Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()A、It ensures that data is retransmitted if an acknowledgment is not received.B、It reassembles segments in the correct order on the destination device.C、It provides a mechanism for the receiver to control the transmission speed.D、It regulates the size of each datagram segment.E、All of the above are functions of flow control

Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()

  • A、It ensures that data is retransmitted if an acknowledgment is not received.
  • B、It reassembles segments in the correct order on the destination device.
  • C、It provides a mechanism for the receiver to control the transmission speed.
  • D、It regulates the size of each datagram segment.
  • E、All of the above are functions of flow control

相关考题:

As the Ezonexam network administrator, you are required to have a firm understanding of the OSI model. Why does the data communication industry use the layered OSI reference model? (Choose two)A.It enables equipment from different vendors to use the same electronic components, thus saving research and development fundsB.It encourages industry standardization by defining what functions occur at each layer of the modelC.It divides the network communication process into smaller and simpler components; thus aiding component development, design and troubleshootingD.It provides a means by which changes in functionality in one layer require changes in other layersE.It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers

()is preservation of confidentiality, integrity and availability of information, in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved。A、Equipment securityB、Network securityC、Information securityD、Content security

Even though current technologies make the ultimate segmented network impractical, new technologies and products hold the promise of making the concept a reality. Most important of all these new technologies are (66) . The ultimate switched LAN, which is technically possible, now, exhibits the following characteristics:1. High-speed yet cost-effective switching devices can be implemented on a wide scale, providing dedicated connections for individual users and supporting the aggregate (67) of all networked users.2. The ability to deploy switching capabilities incrementally into the (68) base. Switching implementations support switching of individual users or groups so that existing users of shared media modules can continue to use the existing equipment until they can justify moving to dedicate switched LAN connections.3. Support and enhancement of existing routed environments. Switching (69) routint, but rather can be introduced into the network without making any changes to the existing routing equipment or configuration.(70) play a critical role in the integration of switching into existing networks.A.switch-based LANsB.WANsC.user servicesD.LAN-BY-PHONE

Rapid advances in computer and communication technologies have resulted in the(71) merger of these two fields. The lines have bluned among computing, switching, and digital transmission equipment, and the same digital techniques are being used for data, voice, and image transmission. Merging and evolving technologies, coupled with increasing demands for efficient and timely collection, processing, and(72) of information, are leading to the development of(73) that transmit and process all types of data. The ultimate goal of this evolution is something its proponents-some of the most powerful forces in the computing and telecommunications industries-call the (74) .The (74) will be a worldwide public telecommunications network that will deliver a wide variety of services. The (74) will be defined by the standardization of user interfaces, and will be implemented as a set of digital switches and paths supporting a broad range of traffic types and providing (75) processing services. Inpractice, there will be multiple networks, implemented within national boundaries, but from the user's point of view there will be a single, uniformly accessible worldwide network.A.decreasingB.increasingC.collectiveD.single

While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop.Which of these can you implement to prevent future occurrences of this issue?()A.RSTPB.root guardC.BPDU guardD.GLBP

Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?() A. It ensures that data is retransmitted if an acknowledgment is not received.B. It reassembles segments in the correct order on the destination device.C. It provides a mechanism for the receiver to control the transmission speed.D. It regulates the size of each datagram segment.E. All of the above are functions of flow control

What should be part of a comprehensive network security plan()。 A.Allow users to develop their own approach to network securityB.Physically secure network equipment from potential access by unauthorized individualsC.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reportedE.Minimize network overhead by deactivating automatic antivirus client updates

Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()A、Building schematicB、IGP community elementsC、Listing of interconnectionsD、Physical topology diagramE、Logical topology diagramF、Inventory of network equipment

What is a benefit of implementing a Cisco End-to-End Solution?()A、It maximizes the network securityB、It increase the cost of the equipmentC、It enables the network to work as a unified wholeD、It reduces the Cost of equipment

In the plan phase, network readiness assessment addresses which customer need? Select exactly 1 answer(s) from the following:()。A、an assessment of the preparedness of the customers existing system infrastructure to support a propose solutionB、a comprehensive design that has been customized based on the operations processes, network management processes, and tools of its systemC、an in-depth assessment of the operational environment required to support the operation of both the current and planned solutionsD、the optimal technologies for supporting its business requirements and objectives

