Test Bank | Ch12 Securing TCP/IP Networks – 4th Ed - Test Bank | Guide to TCPIP 4e by Jeffrey Carrell by Jeffrey L. Carrell, Laura Chappell, Ed Tittel. DOCX document preview.

Test Bank | Ch12 Securing TCP/IP Networks – 4th Ed

View Product website:

https://selldocx.com/docx/test-bank-ch12-securing-tcpip-networks-4th-ed-1330

Chapter 9: TCP/IP Transport Layer Protocols

Student: ___________________________________________________________________________

1. UDP offers connection-oriented services with sequencing, error recovery, and a sliding window mechanism. 
True    False

 

2. UDP is the only connectionless TCP/IP protocol at the Transport layer. 
True    False

 

3. When the Protocol field of an IP header contains the value 17 (0x11), the UDP header follows the IP header. 
True    False

 

4. TCP half-open connections occur when the handshake process does not end successfully with a final ACK. 
True    False

 

5. TCP keep-alives are enabled by default on Windows XP, Windows Vista, Windows 7, Windows Server 2003, and Windows Server 2008, although any application may disable TCP keep-alives, if desired by its programmer. 
True    False

 

6. ____ provide the simplest kind of transport services because they simply package messages, taken as is from the TCP/IP Application layer, into datagrams. 
A. Core services
B. Port numbers
C. Logical connections
D. Connectionless protocols

 

7. ____ is a simple protocol that is used by applications that contain their own connection-oriented timeout values and retry counters, similar to those provided by TCP. 
A. UDP
B. DoS
C. RTO
D. MSS

 

8. UDP runs up to ____ percent faster than TCP, under some conditions, because it does next to nothing. 
A. 20
B. 30
C. 40
D. 50

 

9. TCP hosts create a virtual connection with each other using a ____. 
A. sliding window
B. handshake process
C. teardown sequence
D. retry mechanism

 

10. Dynamic ports are used as ____ for specific communications while they are underway. 
A. temporary ports
B. core services
C. byte streams
D. lost segments

 

11. The ____ field value defines the destination application or process that uses the IP and UDP headers. 
A. Checksum
B. Dynamic Port Number
C. Length
D. Destination Port Number

 

12. The ____ field defines the length of the packet from the UDP header to the end of valid data(not including any data link padding, if padding is required). 
A. Checksum
B. Dynamic Port Number
C. Length
D. Destination Port Number

 

13. Once a TCP connection is established, a ____ can maintain the connection when there is no data sent across the wire. 
A. watchdog process
B. core service
C. keep-alive process
D. handshake process

 

14. The TCP connection termination process requires ____ packets. 
A. one
B. two
C. three
D. four

 

15. The ____ process guarantees that packets are ordered properly and protects against missing segments. 
A. watchdog
B. keep-alive
C. handshake
D. sequence and acknowledgement

 

16. ____ is the overloading of the network or a receiver. 
A. Sequence number tracking
B. Buffering
C. Congestion
D. Windowing

 

17. Overloading a receiver occurs when the number of data bytes is greater than the ____. 
A. advertised window
B. bandwidth
C. sliding window
D. ephemeral port

 

18. TCP supports ____ - the process of sending numerous data packets in sequence without waiting for an intervening acknowledgment. 
A. retries
B. sequence number tracking
C. windowing
D. error recovery

 

19. ____ is detected whenever three or more duplicate ACK packets (known as a triple-ACK) or timeout events occur, and timeout events are considered more serious than duplicate acknowledgements. 
A. Logical connection
B. Congestion
C. Retransmission
D. Windowing

 

20. When an out-of-order data segment is received, the Fast Retransmit process requires the receiver to immediately send ____. 
A. duplicate ACKs
B. core services
C. byte streams
D. lost segments

 

21. The Fast Recovery process dictates that when a host receives three duplicate ACKs, it must immediately start retransmitting the ____ without waiting for the retransmission timer to expire. 
A. duplicate ACKs
B. core services
C. byte streams
D. lost segments

 

22. TCP supports a ____ mechanism, which is a management method for data transmission used to determine the amount of unacknowledged data that can go out on the wire from any sender. 
A. congestion
B. retry
C. sliding window
D. watchdog

 

23. ____ is caused when enough data is sent to a TCP host to fill its receiver buffer, thereby putting the receiver in a zero-window state. 
A. DoS
B. Silly Window Syndrome
C. Time Wait delay
D. Retransmission timeout

 

24. The initial sequence number used in a TCP connection is defined by the ____ and, for security purposes, should be randomly assigned. 
A. host
B. packet
C. port
D. segment

 

25. The ____ flag is used to indicate that the host completed a transaction. 
A. Reset
B. FIN
C. SYN
D. URG

 

26. By default, Windows Vista, Windows 7, and Windows Server 2008 support a port range of 49152 to ____. 
A. 55874
B. 58314
C. 61000
D. 65535

 

27. Because of ____________________’s end-to-end reliabilityand flexibility, it is the preferred transport method for applications that transfer large quantities of data and require reliable delivery services. 
________________________________________

 

28. ____________________ defines the range of numbers that identifies dynamic ports. 
________________________________________

 

29. The ____________________ window is always the lesser of what the network and receiver can handle. 
________________________________________

 

30. TCP has four defined congestion control mechanisms to ensure the most efficient use of ____________________ along with quick error and congestion recovery. 
________________________________________

 

31. The ____________________ pseudo-header consists of three fields taken from the IP header: the IP Source Address field value, the IP Destination Address field value, and the Protocol field value. 
________________________________________

 

32. Match each item with a statement below. 

 

33. Briefly discuss the type of tasks typically handled by connectionless protocols. 


 


 


 


 

 

34. What are the functions of a connection-oriented protocol? 


 


 


 


 

 

35. Briefly discuss four limitations of UDP. 


 


 


 


 

 

36. List the fields contained in the UDP header. 


 


 


 


 

 

37. Briefly describe the TCP startup connection process. 


 


 


 


 

 

38. What is the order of the half-open connection communication sequence? 


 


 


 


 

 

39. Briefly describe the following TCP connection states: LISTEN, SYN SENT, SYN RECD, AND CLOSE WAIT. 


 


 


 


 

 

40. List the two TCP control mechanisms, as defined in RFC 2581. 


 


 


 


 

 

41. Briefly define the following TCP flag settings: URG (Urgent), ACK (Acknowledgement), and PSH(Push). 


 


 


 


 

 

42. What is the difference between the window size field and the urgent pointer field? 


 


 


 


 

 

Chapter 9: TCP/IP Transport Layer Protocols

Document Information

Document Type:
DOCX
Chapter Number:
12
Created Date:
Aug 21, 2025
Chapter Name:
Chapter 12 Securing TCP/IP Environments
Author:
Jeffrey L. Carrell, Laura Chappell, Ed Tittel

Connected Book

Test Bank | Guide to TCPIP 4e by Jeffrey Carrell

By Jeffrey L. Carrell, Laura Chappell, Ed Tittel

Test Bank General
View Product →

$24.99

100% satisfaction guarantee

Buy Full Test Bank

Benefits

Immediately available after payment
Answers are available after payment
ZIP file includes all related files
Files are in Word format (DOCX)
Check the description to see the contents of each ZIP file
We do not share your information with any third party