多选题Which three statements describe the Transmission Control Protocol (TCP)?()ATCP is a transport layer protocol.BTCP is faster than the User Datagram Protocol (UDP).CTCP provides delivery notification and error checking mechanisms.DTCP uses a best effort delivery approach.ETCP application examples include HTTP and SMTP.

多选题
Which three statements describe the Transmission Control Protocol (TCP)?()
A

TCP is a transport layer protocol.

B

TCP is faster than the User Datagram Protocol (UDP).

C

TCP provides delivery notification and error checking mechanisms.

D

TCP uses a best effort delivery approach.

E

TCP application examples include HTTP and SMTP.


参考解析

解析: 暂无解析

相关考题:

在通信专业中,TCP的英文全称是()A.Transmission Control ProcessB.Transfer Control ProtocolC.Transmission Connecting ProtocolD.Transmission Control Protocol

You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network? (Choose three)A. Congestion avoidanceB. WindowingC. Cut-throughD. BufferingE. Load BalacingF. Fast Forward

Which three statements describe the User Datagram Protocol (UDP)?() A.UDP provides delivery notification and error checking mechanisms.B.UDP is faster than the Transmission Control Protocol (TCP).C.UDP application examples include DNS and VoIP.D.UDP is an application layer protocol.E.UDP uses a best effort delivery approach.

An ATM PVC is configured as atm pvc 1 0 101 aal5snap 256 128 100 .Which three statements describe the traffic management characteristics of this interface?() A.AB.BC.CD.DE.E

Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.) A. includes three design levelsB. incorporates products and technologies into enterprise, service provider, and commercial systemsC. extends the value of designs through a sustained development planD. does not factor customer input design processE. facilitates faster and more reliable customer deploymentsF. incorporates a narrow range of technologies and products

Which of the following correctly describe steps in the OSI data encapsulation process?() A. Transport layer divides a data stream into segments adds reliability flow control informationB. Data link layer adds physical source destination address an FCS to the segmentC. Packets are created when the network layer encapsulate a frame with source destination host address protocol related control informationD. Packets are created when the network layers adds layers 3 address control information to a segmentE. The presentation layer translated bits into bits into voltages for transmission across the physical link

Which statements are true regarding ISDN channels?() A. Each B channel can transmit up to 64 kbpsB. The ISDN B channel carries voice or dataC. The ISDN D channel transmits control information.D. The D channel transmission rate varies depending on the service used.E. HDLC or PPP can be used to encapsulate D channel information.

Which statements describe the routing protocol OSPF?() A. It supports VLSM.B. It is used to route between autonomous systems.C. It confines network instability to one area of the network.D. It increases routing overhead on the network.E. It allows extensive control of routing updates.F. It is simpler to configure than RIP v2.

Which of the following statements regarding ISDN are correct?()A、Each ISDN B channel has transmission speeds of up to 64 kbps.B、The ISDN B channel can carry video, voice or data.C、The ISDN B channel transmission rate varies depending on the service used.D、The ISDN D channel transmits control information.E、The ISDN B channels can be configured with different subnets and encapsulation types when dialer profiles are configured.

Which two characteristics describe the UDP protocol?()A、limited error checkingB、defined timersC、no recovery mechanismsD、three-way handshake

Which three statements describe the User Datagram Protocol (UDP)?()A、UDP provides delivery notification and error checking mechanisms.B、UDP is faster than the Transmission Control Protocol (TCP).C、UDP application examples include DNS and VoIP.D、UDP is an application layer protocol.E、UDP uses a best effort delivery approach.

Your database is up and running and one of your three control files is accidentally erased. You start RMAN and run the following command:   RESTORE CONTROLFILE FROM AUTOBACKUP;   Which of the following statements is true?() A、 The command restores only the missing control file.B、 The command restores all the control files.C、 The command fails because the database is running.D、 This is the correct way to address this problem.E、 This is not the correct way to address this problem.

Which three attributes of the LOG_ARCHIVE_DEST_n initialization parameter control the data availability mode of a Data Guard standby database? ()A、SYNC or ASYNC to identify the network transmission mode. B、LGWR or ARCH to identify the primary database process responsible for sending redo information to the standby. C、AFFIRM or NOAFFIRM to control whether log archiving disk write operations are to be performed synchronously or asynchronously. D、PROTECTED or UNPROTECTED to control the degree of divergence and data loss at the standby database.

