100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Data Communications and Networking quiz questions and answers graded A+ 2025/2026

Rating
-
Sold
-
Pages
113
Grade
A+
Uploaded on
21-03-2025
Written in
2024/2025

Data Communications and Networking quiz questions and answers graded A+ 2025/2026

Institution
Introduction To Network Simulations With Cisco Mod
Course
Introduction to Network Simulations with Cisco Mod











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Introduction to Network Simulations with Cisco Mod
Course
Introduction to Network Simulations with Cisco Mod

Document information

Uploaded on
March 21, 2025
Number of pages
113
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Data Communications and Networking

One of the responsibilities of the transport layer protocol is to create a _______________
communication. - ANS-One of the responsibilities of the transport layer protocol is to create a
PROCESS-TO-PROCESS communication.

UDP is called a _________________ transport protocol. - ANS-UDP is called a
CONNECTIONLESS, UNRELIABLE transport protocol.

UDP does not add anything to the services of IP except for providing __________________
communication. - ANS-UDP does not add anything to the services of IP except for providing
PROCESS-TO-PROCESS communication.

UDP is acronym for ___________________. - ANS-UDP is an acronym for USER DATAGRAM
PROTOCOL.

Although there are several ways to achieve process-to-process communication, the most
common is through the __________________ paradigm. - ANS-Although there are several
ways to achieve process-to-process communication, the most common is through the
CLIENT-SERVER paradigm.

The local host and remote host are defined using IP addresses. To define the process, we need
second identifiers called _________________. - ANS-The local host and remote host are
defined using IP addresses. To define the process, we need second identifiers called PORT
ADDRESSES.

The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers.
They are called the _________________ ports. - ANS-The ports ranging from 49,152 to 65,535
can be used as temporary or private port numbers. They are called the DYNAMIC ports.

In the sending computer, UDP receives a data unit from the ____________________ layer. -
ANS-In the sending computer, UDP receives a data unit from the APPLICATION LAYER.

In the sending computer, UDP sends a data unit to the ___________________ layer. - ANS-In
the sending computer, UDP sends a data unit to the IP LAYER.

UDP and TCP are both __________________ layer protocols. - ANS-UDP and TCP are both
TRANSPORT LAYER PROTOCOLS.

The function the UDP performs is ____________________. - ANS-The function the UDP
performs is PROCESS-TO-PROCESS COMMUNICATION.

,When the IP layer of a receiving host receives a datagram, ____________________. -
ANS-When the IP layer of a receiving hoat receives a datagram, A TRANSPORT LAYER
PROTOCOL TAKES OVER.

UDP needs the __________________ address to deliver the user datagram to the correct
application process. - ANS-UDP needs the PORT address to deliver the user datagram to the
correct application process.

A port address in UDP is __________ bits long. - ANS-A port address in UDP is 16 BITS long.

The source port address on the UDP user datagram header defines ____________________. -
ANS-The source port address on the UDP user datagram header defines THE PROCESS
RUNNING ON THE SENDING COMPUTER.

The combination of an IP address and a port number is called a __________________. -
ANS-The combination of an IP address and a port number is called a SOCKET ADDRESS.

To use the services of UDP, we need __________________ socket addresses. - ANS-To use
the services of UDP, we need TWO SOCKET ADDRESSES.

UDP packets are called _______________. - ANS-UDP packets are called USER
DATAGRAMS.

UDP packets are encapsulated in _____________________. - ANS-UDP packets are
encapsulated in an IP DATAGRAM.

UDP packets have a fixed-size header of ___________________ bytes. - ANS-UDP packets
have a fixed-size header of 8 BYTES.

UDP uses ___________________ to handle outgoing user datagrams from multiple processes
on one host. - ANS-UDP uses MULTIPLEXING to handle outgoing user datagrams from multiple
processes on one host.

UDP uses __________________ to handle incoming user datagrams that go to different
processes on the same host. - ANS-UDP uses DEMULTIPLEXING to handle incoming user
datagrams that go to different processes on the same host.

TCP is a __________________ protocol. - ANS-TCP is a STREAM-ORIENTED protocol.

TCP allows the sending process to deliver data as a ________________ of bytes and allows
the receiving process to receiving process to obtain data as a __________________ of bytes. -
ANS-TCP allows the sending process to deliver data as a STREAM of bytes and allows the
receiving process to obtain data as a STREAM of bytes.

