Test Bank | Ch12 Securing TCP/IP Networks – 4th Ed - Test Bank | Guide to TCPIP 4e by Jeffrey Carrell by Jeffrey L. Carrell, Laura Chappell, Ed Tittel. DOCX document preview.
View Product website:
https://selldocx.com/docx/test-bank-ch12-securing-tcpip-networks-4th-ed-1330
Chapter 9: TCP/IP Transport Layer Protocols
Student: ___________________________________________________________________________
1. UDP offers connection-oriented services with sequencing, error recovery, and a sliding window mechanism.
True False
2. UDP is the only connectionless TCP/IP protocol at the Transport layer.
True False
3. When the Protocol field of an IP header contains the value 17 (0x11), the UDP header follows the IP header.
True False
4. TCP half-open connections occur when the handshake process does not end successfully with a final ACK.
True False
5. TCP keep-alives are enabled by default on Windows XP, Windows Vista, Windows 7, Windows Server 2003, and Windows Server 2008, although any application may disable TCP keep-alives, if desired by its programmer.
True False
6. ____ provide the simplest kind of transport services because they simply package messages, taken as is from the TCP/IP Application layer, into datagrams.
A. Core services
B. Port numbers
C. Logical connections
D. Connectionless protocols
7. ____ is a simple protocol that is used by applications that contain their own connection-oriented timeout values and retry counters, similar to those provided by TCP.
A. UDP
B. DoS
C. RTO
D. MSS
8. UDP runs up to ____ percent faster than TCP, under some conditions, because it does next to nothing.
A. 20
B. 30
C. 40
D. 50
9. TCP hosts create a virtual connection with each other using a ____.
A. sliding window
B. handshake process
C. teardown sequence
D. retry mechanism
10. Dynamic ports are used as ____ for specific communications while they are underway.
A. temporary ports
B. core services
C. byte streams
D. lost segments
11. The ____ field value defines the destination application or process that uses the IP and UDP headers.
A. Checksum
B. Dynamic Port Number
C. Length
D. Destination Port Number
12. The ____ field defines the length of the packet from the UDP header to the end of valid data(not including any data link padding, if padding is required).
A. Checksum
B. Dynamic Port Number
C. Length
D. Destination Port Number
13. Once a TCP connection is established, a ____ can maintain the connection when there is no data sent across the wire.
A. watchdog process
B. core service
C. keep-alive process
D. handshake process
14. The TCP connection termination process requires ____ packets.
A. one
B. two
C. three
D. four
15. The ____ process guarantees that packets are ordered properly and protects against missing segments.
A. watchdog
B. keep-alive
C. handshake
D. sequence and acknowledgement
16. ____ is the overloading of the network or a receiver.
A. Sequence number tracking
B. Buffering
C. Congestion
D. Windowing
17. Overloading a receiver occurs when the number of data bytes is greater than the ____.
A. advertised window
B. bandwidth
C. sliding window
D. ephemeral port
18. TCP supports ____ - the process of sending numerous data packets in sequence without waiting for an intervening acknowledgment.
A. retries
B. sequence number tracking
C. windowing
D. error recovery
19. ____ is detected whenever three or more duplicate ACK packets (known as a triple-ACK) or timeout events occur, and timeout events are considered more serious than duplicate acknowledgements.
A. Logical connection
B. Congestion
C. Retransmission
D. Windowing
20. When an out-of-order data segment is received, the Fast Retransmit process requires the receiver to immediately send ____.
A. duplicate ACKs
B. core services
C. byte streams
D. lost segments
21. The Fast Recovery process dictates that when a host receives three duplicate ACKs, it must immediately start retransmitting the ____ without waiting for the retransmission timer to expire.
A. duplicate ACKs
B. core services
C. byte streams
D. lost segments
22. TCP supports a ____ mechanism, which is a management method for data transmission used to determine the amount of unacknowledged data that can go out on the wire from any sender.
A. congestion
B. retry
C. sliding window
D. watchdog
23. ____ is caused when enough data is sent to a TCP host to fill its receiver buffer, thereby putting the receiver in a zero-window state.
A. DoS
B. Silly Window Syndrome
C. Time Wait delay
D. Retransmission timeout
24. The initial sequence number used in a TCP connection is defined by the ____ and, for security purposes, should be randomly assigned.
A. host
B. packet
C. port
D. segment
25. The ____ flag is used to indicate that the host completed a transaction.
A. Reset
B. FIN
C. SYN
D. URG
26. By default, Windows Vista, Windows 7, and Windows Server 2008 support a port range of 49152 to ____.
A. 55874
B. 58314
C. 61000
D. 65535
27. Because of ____________________’s end-to-end reliabilityand flexibility, it is the preferred transport method for applications that transfer large quantities of data and require reliable delivery services.
________________________________________
28. ____________________ defines the range of numbers that identifies dynamic ports.
________________________________________
29. The ____________________ window is always the lesser of what the network and receiver can handle.
________________________________________
30. TCP has four defined congestion control mechanisms to ensure the most efficient use of ____________________ along with quick error and congestion recovery.
________________________________________
31. The ____________________ pseudo-header consists of three fields taken from the IP header: the IP Source Address field value, the IP Destination Address field value, and the Protocol field value.
________________________________________
32. Match each item with a statement below.
33. Briefly discuss the type of tasks typically handled by connectionless protocols.
34. What are the functions of a connection-oriented protocol?
35. Briefly discuss four limitations of UDP.
36. List the fields contained in the UDP header.
37. Briefly describe the TCP startup connection process.
38. What is the order of the half-open connection communication sequence?
39. Briefly describe the following TCP connection states: LISTEN, SYN SENT, SYN RECD, AND CLOSE WAIT.
40. List the two TCP control mechanisms, as defined in RFC 2581.
41. Briefly define the following TCP flag settings: URG (Urgent), ACK (Acknowledgement), and PSH(Push).
42. What is the difference between the window size field and the urgent pointer field?
Chapter 9: TCP/IP Transport Layer Protocols
Document Information
Connected Book
Test Bank | Guide to TCPIP 4e by Jeffrey Carrell
By Jeffrey L. Carrell, Laura Chappell, Ed Tittel