تواصل معنا

كورس جافا سوينج
كورس أختبار البرمجيات
الان ومجانا لمدة شهر اللهم ارفع عنا البلاء والوباء
كورس لغة الدارت والفلتر
عن المدونة
Mohon Aktifkan Javascript!Enable JavaScript

السبت، 22 يونيو 2019

Computer Networks Questions & Answers – TCP-2 MCQ أسئله شبكات بالأجابات الجزء الثالث والثلاثون

Computer Networks Questions & Answers – TCP-2 


 
1. The receiver of the data controls the amount of data that are to be sent by the sender is referred as ___________
a) Flow control
b) Error control
c) Congestion control
d) Error detection

Answer: a
Explanation: Flow control is done to prevent the receiver from being overwhelmed with data.


2. Size of TCP segment header ranges between ___________
a) 16 and 32 bytes
b) 16 and 32 bits
c) 20 and 60 bytes
d) 20 and 60 bits

Answer: c
Explanation: The header is 20 bytes if there are no options and upto 60 bytes if it contains options.


3. Connection establishment in TCP is done by which mechanism?
a) Flow control
b) Three-Way Handshaking
c) Forwarding
d) Synchronisation

Answer: b
Explanation: Three-Way Handshaking is used to connect between client and server.


4. The server program tells its TCP that it is ready to accept a connection. This process is called ___________
a) Active open
b) Active close
c) Passive close
d) Passive open

Answer: d
Explanation: This is the first step in the Three-Way Handshaking process and is started by the server.


5. The process of, A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server is ___________
a) Active open
b) Active close
c) Passive close
d) Passive open

Answer: a
Explanation: This is the second step in the Three-Way Handshaking process and is done by the client once it finds the open server.


6. In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is ___________
a) Mutual open
b) Mutual Close
c) Simultaneous open
d) Simultaneous close

Answer: c
Explanation: Here, both TCP’s transmit a SYNC+ACK segment to each other and one single connection is established between them.


7. The situation when a malicious attacker sends a large number of SYNC segments to a server, pretending that each of them is coming from a different client by faking the source IP address in the datagrams.
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack

Answer: a
Explanation: This is the serious security problem during the connection establishment.


8. SYNC flooding attack belongs to a type of security attack known as ___________
a) SYNC flooding attack
b) Active attack
c) Passive attack
d) Denial-of-service attack

Answer: d
Explanation: During SYNC flooding the system collapses and denies service to every request.


9. Size of source and destination port address of TCP header respectively are ___________
a) 16-bits and 32-bits
b) 16-bits and 16-bits
c) 32-bits and 16-bits
d) 32-bits and 32-bits

Answer: b
Explanation: Size of source and destination ports must be 32-bits.


10. What allows TCP to detect lost segments and in turn recover from that loss?
a) Sequence number
b) Acknowledgment number
c) Checksum
d) Both Sequence & Acknowledgment number

Answer: b
Explanation: TCP header contains separate fields for sequence number and acknowledgment number. Its these values that allow TCP to detect lost segments and in turn recover from that loss.


ليست هناك تعليقات:

إرسال تعليق