Identify the switching method that examines the destination MAC

address as the frame is being received then begins
forwarding the frame

prior to receiving the entire frame?

A.) Fragment-free

B.) Store and Forward

C.) Cut-through

D.) Fast forward



Identify the switching method that examines the destination MAC address as the frame is being rec..

Answer / guest

Answer: C

Cut through examines the destination MAC address and begins
forwarding

the frame prior to receiving the entire frame.

Is This Answer Correct ?    10 Yes 0 No

Post New Answer

More CCNA Interview Questions

What are the OSPF router rules????

6 Answers   NIIT,


Regarding frame relay, which of the following statements are true? A.) You must use ANSI encapsulation if connecting to non-Cisco equipment B.) You must use IETF encapsulation if connecting to non-Cisco equipment C.) You must use Q.933a encapsulation if connecting to non-Cisco equipment D.) You must use Cisco encapsulation if connecting to non-Cisco equipment

2 Answers  


3. What does a bridge use to segment a network? A. IP Addresses B. Broadcasts C. Application data D. Media Access Control addresses

2 Answers  


what is internetworking.

6 Answers  


What cable called v.35?

0 Answers  






Which network mask should you place on a Class C address to accommodate a user requirement for five networks with a maximum of 17 hosts on each networks A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248

7 Answers  


For IPX, what is the DEFAULT Cisco Encapsulation on an Ethernet interface? A.) novell-ether B.) gns C.) snap D.) arpa E.) sap F.) dix

1 Answers  


On an ISDN BRI interface, the control channel is the 'D' channel. What is the rate of this channel? A.) 64 Kbps B.) 1.544 Mbps C.) 128 Kbps D.) 2.048 Mbps E.) 16 Kbps

2 Answers  


How many potions of ip?

0 Answers  


which utility should use to test whether TCP/IP has been initialized on a system.friends plz post the answer with explaination..

3 Answers  


Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI

1 Answers  


Which ipsec rule is used for the olympia branch and what does it define? (Choose two)

0 Answers  


Categories