16. Using which method in transport layer data integrity can be ensured?
a.
Checksum
b.
Repetition codes
c.
Cyclic redundancy checks
d.
Error correcting codes
Answer:
Option(a)
17. Buffer overrun can be reduced by using what?
a.
Traffic control
b.
Flow control
c.
Byte orientation
d.
Data integrity
Answer:
Option(b)
18. Transport layer can identify the symptoms of overload nodes using _________
a.
Flow control
b.
Traffic control
c.
Byte orientation
d.
Data integrity
Answer:
Option(b)
19. Transport layer is which layer in OSI model?
a.
Fourth layer
b.
Third layer
c.
Second layer
d.
Fifth layer\
Answer:
Option(a)
20. Congestion control can control traffic entry into a telecommunications network, so to avoid _________
a.
Congestive connection
b.
Connection collapse
c.
Congestive collapse
d.
Collapse congestive
Answer:
Option(c)
21.
FCP stands for _________
a.
Fiber Channel Protocol
b.
Field Channel Protocol
c.
Fast Channel Protocol
d.
Fiber Carrying Protocol
Answer:
Option(a)
22.
UDP packets are called as _________
a.
Segments
b.
Checksum
c.
Frames
d.
Datagrams
Answer:
Option(d)
23._________ does not provide reliable end to end communication.
a.
TCP
b. UDP
c.
Both TCP and UDP
d.
Neither TCP nor UDP
Answer:
Option(b)
24.
ARQ stands for __________
a.
Automatic Repeat Request
b.
Automatic Request Repeat
c.
Application Repeat Request
d.
Application Request Repeat
Answer:
Option(a)
25. The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are:
a.
TCP, UDP, UDP and TCP
b.
UDP, TCP, TCP and UDP
c.
UDP, TCP, UDP and TCP
d.
TCP, UDP, TCP and UDP
Answer:
Option(c)
26. Which of the following transport layer protocols is used to support electronic mail?
a.
SMTP
b.
IP
c.
TCP
d.
UDP
Answer:
Option(c)
27. Consider an instance of TCP’s Additive Increase Multiplicative Decrease (AIMD) algorithm where the window size at the start of the slow start phase is 2 MSS and the threshold at the start of the first transmission is 8 MSS. Assume that a timeout occurs during the fifth transmission. Find the congestion window size at the end of the tenth transmission.
a.
8 MSS
b.
14 MSS
c.
7 MSS
d.
12 MSS
Answer:
Option(c)
28. A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT
a. block entire HTTP traffic during 9:00PM and 5 :0OAM
b.
block all ICMP traffic
c. stop incoming traffic from a specific IP address but allow outgoing traffic to the same IP address
d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Answer:
Option(d)
29. Which of the following system calls results in the sending of SYN packets?
a.
socket
b.
bind
c.
listen
d.
connect
Answer:
Option(d)
30. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion
window
a.
does not increase
b.
increases linearly
c.
increases quadratically
d.
increases exponentially
Answer:
Option(d)
0 Comments