Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which three of the following are true statements about

connection-oriented sessions?

A.) The segments delivered are acknowledged back to the
sender upon

their reception

B.) Any segments not acknowledged the are retransmitted by
the receiver

C.) A manageable data flow is maintained in order to avoid
congestion,

overloading and loss of any data

D.) Segments are sequenced back into their proper order upon
arrival at

their destination



Which three of the following are true statements about connection-oriented sessions? A.) The s..

Answer / guest

Answer: A C D

Connection-oriented services are useful for transmitting
data from

applications that are intolerant of delays and packet
re-sequencing. FTP

and Telnet applications are based on connection-oriented
services as

well as some voice and video programs. Any segment that is not

acknowledged by the received is retransmitted by the sender.

Is This Answer Correct ?    4 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which ipsec rule is used for the olympia branch and what does it define? (Choose two)

0 Answers  


what is used for passive intercae comand mine answer-to prevent to take update from outside

2 Answers  


What is etherchannel?

0 Answers  


You need to come up with a TCP/IP addressing scheme for your company. How many network IDs must you allow for when you define the subnet mask for the network? A.) One for each WAN link B.) One for each router interface C.) One for each NIC installed in each client D.) One for each subnet with hosts E.) One for each host ID

1 Answers  


Which three commands are used to configure information into RAM on a router? (Choose three) A. configure memory B. configure terminal C. configure overwrite D. copy tftp startup-config E. copy running-config startup-config F. copy startup-config running-config

8 Answers   HCL,


Why do you use ‘service password encryption’?

0 Answers  


Can you explain the broader steps of how L2F establishes the tunnel?

0 Answers   CCIE,


Which protocol used before part of ccna?

0 Answers  


When setting up a WAN network, everything outside of the Demarc is not owned by the customer. Which of the following are not owned by the customer? A.) The T1 line. B.) LAN C.) The Router D.) DTE E.) PC's F.) CO

1 Answers  


Which switching technology can reduce the size of a broadcast domain? A.) Cut-Through B.) Store-and-Forward C.) Spanning Tree Protocol D.) RARP E.) ARP F.) VLAN

2 Answers  


What is the difference between the communication and transmission?

0 Answers  


On which bas ospf take decision?

0 Answers  


Categories