Switching methods include cut-through, store and forward,
and a modified version of the first two methods. Which
statement about switching methods is true?

A. The store and forward method has low latency

B. The cut through method of switching has high latency

C. The modified version holds the packet in memory until 50
percent of the packet reaches the switch

D. The modified version holds the packet in memory until the
data spoon of the packet reaches the switch

Answers were Sorted based on User's Feedback



Switching methods include cut-through, store and forward, and a modified version of the first two m..

Answer / guest

Answer: C

Is This Answer Correct ?    4 Yes 3 No

Switching methods include cut-through, store and forward, and a modified version of the first two m..

Answer / arun

d

Is This Answer Correct ?    3 Yes 2 No

Switching methods include cut-through, store and forward, and a modified version of the first two m..

Answer / shahid

Store and forward stores complete frame in buffer so it is memory intensive and I think this will take time also.
Cut-through doesn't store complete frame, it looks till destination MAC address and forwards, downside is that the corrupt frame will also be forwarded (in store & forward if frame is corrupted, not get forwarded)
In modified cut-through first 64 bytes are checked and then frame is forwarded (corrupt frame is not forwarded also).

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

You want to clear the outputs on your serial interface showing errors on the interface. Which command do you type?

1 Answers  


hi shain can u send me some detail about bgp so that i can enhance my knowledge over bgp and can you also teach me about the process of suppernating. now what i am thinking that this could be last visit on that site overhere.so please mail that short of thing on my gmail id i am requesting to all of the visitor that please send theire doubt or question to my new gmail id which is jitendera.ccnainterview@gmail.com.i will try to solve it if i am capable to do it Wishing all of you for great future Jitendera kaumar sinha

0 Answers   HCL,


Which command we use for ping in ipv6?

0 Answers  


What is the protocol and what is the second part of the following network address? 172.16.0.254 mask - 255.255.0.0 A. IPX MAC address B. IP Class C directed broadcast C. Private IP address node number D. Public IP directed broadcast E. Private IP directed broadcast

1 Answers  


Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command line keyword for this encapsulation method? A.) dix B.) sap C.) arpa D.) gns E.) snap F.) novell-ether

1 Answers  






Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  


What command displays detail information about the OSPF interfaces, including the authentication method?

1 Answers  


How to crimping cat cable without using crimping and any tool...........?

6 Answers   CTS, Wipro,


Which statement is true when a broadcast is sent in an Ethernet/802.3 ITAN? A. The ip shored used is 255.255.255.0 B. The IP address used is 255.255.255.255 C. The MAC address used is 00 00 00 00 00 00 D. The MAC address used is FF FF FF FF FF FF

1 Answers  


Why is UDP lease favored when compared to TCP?

0 Answers  


Identify the command to configure the router to boot from an alternate IOS located in flash? A.) boot system flash IOS.exe B.) boot system tftp IOS.exe 172.16.5.1 C.) boot system alternate IOS.exe D.) boot system rom IOS.exe

1 Answers  


Which port are used by Viruses? TCP or UDP?

8 Answers  


Categories