Which statements describe the routing protocol OSPF?()A、It supports VLSM.B、It is used to route between autonomous systems.C、It confines network instability to one area of the network.D、It increases routing overhead on the network.E、It allows extensive control of routing updates.F、It is simpler to configure than RIP v2.

Which three statements are valid SDM configuration wizards? ()A、NATB、VPNC、STPD、Security Audit

Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)A、includes three design levelsB、incorporates products and technologies into enterprise, service provider, and commercial systemsC、extends the value of designs through a sustained development planD、does not factor customer input design processE、facilitates faster and more reliable customer deploymentsF、incorporates a narrow range of technologies and products

Which statements are true regarding ISDN channels?()A、Each B channel can transmit up to 64 kbpsB、The ISDN B channel carries voice or dataC、The ISDN D channel transmits control information.D、The D channel transmission rate varies depending on the service used.E、HDLC or PPP can be used to encapsulate D channel information.

Which three statements describe how the strict SQL mode provides added security?()A、It rejects statements that try to insert out-of-range valuesB、It rejects invalid datesC、It limits the operations that the server can performD、It rejects queries that produce out-of-range valuesE、It rejects dates with zero day or month values

多选题Which of the following correctly describe steps in the OSI data encapsulation process?()ATransport layer divides a data stream into segments adds reliability flow control informationBData link layer adds physical source destination address an FCS to the segmentCPackets are created when the network layer encapsulate a frame with source destination host address protocol related control informationDPackets are created when the network layers adds layers 3 address control information to a segmentEThe presentation layer translated bits into bits into voltages for transmission across the physical link

多选题Which statements are true regarding ISDN channels?()AEach B channel can transmit up to 64 kbpsBThe ISDN B channel carries voice or dataCThe ISDN D channel transmits control information.DThe D channel transmission rate varies depending on the service used.EHDLC or PPP can be used to encapsulate D channel information.

多选题Which of the following correctly describe steps in the OSI data encapsulation process?()AThe transport layer divides a data stream into segments and may add reliability and flow control information.BThe data link layer adds physical source and destination addresses and an FCS to the segment.CPackets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.DPackets are created when the network layer adds Layer 3 addresses and control information to a segment.EThe presentation layer translates bits into voltages for transmission across the physical link.

单选题Which of the following is NOT one of the three details you need to fill in on the New Custom Control dialog?()AName of the custom controlBComments to describe the custom controlCList of the controls that will make up this custom controlDApplication that will contain the custom control

多选题Which three statements describe how the strict SQL mode provides added security?()AIt rejects statements that try to insert out-of-range valuesBIt rejects invalid datesCIt limits the operations that the server can performDIt rejects queries that produce out-of-range valuesEIt rejects dates with zero day or month values

多选题Which three statements correctly describe the functions and use of constraints? ()AConstraints provide data independence.BConstraints make complex queries easy.CConstraints enforce rules at the view level.DConstraints enforce rules at the table level.EConstraints prevent the deletion of a table if there are dependencies.FConstraints prevent the deletion of an index if there are dependencies.

多选题Which of the following statements regarding ISDN are correct?()AEach ISDN B channel has transmission speeds of up to 64 kbps.BThe ISDN B channel can carry video, voice or data.CThe ISDN B channel transmission rate varies depending on the service used.DThe ISDN D channel transmits control information.EThe ISDN B channels can be configured with different subnets and encapsulation types when dialer profiles are configured.

多选题Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)Aincludes three design levelsBincorporates products and technologies into enterprise, service provider, and commercial systemsCextends the value of designs through a sustained development planDdoes not factor customer input design processEfacilitates faster and more reliable customer deploymentsFincorporates a narrow range of technologies and products

多选题Which three statements are true about windows? ()(Choose three.)AOnly one window can be open at any given timeBConsumer groups are associated with windowsCWindows work with job classes to control resource allocationDThe database service name must be provided during windows creationEWindows can automatically start job or change resource allocation among jobs for various time periods.

多选题Which three statements describe the User Datagram Protocol (UDP)?()AUDP provides delivery notification and error checking mechanisms.BUDP is faster than the Transmission Control Protocol (TCP).CUDP application examples include DNS and VoIP.DUDP is an application layer protocol.EUDP uses a best effort delivery approach.