niusouti.com

On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()A. Source Quench.B. Learning.C. Buffering.D. Windowing.E. Cut-Through.

题目
On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()

A. Source Quench.

B. Learning.

C. Buffering.

D. Windowing.

E. Cut-Through.


相似考题
更多“On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?() ”相关问题
  • 第1题:

    Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.

    A.transmitting devices

    B.transmitted devices

    C.receiving devices

    D.received devices


    正确答案:A

  • 第2题:

    Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.

    A.transmitting devices

    B.transmitted devices

    C.receiving devices

    D.received devices


    正确答案:A

  • 第3题:

    Which one of the following is the most commonly used layer 2 network device?()

    A. Hub

    B. Bridge

    C. Switch

    D. Router

    E. Repeaters

    F. None of the above


    参考答案:C

  • 第4题:

    For the following options, which feature is the foundation of Cisco Self-Defending Network technology?()

    • A、secure network platform
    • B、secure connectivity
    • C、threat control and containment
    • D、policy management

    正确答案:A

  • 第5题:

    Cisco IOS NetFlow gathers data that can be used in which three of these? ()

    • A、 accounting
    • B、 authentication
    • C、 authorization
    • D、 network monitoring
    • E、 network planning

    正确答案:A,D,E

  • 第6题:

    Which of the following are valid modes of accessing the data plane()

    • A、Serial connection
    • B、Secure Shell
    • C、RADIUS
    • D、Simple Network Management Protocol
    • E、HTTP
    • F、Telnet

    正确答案:A,B,D,E,F

  • 第7题:

    Which one of the following is the most commonly used layer 2 network device?()

    • A、Hub
    • B、Bridge
    • C、Switch
    • D、Router
    • E、Repeaters
    • F、None of the above

    正确答案:C

  • 第8题:

    As a Cisco Network Engineer, you have to master the knowledge of the Cisco Storage Area Network solution for the data center. Which three of the following are features of it? ()(Choose three.)

    • A、It provides multiprotocol support.
    • B、It allows you to create separate networks on the VSAN.
    • C、It allows you to migrate to new technologies without a complete equipment upgrade.
    • D、It reduces cost and complexity by providing an easy transition to evolving technologies.

    正确答案:A,C,D

  • 第9题:

    A system administrator is attempting to unmount filesystem /dev/data and receives the following message:   umount: 0506-349 Cannot unmount /dev/data: The requested resource is busy.   Which of the following commands can be used to determine which process has open references within the filesystem?()

    • A、lsfs
    • B、topas
    • C、fuser
    • D、mount

    正确答案:C

  • 第10题:

    多选题
    Which of the following correctly describe steps in the OSI data encapsulation process?()
    A

    Transport layer divides a data stream into segments & adds reliability & flow control information

    B

    Data link layer adds physical source & destination address & an FCS to the segment

    C

    Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information

    D

    Packets are created when the network layers adds layers 3 address & control information to a segment

    E

    The presentation layer translated bits into bits into voltages for transmission across the physical link


    正确答案: A,B
    解析: 暂无解析

  • 第11题:

    多选题
    On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()
    A

    Source Quench.

    B

    Learning.

    C

    Buffering.

    D

    Windowing.

    E

    Cut-Through.


    正确答案: E,B
    解析: 暂无解析

  • 第12题:

    单选题
    When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()
    A

    Ring

    B

    Mesh

    C

    Star

    D

    Hybrid


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which of the following is used to create multiple networks from one large network?()

    A.PAT

    B.NAT

    C.Multicast

    D.Subnetting


    参考答案:D

  • 第14题:

    Which of the following correctly describe steps in the OSI data encapsulation process?()

    A. Transport layer divides a data stream into segments & adds reliability & flow control information

    B. Data link layer adds physical source & destination address & an FCS to the segment

    C. Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information

    D. Packets are created when the network layers adds layers 3 address & control information to a segment

    E. The presentation layer translated bits into bits into voltages for transmission across the physical link


    参考答案:A, D

  • 第15题:

    The most commonly used locking level in implementing concurrency control is at which of the following levels?

    A.database

    B.table

    C.record

    D.field


    正确答案:C

  • 第16题:

    On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()

    • A、Source Quench.
    • B、Learning.
    • C、Buffering.
    • D、Windowing.
    • E、Cut-Through.

    正确答案:A,C,D

  • 第17题:

    Which of the following correctly describe steps in the OSI data encapsulation process?()

    • A、Transport layer divides a data stream into segments & adds reliability & flow control information
    • B、Data link layer adds physical source & destination address & an FCS to the segment
    • C、Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information
    • D、Packets are created when the network layers adds layers 3 address & control information to a segment
    • E、The presentation layer translated bits into bits into voltages for transmission across the physical link

    正确答案:A,D

  • 第18题:

    With regard to Ethernet media access methods, which of the following are true?()

    • A、A device waits for an electronic signal before transmitting.
    • B、A device listens and waits until the media is not busy before transmitting.
    • C、All devices on an Ethernet segment see data that passes on the network medium.
    • D、Only the sender and the receiver devices see data that passes on the network medium.
    • E、Ethernet networks allow you to configured devises with higher transmission priority.

    正确答案:B,C

  • 第19题:

    Which of the following are valid modes of accessing the data plane? (Choose all that apply.)()

    • A、Serial connection
    • B、Secure Shell
    • C、RADIUS
    • D、Simple Network Management Protocol
    • E、HTTP
    • F、Telnet

    正确答案:A,B,D,E,F

  • 第20题:

    Which of the following is used to create multiple networks from one large network?()

    • A、PAT
    • B、NAT
    • C、Multicast
    • D、Subnetting

    正确答案:D

  • 第21题:

    多选题
    Which of the following are valid modes of accessing the data plane()
    A

    Serial connection

    B

    Secure Shell

    C

    RADIUS

    D

    Simple Network Management Protocol

    E

    HTTP

    F

    Telnet


    正确答案: D,A
    解析: 暂无解析

  • 第22题:

    多选题
    Which of the following are valid modes of accessing the data plane? (Choose all that apply.)()
    A

    Serial connection

    B

    Secure Shell

    C

    RADIUS

    D

    Simple Network Management Protocol

    E

    HTTP

    F

    Telnet


    正确答案: B,A
    解析: 暂无解析

  • 第23题:

    单选题
    Which one of the following is the most commonly used layer 2 network device?()
    A

    Hub

    B

    Bridge

    C

    Switch

    D

    Router

    E

    Repeaters

    F

    None of the above


    正确答案: C
    解析: 暂无解析