Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Switching methods include cut-through, store and forward,
and a modified version of the first two methods. Which
statement about switching methods is true?

A. The store and forward method has low latency

B. The cut through method of switching has high latency

C. The modified version holds the packet in memory until 50
percent of the packet reaches the switch

D. The modified version holds the packet in memory until the
data spoon of the packet reaches the switch

Answers were Sorted based on User's Feedback



Switching methods include cut-through, store and forward, and a modified version of the first two m..

Answer / guest

Answer: C

Is This Answer Correct ?    4 Yes 3 No

Switching methods include cut-through, store and forward, and a modified version of the first two m..

Answer / arun

d

Is This Answer Correct ?    3 Yes 2 No

Switching methods include cut-through, store and forward, and a modified version of the first two m..

Answer / shahid

Store and forward stores complete frame in buffer so it is memory intensive and I think this will take time also.
Cut-through doesn't store complete frame, it looks till destination MAC address and forwards, downside is that the corrupt frame will also be forwarded (in store & forward if frame is corrupted, not get forwarded)
In modified cut-through first 64 bytes are checked and then frame is forwarded (corrupt frame is not forwarded also).

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 A. This will block ftp traffic. B. This will block http traffic. C. This will permit ftp traffic. D. This will permit tftp traffic.

1 Answers  


how will configure Nat

6 Answers   Spanco,


what are loops in switches excactly...and how does it gets created???

1 Answers  


Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z

1 Answers  


What is the size of ipv4?

0 Answers  


What is difference between rip and ripv2?

0 Answers  


What is the key advantage of using switches?

0 Answers  


Which protocol resolves an IP address to a MAC address? A.) DHCP B.) RARP C.) ARP D.) NBP E.) DNS

3 Answers  


Ping uses which Internet layer protocol? A.) RARP B.) ICMP C.) ARP D.) FTP

4 Answers  


Tell me which multicast ip eigrp protocol use?

0 Answers  


What is convergence time? A.) The update time B.) The time it takes to reload a router C.) The time it takes for a packet to reach its destination D.) The time is takes for all routers update their tables after a change takes place

1 Answers  


Identify the 2 types of access-list filters that control SAP traffic? A.) Novell-ether B.) Arpa C.) Input-sap-filter D.) Round-robin E.) Output-sap-filter

1 Answers  


Categories