Data

A highly detailed illustration depicting various network protocols and technologies in a dynamic and visually engaging style, incorporating elements like routers, data packets, and cloud services.

Network Protocols Quiz

Test your knowledge of network protocols, packet switching, and the fundamentals of IPv4 and IPv6 with our comprehensive quiz designed for tech enthusiasts and students alike. Dive into essential concepts related to data transmission, routing protocols, and network architecture.

Key Features:

  • 101 challenging questions
  • Multiple choice and checkbox formats
  • Learn about TCP/IP and routing protocols
101 Questions25 MinutesCreated by RoutingMaster123
Select the two most appropriate choice.
A: These are Transport Protocols: TCP, ICMP. IGRP, SCTP, VOIP
B: These are Transport Protocols: TCP, UDP, SCTP, TCP RENO, TCP VEGAS
C: These are Network Layer related Protocols: TCP, ICMP. IGRP, SCTP, VOIP, IPv6, IPv4
D: These are Network Layer related Protocols: IGMP, ICMP, AODV, VOIP, IPv6, IPv4
E: These are Network Layer related Protocols: IGMP, ICMP, AODV, IPv6, IPv4, CSMA
F: These are Network Layer related Protocols: IGMP, ICMP, AODV, RIP, IPv6, IPv4, DSR, DSDV, IPSec
G: These are Network Layer related Protocols: IGMP, ICMP, AODV, IPv6, IPv4, UDP
H: These are Network Layer related Protocols: IGMP, ICMP, AODV, IPv6, IPv4, CSMA
I: These are Network Layer related Protocols: IGMP, ICMP, AODV, IPv6, IPv4, TCP
2.Circuit switching was dropped in favour of Packet switching however this was at a cost of efficiency and throughput on network resources.
True
False
3. Virtual Circuits are equivalent of Circuit switching type networks on a packet switching networks and they allow a more reliable connection than packet switching networks can afford in general.
True
False
4.The internet is made up of several information sharing routers and this routing information is generated by applications that send and receive data using the routers and links.
True
False
5.Circuit switching leads to a lower variation in end-to-end delay.
True
False
6. Packet switching is more efficient than circuit switching for traffic that arrives in "bursts.
True
False
7. Circuit switching was used by the older telephone network
True
False
8.The Network layer in TCP/IP provides a best effort service. By this it is meant? Select most appropriate.
A: All packets are sent and received reliably
B: All packets are sent and received with no QoS guarantee
C: All packets are delivered in order
D: All packets are delivered out of order
E: All packets are delivered just once
F: All packets are delivered in duplicates and or triplicates
G: All packets are delivered within a stipulated time
H: All packets are delivered securely
9.In an IPv4 Datagram, the 'Identification' field is useful in the following process.
A: Ordered Delivery
B: Error Checking
C: Addressing
D: Fragmentation and Reassembly
E: None of these
10. In a maximum possible size datagram, the IHL field is 15. What is the amount of pure data in bytes carried by this datagram
A: 65476
B: 65475
C: 65521
C: 65521
E: none of these
11.In IPv4 the TTL decreases by 1 with every hop.
A: True
B: False
12.The maximum amount of data in any IPv4 datagram can be
A: 65516
B: 65515
C: 65536
D: 65535
E: none of these
13.IPv6 supports priority traffic passing for some applications.
A: True
B: False
14.IPv6 allows more than one flow between any two communication nodes via its Flow and label field
A: True
B: False
15.IPv6 Options do not exist in the header for IPv6 but exist in the data part.
A: True
B: False
16.Distance Vector Algorithm directly shares routing information with nodes that are several hops away.
A: True
B: False
17.A router that floods routing information also creates duplicate datagrams.
A: True
B: False
18. RIP shares routing information only when there is a change in the network topology.
A:True
B:False
Bursty Traffic results in
A: longer queues but shorter delays
B: Shorter queues but longer delays
C: longer queues and longer delays
19.Packet arrival on real networks is bursty.
A : True
B: False
20.Queues help smooth out packet arrival rates.
A: True
B: False
When designing queues we should aim for
A: maximum efficiency and min delays
B: optimal efficiency and min delays
C: min efficiency and max delays
D: none of these
The data field of the datagram may consist of...
A: TCP Segment
B: UDP Segment
C: Application Layer PDU
D: All of the above
Time to Live field is set
A: at random and updated as needed
B: based on routing metrics collected
C: to 100 to start with
D: to 0 to start with
E: none of the above (commonly set to 64 or there abouts).
IPv4 header check-sum may help identify
A: corrupt IPv4 data
B: corrupt routing tables
C: corrupt IP addresses
D: all of the above
At each hop, the TTL Field is
A: Increased by 1
B: Divided by 2
C: Decreased by 1
D: Multiplied by 2
When the TTL field is '0' the packet is dropped and not forwarded any further.
A: True
B: False
ID and Offset fields of the IPv4 header are used in the
