A. It ensures that data is retransmitted if an acknowledgment is not received.
B. It reassembles segments in the correct order on the destination device.
C. It provides a mechanism for the receiver to control the transmission speed.
D. It regulates the size of each datagram segment.
E. All of the above are functions of flow control
第1题:
Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.
A.transmitting devices
B.transmitted devices
C.receiving devices
D.received devices
第2题:
A. Source Quench.
B. Learning.
C. Buffering.
D. Windowing.
E. Cut-Through.
第3题:
On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()
第4题:
What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
第5题:
What level of control does a subflow have on the overall contact?()
第6题:
Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()
第7题:
Relief valve
Direction control valve
Stop valve
Pressure control valve
第8题:
CAC is used to allocate enough bandwidth for the number of calls that are allowed on the VoIP network.
CAC is used to protect the quality of the voice calls by preventing call establishment if enough resources are not available on the network.
CAC provides queuing mechanisms for voice calls if the packets exceed the configured or budgeted rate.
In a VoIP network the CAC can be replaced with the LLQ QoS mechanism if it has been properly implemented.
第9题:
The transport layer divides a data stream into segments and may add reliability and flow control information.
The data link layer adds physical source and destination addresses and an FCS to the segment.
Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
The presentation layer translates bits into voltages for transmission across the physical link.
第10题:
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
第11题:
data wall
data channel
database
firewall
第12题:
It ensures that data is retransmitted if an acknowledgment is not received.
It reassembles segments in the correct order on the destination device.
It provides a mechanism for the receiver to control the transmission speed.
It regulates the size of each datagram segment.
All of the above are functions of flow control
第13题:
A. Transport layer divides a data stream into segments & adds reliability & flow control information
B. Data link layer adds physical source & destination address & an FCS to the segment
C. Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information
D. Packets are created when the network layers adds layers 3 address & control information to a segment
E. The presentation layer translated bits into bits into voltages for transmission across the physical link
第14题:
What type of valve is used to direct the flow of hydraulic fluid?
A.relief valve
B.direction control valve
C.stop valve
D.pressure control valve
第15题:
Which of the following correctly describe steps in the OSI data encapsulation process?()
第16题:
()is not a physical wall but a flow virtual data to protect the computer network.
第17题:
What is an advantage of the IntServ QoS model?()
第18题:
Transport layer divides a data stream into segments & adds reliability & flow control information
Data link layer adds physical source & destination address & an FCS to the segment
Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information
Packets are created when the network layers adds layers 3 address & control information to a segment
The presentation layer translated bits into bits into voltages for transmission across the physical link
第19题:
Source Quench.
Learning.
Buffering.
Windowing.
Cut-Through.
第20题:
Test the design on a pilot network for expected results prior to implementing on the production network.
Run a network audit to determine types of traffic in use on the network.
Launch campus updates into the production network and monitor impact to see if configuration changes are needed.
Create an interruption of data flow to determine test back-door access methods.
第21题:
the VoIP endpoints have the intelligence to set up and control calls
Call setup and control functionality is centralized in one call agent or cluster
Call setup and control resides in call agents that are distributed throughout the network
Each VoIP device has separate call control, voice packetization, and transport mechanisms
第22题:
The ability to detect and prevent malicious traffic.
The ability to associate security breaches with a specific user.
Converged management of network and security events, network flow data, and identity information.
Consistent device management across administrative realms.
第23题:
Modify the UPDATE statement in the OLE DB Command transform to use the PAGLOCK table hint.
Modify the UPDATE statement in the OLE DB Command transform to use the TABLOCK table hint.
Stage the data in the data flow. Replace the OLE DB Command transform in the data flow with an Execute SQL task in the control flow.
Stage the data in the data flow. Replace the UPDATE statement in the OLE DB Command transform with a DELETE statement followed by an INSERT statement.