Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Identify 3 characteristics of a connection oriented protocol?

A.) Path determination

B.) Flow control

C.) Acknowledgements

D.) Uses hop count as metric

E.) 3 step handshake

Answers were Sorted based on User's Feedback



Identify 3 characteristics of a connection oriented protocol? A.) Path determination B.) Flow ..

Answer / guest

Answer: B C E

Connection oriented protocols must first establish the
connection (3

step handshake), employ methods to acknowledge the receipt
of data

(acknowledgements) and slow down the flow of data if
required (flow

control).

Is This Answer Correct ?    8 Yes 1 No

Identify 3 characteristics of a connection oriented protocol? A.) Path determination B.) Flow ..

Answer / kiran

Above mentioned ans is the right one

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify the command to configure the IP address 172.16.100.5 255.255.255.0? A.) Router(config-if)# ip address 172.16.100.5 255.255.255.0 B.) Router(config)# ip address 172.16.100.5 C.) Router# ip address 172.16.100.5 255.255.255.0 D.) Router(config)# ip address 172.16.100.5 255.255.255.0

2 Answers  


In which access- list type you can't do editing?

0 Answers  


Which cable called v.35?

0 Answers  


Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub

1 Answers  


Which of the following are examples of the Application Layer? A.) LLC B.) Token Ring C.) Spreadsheet D.) TCP E.) IP F.) Word Processor

1 Answers  


What is the function of Layer 2 Device?

3 Answers  


When editing a line in the CLI mode, what does 'CTRL-A' do? A.) Moves you to the previous command. B.) Moves you to the next word. C.) Moves you to the end of the line. D.) Moves you to the next command. E.) Moves you to the beginning of the line.

1 Answers  


What does the command "IP name-server 255.255.255.255" accomplish? A. It sets the domain name lookup to be a local broadcast. B. This is an illegal command. C. It disables domain name lookup. D. The command is now defunct and has been replaced by "IP server-name ip any"

1 Answers   Cisco,


Which of the following describe full-duplex transmission? A.) Uses a single wire B.) Data transmission in both directions, but only one way at a time C.) Uses a point-to-point connection from the transmitter of the transmitting station to the receiver of the receiving station D.) Data transmission in only one direction

2 Answers  


Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) They are identical C.) They both require the enable password D.) User exec is a subset of the privileged exec

1 Answers  


in which way the datas will transfer from one host to another host by using osi layer?

3 Answers  


Difference between Distance vector, Link state protocols

3 Answers   HCL,


Categories