In this section of Data Communication and Networking – Process-to-Process Delivery: UDP, TCP, and SCTP MCQ (Multiple Choice) Based Questions and Answers,it cover the below lists of topics.All the Multiple Choice Questions and Answers (MCQs) have been compiled from the book of Data Communication and Networking by The well known author behrouz forouzan.
This Section covers below lists of topics.
- Average data rate, peak data rate, maximum burst size, and effective band-width MCQs.
- Congestion control MCQs.
- Open-loop congestion control MCQs.
- Quality of service (QoS), Scheduling, traffic shaping, resource reservation, and admission control techniques MCQs.
- Scheduling techniques ,FIFO queuing, priority queuing, and weighted fair queuing MCQs.
- traffic shaping techniques ,Leaky bucket and token bucket MCQs
- Resource Reservation Protocol (RSVP)- a signaling protocol MCQs
- Differential Services – a class-based QoS model MCQs
- Attributes to control traffic in Frame Relay,Access rate, committed burst size, committed information rate, and excess burst size MCQs
1. One of the responsibilities of the transport layer protocol is to create a ______ communication.
- host-to-host
- process-to-process
- node-to-node
- none of the above
B. process-to-process
2. UDP is called a ________________transport protocol.
- connectionless, reliable
- connection-oriented, unreliable
- connectionless, unreliable
- none of the above
C. connectionless, unreliable
3. UDP does not add anything to the services of IP except for providing _______ communication
- node-to-node
- process-to-process
- host-to-host
- none of the above
B. process-to-process
4. UDP is an acronym for _______
- User Delivery Protocol
- User Datagram Procedure
- User Datagram Protocol
- none of the above
C. User Datagram Protocol
5. Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm
- client-server
- client-client
- server-server
- none of the above
A. client-server
6. The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________
- UDP addresses
- transport addresses
- port addresses
- none of the above
C. port addresses
7. The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports
- well-known
- registered
- dynamic
- none of the above
C. dynamic
8. In the sending computer, UDP receives a data unit from the _______ layer.
- application
- transport
- IP
- none of the above
A. application
9. In the sending computer, UDP sends a data unit to the _______ layer
- application
- transport
- IP
- none of the above
C. IP
10. UDP and TCP are both _______ layer protocols
- data link
- network
- transport
- none of the above
C. transport
11. Which of the following functions does UDP perform?
- process-to-process communication
- host-to-host communication
- end-to-end reliable data delivery
- none of the above
A. process-to-process communication
12. When the IP layer of a receiving host receives a datagram, _______
- delivery is complete
- a transport layer protocol takes over
- a header is added
- none of the above
B. a transport layer protocol takes over
13. UDP needs the _______ address to deliver the user datagram to the correct application process
- port
- application
- internet
- none of the above
A. port
14. A port address in UDP is _______bits long.
- 8
- 16
- 32
- any of the above
B. 16
15. Which of the following does UDP guarantee?
- flow control
- connection-oriented delivery
- flow control
- none of the above
D. none of the above
16. The source port address on the UDP user datagram header defines _______
- the sending computer
- the receiving computer
- the process running on the sending computer
- none of the above
C. the process running on the sending computer
17. The combination of an IP address and a port number is called a ____________
- transport address
- network address
- socket address
- none of the above
C. socket address
18. To use the services of UDP, we need ________ socket addresses
- four
- two
- three
- none of the above
B. two
19. UDP packets are called __________
- user datagrams
- segments
- frames
- none of the above
A. user datagrams
20. UDP packets have a fixed-size header of _______ bytes
- 6
- 8
- 40
- none of the above
B. 8
21. UDP packets are encapsulated in ___________
- an Ethernet frame
- an TCP segment
- an IP datagram
- none of the above
C. an IP datagram
22. UDP uses ________ to handle outgoing user datagrams from multiple processes on one host
- flow control
- multiplexing
- demultiplexing
- none of the above
B. multiplexing
23. UDP uses _______ to handle incoming user datagrams that go to different processes on the same host.
- flow control
- multiplexing
- demultiplexing
- none of the above
C. demultiplexing
24. TCP is a __________protocol
- stream-oriented
- message-oriented
- block-oriented
- none of the above
A. stream-oriented
25. TCP allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes
- message; message
- stream; stream
- block; block
- none of the above
B. stream; stream
26. Because the sending and the receiving processes may not write or read data at the same speed, TCP ________
- speeds up the slower process
- slows down the faster process
- uses buffers
- none of the above
C. uses buffers
27. TCP groups a number of bytes together into a packet called a ___________
- user datagram
- segment
- datagram
- none of the above
B. segment
28. TCP is a ___________ protocol.
- connection-oriented
- connectionless
- both a and b
- none of the above
A. connection-oriented
29. TCP is a(n) _______ transport protocol
- unreliable
- best-effort delivery
- reliable
- none of the above
C. reliable
30. TCP uses _________________ to check the safe and sound arrival of data.
- an acknowledgment mechanism
- out-of-band signalling
- the services of another protocol
- none of the above
A. an acknowledgment mechanism
31. The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________
- 0
- 1
- randomly generated number
- none of the above
C. randomly generated number
32. TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.
- first
- last
- middle
- none of the above
A. first
33. Communication in TCP is ___________
- simplex
- half-duplex
- full-duplex
- none of the above
C. full-duplex
34. The value of the acknowledgment field in a segment defines the number of the ______byte a party expects to receive
- first
- last
- next
- none of the above
C. next
35. The acknowledgment number is ________
- independent
