网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()
A. It ensures that data is retransmitted if an acknowledgment is not received.
B. It reassembles segments in the correct order on the destination device.
C. It provides a mechanism for the receiver to control the transmission speed.
D. It regulates the size of each datagram segment.
E. All of the above are functions of flow control
参考答案
更多 “ Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?() A. It ensures that data is retransmitted if an acknowledgment is not received.B. It reassembles segments in the correct order on the destination device.C. It provides a mechanism for the receiver to control the transmission speed.D. It regulates the size of each datagram segment.E. All of the above are functions of flow control ” 相关考题
考题
●Flow control is a function that prevents network congestion by ensuring that (71) do not overwhelm (72) with datA.There are three commonly used methods for handling network congestion . (73) is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74) are used by receiving devices to help prevent their buffers from overflowing . (75) is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.(71)~(72)A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices(73)~(75) A.BufferB.Source-quench messagesC.BufferingD.Windowing
考题
Flow control is a function that prevents network congestion by ensuring that _( )_ do not overwhelm_( )_ with data.There are three commonly used methods for handling network congestion._( )_is used by network devices to temporarily store bursts of excess data in memory until they can be processed._( )_ are used by receiving devices to help prevent their buffers from overflowing._( )_ is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices@@@SXB@@@A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering
考题
You need to describe the various types of flow control to your co-workers. Which of the following are types of flow control that can be used in a network? (Choose three)A. Congestion avoidanceB. WindowingC. Cut-throughD. BufferingE. Load BalacingF. Fast Forward
考题
Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices
考题
Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices
考题
Which of the following correctly describe steps in the OSI data encapsulation process?()
A. Transport layer divides a data stream into segments adds reliability flow control informationB. Data link layer adds physical source destination address an FCS to the segmentC. Packets are created when the network layer encapsulate a frame with source destination host address protocol related control informationD. Packets are created when the network layers adds layers 3 address control information to a segmentE. The presentation layer translated bits into bits into voltages for transmission across the physical link
考题
On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()
A. Source Quench.B. Learning.C. Buffering.D. Windowing.E. Cut-Through.
考题
What type of valve is used to direct the flow of hydraulic fluid?A.relief valveB.direction control valveC.stop valveD.pressure control valve
考题
On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()A、Source Quench.B、Learning.C、Buffering.D、Windowing.E、Cut-Through.
考题
Which of the following correctly describe steps in the OSI data encapsulation process?()A、Transport layer divides a data stream into segments adds reliability flow control informationB、Data link layer adds physical source destination address an FCS to the segmentC、Packets are created when the network layer encapsulate a frame with source destination host address protocol related control informationD、Packets are created when the network layers adds layers 3 address control information to a segmentE、The presentation layer translated bits into bits into voltages for transmission across the physical link
考题
What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()A、The ability to detect and prevent malicious traffic.B、The ability to associate security breaches with a specific user.C、Converged management of network and security events, network flow data, and identity information.D、Consistent device management across administrative realms.
考题
()is not a physical wall but a flow virtual data to protect the computer network.A、data wallB、data channelC、databaseD、firewall
考题
What level of control does a subflow have on the overall contact?()A、The subflow cannot call additional or "nested" subflows. B、The subflow cannot transfer the contact to another resource. C、The subflow has full contact control and can perform any action that the parent flow can perform.
考题
What is an advantage of the IntServ QoS model?()A、 It supports admission control that allows a network to reject or downgrade new RSVP sessions if one of the interfaces in the path has reached the limit (that is, all reservable bandwidth is booked).B、 RSVP signals QoS requests per individual flow. In the request the authorized user (authorization object) and needed traffic policy (policy object) are sent. The network can then provide best-effort delivery to these individual flows.C、 RSVP streamlines communication by making it unnecessary to inform network devices of flow parameters (IP addresses and port numbers).D、 Because of the stateful RSVP architecture, continuous signaling does not have to occur.E、 The flow-based approach is scalable to large implementations, such as the public Internet, because RSVP tracks each individual flow.