A: subnetting process
B: forwarding process
C: ICMP processes
D: None of the above
Datagrams may arrive damaged, in duplicate, out of order or even not arrive all together.
A: True
B : False
Padding in the Datagram helps in ensuring the Datagram length is a multiple of 32 bits.
A: True
B: False
The originator of a IPv4 datagram can block the fragmentation process.
A: True
B: False
For fragmentation to happen the MTU should be
A: more than the data length in the datagram
B: more than the header length in the datagram
C: less than the data length in the datagram
D: less than the header length in the datagram
E: less than the total length of the datagram
The more flag in the last fragment of a fragmented IPv4 Datagram is set to
A: 1
B: 0
The segment offset value in a fragment is always a multiple of
A: 4 bits
B: 4 bytes
C: 8 bits
D: 8 bytes
Fragments are stitched back into the original sized datagram before being passed on to the transport layer at its destination.
A:True
B:False
Transport Layer is essentially responsible for security of a web connection.
A:True
B:False
TCP and IGMP are both transport layer protocols
A:True
B:False
All transport layer protocols are essentially there to bring reliability within an inherently unreliable network.
A:True
B:False
TCP is a connection oriented protocol.
A:True
B:False
UDP is a connection oriented protocol.
A:True
B:False
UDP and TCP header size is the same length.
True
False
UDP can provide ordered delivery.
True
False
There is no check-sum field in TCP or UDP header.
True
False
UDP can manage congestion via exponential back-off based slowing of transmission.
True
False
UDP is a data-gram like service with minor additional features.
True
False
A socket is a number given to nodes on a network.
True
Fale
Using UDP and or TCP computers can multiplex and share data between several applications in parallel.
True
False
UDP is good for short messages that need to be delivered quickly.
True
False
TCP is good for short messages that need to be delivered quickly.
True
False
Real time applications require a
A: 100% reliable network
B: fast segment delivery
C: in sequence segment delivery
D: all of the above
E: none of the above
UDP is the correct choice of protocol used for updating and accessing a database hosted on a webserver.
True
False
A transport layer protocol such as UDP provides...
A: Reliable connection start up
B: Graceful connection shut down
C: Ordered delivery
D: Flow control
E: congestion control
F: end to end communication
G: All of the above
H: None of the above
TCP Flow control parameters are exchanged...
A: only at the start of a connection
B: both at the start of a connection and during the connection
C: during when the connection exchanges bytes
D: None of the above
20. On receipt of a Flow control Wrx (receive window)of 3000 the transmits side transport layer can read up to
A: 1000 bytes from the application layer to send
B: 2000 bytes from the application layer to send
C: 3000 bytes from the application layer to send
D: 4000 bytes from the application layer to send
21. Later on in the connection the receipt of a Flow control Wrx (receive window) of 1000 the transmits side transport layer can read and store up to
A: 1000 bytes from the application layer to send
B: 2000 bytes from the application layer to send
C: 3000 bytes from the application layer to send
D: 4000 bytes from the application layer to send
22. The receive buffer space at the transport layer is 2900 bytes and is full. How many bytes does the receive side advertise to the transmit side to send at this stage of the connection.
A: 0 byte
B: 1 byte
C: 2900 bytes
D: None of the above.
23. Later on during the connection, the application layer reads 2000 bytes from the transport layer. What Window size is then advertised to the sender? (Buffer size was 2900 and was full).
A: 2000 bytes
B: 900 bytes
C: 2900 bytes
D: None of the above.
24. The transport layer reads data from application layer and maintains a variable window for managing the bytes to send. When does the window size updates during a connection...
A: When W is advertised by the receiver
A: When W is advertised by the receiver
C: Both when new W and ACK No are received
D: When sender sends X bytes
E: All of the above
What is common between RIP, SNMP, DNS and DHCP protocols.
A: They all use TCP to work.
B: They all use UDP to work.
C: They all use STCP to work.
D: None of the above
TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the _______ byte carried in that segment.
A: First
B: Last
C: Next
D: None of the above.
The value of the acknowledgment field in a segment defines the sequence number related to the ______byte a party expects to receive.
A: First
B: Last
C: Next
D: None of the above.
To accomplish flow control, TCP uses a ___________ window protocol.
A: limited-size
B: sliding
C: fixed-size
D: None of the above.
In TCP, the size of the send window is the ________ of rwnd and cwnd.
A: Sum of the two.
B: Max
C: Min
