Network equipment supporting the

题目

Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()

  • A、It ensures that data is retransmitted if an acknowledgment is not received.
  • B、It reassembles segments in the correct order on the destination device.
  • C、It provides a mechanism for the receiver to control the transmission speed.
  • D、It regulates the size of each datagram segment.
  • E、All of the above are functions of flow control
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Even though current technologies make the ultimate segmented network impractical, new technologies and products hold the promise of making the concept a reality. Most important of all these new technologies are (66) . The ultimate switched LAN, which is technically possible, now, exhibits the following characteristics:

1. High-speed yet cost-effective switching devices can be implemented on a wide scale, providing dedicated connections for individual users and supporting the aggregate (67) of all networked users.

2. The ability to deploy switching capabilities incrementally into the (68) base. Switching implementations support switching of individual users or groups so that existing users of shared media modules can continue to use the existing equipment until they can justify moving to dedicate switched LAN connections.

3. Support and enhancement of existing routed environments. Switching (69) routint, but rather can be introduced into the network without making any changes to the existing routing equipment or configuration.(70) play a critical role in the integration of switching into existing networks.

A.switch-based LANs

B.WANs

C.user services

D.LAN-BY-PHONE


正确答案:A

第2题:

While troubleshooting a network outage, you discover that an employee brought a switch from home into the office to connect additional equipment to the network. In order to increase his speed, he connected this switch to both network ports in his office, resulting in a bridge loop.Which of these can you implement to prevent future occurrences of this issue?()

A.RSTP

B.root guard

C.BPDU guard

D.GLBP


参考答案:C

第3题:

As the Ezonexam network administrator, you are required to have a firm understanding of the OSI model. Why does the data communication industry use the layered OSI reference model? (Choose two)

A.It enables equipment from different vendors to use the same electronic components, thus saving research and development funds

B.It encourages industry standardization by defining what functions occur at each layer of the model

C.It divides the network communication process into smaller and simpler components; thus aiding component development, design and troubleshooting

D.It provides a means by which changes in functionality in one layer require changes in other layers

E.It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers


正确答案:BC
解析:Explanation:
The OSI (Open System Interconnection) reference model was created as a reference point for communications devices. A layered approach is used to segment the entire telecommunications process into a series of smaller steps.

A is correct because it encourages a level of standardization by encouraging that functions be compared to known layers.

D is also correct because it allows engineers to focus on the development, refining, and perfection of simpler components.

第4题:

What is a benefit of implementing a Cisco End-to-End Solution?()

  • A、It maximizes the network security
  • B、It increase the cost of the equipment
  • C、It enables the network to work as a unified whole
  • D、It reduces the Cost of equipment

正确答案:C

第5题:

What should be part of a comprehensive network security plan()。

A.Allow users to develop their own approach to network security

B.Physically secure network equipment from potential access by unauthorized individuals

C.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten

D.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported

E.Minimize network overhead by deactivating automatic antivirus client updates


参考答案:B

第6题:

Rapid advances in computer and communication technologies have resulted in the(71) merger of these two fields. The lines have bluned among computing, switching, and digital transmission equipment, and the same digital techniques are being used for data, voice, and image transmission. Merging and evolving technologies, coupled with increasing demands for efficient and timely collection, processing, and(72) of information, are leading to the development of(73) that transmit and process all types of data. The ultimate goal of this evolution is something its proponents-some of the most powerful forces in the computing and telecommunications industries-call the (74) .The (74) will be a worldwide public telecommunications network that will deliver a wide variety of services. The (74) will be defined by the standardization of user interfaces, and will be implemented as a set of digital switches and paths supporting a broad range of traffic types and providing (75) processing services. Inpractice, there will be multiple networks, implemented within national boundaries, but from the user's point of view there will be a single, uniformly accessible worldwide network.

A.decreasing

B.increasing

C.collective

D.single


正确答案:B

第7题:

Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()

A. It ensures that data is retransmitted if an acknowledgment is not received.

B. It reassembles segments in the correct order on the destination device.

C. It provides a mechanism for the receiver to control the transmission speed.

D. It regulates the size of each datagram segment.

E. All of the above are functions of flow control


参考答案:C

第8题:

()is preservation of confidentiality, integrity and availability of information, in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved。

A、Equipment security

B、Network security

C、Information security

D、Content security


正确答案:C

第9题:

Which of the following are considered common elements found in a set of network documents?(Choose all that apply.)()

  • A、Building schematic
  • B、IGP community elements
  • C、Listing of interconnections
  • D、Physical topology diagram
  • E、Logical topology diagram
  • F、Inventory of network equipment

正确答案:C,D,E,F

第10题:

In the plan phase, network readiness assessment addresses which customer need? Select exactly 1 answer(s) from the following:()。

  • A、an assessment of the preparedness of the customers existing system infrastructure to support a propose solution
  • B、a comprehensive design that has been customized based on the operations processes, network management processes, and tools of its system
  • C、an in-depth assessment of the operational environment required to support the operation of both the current and planned solutions
  • D、the optimal technologies for supporting its business requirements and objectives

正确答案:A

更多相关问题