考题
Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()A、It ensures that data is retransmitted if an acknowledgment is not received.B、It reassembles segments in the correct order on the destination device.C、It provides a mechanism for the receiver to control the transmission speed.D、It regulates the size of each datagram segment.E、All of the above are functions of flow control
考题
多选题Which of the following correctly describe steps in the OSI data encapsulation process?()ATransport layer divides a data stream into segments adds reliability flow control informationBData link layer adds physical source destination address an FCS to the segmentCPackets are created when the network layer encapsulate a frame with source destination host address protocol related control informationDPackets are created when the network layers adds layers 3 address control information to a segmentEThe presentation layer translated bits into bits into voltages for transmission across the physical link
考题
单选题What type of valve is used to direct the flow of hydraulic fluid?()A
Relief valveB
Direction control valveC
Stop valveD
Pressure control valve
考题
多选题On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()ASource Quench.BLearning.CBuffering.DWindowing.ECut-Through.
考题
单选题Which statement is true about the Call Admission Control (CAC) feature in VoIP networks?()A
CAC is used to allocate enough bandwidth for the number of calls that are allowed on the VoIP network.B
CAC is used to protect the quality of the voice calls by preventing call establishment if enough resources are not available on the network.C
CAC provides queuing mechanisms for voice calls if the packets exceed the configured or budgeted rate.D
In a VoIP network the CAC can be replaced with the LLQ QoS mechanism if it has been properly implemented.
考题
单选题What is an important step to take when verifying a newly proposed network security solution? ()A
Test the design on a pilot network for expected results prior to implementing on the production network.B
Run a network audit to determine types of traffic in use on the network.C
Launch campus updates into the production network and monitor impact to see if configuration changes are needed.D
Create an interruption of data flow to determine test back-door access methods.
考题
多选题Which of the following correctly describe steps in the OSI data encapsulation process?()AThe transport layer divides a data stream into segments and may add reliability and flow control information.BThe data link layer adds physical source and destination addresses and an FCS to the segment.CPackets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.DPackets are created when the network layer adds Layer 3 addresses and control information to a segment.EThe presentation layer translates bits into voltages for transmission across the physical link.
考题
单选题Which statement is true about the distributed call control in a VoIP network?()A
the VoIP endpoints have the intelligence to set up and control callsB
Call setup and control functionality is centralized in one call agent or clusterC
Call setup and control resides in call agents that are distributed throughout the networkD
Each VoIP device has separate call control, voice packetization, and transport mechanisms
考题
单选题Which OSI layer is associated with the following: The acknowledgement of transmissions, sequencing, and flow control across a network?()A
Layer 2B
Layer 3C
Layer 4D
Layer 5E
Layer 6F
Layer 7
考题
多选题What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()AThe ability to detect and prevent malicious traffic.BThe ability to associate security breaches with a specific user.CConverged management of network and security events, network flow data, and identity information.DConsistent device management across administrative realms.
考题
单选题()is not a physical wall but a flow virtual data to protect the computer network.A
data wallB
data channelC
databaseD
firewall
考题
单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. You create a SQL Server 2008 Integration Services (SSIS) package to perform an extract, transform, and load (ETL) process to load data to a DimCustomer dimension table that contains 1 million rows. Your data flow uses the following components: A SQL Destination data flow task to insert new customers An OLE DB Command transform that updates existing customers On average, 25 percent of existing customer records is updated each night. You need to reduce the amount of time required to update customer records. What should you do?()A
Modify the UPDATE statement in the OLE DB Command transform to use the PAGLOCK table hint. B
Modify the UPDATE statement in the OLE DB Command transform to use the TABLOCK table hint. C
Stage the data in the data flow. Replace the OLE DB Command transform in the data flow with an Execute SQL task in the control flow.D
Stage the data in the data flow. Replace the UPDATE statement in the OLE DB Command transform with a DELETE statement followed by an INSERT statement.
考题
单选题Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()A
It ensures that data is retransmitted if an acknowledgment is not received.B
It reassembles segments in the correct order on the destination device.C
It provides a mechanism for the receiver to control the transmission speed.D
It regulates the size of each datagram segment.E
All of the above are functions of flow control
热门标签
最新试卷