If a frame is received at a switch and only the destination
hardware address is read before the frame is forwarded, what
type of
switching method is this?
A.) Store-and-drop
B.) Latency
C.) Store-and-forward
D.) Cut-through
Answer / guest
Answer: D
Cut-Through switching copies only the destination address
which is the
first 6 bytes after the frame preamble into its buffer. The
LAN switch
then looks up the destination address in its switching table and
determines the outgoing interface. The frame is then sent to the
interface. A cut-through switch provides reduced latency
because it
begins to forward the frame as soon as it read the
destination address
and determines the outgoing interface.
| Is This Answer Correct ? | 4 Yes | 1 No |
When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.
What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
Which way of communication bus topology use?
Which ipsec rule is used for the olympia branch and what does it define?
Explain the difference between simple authentication and md5?
Which two of the following protocols are used at the Transport layer? A.) ARP B.) UDP C.) ICMP D.) RARP E.) TCP F.) BootP
Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process
Access lists are numbered. Which of the following ranges could be used for an IP access list? A. 600 - 699 B. 100 - 199 C. 1 - 99 D. 800 - 899 E. 1000 - 1099
What field tells the Internet layer how to handle an IP packet? A. Type of Service B. Identification C. Flags D. Frag Offset
Value in which type of access list?
can anyone tell me which r the companies hiring freshers ( ccna ) in mumbai
You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet