Station A is transmitting data to station B faster that
station B
can handle it. When station B's buffer fills up, it send out
a message
to station A to stop sending data. After B empties out its
buffer,
station B sends a message to station A to start sending data
again.
This is most directly an example of (pick the best answer only):
A.) Poison Reverse
B.) Connectionless protocol
C.) Windowing
D.) Connection oriented protocol
E.) Flow Control
F.) Split Horizon
Answer / guest
Answer: E
Flow control is when a station is being overloaded with data
and tells
the other station to stop for a while, so the receiving
station can
process the data that it has in its buffer.
| Is This Answer Correct ? | 2 Yes | 0 No |
What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops
Which two statements are true? (Choose two) A. Ethernet 802.3 utilizes a half duplex method for data transfer B. In a 100 MBS point to point connection a full duplex connection can provide 400 Mbs of data transfer C. Ethernet switches can use the full duplex mode to connect multiple nodes on a single pod of a switch D. Full duplex Ethernet takes advantage of UTP using one pair for transmission and the other pair for reception
Which NetWare protocol provides link-state routing? A. NLSP B. RIP C. SAP D. NCP
in stead of 0.0.0.0 wild card mask what u can write after ip?
What is the maximum hop count for Link-State protocols? A.) 15 B.) there is no hop count limit C.) 256 D.) 16
CPE is an acronym for which of the following? A.) Customer Premise Equipment B.) Central Processing Engineering C.) Customer Process Equipment D.) Central Processing Equipment
Identify the command to determine if an IP access-list is grouped on interface e0? A.) Router(config)# show ip interface e0 B.) Router> show ip interface e0 C.) Router# show interface e0 D.) Router# show ip interface e0
What is switch priority & why it is used????
You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet
How many LMI types are available on Cisco routers? A.) Four B.) Two C.) Five D.) Three
what is secure hand shake protocol
Which three commands are used to configure information into RAM on a router? (Choose three) A. configure memory B. configure terminal C. configure overwrite D. copy tftp startup-config E. copy running-config startup-config F. copy startup-config running-config