Station A is transmitting data to station B, and expects an
acknowledgment after every 400 bytes. After transmitting
data for a
while, the two stations determine the line is reliable and
change to
expecting and acknowledgement every 600 bytes.
This is an example of (pick the best answer only):
A.) BECN
B.) Sliding Windows
C.) Poison Reverse
D.) Countdown timers
E.) Split Horizon
F.) Count to infinity
Answer / guest
Answer: B
A TCP/IP 'window' is the amount of data (number of bytes)
that the
sending station will transmit before expecting an
acknowledgement back.
If the stations can change that window size on the fly, that
is called a
sliding window. This is done to optimize performance.
| Is This Answer Correct ? | 0 Yes | 0 No |
Identify the command that forces the router to load into ROM mode upon a reload? A.) boot system rom B.) rom boot C.) boot system flash rom D.) boot router rom
Which of the following are examples of ICMP? A.) Traceroute B.) Web Browsing C.) Ping D.) Telnet E.) Destination Unreachable message from a router F.) Inverse Tunnels
Of the following switching types, which one has the lowest latency? A.) Cut-through B.) Fragment Free C.) None D.) Store-and-forward
what is the diffrence betwwen telnet and ssh.this question is asked by nikhil and i am plasing the answer here insteed of his personal mail.
Utilizing RIP, what is the limit when it comes to number of hops?
What is a characteristic of Store and Forward switches? A.) They forward the frame before it is completely read. B.) They work at wire speed. C.) They are the same a Cut-Through switching. D.) They read the entire frame and check CRC before forwarding. E.) They decrease latency.
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
What is L2 Link and its significance regarding IP addressing.
What is the correct command line syntax for configuring a port on a 7000 or 7500 series Cisco router with a VIP card? A.) port B.) port adapter/port C.) You can't put a VIP card in a 7000 or 7500 router. D.) slot/port-adapter/port E.) slot/port F.) slot
Mention what does the clock rate do?
Why is network segmentation a good idea when managing a large network?
What would be the proper wildcard mask to permit all odd numbered hosts on the 10.48.0.0/12 network? access-list 1 permit 10.48.0.0 0.15.255.255 access-list 1 permit 10.48.0.1 0.15.255.254 access-list 1 permit 10.48.0.0 0.15.255.1 access-list 1 permit 10.48.0.0 0.0.0.254 access-list 1 permit 10.48.0.0 0.0.0.255