Which statement about the flow control function of TCP is true?
A. TCP makes no snarl to check for lost or duplicate data
packets
B. The application layer must sequence data packets when
using TCP
C. TCP controls the flow of UDP data through negative
acknowledgements (NAK)
D. TCP is a connection oriented protocol that acknowledges
receipt of data packets and is considered reliable
Answers were Sorted based on User's Feedback
Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25
What is a benefit of a virtual LAN (VLAN)? A. It increases the number of broadcast domains B. It decreases the number of broadcast domains C. It increases the numberr of collision domains D. It decreases the number of collision domains E. Since it is a vitual Interface it never shuts down
Which type of routing you did in ccna?
How can an Ethernet switch improve network performance? Choose three
Which network mask should you place on a Class C network to accommodate a user requirement of ten subnetworks? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248
What is the link state routing protocol in the TCP/IP protocol stack? A. IP B. IS-IS C. NLSP D. OSPF E. RIP version 2
What is true about frame-relay DLCI? A.) DLCI represents a single physical circuit B.) DLCI is optional in all frame-relay networks C.) DLCI identifies a logical connection between DTE devices D.) DLCI is used to tag the beginning of a frame with VLAN information
Identify the 2 commands that save the running-config to a TFTP server? A.) write running tftp B.) copy running network C.) copy running tftp D.) write network
What is passive topology in ccna?
Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address
Identify the purpose of the following command 'ip route 192.168.100.0 255.255.255.0 10.1.0.1' A.) Enabling a dynamic routing protocol B.) Creating a static route to the 10.1.0.0 network C.) Teaches the router about the distant network 192.168.100.0 and how it can be reached via 10.1.0.1 D.) Assigning the IP address 192.168.100.0 to an interface
Which LAN switching method is used in CISCO Catalyst 5000?