Describe End to End network services: (Choose all that apply)

A.) Best Route selection

B.) Accomplished Segment by Segment, each segment is autonomous

C.) Flow Control & Data Integrity

D.) Best efforts packet delivery



Describe End to End network services: (Choose all that apply) A.) Best Route selection B.) Acc..

Answer / guest

Answer: A B C D

All of the above End to End network services.

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

Explain the types of nat?

0 Answers  


Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many hosts are available? A. 254 B. 510 C. 126 D. 16,372

1 Answers  


how we update the IOS version with the help of TFTP?

0 Answers  


what is the reason for creating vlans

4 Answers  


friends i have 3ree prob which is asked in ibm india in technical round 1 what is ftp(this was easy i had answered) 2 why we use ftp(i think it is a tough one) 3 how can we enable ftp in the widows xp. friend i need these question answer as soon as possible if it is possible to reply within the eveing then i always obeyliged to you i am espacily looking towards the jitendera sinha who make most of the valuable answer loking toward you nidhi mall

3 Answers   IBM,






Explain the term 'multicast'.

0 Answers  


Each department has its own file server and the company has an enterprise server that is shared by all departments. What does a network administrator use to provide a secure separation between the management and sales departments? A. a bridge between management and sales B. routers to provide the most secure segmentation C. a hub to provide ease of management and a satisfactory alternative for network security D. an Ethernet switch to maintain secure separationthrough programming the access lists for each port of the switch

1 Answers  


What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer

1 Answers  


How many maximum paths you can give on latest ios in rip?

0 Answers  


Urgent reply plz donot have time to serch on google plz reply the questions is how to remove newfolder.exe virus from my windows 2003 server i have all ready tried quick heal.spy hunter mcafee server . plz reply

1 Answers  


Identify 3 UDP characteristics? A.) Reliable communication protocol B.) Applications that use UDP must incorporate reliability C.) Connnection-less oriented D.) Incorporates no handshaking

2 Answers  


Which of these is the Private key? A. Bear B. Cave C. Indian D. Cowboy

1 Answers  


Categories