单选题Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()AIt ensures that data is retransmitted if an acknowledgment is not received.BIt reassembles segments in the correct order on the destination device.CIt provides a mechanism for the receiver to control the transmission speed.DIt regulates the size of each datagram segment.EAll of the above are functions of flow control

单选题
Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()
A

It ensures that data is retransmitted if an acknowledgment is not received.

B

It reassembles segments in the correct order on the destination device.

C

It provides a mechanism for the receiver to control the transmission speed.

D

It regulates the size of each datagram segment.

E

All of the above are functions of flow control


参考解析

解析: 暂无解析

相关考题:

●Flow control is a function that prevents network congestion by ensuring that (71) do not overwhelm (72) with datA.There are three commonly used methods for handling network congestion . (73) is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74) are used by receiving devices to help prevent their buffers from overflowing . (75) is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.(71)~(72)A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices(73)~(75) A.BufferB.Source-quench messagesC.BufferingD.Windowing

Perform. Quality Control is the process of monitoring and recording resuks of executing the Quality Plan activities to assess performance and recommend necessary changes.( )are the techniques and tools in performing quality control. ①Activity network diagram②Cause and effect diagrams③Inspection④Flow chart⑤Work Breakdown Structure⑥Pareto chart A.①③⑤ B.②④⑤⑥ C.②③④⑤⑥ D.①②③④⑥

You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network? (Choose three)A. Congestion avoidanceB. WindowingC. Cut-throughD. BufferingE. Load BalacingF. Fast Forward

Which OSI layer is associated with the following: The acknowledgement of transmissions, sequencing, and flow control across a network?A. Layer 2B. Layer 3C. Layer 4D. Layer 5E. Layer 6F. Layer 7

Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices

Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices

Which of the following correctly describe steps in the OSI data encapsulation process?() A. Transport layer divides a data stream into segments adds reliability flow control informationB. Data link layer adds physical source destination address an FCS to the segmentC. Packets are created when the network layer encapsulate a frame with source destination host address protocol related control informationD. Packets are created when the network layers adds layers 3 address control information to a segmentE. The presentation layer translated bits into bits into voltages for transmission across the physical link

Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?() A. It ensures that data is retransmitted if an acknowledgment is not received.B. It reassembles segments in the correct order on the destination device.C. It provides a mechanism for the receiver to control the transmission speed.D. It regulates the size of each datagram segment.E. All of the above are functions of flow control

On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?() A. Source Quench.B. Learning.C. Buffering.D. Windowing.E. Cut-Through.

What should be part of a comprehensive network security plan()。 A.Allow users to develop their own approach to network securityB.Physically secure network equipment from potential access by unauthorized individualsC.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reportedE.Minimize network overhead by deactivating automatic antivirus client updates

On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()A、Source Quench.B、Learning.C、Buffering.D、Windowing.E、Cut-Through.

What are two ways to minimize the delay of VoIP packets that are traversing a network?()A、Use WFQ, CBWFO, and LLO to prioritize delay-sensitive packetsB、Use WFO, CBWFO, and LLO to compress the payload.C、Give TCP packets priority over UDP packets.D、Use control plane policing for cRTP queuing.E、Use stacker and predictor to compress the payload.

What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions

What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()A、The ability to detect and prevent malicious traffic.B、The ability to associate security breaches with a specific user.C、Converged management of network and security events, network flow data, and identity information.D、Consistent device management across administrative realms.

What should be part of a comprehensive network security plan?()A、Allow users to develop their own approach to network security.B、Physically secure network equipment from potential access by unauthorized individuals.C、Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.D、Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.E、Minimize network overhead by deactivating automatic antivirus client updates.

Which OSI layer is associated with the following: The acknowledgement of transmissions, sequencing, and flow control across a network?()A、Layer 2B、Layer 3C、Layer 4D、Layer 5E、Layer 6F、Layer 7

What is an advantage of the IntServ QoS model?()A、 It supports admission control that allows a network to reject or downgrade new RSVP sessions if one of the interfaces in the path has reached the limit (that is, all reservable bandwidth is booked).B、 RSVP signals QoS requests per individual flow. In the request the authorized user (authorization object) and needed traffic policy (policy object) are sent. The network can then provide best-effort delivery to these individual flows.C、 RSVP streamlines communication by making it unnecessary to inform network devices of flow parameters (IP addresses and port numbers).D、 Because of the stateful RSVP architecture, continuous signaling does not have to occur.E、 The flow-based approach is scalable to large implementations, such as the public Internet, because RSVP tracks each individual flow.

Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()A、It ensures that data is retransmitted if an acknowledgment is not received.B、It reassembles segments in the correct order on the destination device.C、It provides a mechanism for the receiver to control the transmission speed.D、It regulates the size of each datagram segment.E、All of the above are functions of flow control

多选题Which of the following correctly describe steps in the OSI data encapsulation process?()ATransport layer divides a data stream into segments adds reliability flow control informationBData link layer adds physical source destination address an FCS to the segmentCPackets are created when the network layer encapsulate a frame with source destination host address protocol related control informationDPackets are created when the network layers adds layers 3 address control information to a segmentEThe presentation layer translated bits into bits into voltages for transmission across the physical link

单选题You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What action must you take to restrict the amount of data in a particular public folder only without impacting on the other public folders?()AYou must use the equipment mailbox.BYou must use the Mail Flow Troubleshooter.CYou must use the Public Folder Management Console.DYou must use the Exchange Server Jetstress 2010.

多选题On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()ASource Quench.BLearning.CBuffering.DWindowing.ECut-Through.

多选题You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure Tom’s computer to run the Magnifier each time he logs on to his computer. Which two interfaces can you use?()AUtility ManagerBAccessibility WizardCAccessibility Options icon in Control PanelDUsers and Passwords icon in Control Panel

单选题What is an important step to take when verifying a newly proposed network security solution? ()ATest the design on a pilot network for expected results prior to implementing on the production network.BRun a network audit to determine types of traffic in use on the network.CLaunch campus updates into the production network and monitor impact to see if configuration changes are needed.DCreate an interruption of data flow to determine test back-door access methods.

多选题Which of the following correctly describe steps in the OSI data encapsulation process?()AThe transport layer divides a data stream into segments and may add reliability and flow control information.BThe data link layer adds physical source and destination addresses and an FCS to the segment.CPackets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.DPackets are created when the network layer adds Layer 3 addresses and control information to a segment.EThe presentation layer translates bits into voltages for transmission across the physical link.

单选题Steering gears can be arranged with hydraulic control equipment known as a (), or with electrical control equipment.AtelemeterBtelemanometerCtelemotorDtelemometer

单选题Which OSI layer is associated with the following: The acknowledgement of transmissions, sequencing, and flow control across a network?()ALayer 2BLayer 3CLayer 4DLayer 5ELayer 6FLayer 7

单选题What should be part of a comprehensive network security plan()。AAllow users to develop their own approach to network securityBPhysically secure network equipment from potential access by unauthorized individualsCEncourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenDDelay deployment of software patches and updates until their effect on end-user equipment is well known and widely reportedEMinimize network overhead by deactivating automatic antivirus client updates