adplus-dvertising
frame-decoration

Question

Which 2 protocols are used in the Transport layer of the TCP/IP model?

a.

UDP and HTTP

b.

TCP and UDP

c.

HTTP and TCP

d.

ICMP and HTTP

Answer: (b).TCP and UDP

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which 2 protocols are used in the Transport layer of the TCP/IP model?

Similar Questions

Discover Related MCQs

Q. Which of them is not an appropriate method of router security?

Q. Which of them is not an attack done in the network layer of the TCP/IP model?

Q. ___________ is an attack technique where numerous SYN packets are spoofed with a bogus source address which is then sent to an inundated server.

Q. ____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number.

Q. There are __________ different versions of IP popularly used.

Q. RoBOT is abbreviated as ___________

Q. TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat.

Q. Application layer sends & receives data for particular applications using Hyper Text Transfer Protocol (HTTP), and Simple Mail Transfer Protocol (SMTP).

Q. Connection authentication is offered for ensuring that the remote host has the likely Internet Protocol (IP) ___________ & _________

Q. Trusted TCP/IP commands have the same needs & go through the identical verification process. Which of them is not a TCP/IP command?

Q. TCP/IP is composed of _______ number of layers.

Q. TCP/IP is extensively used model for the World Wide Web for providing network communications which are composed of 4 layers that work together.

Q. Which of the following is an example of application layer vulnerability?

Q. Which of the following is an example of presentation layer vulnerability?

Q. Which of the following is an example of session layer vulnerability?

Q. Which of the following is an example of Transport layer vulnerability?

Q. Which of the following is not a vulnerability of the application layer?

Q. Which of the following is not an example of presentation layer issues?

Q. Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.

Q. Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?