A. Data, Frame, Packet, Segment, Bit
B. Data, Frame, Segment, Packet, Bit
C. Data, Packet, Frame, Segment, Bit
D. Data, Packet, Segment, Frame, Bit
E. Data, Segment, Frame, Packet, Bit
F. Data, Segment, Packet, Frame, Bit
您可能感興趣的試卷
你可能感興趣的試題
A. Framing
B. De-encapsulation
C. Encapsulation
D. De-framing
E. None of the above
A. The source device will only retransmit lost packets on the request of the destination device.
B. The source device starts a timer when it sends a segment and retransmits if an acknowledgment is not received before the timer expires.
C. The destination device acknowledges receipt of a segment by sending a packet with a new sequence number and the ACK bit sent.
D. The destination device acknowledges receipt of a segment by sending a packet that indicates the next sequence number it expects.
E. If the destination device does not receive a segment, all segments are retransmitted.
F. The source device keeps a record of all segments sent and expects and acknowledgment of each.
A.MTU
B.PDU
C.FCS
D.Flag
E.MAC
F.BRI
A. ERR
B. Flag
C. FCS
D. MTU
E. MAC
F. PDU
A. source and destination MAC address
B. source MAC address and destination network address only
C. source and destination network address only
D. source network address and destination MAC address
E. source and destination MAC address and source and destination network address
A.NT2
B.NT1
C.TE
D.TA
E.TE1
A. Packet Switching
B. Access Layer Security
C. Path Selection.
D. VLAN Membership Assignment.
E. Bridging between LAN segments.
F. Micro-segmentation of Broadcast Domains.
A.ROM
B.RAM
C.Flash
D.Bootstrap
E.Startup-.config
A. The type of application used on the network
B. The type of system bus used by the computers
C. The type of memory installed in each computer
D. The type of media used in the network topology
E. The type of protocols used in the network
F. The physical layout of the network hosts
A. Source Quench.
B. Learning.
C. Buffering.
D. Windowing.
E. Cut-Through.
最新試題
Which of the following describe router functions?()
New switches have been purchased for a network upgrade. The objective for the network design emphasizes efficient, error-free transport instead of fast transport.Which switching mode should be configured on the new switches to provide error-free transport to the network? ()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
A Class C network address has been subnetted with a /27 mask.Which of the following addresses is a broadcast address for one of the resulting subnets?()
What is the subnetwork address for a host with IP address 201.100.5.68/28?()
Which characteristics are representative of a link-state routing protocol?()
The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()
What feature of a networks switch allows an administrative to create separate broadcast domains?()
A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()