D: none of the above.
In the ________ algorithm the size of the congestion window increases exponentially until it reaches a threshold.
A: congestion avoidance
B: congestion detection
C: slow start
D: None of the above.
When the congestion is detected, if detection is by a time-out, a new _______ phase starts.
A: congestion avoidance
B: congestion detection
C: slow start
D: None of the above.
The concept of a socket is used by...
A: Network Layer protocols
B: Transport Layer protocols
C: Physical Layer Protocols
D: None of the above
Same port number can be used by any (TCP, UDP etc) transport layer protocol.
A: True
B: False
TCP segments are likely to be delivered to Application layers on different machines and to different applications. However, these are ignored by the application, if the socket information in them does not match that of the host they are received on.
A: True
B: False
Data transfer begins irrespective of the availability of the receiving side in
A: UDP
B: TCP
C: All transport layer protocols
D: None of the above
At the transport layer port numbers are defined to manage application to application communication and multiplexing. These numbers are used to do end to end communications by the...
A: Network layer protocols
B: Operating System
C: Operating System, Transport layer and Applications in conjunction
D: Application Layer
E: Transport layer
F: None of the above
The bytes of data being transferred in each connection are numbered by TCP. The numbering starts with a "randomly generated number"
True
False
TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the "first" byte carried in that segment.
True
False
The inclusion of the checksum in the TCP segment is "mandatory"
True
False
A SYN segment cannot carry data; it consumes "one" sequence number(s).
True
False
An ACK segment, if carrying no data, consumes "no" sequence number(s)
True
False
The connection establishment procedure in TCP is susceptible to a serious security problem called the "SYN flooding" attack
True
False
The SYN flooding attack belongs to a group of security attacks known as a "denial of service attack"
True
False
The FIN + ACK segment consumes "one" sequence number(s) if it does not carry data.
True
False
In TCP, one end can stop sending data while still receiving data. This is called a "half duplex"
True
False
In TCP, the size of the send window is the "minimum" of rwnd and cwnd
True
False
In TCP, the window should not be "shrunk"
True
False
In TCP, the receiver can temporarily shut down the window; the sender, however, can always send a segment of "one" byte(s) after the window is shut down.
True
False
Nagle's algorithm can solve the silly window syndrome created by the "sender"
True
False
Clark's solution can solve the silly window syndrome created by the "receiver"
True
False
Delayed acknowledgment can solve the silly window syndrome created by the "receiver"
True
False
ACK segments consume "one" sequence number(s) and "are not " acknowledged.
True
False
In modern implementations of TCP, a retransmission occurs if the retransmission timer expires or "three" duplicate ACK segments have arrived.
True
False
In TCP, "no" retransmission timer is set for an ACK segment
True
False
Lost acknowledgments may create a "deadlock" if they are not handled properly.
True
False
In the "slow start" algorithm the size of the congestion window increases exponentially until it reaches a thresholh
True
False
In the "congestion avoidance" algorithm the size of the congestion window increases additively until congestion is detected.
True
False
In the congestion detection algorithm, if detection is by a time-out, a new "slow start" phase starts.
True
False
In TCP, there can be "only one" RTT measurement(s) in progress at any time.
True
False
The value of the window scale factor can be determined during "connection establishment".
True
False
Urgent data requires the urgent pointer field as well as the URG bit in the "control" field
True
False
He options field of the TCP header ranges from 0 to "40 bytes".
True
False
"Maximum segment" defines the maximum number of bytes in a TCP segment
True
False
If the ACK value is 200, then byte "199" has been received successfully.
True
False
The "keepalive" timer prevents a long idle connection between two TCPs.
True
False
The "persistence" timer is needed to handle the zero window-size advertisement.
True
False
A special segment called a probe is sent by a sending TCP when the "persistence" timer goes off.
True
False
{"name":"Data", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge of network protocols, packet switching, and the fundamentals of IPv4 and IPv6 with our comprehensive quiz designed for tech enthusiasts and students alike. Dive into essential concepts related to data transmission, routing protocols, and network architecture.Key Features:101 challenging questionsMultiple choice and checkbox formatsLearn about TCP\/IP and routing protocols","img":"https:/images/course5.png"}
Powered by: Quiz Maker