Computer Networks Questions & Answers – TCP-2
1. The receiver of the data controls the amount of data that are to be sent by the sender is referred as ___________
a) Flow control
b) Error control
c) Congestion control
d) Error detection
Answer: a
Explanation: Flow control is done to prevent the receiver from being overwhelmed with data.
Explanation: Flow control is done to prevent the receiver from being overwhelmed with data.
2. Size of TCP segment header ranges
between ___________
a) 16 and 32 bytes
b) 16 and 32 bits
c) 20 and 60 bytes
d) 20 and 60 bits
a) 16 and 32 bytes
b) 16 and 32 bits
c) 20 and 60 bytes
d) 20 and 60 bits
Answer: c
Explanation: The header is 20 bytes if there are no options and upto 60 bytes if it contains options.
Explanation: The header is 20 bytes if there are no options and upto 60 bytes if it contains options.
3. Connection establishment in TCP
is done by which mechanism?
a) Flow control
b) Three-Way Handshaking
c) Forwarding
d) Synchronisation
a) Flow control
b) Three-Way Handshaking
c) Forwarding
d) Synchronisation
Answer: b
Explanation: Three-Way Handshaking is used to connect between client and server.
Explanation: Three-Way Handshaking is used to connect between client and server.
4. The server program tells its TCP
that it is ready to accept a connection. This process is called ___________
a) Active open
b) Active close
c) Passive close
d) Passive open
a) Active open
b) Active close
c) Passive close
d) Passive open
Answer: d
Explanation: This is the first step in the Three-Way Handshaking process and is started by the server.
Explanation: This is the first step in the Three-Way Handshaking process and is started by the server.
5. The process of, A client that
wishes to connect to an open server tells its TCP that it needs to be connected
to that particular server is ___________
a) Active open
b) Active close
c) Passive close
d) Passive open
a) Active open
b) Active close
c) Passive close
d) Passive open
Answer: a
Explanation: This is the second step in the Three-Way Handshaking process and is done by the client once it finds the open server.
Explanation: This is the second step in the Three-Way Handshaking process and is done by the client once it finds the open server.
6. In Three-Way Handshaking process,
the situation where both the TCP’s issue an active open is ___________
a) Mutual open
b) Mutual Close
c) Simultaneous open
d) Simultaneous close
a) Mutual open
b) Mutual Close
c) Simultaneous open
d) Simultaneous close
Answer: c
Explanation: Here, both TCP’s transmit a SYNC+ACK segment to each other and one single connection is established between them.
Explanation: Here, both TCP’s transmit a SYNC+ACK segment to each other and one single connection is established between them.
7. The situation when a malicious
attacker sends a large number of SYNC segments to a server, pretending that
each of them is coming from a different client by faking the source IP address
in the datagrams.
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack
Answer: a
Explanation: This is the serious security problem during the connection establishment.
Explanation: This is the serious security problem during the connection establishment.
8. SYNC flooding attack belongs to a
type of security attack known as ___________
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack
Answer: d
Explanation: During SYNC flooding the system collapses and denies service to every request.
Explanation: During SYNC flooding the system collapses and denies service to every request.
9. Size of source and destination
port address of TCP header respectively are ___________
a) 16-bits and 32-bits
b) 16-bits and 16-bits
c) 32-bits and 16-bits
d) 32-bits and 32-bits
a) 16-bits and 32-bits
b) 16-bits and 16-bits
c) 32-bits and 16-bits
d) 32-bits and 32-bits
Answer: b
Explanation: Size of source and destination ports must be 32-bits.
Explanation: Size of source and destination ports must be 32-bits.
10. What allows TCP to detect lost
segments and in turn recover from that loss?
a) Sequence number
b) Acknowledgment number
c) Checksum
d) Both Sequence & Acknowledgment number
a) Sequence number
b) Acknowledgment number
c) Checksum
d) Both Sequence & Acknowledgment number
Answer: b
Explanation: TCP header contains separate fields for sequence number and acknowledgment number. Its these values that allow TCP to detect lost segments and in turn recover from that loss.
Explanation: TCP header contains separate fields for sequence number and acknowledgment number. Its these values that allow TCP to detect lost segments and in turn recover from that loss.
ليست هناك تعليقات:
إرسال تعليق