CN 4th Unit MCQ 160
CN 4th Unit MCQ 160
CN 4th Unit MCQ 160
Transport layer aggregates data from different applications into a single stream
before passing it to ____________
a) network layer
b) data link layer
c) application layer
d) physical layer
11. The transport layer protocols used for real time multimedia, file transfer, DNS and
email, respectively are:
a) TCP, UDP, UDP and TCP
b) UDP, TCP, TCP and UDP
c) UDP, TCP, UDP and TCP
d) TCP, UDP, TCP and UDP
12. Which of the following transport layer protocols is used to support electronic mail?
a) SMTP
b) IP
c) TCP
d) UDP
13. A layer-4 firewall (a device that can look at all protocol headers up to the transport
layer) CANNOT
a) Block entire HTTP traffic during 9:00PM and 5:00 AM
b) Block all ICMP traffic
c) Stop incoming traffic from a specific IP address but allow outgoing traffic to the same IP
address
d) Block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
14. Which of the following system calls results in the sending of SYN packets?
a) Socket
b) Bind
c) Listen
d) Connect
15. In the slow start phase of the TCP congestion control algorithm, the size of the
congestion window
a) Does not increase
b) Increases linearly
c) Increasesquadratically
d) Increases exponentially
16. Which one of the following uses UDP as the transport protocol?
a) HTTP
b) Telnet
c) DNS
d) SMTP
17. Packets of the same session may be routed through different paths in
a) TCP, but not UDP
b) TCP and UDP
c) UDP, but not TCP
d) Neither TCP, nor UDP
18. The maximum window size for data transmission using the selective reject protocol
with n-bit frame sequence numbers is:
a) 2^n
b) 2^(n-1)
c) 2^n – 1
d) 2^(n-2)
19. Which of the following functionalities must be implemented by a transport protocol
over and above the network protocol?
a) Recovery from packet losses
b) Detection of duplicate packets
c) Packet delivery in the correct order
d) End to end connectivity
20. Which of the following is NOT true about User Datagram Protocol in transport
layer?
a) Works well in unidirectional communication, suitable for broadcast information.
b) It does three way handshake before sending datagrams
c) It provides datagrams, suitable for modeling other protocols such as in IP tunneling or
Remote Procedure Call and the Network File System
d) The lack of retransmission delays makes it suitable for real-time applications
21. Suppose two hosts use a TCP connection to transfer a large file. Which of the
following statements is/are False with respect to the TCP connection?
1. If the sequence number of a segment is m, then the sequence
number of the subsequent segment is always m+1.
2. If the estimated round trip time at any given point of time
is t sec, the value of the retransmission timeout is always
set to greater than or equal to t sec.
3. The size of the advertised window never changes during the
course of the TCP connection.
4. The number of unacknowledged bytes at the sender is always
less than or equal to the advertised window
a)3 only
b) 1 and 3 only
c) 1 and 4 only
d) 2 and 4 only
22. Identify the correct order in which a server process must invoke the function calls
accept, bind, listen, and recv according to UNIX socket API.
a) listen, accept, bind recv
b) bind, listen, accept, recv
c) bind, accept, listen, recv
d) accept, listen, bind, recv
24. Consider the following statements about the timeout value used in TCP.
i. The timeout value is set to the RTT (Round Trip Time) measured during TCP
connection establishment for the entire duration of the connection.
ii. Appropriate RTT estimation algorithm is used to set the timeout value of a TCP
connection.
iii. Timeout value is set to twice the propagation delay from the sender to the receiver.
Which of the following choices hold?
a) (i) is false, but (ii) and (iii) are true
b) (i) and (iii) are false, but (ii) is true
c) (i) and (ii) are false, but (iii) is true
d) (i), (ii) and (iii) are false
27. Generally TCP is reliable and UDP is not reliable. DNS which has to be reliable uses
UDP because
a) UDP is slower
b) DNS servers has to keep connections
c) DNS requests are generally very small and fit well within UDP segments
d) None of these
28.
a) (1)
b) (2)
c) (3)
d) (4)
29. What is the maximum size of data that the application layer can pass on to the TCP
layer below?
