Identify 3 characteristics of a connection oriented protocol?
A.) Path determination
B.) Flow control
C.) Acknowledgements
D.) Uses hop count as metric
E.) 3 step handshake
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B C E
Connection oriented protocols must first establish the
connection (3
step handshake), employ methods to acknowledge the receipt
of data
(acknowledgements) and slow down the flow of data if
required (flow
control).
| Is This Answer Correct ? | 8 Yes | 1 No |
Mention what is the difference between tcp and udp?
What is DLCI?
How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain
Do you found the Cisco Certification 642-067 exam Guide ?
Which of the following is an example of the Network Layer? A.) Token Ring B.) RARP C.) LLC D.) DDP E.) TCP
what is secure hand shake protocol
You have two Cisco routers setup back-to-back in a lab using DTE/DCE cables. To which router would you add the clockrate command? A.) The serial port on the DCE router B.) The Ethernet port on the DTE router C.) The Ethernet port on the DCE router D.) The serial port on the DTE router
Why mac address called physical address?
In order to configure a Frame Relay subinterface with IP identify the 2 commands that must be configured on the physical interface? A.) Router(config-if)# encapsulation frame-relay B.) Router(config-if)# no ip address C.) Router(config-if)#encapsulation subinterface frame-relay D.) Router(config)# subinterface s0 encapsulation frame-relay
Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) They are identical C.) They both require the enable password D.) User exec is a subset of the privileged exec
what are two security appliances that can be installed a network
What not a name of an ISP? A. MSN B. Comcast C. Verizon D. McDonalds