- randomly generated
- cumulative
- none of the above
C. cumulative
36. The value of the window size is determined by _________
- the sender
- the receiver
- both the sender and receiver
- none of the above
B. the receiver
37. The inclusion of the checksum in the TCP segment is ________
- optional
- mandatory
- at the discretion of the application program
- none of the above
B. mandatory
38. A TCP segment is encapsulated in __________
- an IP datagram
- an Ethernet frame
- a UDP user datagram
- none of the above
A. an IP datagram
39. Connection establishment in TCP is called __________ handshaking
- two-way
- four-way
- one-way
- none of the above
D. none of the above
40. A SYN segment cannot carry data; it consumes _____ sequence number(s).
- no
- one
- two
- none of the above
B. one
41. A SYN + ACK segment cannot carry data; it consumes _____ sequence number(s).
- no
- three
- two
- none of the above
D. none of the above
42. An ACK segment, if carrying no data, consumes ______ sequence number(s).
- no
- one
- two
- none of the above
A. no
43. The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.
- ACK flooding
- FIN flooding
- SYN flooding
- none of the above
C. SYN flooding
44. The SYN flooding attack belongs to a group of security attacks known as a _____ attack
- denial of service
- replay
- man-in-the middle
- none of the above
A. denial of service
45. The FIN segment consumes ____ sequence numbers if it does not carry data.
- two
- three
- no
- none of the above
D. none of the above
46. The FIN + ACK segment consumes _____ sequence number(s) if it does not carry data
- two
- three
- one
- none of the above
C. one
47. In TCP, one end can stop sending data while still receiving data. This is called a ______.
- half-close
- half-open
- one-way termination
- none of the above
A. half-close
48. A(n) _________ machine is a machine that goes through a limited number of states.
- infinite state
- finite state
- both a and b
- none of the above
B. finite state
49. _____ control regulates the amount of data a source can send before receiving an acknowledgment from the destination.
- Error
- Flow
- Congestion
- none of the above
B. Flow
50. To accomplish flow control, TCP uses a ___________ window protocol
- limited-size
- sliding
- fixed-size
- none of the above
B. sliding
51. TCP sliding windows are __________ oriented
- packet
- segment
- byte
- none of the above
C. byte
52. ACK segments consume _______ sequence number(s) and _______ acknowledged
- no; are not
- one; are not
- no; are
- none of the above
A. no; are not
53. TCP delivers _______ out-of-order segments to the process
- all
- no
- some
- none of the above
B. no
54. IP is responsible for _______ communication while TCP is responsible for _______ communication
- host-to-host; process-to-process
- process-to-process; host-to-host
- process-to-process; network-to-network
- none of the above
A. host-to-host; process-to-process
55. If a segment carries data along with an acknowledgment, this is called _______
- backpacking
- piggybacking
- piggypacking
- none of the above
B. piggybacking
56. Multiply the header length field by _______ to find the total number of bytes in the TCP header
- 2
- 4
- 6
- none of the above
B. 4
57. Urgent data requires the urgent pointer field as well as the URG bit in the _______ field
- control
- offset
- sequence number
- none of the above
A. control
58. The options field of the TCP header ranges from 0 to _______ bytes.
- 10
- 20
- 40
- none of the above
C. 40
59. If the ACK value is 200, then byte _______ has been received successfully
- 199
- 200
- 201
- none of the above
A. 199
60. Stream Control Transmission Protocol (SCTP) is a new _____________protocol.
- reliable, character-oriented
- reliable, message-oriented
- unreliable, message-oriented
- none of the above
B. reliable, message-oriented
61. SCTP allows __________ service in each association
- single stream
- multistream
- double stream
- none of the above
B. multistream
62. SCTP association allows _____________ for each end
- only one IP address
- multiple IP addresses
- only two IP address
- none of the above
B. multiple IP addresses
63. In SCTP, a data chunk is numbered using ________
- a TSN
- an SI
- an SSN
- none of the above
A. a TSN
64. To distinguish between different streams, SCTP uses ___________
- a TSN
- an SI
- an SSN
- none of the above
B. an SI
65. To distinguish between different data chunks belonging to the same stream, SCTP uses ___________
- TSNs
- SIs
- SSNs
- none of the above
C. SSNs
66. TCP has ____________; SCTP has ____________
- packets; segments
- segments; packets
- segments; frames
- none of the above
B. segments; packets
67. The control information in SCTP is included in the ________
- header control field
- control chunks
- data chunks
- none of the above
B. control chunks
68. An SCTP packet can carry __________
- only one data chunk
- several data chunks
- no data chunks
- none of the above
B. several data chunks
69. In SCTP, the acknowledgment number and window size are part of each ________
- data chunk
- control chunk
- a or b
- none of the above
B. control chunk
70. There is no need for a header length field in SCTP because ________________
- there are no options in the general header
- the size of the header is fixed
- both a and b
- none of the above
C. both a and b
71. The checksum in SCTP is ________ bits.
- 16
- 32
- 64
- none of the above
B. 32
72. The association identifier in SCTP is __________________
- a unique verification tag
- a combination of logical and port addresses
- either a or b
- none of the above
A. a unique verification tag
73. In SCTP, control information and data information are carried in _______ chunks.
- the same chunk
- different chunks
- either a or b
- none of the above
B. different chunks
74. In SCTP, acknowledgment numbers are used to acknowledge _____________
- both data chunks and control chunks
- only control chunks
- only data chunks
- none of the above
C. only data chunks
75. In an SCTP packet, control chunks come ___________ data chunks
- after
- before
- a or b
- none of the above
B. before
76. In SCTP, ___________ can be carried in a packet that carries an INIT chunk
- only data chunks
- only control chunks
- no other chunk
- none of the above
C. no other chunk
77. A connection in SCTP is called an ____________
- negotiation
- association
- transmission
- none of the above
B. association