a) Any size
b) 216 bytes - size of TCP header
c) 216 bytes
d) 1500
30. An ACK number of 1000 in TCP always means that
a) 999 bytes have been successfully received
b) 1000 bytes have been successfully received
c) 1001 bytes have been successfully received
d) None of the above
31. Suppose you are browsing the World Wide Web using a web browser and trying to
access the web servers. What is the underlying protocol and port number that are being
used?
a) UDP, 80
b) TCP, 80
c) TCP, 25
d) UDP, 25
32. Optical fiber uses reflection to guide light through a channel, in which angle of
incidence is ________ the critical angle.
a) Equal to
b) Less than
c) Greater than
d) Less than or equal to
33. Which algorithm is used to shape the bursty traffic into a fixed rate traffic by
averaging the data rate?
a) Solid Bucket Algorithm
b) Spanning Tree Algorithm
c) Hocken Helm Algorithm
d) Leaky Bucket Algorithm
34. The protocol data unit for the transport layer in the internet stack is
a) segment
b) message
c) datagram
d) frame
36. Which of the following control fields in TCP header is used to specify whether the
sender has no more data to transmit?
a) FIN
b) RST
c) SYN
d) PSH
42. Which among the following are delivered by the transport layer in process-to-
process delivery mechanism?
a) Frames
b) Datagrams
c) Packets
d) All of the above
43. Which among the following are uncontrolled and un-registered form of ephemeral
ports in accordance to IANA?
a) Well known Ports
b) Registered Ports
c) Dynamic Ports
d) All of the above
44. What is the purpose of using source & destination port numbers respectively in the
addressing method of transport layer?
a) For Delivery & Reply operations
b) For Reply & Delivery operations
c) Only for Delivery operations
d) Only for Reply operations
45. Which among the several transport services deals with the addresses, protocol utility
class in addition to performance evaluating features of a connection?
a. Connection Management
b. Quality of Service
c. User Interface
d. Status Reporting
46. Which mechanism/s is/are extremely essential in data link and transport layers in
accordance to operational services offered by the transport protocols?
a) Buffering
b) Flow Control
c) Both a & b
d) None of the above
47. Which among the below specified design issues should not be minimized while
designing the system of a computer network?
a. Bandwidth
b. Content Switching
c. Software Overhead
d. All of the above
50. Which TCP timer signifies its contribution in measuring the time of connection
maintenance in TIME_WAIT state?
51. Which among the following specifies the impossibility of updating RTT estimator
during the arrival acknowledgement of retransmitted data especially at the occurrence
of timeout and retransmission phases in TCP?
a. NAGLE algorithm
b. Karn's algorithm
c. Clark's Solution
d. None of the above
52. Which mechanism in transport layer supplies multiple network connections along
with the distribution of traffic over them in a round-robin basis/ fashion?
a. Upward Multiplexing
b. Downward Multiplexing
c. Buffering & Flow Control
d. Crash Recovery
53. STUB is a technique utilized in the client-server operation especially for
implementation of __________
a. RPC
b. RTP
c. RTCP
d. All of the above
67. Frames that are used for initial communication between stations and access points
are called
A Management Frames
B Beacon Frame
C Control frames
D Data frames
70. Transport layer may be responsible for flow and error Control, like the
A Data Link Layer
B Physical Layer
C Subnet Layer
D Application Layer
71. In transport layer, a message is normally divided into transmittable
A Frames
B Signals
C Networks
D Segments
72. Congestion control can control traffic entry into a telecommunications network, so
to avoid _________
A Congestive collapse
B Congestive connection
C Connection collapse
D Collapse congestive
74. Transport layer can identify the symptoms of overload nodes using _________
A Traffic control
B Flow control
C Byte orientation
D Data integrity
75. Using which method in transport layer data integrity can be ensured?
A Checksum
B Repetition codes
C Cyclic redundancy checks
D Error correcting codes
79. Which one of the following is a version of UDP with congestion control?
A stream control transmission protocol
B structured stream transport
C datagram congestion control protocol
D none of the mentioned
84. Which one of the following is a transport layer protocol used in networking?
A TCP
B UDP
C Both TCP and UDP
D None of the mentioned
1. DHCP
2. SMTP
3. HTTP
4. TFTP
5. FTP
A. 1 and 2
B. 2, 3 and 5
C. 1, 2 and 4
D. 1, 3 and 4
87. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI
model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
88. Which of the following describe the DHCP Discover message?
89. You want to implement a mechanism that automates the IP configuration, including
IP address, subnet mask, default gateway, and DNS information. Which protocol will
you use to accomplish this?
