In this section of Data Communication and Networking – Process-to-Process Delivery: UDP, TCP, and SCTP MCQ (Multiple Choice) Based Questions and Answers,it cover the below lists of topics.All the Multiple Choice Questions and Answers (MCQs) have been compiled from the book of Data Communication and Networking by The well known author behrouz forouzan.

This Section covers below lists of topics.

  1. Average data rate, peak data rate, maximum burst size, and effective band-width MCQs.
  2. Congestion control MCQs.
  3. Open-loop congestion control MCQs.
  4. Quality of service (QoS), Scheduling, traffic shaping, resource reservation, and admission control techniques MCQs.
  5. Scheduling techniques ,FIFO queuing, priority queuing, and weighted fair queuing MCQs.
  6. traffic shaping techniques ,Leaky bucket and token bucket MCQs
  7. Resource Reservation Protocol (RSVP)- a signaling protocol MCQs
  8. Differential Services – a class-based QoS model  MCQs
  9. Attributes to control traffic in Frame Relay,Access rate, committed burst size, committed information rate, and excess burst size MCQs

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. One of the responsibilities of the transport layer protocol is to create a ______ communication.

  • host-to-host
  • process-to-process
  • node-to-node
  • none of the above

2. UDP is called a ________________transport protocol.

  • connectionless, reliable
  • connection-oriented, unreliable
  • connectionless, unreliable
  • none of the above

3. UDP does not add anything to the services of IP except for providing _______ communication

  • node-to-node
  • process-to-process
  • host-to-host
  • none of the above

4. UDP is an acronym for _______

  • User Delivery Protocol
  • User Datagram Procedure
  • User Datagram Protocol
  • none of the above

5. Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm

  • client-server
  • client-client
  • server-server
  • none of the above

6. The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________

  • UDP addresses
  • transport addresses
  • port addresses
  • none of the above

7. The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports

  • well-known
  • registered
  • dynamic
  • none of the above

8. In the sending computer, UDP receives a data unit from the _______ layer.

  • application
  • transport
  • IP
  • none of the above

9. In the sending computer, UDP sends a data unit to the _______ layer

  • application
  • transport
  • IP
  • none of the above

10. UDP and TCP are both _______ layer protocols

  • data link
  • network
  • transport
  • none of the above

11. Which of the following functions does UDP perform?

  • process-to-process communication
  • host-to-host communication
  • end-to-end reliable data delivery
  • none of the above

12. When the IP layer of a receiving host receives a datagram, _______

  • delivery is complete
  • a transport layer protocol takes over
  • a header is added
  • none of the above

13. UDP needs the _______ address to deliver the user datagram to the correct application process

  • port
  • application
  • internet
  • none of the above

14. A port address in UDP is _______bits long.

  • 8
  • 16
  • 32
  • any of the above

15. Which of the following does UDP guarantee?

  • flow control
  • connection-oriented delivery
  • flow control
  • none of the above

16. The source port address on the UDP user datagram header defines _______

  • the sending computer
  • the receiving computer
  • the process running on the sending computer
  • none of the above

17. The combination of an IP address and a port number is called a ____________

  • transport address
  • network address
  • socket address
  • none of the above

18. To use the services of UDP, we need ________ socket addresses

  • four
  • two
  • three
  • none of the above

19. UDP packets are called __________

  • user datagrams
  • segments
  • frames
  • none of the above

20. UDP packets have a fixed-size header of _______ bytes

  • 6
  • 8
  • 40
  • none of the above

21. UDP packets are encapsulated in ___________

  • an Ethernet frame
  • an TCP segment
  • an IP datagram
  • none of the above

22. UDP uses ________ to handle outgoing user datagrams from multiple processes on one host

  • flow control
  • multiplexing
  • demultiplexing
  • none of the above

23. UDP uses _______ to handle incoming user datagrams that go to different processes on the same host.

  • flow control
  • multiplexing
  • demultiplexing
  • none of the above

24. TCP is a __________protocol

  • stream-oriented
  • message-oriented
  • block-oriented
  • none of the above

25. TCP allows the sending process to deliver data as a _______of bytes and allows the receiving process to obtain data as a _________ of bytes

  • message; message
  • stream; stream
  • block; block
  • none of the above

26. Because the sending and the receiving processes may not write or read data at the same speed, TCP ________

  • speeds up the slower process
  • slows down the faster process
  • uses buffers
  • none of the above

27. TCP groups a number of bytes together into a packet called a ___________

  • user datagram
  • segment
  • datagram
  • none of the above

28. TCP is a ___________ protocol.

  • connection-oriented
  • connectionless
  • both a and b
  • none of the above

29. TCP is a(n) _______ transport protocol

  • unreliable
  • best-effort delivery
  • reliable
  • none of the above

30. TCP uses _________________ to check the safe and sound arrival of data.

  • an acknowledgment mechanism
  • out-of-band signalling
  • the services of another protocol
  • none of the above

31. The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a __________________

  • 0
  • 1
  • randomly generated number
  • none of the above

32. TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.

  • first
  • last
  • middle
  • none of the above

33. Communication in TCP is ___________

  • simplex
  • half-duplex
  • full-duplex
  • none of the above

34. The value of the acknowledgment field in a segment defines the number of the ______byte a party expects to receive

  • first
  • last
  • next
  • none of the above

35. The acknowledgment number is ________

  • independent
  • randomly generated
  • cumulative
  • none of the above

36. The value of the window size is determined by _________

  • the sender
  • the receiver
  • both the sender and receiver
  • none of the above

