Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()A. It ensures that data is retransmitted if an acknowledgment is not received.B. It reassembles segments i

题目
Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()

A. It ensures that data is retransmitted if an acknowledgment is not received.

B. It reassembles segments in the correct order on the destination device.

C. It provides a mechanism for the receiver to control the transmission speed.

D. It regulates the size of each datagram segment.

E. All of the above are functions of flow control


相似考题
更多“Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?() ”相关问题
  • 第1题:

    Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.

    A.transmitting devices

    B.transmitted devices

    C.receiving devices

    D.received devices


    正确答案:A

  • 第2题:

    On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()

    A. Source Quench.

    B. Learning.

    C. Buffering.

    D. Windowing.

    E. Cut-Through.


    参考答案:A, C, D

  • 第3题:

    On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()

    • A、Source Quench.
    • B、Learning.
    • C、Buffering.
    • D、Windowing.
    • E、Cut-Through.

    正确答案:A,C,D

  • 第4题:

    What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()

    • A、The ability to detect and prevent malicious traffic.
    • B、The ability to associate security breaches with a specific user.
    • C、Converged management of network and security events, network flow data, and identity information.
    • D、Consistent device management across administrative realms.

    正确答案:B,C

  • 第5题:

     What level of control does a subflow have on the overall contact?()

    • A、The subflow cannot call additional or "nested" subflows. 
    • B、The subflow cannot transfer the contact to another resource. 
    • C、The subflow has full contact control and can perform any action that the parent flow can perform.

    正确答案:C

  • 第6题:

    Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()

    • A、It ensures that data is retransmitted if an acknowledgment is not received.
    • B、It reassembles segments in the correct order on the destination device.
    • C、It provides a mechanism for the receiver to control the transmission speed.
    • D、It regulates the size of each datagram segment.
    • E、All of the above are functions of flow control

    正确答案:C

  • 第7题:

    单选题
    What type of valve is used to direct the flow of hydraulic fluid?()
    A

    Relief valve

    B

    Direction control valve

    C

    Stop valve

    D

    Pressure control valve


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    Which statement is true about the Call Admission Control (CAC) feature in VoIP networks?()
    A

     CAC is used to allocate enough bandwidth for the number of calls that are allowed on the VoIP network.

    B

     CAC is used to protect the quality of the voice calls by preventing call establishment if enough resources are not available on the network.

    C

     CAC provides queuing mechanisms for voice calls if the packets exceed the configured or budgeted rate.

    D

     In a VoIP network the CAC can be replaced with the LLQ QoS mechanism if it has been properly implemented.


    正确答案: B
    解析: 暂无解析

  • 第9题:

    多选题
    Which of the following correctly describe steps in the OSI data encapsulation process?()
    A

    The transport layer divides a data stream into segments and may add reliability and flow control information.

    B

    The data link layer adds physical source and destination addresses and an FCS to the segment.

    C

    Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.

    D

    Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

    E

    The presentation layer translates bits into voltages for transmission across the physical link.


    正确答案: E,B
    解析: 暂无解析

  • 第10题:

    单选题
    Which OSI layer is associated with the following: The acknowledgement of transmissions, sequencing, and flow control across a network?()
    A

    Layer 2

    B

    Layer 3

    C

    Layer 4

    D

    Layer 5

    E

    Layer 6

    F

    Layer 7


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    ()is not a physical wall but a flow virtual data to protect the computer network.
    A

    data wall 

    B

    data channel 

    C

    database 

    D

    firewall


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()
    A

    It ensures that data is retransmitted if an acknowledgment is not received.

    B

    It reassembles segments in the correct order on the destination device.

    C

    It provides a mechanism for the receiver to control the transmission speed.

    D

    It regulates the size of each datagram segment.

    E

    All of the above are functions of flow control


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which of the following correctly describe steps in the OSI data encapsulation process?()

    A. Transport layer divides a data stream into segments & adds reliability & flow control information

    B. Data link layer adds physical source & destination address & an FCS to the segment

    C. Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information

    D. Packets are created when the network layers adds layers 3 address & control information to a segment

    E. The presentation layer translated bits into bits into voltages for transmission across the physical link


    参考答案:A, D

  • 第14题:

    What type of valve is used to direct the flow of hydraulic fluid?

