Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which statement about the flow control function of TCP is true?

A. TCP makes no snarl to check for lost or duplicate data
packets

B. The application layer must sequence data packets when
using TCP

C. TCP controls the flow of UDP data through negative
acknowledgements (NAK)

D. TCP is a connection oriented protocol that acknowledges
receipt of data packets and is considered reliable

Answers were Sorted based on User's Feedback



Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check fo..

Answer / guest

Answer: D

Is This Answer Correct ?    2 Yes 0 No

Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check fo..

Answer / gautam mishra

d

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which two of the following protocols are used at the Transport layer? A.) ARP B.) UDP C.) ICMP D.) RARP E.) TCP F.) BootP

7 Answers  


Which 2 commands shows the Cisco IOS filename? A.) show IOS B.) show ver C.) show flash D.) show mem E.) show NVRAM

1 Answers  


The benefits to segmenting with Bridges are which of the following? A.) Scalability B.) Datagram filtering C.) Manageability D.) Reliability

1 Answers  


What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer

1 Answers  


How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain

3 Answers  


What is the Cisco name for the encapsulation type used on a serial interface? A. HDLC B. SDLC C. SAP D. SNAP

3 Answers   HCL,


WAN stands for which of the following? A.) Wide Arena Network B.) World Area Network C.) Wide Area News D.) Wide Area Network

2 Answers  


In port based access-list which command you give instead of ip?

0 Answers  


Why Authentication Header (AH) is not compatible with the network that using NAT?????? Jitu, looking for u specially...!!!! U knw why i m looking for u..!!!

1 Answers  


What are the two types of transmission technology available in ccna?

1 Answers  


Which of the following are Transport layer protocols? A.) UDP B.) TCP C.) NBP D.) IP E.) SPX

3 Answers  


Which statement is true when a broadcast is sent in an Ethernet/802.3 ITAN? A. The ip shored used is 255.255.255.0 B. The IP address used is 255.255.255.255 C. The MAC address used is 00 00 00 00 00 00 D. The MAC address used is FF FF FF FF FF FF

1 Answers  


Categories