Filters
Question type

Study Flashcards

UDP is called a ________________transport protocol.


A) connectionless, reliable
B) connection-oriented, unreliable
C) connectionless, unreliable
D) none of the above

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

UDP and TCP are both _______ layer protocols.


A) data link
B) network
C) transport
D) none of the above

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

UDP is an acronym for _______.


A) User Delivery Protocol
B) User Datagram Procedure
C) User Datagram Protocol
D) None of the above

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

UDP needs the _______ address to deliver the user datagram to the correct application process.


A) port
B) application
C) internet
D) none of the above

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Internet is


A) a local computer network
B) a worldwide network of computers
C) an interconnected network of computers
D) a worldwide interconnected network of computers which use a common protocol

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

The local host and the remote host are defined using IP addresses. To define the processes, we need second identifiers called ____________.


A) UDP addresses
B) transport addresses
C) port addresses
D) none of the above

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

World Wide Web


A) is another name for internet
B) worldwide connection for computers
C) a collection of linked information residing on computers connected by the internet
D) a collection of worldwide information

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

UDP does not add anything to the services of IP except for providing _______ communication.


A) node-to-node
B) process-to-process
C) host-to-host
D) none of the above

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

________ means to prove the identity of the entity that tries to access the system's resources.


A) Message authentication
B) Entity authentication
C) Message confidentiality
D) none of the above

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

B

Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.


A) confidentiality
B) integrity
C) authentication
D) none of the above

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

In the sending computer, UDP receives a data unit from the _______ layer.


A) application
B) transport
C) IP
D) none of the above

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Transport layer protocols are useful for ensuring ______________ delivery.


A) H-2-H
B) H-2-R
C) N/W-2-N/W
D) End-2-End

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

_________ means that a sender must not be able to deny sending a message that he sent.


A) Confidentiality
B) Integrity
C) Authentication
D) Non-repudiation

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

One of the responsibilities of the transport layer protocol is to create a ______ communication.


A) host-to-host
B) process-to-process
C) node-to-node
D) none of the above

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

The ports ranging from 49,152 to 65,535 can be used as temporary or private port numbers. They are called the ________ ports.


A) well-known
B) registered
C) dynamic
D) none of the above

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Although there are several ways to achieve process-to-process communication, the most common is through the __________ paradigm.


A) client-server
B) client-client
C) server-server
D) none of the above

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

A

HTML tags define


A) The data types of elements of document
B) Presentation of specified elements of a document
C) The contents of the document
D) The structure of the document

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

In the sending computer, UDP sends a data unit to the _______ layer.


A) application
B) transport
C) IP
D) none of the above

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

C

_______________is a reliable delivery mechanism.


A) IP
B) TCP
C) UDP
D) ARP

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

When the IP layer of a receiving host receives a datagram, _______.


A) delivery is complete
B) a transport layer protocol takes over
C) a header is added
D) none of the above

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 25

Related Exams

Show Answer