37. The inclusion of the checksum in the TCP segment is ________

  • optional
  • mandatory
  • at the discretion of the application program
  • none of the above

38. A TCP segment is encapsulated in __________

  • an IP datagram
  • an Ethernet frame
  • a UDP user datagram
  • none of the above

39. Connection establishment in TCP is called __________ handshaking

  • two-way
  • four-way
  • one-way
  • none of the above

40. A SYN segment cannot carry data; it consumes _____ sequence number(s).

  • no
  • one
  • two
  • none of the above

41. A SYN + ACK segment cannot carry data; it consumes _____ sequence number(s).

  • no
  • three
  • two
  • none of the above

42. An ACK segment, if carrying no data, consumes ______ sequence number(s).

  • no
  • one
  • two
  • none of the above

43. The connection establishment procedure in TCP is susceptible to a serious security problem called the _________ attack.

  • ACK flooding
  • FIN flooding
  • SYN flooding
  • none of the above

44. The SYN flooding attack belongs to a group of security attacks known as a _____ attack

  • denial of service
  • replay
  • man-in-the middle
  • none of the above

45. The FIN segment consumes ____ sequence numbers if it does not carry data.

  • two
  • three
  • no
  • none of the above

46. The FIN + ACK segment consumes _____ sequence number(s) if it does not carry data

  • two
  • three
  • one
  • none of the above

47. In TCP, one end can stop sending data while still receiving data. This is called a ______.

  • half-close
  • half-open
  • one-way termination
  • none of the above

48. A(n) _________ machine is a machine that goes through a limited number of states.

  • infinite state
  • finite state
  • both a and b
  • none of the above

49. _____ control regulates the amount of data a source can send before receiving an acknowledgment from the destination.

  • Error
  • Flow
  • Congestion
  • none of the above

50. To accomplish flow control, TCP uses a ___________ window protocol

  • limited-size
  • sliding
  • fixed-size
  • none of the above

51. TCP sliding windows are __________ oriented

  • packet
  • segment
  • byte
  • none of the above

52. ACK segments consume _______ sequence number(s) and _______ acknowledged

  • no; are not
  • one; are not
  • no; are
  • none of the above

53. TCP delivers _______ out-of-order segments to the process

  • all
  • no
  • some
  • none of the above

54. IP is responsible for _______ communication while TCP is responsible for _______ communication

  • host-to-host; process-to-process
  • process-to-process; host-to-host
  • process-to-process; network-to-network
  • none of the above

55. If a segment carries data along with an acknowledgment, this is called _______

  • backpacking
  • piggybacking
  • piggypacking
  • none of the above

56. Multiply the header length field by _______ to find the total number of bytes in the TCP header

  • 2
  • 4
  • 6
  • none of the above

57. Urgent data requires the urgent pointer field as well as the URG bit in the _______ field

  • control
  • offset
  • sequence number
  • none of the above

58. The options field of the TCP header ranges from 0 to _______ bytes.

  • 10
  • 20
  • 40
  • none of the above

59. If the ACK value is 200, then byte _______ has been received successfully

  • 199
  • 200
  • 201
  • none of the above

60. Stream Control Transmission Protocol (SCTP) is a new _____________protocol.

  • reliable, character-oriented
  • reliable, message-oriented
  • unreliable, message-oriented
  • none of the above

61. SCTP allows __________ service in each association

  • single stream
  • multistream
  • double stream
  • none of the above

62. SCTP association allows _____________ for each end

  • only one IP address
  • multiple IP addresses
  • only two IP address
  • none of the above

63. In SCTP, a data chunk is numbered using ________

  • a TSN
  • an SI
  • an SSN
  • none of the above

64. To distinguish between different streams, SCTP uses ___________

  • a TSN
  • an SI
  • an SSN
  • none of the above

65. To distinguish between different data chunks belonging to the same stream, SCTP uses ___________

  • TSNs
  • SIs
  • SSNs
  • none of the above

66. TCP has ____________; SCTP has ____________

  • packets; segments
  • segments; packets
  • segments; frames
  • none of the above

67. The control information in SCTP is included in the ________

  • header control field
  • control chunks
  • data chunks
  • none of the above

68. An SCTP packet can carry __________

  • only one data chunk
  • several data chunks
  • no data chunks
  • none of the above

69. In SCTP, the acknowledgment number and window size are part of each ________

  • data chunk
  • control chunk
  • a or b
  • none of the above

70. There is no need for a header length field in SCTP because ________________

  • there are no options in the general header
  • the size of the header is fixed
  • both a and b
  • none of the above

71. The checksum in SCTP is ________ bits.

  • 16
  • 32
  • 64
  • none of the above

72. The association identifier in SCTP is __________________

  • a unique verification tag
  • a combination of logical and port addresses
  • either a or b
  • none of the above

73. In SCTP, control information and data information are carried in _______ chunks.

  • the same chunk
  • different chunks
  • either a or b
  • none of the above

74. In SCTP, acknowledgment numbers are used to acknowledge _____________

  • both data chunks and control chunks
  • only control chunks
  • only data chunks
  • none of the above

75. In an SCTP packet, control chunks come ___________ data chunks

  • after
  • before
  • a or b
  • none of the above

76. In SCTP, ___________ can be carried in a packet that carries an INIT chunk

  • only data chunks
  • only control chunks
  • no other chunk
  • none of the above

77. A connection in SCTP is called an ____________

  • negotiation
  • association
  • transmission
  • none of the above
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook