Module 14 Transport Layer

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/37

flashcard set

Earn XP

Description and Tags

yessir

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

Which layer is responsible for establishing a temporary communication session between the source and destination host applications?

  1. application layer

  2. data link layer

  3. network layer

  4. physical layer

  5. transport layer

  1. transport layer

2
New cards

Which three are transport layer responsibilities? (Choose three.)

  1. conversation multiplexing

  2. identifying frames

  3. identifying routing information

  4. segmenting data and reassembling segments

  5. tracking individual conversations

  1. conversation multiplexing

  1. segmenting data and reassembling segments

  2. tracking individual conversations

3
New cards

Which transport layer protocol statement is true?

  1. TCP has fewer fields than UDP.

  2. TCP is faster than UDP.

  3. UDP is a best-effort delivery protocol.

  4. UDP provides reliability.


  1. UDP is a best-effort delivery protocol.

4
New cards

Which transport layer protocol would be used for VoIP applications?

  1. Session Information Protocol (SIP)

  2. Transmission Control Protocol (TCP)

  3. User Datagram Protocol (UDP)

  4. VoIP Transfer Protocol

  1. User Datagram Protocol (UDP)

5
New cards

Which transport layer protocol ensures reliable same-order delivery?

  1. ICMP

  2. IP

  3. TCP

  4. UDP

  1. TCP

6
New cards

Which TCP header statement is true?

  1. It consists of 4 fields in an 8-byte header.

  2. It consists of 8 fields in a 10-byte header.

  3. It consists of 10 fields in a 20-byte header.

  4. It consists of 20 fields in a 40-byte header.

  1. It consists of 10 fields in a 20-byte header.

7
New cards

Which two applications would use the TCP transport layer protocol? (Choose two.)

  1. FTP

  2. HTTP

  3. ICMP

  4. TFTP

  5. VoIP

  1. FTP

  2. HTTP

8
New cards

Which of the following is a stateless best-effort delivery transport layer protocol?

  1. ICMP

  2. IP

  3. TCP

  4. UDP

  1. UDP

9
New cards

Which UDP header statement is true?

  1. It consists of 4 fields in an 8-byte header.

  2. It consists of 8 fields in a 10-byte header.

  3. It consists of 10 fields in a 20-byte header.

  4. It consists of 20 fields in a 40-byte header.

  1. It consists of 4 fields in an 8-byte header.

10
New cards

Which two applications would use the UDP transport layer protocol? (Choose two.)

  1. FTP

  2. HTTP

  3. ICMP

  4. TFTP

  5. VoIP

  1. TFTP

  2. VoIP

11
New cards

Which two fields are the same in a TCP and UDP header? (Choose two.)

  1. Control bits

  2. Destination port number

  3. Sequence number

  4. Source port number

  5. Well-known port number

  1. Destination port number

  1. Source port number

12
New cards

Assume a host with IP address 10.1.1.10 wants to request web services from a server at 10.1.1.254. Which of the following would display the correct socket pair?

  1. 1099:10.1.1.10, 80:10.1.1.254

  2. 10.1.1.10:80, 10.1.1.254:1099

  3. 10.1.1.10:1099, 10.1.1.254:80

  4. 80:10.1.1.10, 1099:10.1.1.254

  1. 10.1.1.10:1099, 10.1.1.254:80

13
New cards

Which port group includes port numbers for FTP, HTTP, and TFTP applications?

  1. dynamic ports

  2. private ports

  3. registered ports

  4. well-known ports

  1. well-known ports

14
New cards

Which Windows command would display the protocols in use, the local address and port numbers, the foreign address and port numbers, and the connection state?

  1. ipconfig /all

  2. ping

  3. netstat

  4. traceroute

  1. netstat

15
New cards

Which of the following would be valid source and destination ports for a host connecting to an email server?

  1. Source: 25, Destination: 49152

  2. Source: 80, Destination: 49152

  3. Source: 49152, Destination: 25

  4. Source: 49152, Destination: 80

  1. Source: 49152, Destination: 25

16
New cards

Which control bit flags are used during the three-way handshake?

  1. ACK and FIN

  2. FIN and RESET

  3. RESET and SYN

  4. SYN and ACK

  1. SYN and ACK

17
New cards

How many exchanges are needed to end both sessions between two hosts?

  1. one exchange

  2. two exchanges

  3. three exchanges

  4. four exchanges

  5. five exchanges

  1. four exchanges

18
New cards

What field is used by the destination host to reassemble segments into the original order?

  1. Control Bits

  2. Destination Port

  3. Sequence Number

  4. Source Port

  5. Window Size

  1. Sequence Number

19
New cards

What field is used to provide flow control?

  1. Control Bits

  2. Destination Port

  3. Sequence Number

  4. Source Port

  5. Window Size

  1. Window Size

20
New cards

What happens when a sending host senses there is congestion?

