Which of the following statements are true?
A.) Store and forward switching creates variable latency
through the switch
B.) Cut through switching creates variables latency through
the switch
C.) Cut through switching works at wire speed
D.) Store and forward switching works at wire speed
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A C
The larger the packet, the greater the latency when using a
switch with
Store and Forward methods. This is due to the fact that
Store and
Forward switching copies the entire Frame into its buffer before
forwarding the frame. Cut Through switching only examines the
destination address before forwarding the packet and does
not copy the
frame into its buffer.
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / vijay
store and forward switching andcut through switching
creates variable latency through the switch
| Is This Answer Correct ? | 1 Yes | 1 No |
Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john
What is Cisco register bits? How they help?
Hi Jitendera, I continuously read your answers which is more knowlegable than books... Q.I am facing some problems in subnetting.can you plzz explain the subnetting process.. will be remain thankful
UDP works at which layer of the DOD model? A.) Internet B.) Host-to-Host C.) Transport D.) Data Link
Which of the following describe full-duplex transmission? A.) Uses a single wire B.) Data transmission in only both directions, but only one way at a time C.) Uses a point-to-point connection from the transmitter of the transmitting station to the receiver of the receiving station D.) Data transmission in only one direction
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
How do areas benefit a link state inter network?
in router we use config# ip host router2 ipaddress we use it for ping the neighbor router using name provided by us ..........instead of ip address in this max how many ip address can be assigned thanks
Identify the command that will display the RIP routes entering and leaving the router? A.) Router(config)# debug ip rip B.) Router# debug ip rip C.) Router>debug ip rip D.) Router# debug rip routes
Explain how an spf algorithm works?
what is uplink port why are we use this port,this port having extra feature or only use to redundant link or other please explain it ,,,,,,,,,,,,,,,, bcz i am very confuse ..... Thanks
Can anybody tell me how to configure a cisco router?