What is a disadvantage of using a connection oriented
protocal such as TCP?

A. Packet acknowledgement may add overhead

B. packets are not tagged with sequence numbers

C. Loss or duplication of data packets is more likely to occur

D. The application layer must assume responsibility for
correct searchers of the data packets



What is a disadvantage of using a connection oriented protocal such as TCP? A. Packet acknowledg..

Answer / guest

Answer: A

Is This Answer Correct ?    30 Yes 2 No

Post New Answer

More CCNA Interview Questions

Identify the default serial encapsulation? A.) ISDN B.) HDLC C.) SDLC D.) Frame Relay E.) PPP

2 Answers  


Which device listed below provides clocking for the line? A.) DCE B.) CPE C.) CO D.) DTE E.) Demarc

2 Answers  


Why we use debug command?

0 Answers  


Which protocol gets a hardware address from a known IP address? A.) RARP B.) TCP C.) IP D.) BootP E.) ARP F.) ICMP

3 Answers  


Identify the purpose of the Ping command? A.) Share routing information with a neighbor router B.) Transmit user data when buffers are full C.) Test connectivity at layer 3 D.) Test entire protocol stack

2 Answers  






Explain the terms unicast, multicast, broadcast and multicast.

0 Answers  


Describe ICMP messages

4 Answers   HCL,


what is the purpose of multicast packets?

2 Answers  


Explain types of communication in ipv4?

0 Answers  


Select the most correct statement regarding client port address assignment. The client port always matches the destination port. To access a web page the client uses the source port of 80 and the destination port is dynamically selected. When a client requests a web page the destination port is 80 by default and the source port for the client is dynamically selected. The client source port is 1024 to get web pages and 1055 when retrieving ftp files.

2 Answers  


IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port

3 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

1 Answers  


Categories