP and UDP

Last Answer : c. UDP, TCP, UDP and TCP

Description : _________ does not provide reliable end to end communication. a. TCP b. UDP c. Both TCP and UDP d. Neither TCP nor UDP

Last Answer : b. UDP

Description : TCP and UDP are called ________ a. Application protocols b. Session protocols c. Transport protocols d. Network protocols

Last Answer : c. Transport protocols

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : Which protocol does HTTP (Hyper Text Transfer Protocol) - use for transferring web pages at the Transport layer a. IP b. UDP c. TCP d. ARP

Last Answer : c. TCP

Description : Which protocol does switch use at the layer 2 for finding MAC address? a. ICMP b. UDP c. ARP d. TCP

Last Answer : c. ARP

Description : Which processes does TCP, but not UDP, use? a. Windowing b. Acknowledgements c. Both a and b d. Destination Port

Last Answer : c. Both a and b

Description : State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new transport protocol at the same layer as TCP and ... , 3. false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : D. 1.false, 2. true, 3. true

Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server

Last Answer : A. electronic mail, server (storage)

Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP

Last Answer : C. port

Description : TCP and UDP are called ________ A. Application protocols B. Session protocols C. Transport protocols D. Network protocols

Last Answer : C. Transport protocols

Description : Which of the following are used as transport layer protocols in networking? A. TCP and FTP B. UDP and HTTP C. TCP and UDP D. HTTP and FTP

Last Answer : C. TCP and UDP

Description : Which of the following are transport layer protocols used in networking? a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP

Last Answer : c) TCP and UDP

Description : Explain UDP & TCP.

Last Answer : Source port address ∙ Destination port address ∙ Total length ∙ Checksum Transmission Control Protocol(TCP) ∙ Source port address ∙ Destination port address ∙ Sequence number ∙ Acknowledgement ... ∙ Control ∙ Window size ∙ Check sum ∙ Urgent pointer ∙ Options and padding

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP

Description : Which is a link layer protocol? a) ARP b) TCP c) UDP d) HTTP

Last Answer : b) TCP

Description : Which transport layer protocols is used by DHCP? a. RSVP b. TCP c. DCCP d. UDP

Last Answer : d. UDP

Description : Which transport layer protocols is used by DHCP:- a. RSVP b.TCP c. DCCP d. UDP

Last Answer : d. UDP

Description : Port no.(6346,6347) Gnutella service having which protocols ….. a. TCP b. UDP c. TCP, UDP d. NONE

Last Answer : c. TCP, UDP

Description : . As an ethical hacker, you should scan all ________ UDP and TCP port on each network host that’s found by your scanner. a. 65535 b. 65353 c. 65333 d. 65555

Last Answer : a. 65535

Description :  TCP and UDP are called? A. Application protocols B. Session protocols C. Transport protocols D. Network protocols

Last Answer : C. Transport protocols  

Description : Which protocol is used to link all the devices in the IoT? A. TCP/IP B. Network C. UDP D. HTTP

Last Answer : A. TCP/IP 

Description : ______________ is useful for time-sensitive application that have very small data units to exchange and do not want the overhead of connection setup. A. TCP B. UDP C. Transport layer D. None of the above.

Last Answer : B. UDP