Which three best describe the partner benefits of the Cisco Lifecycle Services approach?()A、Improve customer satisfaction ratesB、Improve the skill sets of their staff membersC、Increase their staff productivityD、Reduce the risk involved with deploying and supporting new and complex technologiesE、Improve response times for network outagesF、Help ensure that suppliers are meeting metrics

What does most service requests coming to Cisco TAC concern?()A、 equipment defectsB、 equipment failuresC、 complex network operation and management issuesD、 integrating mixed vendor equipment

过滤器的响应动作可以根据过滤器的保护类型进行配置,下列哪几类保护类型属于Application rotection?()A、Attack ProtectionB、ReconnaissanceC、Traffic NormalizationsD、Network Equipment ProtectionE、Security PolicyF、Informational

The integrated logistics activities, equipment and information network and so on, is called ()A、logistics integrationB、logistics industryC、logistics centerD、logistics park

What should be part of a comprehensive network security plan?()A、Allow users to develop their own approach to network security.B、Physically secure network equipment from potential access by unauthorized individuals.C、Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.D、Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.E、Minimize network overhead by deactivating automatic antivirus client updates.

You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)A、The length of the houseB、How many rooms are in the houseC、How many users will be using the wireless networkD、The building material of the houseE、The cost of the house

多选题A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)AThe length of the houseBHow many rooms are in the houseCHow many users will be using the wireless networkDThe building material of the houseEThe cost of the house

多选题Which three best describe the partner benefits of the Cisco Lifecycle Services approach?()AImprove customer satisfaction ratesBImprove the skill sets of their staff membersCIncrease their staff productivityDReduce the risk involved with deploying and supporting new and complex technologiesEImprove response times for network outagesFHelp ensure that suppliers are meeting metrics

单选题What is the benefit of implementing a Cisco end-to-end solution?()AIt enables the network to work as a unified wholeBIt maximizes the network securityCIt increases the cost of the equipmentDIt reduces the cost of the equipment

单选题In the plan phase, network readiness assessment addresses which customer need? Select exactly 1 answer(s) from the following:()。Aan assessment of the preparedness of the customers existing system infrastructure to support a propose solutionBa comprehensive design that has been customized based on the operations processes, network management processes, and tools of its systemCan in-depth assessment of the operational environment required to support the operation of both the current and planned solutionsDthe optimal technologies for supporting its business requirements and objectives

多选题You need to configure port security on switch R1.  Which two statements are true about this  technology? ()APort security can be configured for ports supporting VoIP.BWith port security configured, four MAC addresses are allowed by default.CThe network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.DWithsecurity configured, only one MAC addresses is allowed by default.EPort security cannot be configured for ports supporting VoIP.

多选题Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()ABuilding schematicBIGP community elementsCListing of interconnectionsDPhysical topology diagramELogical topology diagramFInventory of network equipment

多选题Your company has a Microsoft Hyper-V Server 2008 R2 environment. You manage the virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. Virtual machines (VMs) will use Microsoft iSCSI Software Initiator to connect to the shared storage volumes within the guest operating system. You need to configure the VMM host server to optimize the network environment for iSCSI traffic. Which two actions should you perform?()ASet the network adapters to 1454 MTU.BSet the network adapters and the supporting infrastructure to support jumbo frames.CEnable RX and TX TCP checksum offload support on the network adapters.DDisable RX and TX TCP checksum offload support on the network adapters.

单选题What does most service requests coming to Cisco TAC concern?()A equipment defectsB equipment failuresC complex network operation and management issuesD integrating mixed vendor equipment

单选题What should be part of a comprehensive network security plan()。AAllow users to develop their own approach to network securityBPhysically secure network equipment from potential access by unauthorized individualsCEncourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenDDelay deployment of software patches and updates until their effect on end-user equipment is well known and widely reportedEMinimize network overhead by deactivating automatic antivirus client updates

单选题Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()AIt ensures that data is retransmitted if an acknowledgment is not received.BIt reassembles segments in the correct order on the destination device.CIt provides a mechanism for the receiver to control the transmission speed.DIt regulates the size of each datagram segment.EAll of the above are functions of flow control