Sequence and acknowledgement numbers are used for?
A.) Layer transitioning
B.) Flow control
C.) Port number addressing
D.) Reliability
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
TCP uses sequence numbers and acknowledgements to implement
reliability.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / norbac
to make transmitions of packets between two hosts more reliable
| Is This Answer Correct ? | 1 Yes | 0 No |
hello sir , if i finish this certification is the job is conform ?? and in chennai were i can do this ??
Which device works at the Network Layer of the OSI model? Router Switch Bridge Hub
what is vc,pvc,lmi and dlsi
What parameter is used with statically assigned routers to tell packets which interface to use to reach a distant network? A.) Mask B.) Subnet C.) Default gateway D.) Interface
Can Anyone tell what is aummarization??
Which Distance Vector characteristic can help to speed up convergence? A.) Triggered Updates. B.) Split Horizon. C.) Poison Reverse. D.) Hold Down timers. E.) Inverse ARP.
1350 Value in which type of access-list?
Using the access-list command, 'access-list 1 deny 2.2.2.2', what else must be done to stop host 2.2.2.2 from sending any traffic out of physical interface E0, while still allowing other traffic? A.) In global mode, Add a line - 'access-list 1 permit 0.0.0.0 255.255.255.255' B.) On interface E0, Add a line - 'access-group 1 in' C.) In global mode, Add a line - 'access-list 1 permit all' D.) On interface E0, Add a line - 'access-list 1 in' E.) On interface E0, Add a line - 'access-list 1 out' F.) On interface E0, Add a line - 'ip access-group 1'
What are the generic parts of a network layer address? A. an intenetworks number and a URL B. a vendor code and a serial number C. a network number and a host number D. a broadcast number and a unicast number E. a domain identifier and a device identifier
Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connnections D.) Path selection E.) MAC address examination F.) Network monitoring
Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's
What is the draw back of eigrp protocol?