PART 4: TRANSPORT LAYER
Question 1.127: Which of the following protocols belong to the Transport Layer in the
TCP/IP model:
A. UDP
B. IP
C. TCP
D. Both A and C are correct
Question 1.128: Which protocol provides reliable packet transport:
A. UDP
B. TCP
C. ARP
D. IP
Question 1.129: The Window field in the TCP packet header refers to:
A. Available memory size
B. Operating system
C. Screen size
D. All are incorrect
Question 1.130: A TCP packet that requires a connection will have the flag values:
A. RST=1, SYN=1
B. ACK=1, SYN=1
C. ACK=0, SYN=1
D. FIN=1, SYN=0
Question 1.131: TCP and UDP operate at which layer in the OSI model:
A. Session (Layer 5)
B. Transport (Layer 4)
C. Network (Layer 3)
D. Data Link (Layer 2)
Question 1.132: Which of the following statements is true regarding techniques for efficient
bandwidth usage:
A. Static window flow control
B. Guaranteed rate flow control
C. Dynamic window flow control
D. Dynamic rate flow control
Question 1.133: Which protocols does TCP operate with at the same layer:
A. ARP, RARP
B. UDP
C. TELNET, FTP
D. IP, ARP
Question 1.134: TCP and UDP operate at which layer:
A. Application
B. Network
C. Transport
D. Presentation
Question 1.135: UDP is used for applications that:
A. Require a connection
B. Demand high reliability
C. Require low latency
D. Do not require high reliability
Question 1.136: The Host to Host transport layer operates with the protocol:
A. TCP
B. IP
C. ICMP
D. ARP
Question 1.137: In a UDP packet, the actual data starts from byte:
A. 4
B. 5
C. 8
D. 9
Question 1.138: Which equation best describes the UDP protocol:
A. UDP = IP
B. UDP = TCP - (reliability)
C. UDP = ICMP + (multiplexing by port address)
D. UDP = TCP - IP
Question 1.139: To detect errors in a packet, the technique used is:
A. Sequence number
B. Acknowledgement number
C. Timer
D. Checksum
Question 1.140: When a TCP entity sends a SYNACK segment with an Acknowledgement
Number = 100, it means:
A. The data packet it sends starts with byte 100 in the data stream
B. The first byte of data in the data stream to be sent has sequence number 100
C. It will send from byte 100
D. It expects to receive data starting with byte number 100
Question 1.141: The transport protocol that operates above IP without requiring a connection
before transmission is:
A. UDP
B. TCP
C. HTTP
D. FTP
Question 1.142: The TCP protocol can handle:
A. Lost packets
B. Duplicate packets
C. Out-of-order packets
D. All of the above
Question 1.143: The checksum in a UDP data packet is of length:
A. 4 bits
B. 8 bits
C. 16 bits
D. 32 bits
Question 1.144: The position of the actual data in a TCP data packet starts from byte:
A. 40
B. 32
C. 5
D. Undefined
Question 1.145: Suppose TCP entity A needs to send 1500 bytes to transport entity B. The
first packet contains 1000 bytes of data, and the Sequence Number of this packet is 100. The
Sequence Number of the second packet will be:
A. 1101
B. 1100
C. 500
D. 501
Question 1.146: For TCP, the receiver will inform the sender about the maximum amount of
data it can receive. This value is determined in the field:
A. Sequence Number
B. Acknowledgement Number
C. Rcvr Number
D. Header length
Question 1.147: After TCP entity sends a SYN segment with Sequence Number = 100, it
receives an ACKSYN packet with Sequence Number = 200. The Acknowledgment Number
field of this ACKSYN packet will be:
A. 100
B. 101
C. 200
D. 201
Question 1.148: Suppose an application creates a 60-byte message. This message is placed in
a TCP segment and then in an IP datagram. Assuming both the TCP and IP packets do not
have special data fields (Optional = 0), what percentage of actual data will be contained in
each IP datagram:
A. 20%
B. 40%
C. 60%
D. 80%
Question 1.149: The default TCP port used for an FTP server is:
A. 20 and 21
B. 80 and 8080
C. 110 and 80
D. 8080 and 1080
Question 1.150: In a UDP data packet, the address used to identify the receiving process is
located at:
A. Byte 1 and 2
B. Byte 3 and 4
C. Byte 5 and 6
D. Undefined
Question 1.151: The TCP and UDP protocols operate at which layer in the following layers:
A. Transport
B. Network
C. Application
D. Presentation
Question 1.152: The TCP protocol works at which layer in the OSI model:
A. Application layer
B. Transport layer
C. Network layer
D. Data Link layer
Question 1.153: Which of the following protocols does not guarantee that the sent data will
reach the receiver completely:
A. TCP
B. ASP
C. UDP
D. ARP
Question 1.154: Transport layer protocols:
A. Control the transmission of data between two processes on a computer network
B. Control the content of exchanged messages between two processes and the behavior of
each side upon receiving the message
C. Control the transmission of data between two computers on a network
D. Control the transmission of data between two computers on the same transmission medium
Question 1.155: Suppose the Length field of a UDP data packet has a value of 150. The
actual data will have:
A. 67 bytes
B. 142 bytes
C. 150 bytes
D. 158 bytes
Question 1.156: Observing a person accessing a webpage and typing the following path:
http://www.tomang.net:3000. How does the Web server for this page use the TCP port:
A. Uses the default port
B. Does not use the default port
C. Uses the standard port
D. Uses a specific port for the Web server
Question 1.157: A UDP socket is identified by:
A. Source IP address, destination IP address
B. Source IP address, source port number
C. Destination IP address, destination port number
D. Source IP address, destination IP address, source port number, destination port number
Question 1.158: A TCP socket is identified by:
A. Source IP address, destination IP address
B. Source IP address, source port number, destination IP address
C. Source IP address, destination IP address, destination port number
D. Source IP address, source port number, destination IP address, destination port number
Question 1.159: A reliable data transfer protocol (rdt) needs to be used on:
A. High-reliability channels
B. Unreliable channels
C. Both of the above
D. Neither of the above
Question 1.160: The complexity of the reliable data transfer protocol (rdt) depends on:
A. Network architecture
B. Network devices (routers, switches, hubs, etc.)
C. Characteristics of the transmission channel
D. The distance between hosts