Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is a characteristic of Store and Forward switches?

A.) They work at wire speed.

B.) They are the same as Cut-Through switching in 'prune' mode.

C.) They forward based on transport layer info.

D.) They forward the frame before it is completely read.

E.) They increase latency.



What is a characteristic of Store and Forward switches? A.) They work at wire speed. B.) They ..

Answer / guest

Answer: E

Store and froward will not forward fragments. The longer the
packet, the

longer the delay (latency) in the switch. There is no such
thing as

'prune' mode.

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

how to troubleshoot when protocols is down and link is not getting up

7 Answers   HCL, Sify,


What does the IPX maximum-path command do? A.) Allows you to disable the TTL on an IPX packet B.) This parameter is only used in NLSP routing C.) Sets the maximum metric that can appear in the routing table D.) Configures round robin load sharing over multiple equal metric paths (parallel paths)

1 Answers  


tell me our traditional ip routing is what A--conectless b----conection orented c-----pacekt switching d------ckt switching slect any two this is the question which i forgot to incoprate next-questions

4 Answers  


What are 3 ways to provide login access to router? A.) Console B.) TFTP C.) Rlogin D.) Auxiliary Port E.) X Windows F.) Telnet

2 Answers  


IP standard access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) port C.) protocol D.) source address

1 Answers  


Why we are not using subnet mask of class A in class C?before answering this question, just think upon if we do this then we don't need to move to IPv6.

2 Answers  


In which two modes can the ICMP ping command be used? (Choose two) A. user B. privileged C. global configuration D. interface configuration

1 Answers  


What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer

1 Answers  


Operation of two PC connecting with brand new switches. (they expecting step by step arp ,broadcast,MAC table, RARP operation)

2 Answers   HCL,


Hi my company network is creating loop and network performence is big slow and also all pc don,t get dhcp ip so pls let me know what is happing in my network.

3 Answers  


NetWare IPX addressing uses a network number and a node number. Which statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digits long. B. The node address is always administratively assigned. C. The node address is usually the MAC address. D. If the MAC address is used as the node address, then IPX eliminates the use of ARP.

1 Answers  


Which protocol gets a hardware address from a known IP address? A.) RARP B.) TCP C.) IP D.) BootP E.) ARP F.) ICMP

3 Answers  


Categories