Station A is transmitting data to station B faster that
station B
can handle it. When station B's buffer fills up, it send out
a message
to station A to stop sending data. After B empties out its
buffer,
station B sends a message to station A to start sending data
again.
This is most directly an example of (pick the best answer only):
A.) Poison Reverse
B.) Connectionless protocol
C.) Windowing
D.) Connection oriented protocol
E.) Flow Control
F.) Split Horizon
Answer / guest
Answer: E
Flow control is when a station is being overloaded with data
and tells
the other station to stop for a while, so the receiving
station can
process the data that it has in its buffer.
| Is This Answer Correct ? | 2 Yes | 0 No |
Which port are used by Viruses? TCP or UDP?
What is the virtual path?
Which of the following are logged when IP access list logging is enabled? A.) source address B.) protocol C.) source port D.) destination address E.) access list number F.) destination port
Identify the 3 key features of the Cisco Discovery Protocol? A.) Off by default B.) Will allow for the discovery of layer 3 addresses on neighbor routers C.) Verify connectivity D.) Open standard E.) Does not require any layer 3 protocols to be configured
Identify the switching method that receives the entire frame then dispatches it? A.) Cut-through B.) Receive and forward C.) Store and forward D.) Fast forward
Which of the following are examples of the Transport Layer? A.) SQL B.) UDP C.) IP D.) LLC E.) ARP
Which command should you use to confound a router so that it can become a TFTP server host for a router system image that is run in a Flash? A. copy flash tftp B. config tftp server C. write, network -router name- D. tftp-server system -file name- E. setup server tftp -system name-
Hub in star topology or bus topology?
Identify the OSI layer associated with bits? A.) Physical B.) Network C.) Binary D.) Data link
Which layer is responsible for identifying and establishing the availability of the intended communication partner? A.) Application B.) Presentation C.) Transport D.) Session E.) Network
How does rip differs from igrp?
If you are in IOS user mode, which command do you use to enter the privileged mode? A. Set B. Enable C. Configure D. Privileges