A. SMTP
B. SNMP
C. DHCP
D. ARP
91. Which of the following allows a router to respond to an ARP request that is intended
for a remote host?
A. Gateway DP
B. Reverse ARP (RARP)
C. Proxy ARP
D. Inverse ARP (IARP)
92. TheDoD model (also called the TCP/IP stack) has four layers. Which layer of the
DoD model is equivalent to the Network layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
94. Which class of IP address provides a maximum of only 254 host addresses per
network ID?
A. Class A
B. Class B
C. Class C
D. Class D
95. If you use either Telnet or FTP, which is the highest layer you are using to transmit
data?
A. Application
B. Presentation
C. Session
D. Transport
100. Which of the following are TCP/IP protocols used at the Application layer of the
OSI model?
1. IP
2. TCP
3. Telnet
4. FTP
5. TFTP
A. 1 and 3
B. 1, 3 and 5
C. 3, 4 and 5
D. All of the above
101. What protocol is used to find the hardware address of a local device?
A. RARP
B. ARP
C. IP
D. ICMP
102. Which of the following protocols uses both TCP and UDP?
A. FTP
B. SMTP
C. Telnet
D. DNS
108.For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are
needed.
A. exactly 10
B. less than 10
C. more than 10
D. only one
109. Transport layer aggregates data from different applications into a single stream
before passing it to __________
A. data link layer
B. application layer
C. physical layer
D. network layer
110. Each segment as an independent packet and delivers it to the transport layer at the
destination machine is called_____
A. Connection Oriented
B. Connectionless
C. Segmentation
D. Reassembly
111._______ control refers to a set of procedures used to restrict the amount of data that
the sender can send before waiting for acknowledgment.
A. Flow
B. Error
C. Transmission
D. Data
116. _______ is a flow characteristic that applications can tolerate in different degrees.
A) Reliability
B) Delay
C) Jitter
D) Bandwidth
117. The _______ defines the maximum data rate of the traffic.
A) peak data rate
B) maximum burst size
C) effective bandwidth
D) none of the above
118. In Frame Relay, the _____________ defines an average rate in bits per second.
A) access rate
B) committed burst size
C) committed information rate
D) excess burst size
119. In ________ congestion control, policies are applied to prevent congestion before it
happens.
A) open-loop
B) closed-loop
C) either (a) or (b)
D) neither (a) nor (b)
120. In ________ we try to avoid traffic congestion.
A) congestion control
B) quality of service
C) either (a) or (b)
D) both (a) and (b)
121. _________ is a characteristic that a flow needs. Lack of it means losing a packet or
acknowledgment, which entails retransmission.
A) Reliability
B) Delay
C) Jitter
D) Bandwidth
122. In a network, after the load reaches the capacity, throughput _______.
A) increases sharply
B) increases proportionally with the load
C) declines sharply
D) declines proportionally with the load
123. In _________ queuing, the packets are assigned to different classes and admitted to
different queues. The queues, however, are weighted based on the priority of the
queues; higher priority means a higher weight. The system processes packets in each
queue in a round-robin fashion with the number of packets selected from each queue
based on the corresponding weight.
A) FIFO
B) priority
C) weighted fair
D) none of the above
124. In ATM, the _________ class is a best-effort delivery service that does not
guarantee anything.
A) CBR
B) VBR
C) ABR
D) UBR
125. The________ normally refers to the maximum length of time the traffic is
generated at the peak rate.
A) peak data rate
B) maximum burst size
C) effective bandwidth
D) none of the above
126. In _______ congestion control, mechanisms are used to alleviate congestion after it
happens.
A) open-loop
B) closed-loop
C) either (a) or (b)
D) neither (a) nor (b)
128. In the ________ algorithm of TCP, the size of the congestion window increases
exponentially until it reaches a threshold.
