Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


If a frame is received at a switch and only the destination

hardware address is read before the frame is forwarded, what
type of

switching method is this?

A.) Store-and-drop

B.) Latency

C.) Store-and-forward

D.) Cut-through



If a frame is received at a switch and only the destination hardware address is read before the f..

Answer / guest

Answer: D

Cut-Through switching copies only the destination address
which is the

first 6 bytes after the frame preamble into its buffer. The
LAN switch

then looks up the destination address in its switching table and

determines the outgoing interface. The frame is then sent to the

interface. A cut-through switch provides reduced latency
because it

begins to forward the frame as soon as it read the
destination address

and determines the outgoing interface.

Is This Answer Correct ?    4 Yes 1 No

Post New Answer

More CCNA Interview Questions

When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.

1 Answers  


What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

1 Answers  


Which way of communication bus topology use?

0 Answers  


Which ipsec rule is used for the olympia branch and what does it define?

0 Answers  


Explain the difference between simple authentication and md5?

0 Answers  


Which two of the following protocols are used at the Transport layer? A.) ARP B.) UDP C.) ICMP D.) RARP E.) TCP F.) BootP

1 Answers  


Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process

1 Answers  


Access lists are numbered. Which of the following ranges could be used for an IP access list? A. 600 - 699 B. 100 - 199 C. 1 - 99 D. 800 - 899 E. 1000 - 1099

1 Answers  


What field tells the Internet layer how to handle an IP packet? A. Type of Service B. Identification C. Flags D. Frag Offset

1 Answers  


Value in which type of access list?

0 Answers  


can anyone tell me which r the companies hiring freshers ( ccna ) in mumbai

1 Answers   HCL,


You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet

1 Answers  


Categories