Station A is transmitting data to station B, and expects an
acknowledgment
after every 400 bytes. After transmitting data for a while,
the two
stations determine the line is reliable and change to
expecting and
acknowledgement every 600 bytes.
This is an example of (pick the best answer only):
A.) BECN
B.) Sliding Windows
C.) Poison Reverse
D.) Countdown timers
E.) Split Horizon
F.) Count to infinity
Identify the purpose of the Trace command? A.) Explorer packet transmitting routing information B.) Test connectivity C.) Determine the path a packet is taking through the network D.) Transmits user data when buffers are full
Can you explain in a generic manner the packet of IPSec?
Tell us the name of algorithm of eigrp protocol?
Explain some overview of EIGRP?
What is difference between fast ethernet and ethernet port?
13 Answers Bank of Baroda, Bank Of India,
How can we configure Inter-VLAN in Layer 3 Switch? Remember one thing without Router.
What is mac address size of ipv6?
Explain on which interface we always apply access-list?
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
How do you find valid hosts in a subnet?
Identify the purpose of the Trace command? A.) Explorer packet transmitting routing information B.) Test connectivity C.) Determine the path a packet is taking through the network D.) Transmits user data when buffers are full
What are the two types of access lists that can be configured on a Cisco router? A. Standard B. Extended C. Filtering D. Packet