A) slow-start
B) congestion avoidance
C) congestion detection
D) none of the above
130. In the ___________ algorithm of TCP, the size of the threshold is dropped to one-
half, a multiplicative decrease.
A) slow-start
B) congestion avoidance
C) congestion detection
D) none of the above
132. A _________ traffic model has a data rate that does not change.
A) constant bit rate
B) variable bit rate
C) bursty
D) none of the above
133. ________ is the variation in delay for packets belonging to the same flow.
A) Reliability
B) Delay
C) Jitter
D) Bandwidth
135. In ATM, the _________ class delivers cells at a minimum rate. If more network
capacity is available, this minimum rate can be exceeded.
A) CBR
B) VBR
C) ABR
D) UBR
136. In the ________ traffic model, the rate of the data flow changes in time, with the
changes smooth instead of sudden and sharp.
A) constant bit rate
B) variable bit rate
C) bursty
D) none of the above
138. In a network, when the load reaches the network capacity, the delay _______.
A) increases sharply
B) decreases sharply
C) remains constant
D) cannot be predicted
140. In ________ queuing, packets are first assigned to a priority class. Each class has
its own queue.
A) FIFO
B) priority
C) weighted fair
D) none of the above
141. In ________, queuing packets wait in a buffer (queue) until the node (router or
switch) is ready to process them.
A) FIFO
B) priority
C) weighted fair
D) none of the above
143. In Frame Relay, the ___________ is the maximum number of bits in excess of Bc
that a user can send during a predefined time.
A) access rate
B) committed burst size
C) committed information rate
D) excess burst size
144. In a network, when the load is below the capacity of the network, the throughput
______________.
A) increases sharply
B) increases proportionally with the load
C) declines sharply
D) declines proportionally with the load
145. In the __________ method, the signal is included in the packets that carry data.
A) backpressure
B) choke packet
C) implicit signaling
D) explicit signaling
146. In a network, when the load is much less than the capacity of the network, the
delay is _________.
A) at a maximum
B) at a minimum
C) constant
D) none of the above
147. Congestion in a network or internetwork occurs because routers and switches have
_______.
A) tables
B) queues
C) crosspoints
D) none of the above
149. In Frame Relay, the ________ bit warns the sender of congestion in the network.
A) BECN
B) FECN
C) either (a) or (b)
D) neither (a) nor (b)
150. In Frame Relay, the ________ bit is used to warn the receiver of congestion in the
network.
A) BECN
B) FECN
C) either (a) or (b)
D) neither (a) nor (b)
151. The ________ is a function of three values: average data rate, peak data rate, and
maximum burst size.
A) peak data rate
B) maximum burst size
C) effective bandwidth
D) none of the above
Solution:
152. In the _________ algorithm of TCP, the size of the congestion window increases
additively until congestion is detected.
A) slow-start
B) congestion avoidance
C) congestion detection
D) none of the above
153. In ATM, the _________ class is divided into two subclasses: real-time (VBR-RT)
and non-real-time (VBR-NRT). VBR-RT is designed for those users who need real-time
services (such as voice and video transmission) and use compression techniques to
create a variable bit rate. VBR-NRT is designed for those users who do not need real-
time services but use compression techniques to create a variable bit rate.
A) CBR
B) VBR
C) ABR
D) UBR
154. Traffic ______ are qualitative values that represent a data flow.
A) controls
B) descriptors
C) values
D) none of the above
156. In the ______ bucket algorithm, bursty chunks are stored in the bucket and sent
out at an average rate.
A) leaky
B) token
C) either (a) or (b)
D) neither (a) nor (b)
157. The _______ bucket algorithm allows idle hosts to accumulate credit for the future
in the form of tokens.
A) leaky
B) token
C) either (a) or (b)
D) neither (a) nor (b)
158. In ATM, the _________ class is designed for customers who need real-time audio or
video services. The service is similar to that provided by a dedicated line such as a T
line.
A) CBR
B) VBR
C) ABR
D) UBR
159. In the ______ traffic model, the data rate changes suddenly in a very short time.
A) constant bit rate
B) variable bit rate
C) bursty
D) none of the above