What is a function of a reliable transport layer connection?
A. route selection
B. acknowledgements
C. session checkpoints
D. system authentication
Answers were Sorted based on User's Feedback
Answer / suman reddy kancharla
B. acknowledgements
This layer can overcome any lack of reliabilty in the lower
level protocols. It is achieved using acknowledgement
message that informs the sender that the data was
successfully received.
Route selection is done in Network layer.
session checkpoints are done in Session layers.
| Is This Answer Correct ? | 3 Yes | 0 No |
When the router runs out of buffer space, this is called ________. A. Source Quench B. Redirect C. Information Request D. Low Memory
Two of the protocols that can be carried in the Protocol field of an IP packet are? A. TCP B. UDP C. FTP D. TFTP
Which two of the following are valid ways to have multiple encapsulation types on a single interface? A.) This is not possible B.) subinterfaces C.) additional physical interfaces D.) secondary addresses
Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it send out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again. This is most directly an example of (pick the best answer only): A.) Poison Reverse B.) Connectionless protocol C.) Windowing D.) Connection oriented protocol E.) Flow Control F.) Split Horizon
In which access- list type you can't do editing?
Identify the 2 methods to modify the routers boot sequence? A.) Setup program B.) Boot system commands C.) RXBoot D.) Config-register
What is Data, management, native, default,trunk and access vlan?
What is ‘round-trip time’?
What type of switching creates variable latency through the switch? A.) Cut-Through B.) Inverted C.) Layer 4 D.) Multiplexed E.) Store and Forward
Which three basic switch functions increase available bandwidth on the networks? (Choose three) A. loop avoidance B. address learning C. hop count limiting D. broadcast filtering E. packet forward/filtering
Which layer manages protocol access to the Network layer? A.) Datalink - MAC Sublayer B.) Datalink - LLC Sublayer C.) Transport D.) Session E.) Network
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z