,Because the sending and the receiving processes may not write or read data at the same
speed, TCP ___________________. - ANS-Because the sending and receiving processes may
not write or read data at the same speed, TCP USES BUFFERS.

TCP groups a number of bytes together into a packet called a _________________. - ANS-TCP
groups a number of bytes together into a packet called a SEGMENT.

TCP is a ______________ protocol. - ANS-TCP is a CONNECTION-ORIENTED PROTOCOL.

TCP is a ___________________ transport protocol. - ANS-TCP is a RELIABLE transport
protocol.

TCP uses _____________________ to check the safe and sound arrival of data. - ANS-TCP
uses an ACKNOWLEDGEMENT MECHANISM to check the safe and sound arrival of data.

The bytes of data being transferred in each connection are numbered by TCP. The numbering
starts with a __________________. - ANS-The bytes of data being transferred in each
connection are numbered by the TCP. The numbering starts with a RANDOMLY GENERATED
NUMBER.

TCP assigns a sequence number to each segment that is being sent. The sequence number for
each segment is the number of the ______________ byte carried in that segment. - ANS-TCP
assigns a sequence number to each segment that is being sent. The sequence number for each
segment is the number of the FIRST BYTE carried in that segment.

Communication in TCP is ___________________. - ANS-Communication in TCP is
FULL-DUPLEX.

The value of the acknowledgement field in a segment defines the number of the
_________________ byte a party expects to receive. - ANS-The value of the acknowledgement
field in a segment defines the number of the NEXT BYTE A PARTY EXPECTS TO RECEIVE.

The acknowledgement number is __________________. - ANS-The acknowledgement number
is CUMULATIVE.

The value of the window size is determined by _____________________. - ANS-The value of
the window size is determined by THE RECEIVER.

The inclusion of the checksum in the TCP segment is ____________________. - ANS-The
inclusion of the checksum in the TCP segment is MANDATORY.

A TCP segment is encapsulated in __________________. - ANS-A TCP segment is
encapsulated in AN IP DATAGRAM.

, Connection establishment in TCP is called ___________________ handshaking. -
ANS-Connection establishment in TCP is called THREE-WAY HANDSHAKING.

A SYN segment cannot carry data; it consumes _______________ sequence numbers. -
ANS-A SYN segment cannot carry data; it consumes ONE SEQUENCE NUMBER.

A SYN + ACK segment cannot carry data; it consumes _________________ sequence
numbers. - ANS-...

An ACK segment, if carrying no data, consumes __________________ sequence numbers. -
ANS-An ACK segment, if carrying no data, consumes NO SEQUENCE NUMBERS.

The connection establishment procedure in TCP is susceptible to a serious security problem
called the _______________ attack. - ANS-The connection establishment procedure in TCP is
susceptible to a serious security problem called the SYN FLOODING ATTACK.

The SYN flooding attack belongs to a group of security attacks known as _______________
attack. - ANS-The SYN flooding attack belongs to a group of security attacks known as DENIAL
OF SERVICE ATRACK.

The FIN segment consumes __________________ sequence numbers if it does not carry data.
- ANS-...

The FIN + ACK segment consumes _______________ sequence numbers if it does not carry
data. - ANS-The FIN + ACK segment consumes ONE SEQUENCE NUNBER IF IT DOES NOT
CARRY DATA.

In TCP, one end can stop sending data while still receiving data. This is called a
____________________. - ANS-In TCP, one end can stop sending data while still receiving
data. This is called a HALF-CLOSE.

A ______________ machine is a machine that goes through a limited number of states. -
ANS-A FINITE MACHINE is a machine that goes through a limited number of states.

_______________ control regulates the amount of data a source can send before receiving an
acknowledgement from the destination. - ANS-FLOW CONTROL regulates the amount of data a
source can send before receiving an acknowledgement from the destination.

To accomplish flow control, TCP uses a _________________ window protocol. - ANS-To
accomplish flow control, TCP uses a SLIDING WINDOW PROTOCOL.

TCP sliding windows are __________________ oriented. - ANS-TCP sliding windows are BYTE
ORIENTED.
$12.39
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
stellanjiru

Document also available in package deal

Thumbnail
Package deal
Introduction to Network EXAMS New update 2025/2026 ||Questions and Verified answers 100% Correct |Grade A ||LatestB (ALL BUNDLE HERE!!!)
-
66 2025
$ 763.54 More info

Get to know the seller

Seller avatar
stellanjiru Howard Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 year
Number of followers
0
Documents
640
Last sold
4 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions