Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which IP packet field will prevent endless loops?
type-of-service
identificationf
lags
time-to-live
header checksum



Which IP packet field will prevent endless loops? type-of-service ..

Answer / narendra garg

Time-to-live

TTL

Is This Answer Correct ?    7 Yes 2 No

Post New Answer

More CCNA Interview Questions

Which of the following are examples of the Transport Layer? A.) Token Ring B.) UDP C.) TCP D.) IP E.) SQL F.) LLC

2 Answers  


A server is running HTTP, SMTP and DHCP. Which of the following best explains how the server is able to handle all three services over the same connection? The server has separate buffer areas for each application and forwards all data to each service. If the data does not apply to that application, it is discarded. The server processes each packet one at a time and forwards the data to the application that indicates that it is waiting for a transmission to arrive. The data is discarded if it does not apply to that application. The server uses the destination port number in the TCP/UDP header to identify the service. The data is forwarded to the service identified by the port number. The server uses separate three-way handshake connections to control the flow of the data and relates the service to the proper connection. This relationship allows the server to pass the data to the proper service.

1 Answers  


Which three protocols are corerectly matched to their transport layer functions? (Choose three) A. route selection IP B. sliding window UDP C. well known pods IP D. route validation ICMP E. connection oriented TCP F. three way handshake TCP G. no sequence and acknowledgement UDP

1 Answers  


Which of the following will show an extended access list 150? A.) sh access-list B.) sh ip int C.) sh ip access-list 150 D.) sh access-list 150 extended

1 Answers  


What is the difference between arp and rarp?

0 Answers  


Which of the following are examples of ICMP? A.) Traceroute B.) Web Browsing C.) Ping D.) Telnet E.) Destination Unreachable message from a router F.) Inverse Tunnels

1 Answers  


Bridges work at what layer of the OSI model? A.) Data Link B.) Network C.) Physical D.) Application

2 Answers  


in the ospf area network dr and bdr selection procedure occur let there are 4 router in that n/w r1 have the higher priority then r2 and r2 have higher priority then r3 and so on like that r1>r2>r3>r4 now as we know that selection of dr and bdr based upon the router priority so in this case r1 will be dr and r2 will be bdr now my question is that if i am going to implement 5th router which have greater priority then r1 then will it become dr atomically remember that i am not going change my 5 or 1st router property answer that one please

4 Answers  


Identify the command that configures serial0 for PPP encapsulation? A.) Router(config)# encapsulation ppp B.) Router(config-if)# encapsulation serial ppp C.) Router(config-if)# encapsulation ppp D.) Router# encapsulation ppp

2 Answers  


Identify the hardware component that stores the backup configuration? A.) RAM B.) NVRAM C.) Flash D.) ROM

1 Answers  


The network portion of an address typically represents a: A.) Router B.) Ethernet MAC address. C.) Computer D.) Host E.) Segment

3 Answers  


Which ipsec rule is used for the olympia branch and what does it define?

0 Answers  


Categories