Identify the purpose of the TCP 3 step handshake?

A.) Setup a un-reliable connection

B.) Initialize routing tables

C.) Synchronize sequence numbers between hosts

D.) Connection tear down process



Identify the purpose of the TCP 3 step handshake? A.) Setup a un-reliable connection B.) Initi..

Answer / guest

Answer: C

Is This Answer Correct ?    4 Yes 1 No

Post New Answer

More CCNA Interview Questions

What does the meaning of interface 0/0?

0 Answers  


hi... i am a beginner to CCNA... i find it hard understandin collision domain n broadcast domain.. please don tell me the definition.. i read the definitions many times... i need a more detailed explanation... like whn i read the definition it sounds simple... but i don understand whn they say it like a hub has one collision domain and one broadcast domain... and if collisions happen inside collision domain... i am confused... please help me... :(

4 Answers  


Identify the command to configure the configuration-register? A.) Router# config-register 0x2102 B.) Router(config)# config-register 0x2102 C.) Router(config-reg)# 0x2102 D.) Router> config-register 0x2102

1 Answers  


Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered reliable

1 Answers  


What will be the prefix length of 224 in vlsm?

0 Answers  


LAN stands for which of the following? A.) Local Area Network B.) Local Arena Network C.) Local Area News D.) Logical Area Network

3 Answers  


Identify the 3 key features of the Cisco Discovery Protocol? A.) Off by default B.) Will allow for the discovery of layer 3 addresses on neighbor routers C.) Verify connectivity D.) Open standard E.) Does not require any layer 3 protocols to be configured

1 Answers  


Why we are not using subnet mask of class A in class C?before answering this question, just think upon if we do this then we don't need to move to IPv6.

2 Answers  


Which of the following will show an extended access list 150? A.) sh access-list 150 B.) sh ip int C.) sh ip access-list D.) sh access-list 150 extended

2 Answers  


Identify 3 methods not used to prevent routing loops? A.) Holddown timers B.) Sequence numbers C.) Triggered updates D.) Split horizon E.) Area hierarchies F.) Order of router startup

2 Answers  


What are the different types of the password used in securing a cisco router?

0 Answers  


What is VLSM? how to Calculate VLSM? where it is use and why?

13 Answers  


Categories