  1. The receiving host increases the number of bytes it sends before receiving an acknowledgment from the sending host.

  2. The receiving host reduces the number of bytes it sends before receiving an acknowledgment from the sending host.

  3. The sending host increases the number of bytes it sends before receiving an acknowledgment from the destination host.

  4. The sending host reduces the number of bytes it sends before receiving an acknowledgment from the destination host

  1. The sending host reduces the number of bytes it sends before receiving an acknowledgment from the destination host

21
New cards

Why is UDP desirable for protocols that make a simple request and reply transactions?

  1. Flow Control

  2. Low overhead

  3. Reliability

  4. Same-order delivery

  1. Low overhead

22
New cards

Which UDP datagram reassembly statement is true?

  1. UDP does not reassemble the data.

  2. UDP reassembles the data in the order that it was received.

  3. UDP reassembles the data using control bits.

  4. UDP reassembles the data using sequence numbers.

  1. UDP reassembles the data in the order that it was received

23
New cards

Which of the following would be valid source and destination ports for a host connecting to a DNS server?

  1. Source: 53, Destination: 49152

  2. Source: 1812, Destination: 49152

  3. Source: 49152, Destination: 53

  4. Source: 49152, Destination: 1812

  1. Source: 49152, Destination: 53

24
New cards

Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?

  1. The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.

  2. The source decreases the window size to decrease the rate of transmission from the destination.

  3. The destination decreases the window size.

  4. The destination sends fewer acknowledgement messages in order to conserve bandwidth.

  1. The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.

25
New cards

Which two operations are provided by TCP but not by UDP? (Choose two.)

  1. identifying the applications

  2. acknowledging received data

  3. tracking individual conversations

  4. retransmitting any unacknowledged data

  5. reconstructing data in the order received

  1. acknowledging received data

  1. retransmitting any unacknowledged data

26
New cards

What is the TCP mechanism used in congestion avoidance?

  1. three-way handshake

  2. socket pair

  3. two-way handshake

  4. sliding window

  1. sliding window

27
New cards

What is a responsibility of transport layer protocols?

  1. providing network access

  2. tracking individual conversations

  3. determining the best path to forward a packet

  4. translating private IP addresses to public IP addresses

  1. tracking individual conversations

28
New cards

How does a networked server manage requests from multiple clients for different services?

  1. The server sends all requests through a default gateway.

  2. Each request has a combination of source and destination port numbers, coming from a unique IP address.

  3. The server uses IP addresses to identify different services.

  4. Each request is tracked through the physical address of the client.

  1. Each request has a combination of source and destination port numbers, coming from a unique IP address.

29
New cards

Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)

  1. FTP

  2. DNS

  3. HTTP

  4. POP3

  5. VoIP

  1. DNS

  1. VoIP

30
New cards

What is the purpose of using a source port number in a TCP communication?

  1. to notify the remote device that the conversation is over

  2. to assemble the segments that arrived out of order

  3. to keep track of multiple conversations between devices

  4. to inquire for a nonreceived segment

  1. to keep track of multiple conversations between devices

31
New cards

Which number or set of numbers represents a socket?

  1. 01-23-45-67-89-AB

  2. 21

  3. 192.168.1.1:80

  4. 10.1.1.15

  1. 192.168.1.1:80

32
New cards

Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)

  1. ACK

  2. FIN

  3. PSH

  4. RST

  5. SYN

  6. URG

  1. ACK

  1. SYN

33
New cards

What happens if part of an FTP message is not delivered to the destination?

  1. The message is lost because FTP does not use a reliable delivery method.

  2. The FTP source host sends a query to the destination host.

  3. The part of the FTP message that was lost is re-sent.

  4. The entire FTP message is re-sent.

  1. The part of the FTP message that was lost is re-sent.

34
New cards

What type of applications are best suited for using UDP?

  1. applications that are sensitive to delay

  2. applications that need reliable delivery

  3. applications that require retransmission of lost segments

  4. applications that are sensitive to packet loss

  1. applications that are sensitive to delay

35
New cards

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?

  1. The client sets the window size for the session.

  2. The client sends an ISN to the server to start the 3-way handshake.

  3. The client randomly selects a source port number.

  4. The client sends a synchronization segment to begin the session.

  1. The client randomly selects a source port number

36
New cards

Which transport layer feature is used to guarantee session establishment?

  1. UDP ACK flag

  2. TCP 3-way handshake

  3. UDP sequence number

  4. TCP port number

  1. TCP 3-way handshake

37
New cards

What is the complete range of TCP and UDP well-known ports?

  1. 0 to 255

  2. 0 to 1023

  3. 256 – 1023

  4. 1024 – 49151

  1. 0 to 1023

38
New cards

What is a socket?

  1. the combination of the source and destination IP address and source and destination Ethernet address

  2. the combination of a source IP address and port number or a destination IP address and port number

  3. the combination of the source and destination sequence and acknowledgment numbers

  4. the combination of the source and destination sequence numbers and port numbers

  1. the combination of a source IP address and port number or a destination IP address and port number