Question

Which of the following services CANNOT be provided by TCP ? Question 15 options: packets routing...

Which of the following services CANNOT be provided by TCP ?

Question 15 options:

packets routing

flow control

reliable data transfer at transport layer

connection management

Suppose there are two hosts located in two different networks, and each host runs a process. For the communications between these two processes, what type of address will be needed ?

Question 16 options:

IP address of both hosts and port number of both processes

Either IP address of both hosts or port number of both processes

Only port number of both processes

Only IP address of both hosts

Homework Answers

Answer #1

Q15)

Answer is Option A

Packet Routing is not done in TCP where as it establish a connection and then it forwards the packets via that defined path only.

Q16)

Answer is Option A

Process-to-process delivery needs needs socket address which consists of two identifiers, IP address and the port number, and we need both at each end to make a connection.

These are the correct answer for the given problems

If u like the answer do give it a Thumbs Up and have any kind of doubt drop in comments below

Thank You

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
1. a. Which of the following services could not be provided to a flow of packets...
1. a. Which of the following services could not be provided to a flow of packets between a given source and destination? A. In-order packet delivery B. Guaranteed maximum bandwidth C. Guaranteed maximum jitter D. Security services b. In the following protocols, which group is used extensively for routing within an autonomous system in the Internet? A. The Routing Information Protocol (RIP) and IS-IS protocol B. The IS-IS protocol and Open Shortest Path First (OSPF) C. The Routing Information Protocol...
QUESTION 8 To hijack a TCP connection, it is necessary for the attacker to perform a...
QUESTION 8 To hijack a TCP connection, it is necessary for the attacker to perform a number of tasks. Select the best answer from what is given below. (Note: There is only one correct answer.) 1. Monitor and intercept packets between victim hosts 2. Launch a successful SYN flooding attack to mute a victim host for the attacker to impersonate 3. Guess or derive correctly TCP sequence numbers 4. Carry out a successful denial of service attack on the victim...
The average queuing delay increases as the traffic intensity increases. True False The Date: header line...
The average queuing delay increases as the traffic intensity increases. True False The Date: header line in the HTTP response message indicates when the object in the response was last modified. True False Both DNS and HTTP normally run over TCP. True False In a client-server application, clients do not communicate with each other directly. True False A socket is an interface between the application process and the transport layer protocol within a host. True False Two core functions in...
5.Question 5 Pre-attack indicators are like post-attack indicators in which of the following ways: Both are...
5.Question 5 Pre-attack indicators are like post-attack indicators in which of the following ways: Both are more effective in the presence of external threat intelligence IP source shuns work about 50% of the time for both methods. Both will always prevent attacks Both are really a waste of time for most tools Neither can possibly prevent an attack. 1 point 6.Question 6 DMARC is a standard that enforces which of the following IT infrastructure bindings: Connects email content with checksums...
_______ is the highest capacity wireline Internet access service. Gigabit Ethernet Mobile Broadband T-3 DSL 10...
_______ is the highest capacity wireline Internet access service. Gigabit Ethernet Mobile Broadband T-3 DSL 10 points    QUESTION 2 Tunnels are special bits at the beginning and end of each packet that encapsulate the message so that others cannot see what is being transmitted. True False 10 points    QUESTION 3 Service Level Agreements (SLAs) guarantee which of the following is true connections between offices on MPLS services: (There is more than one correct answer) Class of Service options...
Question 21 ​By default, most wireless networks are ____. a. ​secured by WEP b. ​password-locked c....
Question 21 ​By default, most wireless networks are ____. a. ​secured by WEP b. ​password-locked c. ​secured by WPA or WPA2 d. ​left unsecured 1 points Question 22 ​Choosing Image Editing and Illustration Programs a. ​non-lossy b. ​linear c. ​bitmap d. ​vector 1 points Question 23 ​Computer-generated graphics come in two varieties: ____ and vector. a. ​linear b. ​raster c. ​angular d. ​digital 1 points Question 24 ​Currently, WWANs provide wireless connections to the Internet using ____ networks created by...
1. By convention, how are configuration files separated from regular files? (NOTE: A practical effect of...
1. By convention, how are configuration files separated from regular files? (NOTE: A practical effect of the separation is that they are not displayed by the default version of the ls command)                         a. the prefix "rc" (rc.filename)               c. the extension .cfig                         b. a dot (.) at the beginning                    d. by having the SUID bit set 2. The IP address which is reserved for local loopback (equivalent to "localhost") is:                         a. 255.255.255.0                                   c. 192.168.70.1...
Johnson Company— Internal Controls Johnson Company Inc. (Johnson Company or the “Company”) is a U.S. public...
Johnson Company— Internal Controls Johnson Company Inc. (Johnson Company or the “Company”) is a U.S. public company that files quarterly and annual reports with the Securities and Exchange Commission (SEC). JOHNSON COMPANY is a leading retail chain operating more than 500 department stores across the continental United States. JOHNSON COMPANY department stores offer customers a variety of nationally advertised products, including cookware, shoes, jewelry, perfume, and other accessories. The Company’s supply chain of products is managed through a single warehouse...
Background ABC Retailers Inc. (ABC or the “Company”) is a U.S. public company that files quarterly...
Background ABC Retailers Inc. (ABC or the “Company”) is a U.S. public company that files quarterly and annual reports with the Securities and Exchange Commission (SEC). ABC is a leading retail chain operating more than 100 department stores across the continental United States. ABC department stores offer customers a variety of nationally advertised products, including clothing, shoes, jewelry, and other accessories. The Company’s supply chain of products is managed through a single warehouse and distribution facility located in Kansas City,...
3 SECURING THE WORKFORCE Diversity management in X-tech, a Japanese organisation This case is intended to...
3 SECURING THE WORKFORCE Diversity management in X-tech, a Japanese organisation This case is intended to be used as a basis for class discussion rather than as an illustration of the effective or ineffective handling of an administrative situation. The name of the company is disguised. INTRODUCTION In light of demographic concerns, in 2012, the Japanese government initiated an effort to change the work environment in order to secure the workforce of the future. Japan is world renowned for its...