Q.1 In TCP, sending and receiving data is done as _______.
A. Sequence of characters
B. Stream of bytes
C. Packets
D. Lines of data
Ans : Stream of bytes
Q.2 Size of TCP segment header ranges between ___________.
A. 16 and 32 bits
B. 16 and 32 bytes
C. 20 and 60 bits
D. 20 and 60 bytes
Ans : 20 and 60 bytes
Q.3 Which of the following is false with respect to TCP?
A. Process-to-process
B. Connection-oriented
A. Unreliable
B. Transport layer protocol
Ans : Unreliable
Q.4 The receiver of the data controls the amount of data that are to be sent by the sender is referred to as ___________.
A. Error control
B. Flow control
C. Error detection
D. Congestion control
Ans : Flow control
Q.5 TCP groups a number of bytes together into a packet called _______.
A. Buffer
B. Packet
C. Stack
D. Segment
Ans : Segment
Q.6 The server program tells its TCP that it is ready to accept a connection. This process is called ___________.
A. Active close
B. Active open
A. Passive open
B. Passive close
Ans : Passive open
Q.7 TCP process may not write and read data at the same speed. So we need __________ for storage.
A. Buffers
B. Packets
C. Stacks
D. Segments
Ans : Buffers
Q.8 Connection establishment in TCP is done by which mechanism?
A. Three-Way Handshaking
B. Flow control
C. Synchronization
D. Forwarding
Ans : Three-Way Handshaking
Q.9 To achieve reliable transport in TCP, ___________ is used to check the safe and sound arrival of data.
A. Buffer
B. Packet
C. Acknowledgment
D. Segments
Ans : Acknowledgment
Q.10 In Three-Way Handshaking process, the situation where both the TCP’s issue an active open is ___________.
A. Mutual close
B. Mutual open
C. Simultaneous close
D. Simultaneous open
Ans : Simultaneous open
Q.11 Communication offered by TCP is ________.
A. Half-duplex
B. Full-duplex
A. Byte by byte
B. Semi-duplex
Ans : Full-duplex
Q.12 A client that wishes to connect to an open server tells its TCP that it needs to be connected to that particular server. The process is called ___________.
A. Active Close
B. Active open
C. Passive open
D. Passive close
Ans : Active open
Q.13 SYNC flooding attack belongs to a type of security attack known as ___________.
A. Active attack
B. SYNC flooding attack
C. Denial-of-service attack
D. Passive attack
Ans : Denial-of-service attack
Q.14 Suppose a TCP connection is transferring a file of 1000 bytes. The first byte is numbered 10001. What is the sequence number of the segment if all data is sent in only one segment?
A. 10001
B. 10000
A. 12001
B. 11001
Ans : 10001
Q.15 A malicious attacker sends a large number of SYNC segments to a server, pretending that each of them is coming from a different client by faking the source IP address in the datagram. Which type of attack is being performed in this situation?
A. Active attack
B. SYNC flooding attack
C. Denial-of-service attack
D. Passive attack
Ans : SYNC flooding attack
Q.16 In segment header, sequence number and acknowledgement number fields refer to _______.
A. Buffer number
B. Byte number
C. Segment number
D. Acknowledgment
Ans : Byte number
Q.17 The value of acknowledgement field in a segment defines _______.
A. total number of bytes to receive
B. sequence number of the byte received previously
C. sequence of zeros and ones
D. sequence number of the next byte to be received
Ans : sequence number of the byte received previously
Q.18 What allows TCP to detect lost segments and in turn recover from that loss.
A. Acknowledgment number
B. Sequence number
C. Both Sequence & Acknowledgment number
D. Checksum
Ans : Acknowledgment number
Q.19 Bytes of data being transferred in each connection are numbered by TCP. These numbers start with a _________.
A. Random sequence of 0’s and 1’s
B. Fixed number
C. Sequence of zero’s and one’s
D. One
Ans : Sequence of zero’s and one’s
Q.20 The sizes of source and destination port address in TCP header are ___________ respectively.
A. 16-bits and 16-bits
B. 16-bits and 32-bits
C. 32-bits and 32-bits
D. 32-bits and 16-bits
Ans : 16-bits and 16-bits