    A.relief valve

    B.direction control valve

    C.stop valve

    D.pressure control valve


    正确答案:B

  • 第15题:

    Which of the following correctly describe steps in the OSI data encapsulation process?()

    • A、Transport layer divides a data stream into segments & adds reliability & flow control information
    • B、Data link layer adds physical source & destination address & an FCS to the segment
    • C、Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information
    • D、Packets are created when the network layers adds layers 3 address & control information to a segment
    • E、The presentation layer translated bits into bits into voltages for transmission across the physical link

    正确答案:A,D

  • 第16题:

    ()is not a physical wall but a flow virtual data to protect the computer network.

    • A、data wall 
    • B、data channel 
    • C、database 
    • D、firewall

    正确答案:D

  • 第17题:

    What is an advantage of the IntServ QoS model?()

    • A、 It supports admission control that allows a network to reject or downgrade new RSVP sessions if one of the interfaces in the path has reached the limit (that is, all reservable bandwidth is booked).
    • B、 RSVP signals QoS requests per individual flow. In the request the authorized user (authorization object) and needed traffic policy (policy object) are sent. The network can then provide best-effort delivery to these individual flows.
    • C、 RSVP streamlines communication by making it unnecessary to inform network devices of flow parameters (IP addresses and port numbers).
    • D、 Because of the stateful RSVP architecture, continuous signaling does not have to occur.
    • E、 The flow-based approach is scalable to large implementations, such as the public Internet, because RSVP tracks each individual flow.

    正确答案:A

  • 第18题:

    多选题
    Which of the following correctly describe steps in the OSI data encapsulation process?()
    A

    Transport layer divides a data stream into segments & adds reliability & flow control information

    B

    Data link layer adds physical source & destination address & an FCS to the segment

    C

    Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information

    D

    Packets are created when the network layers adds layers 3 address & control information to a segment

    E

    The presentation layer translated bits into bits into voltages for transmission across the physical link


    正确答案: A,B
    解析: 暂无解析

  • 第19题:

    多选题
    On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()
    A

    Source Quench.

    B

    Learning.

    C

    Buffering.

    D

    Windowing.

    E

    Cut-Through.


    正确答案: E,B
    解析: 暂无解析

  • 第20题:

    单选题
    What is an important step to take when verifying a newly proposed network security solution? ()
    A

    Test the design on a pilot network for expected results prior to implementing on the production network.

    B

    Run a network audit to determine types of traffic in use on the network.

    C

    Launch campus updates into the production network and monitor impact to see if configuration changes are needed.

    D

    Create an interruption of data flow to determine test back-door access methods.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Which statement is true about the distributed call control in a VoIP network?()
    A

    the VoIP endpoints have the intelligence to set up and control calls

    B

    Call setup and control functionality is centralized in one call agent or cluster

    C

    Call setup and control resides in call agents that are distributed throughout the network

    D

    Each VoIP device has separate call control, voice packetization, and transport mechanisms


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
    A

    The ability to detect and prevent malicious traffic.

    B

    The ability to associate security breaches with a specific user.

    C

    Converged management of network and security events, network flow data, and identity information.

    D

    Consistent device management across administrative realms.


    正确答案: C,B
    解析: 暂无解析

  • 第23题:

    单选题
    You design a Business Intelligence (BI) solution by using SQL Server 2008. You create a SQL Server 2008 Integration Services (SSIS) package to perform an extract, transform, and load (ETL) process to load data to a DimCustomer dimension table that contains 1 million rows. Your data flow uses the following components: A SQL Destination data flow task to insert new customers An OLE DB Command transform that updates existing customers On average, 25 percent of existing customer records is updated each night. You need to reduce the amount of time required to update customer records. What should you do?()
    A

     Modify the UPDATE statement in the OLE DB Command transform to use the PAGLOCK table hint. 

    B

     Modify the UPDATE statement in the OLE DB Command transform to use the TABLOCK table hint. 

    C

     Stage the data in the data flow. Replace the OLE DB Command transform in the data flow with an Execute SQL task in the control flow.

    D

     Stage the data in the data flow. Replace the UPDATE statement in the OLE DB Command transform with a DELETE statement followed by an INSERT statement.


    正确答案: D
    解析: 暂无解析