What is NOT a characteristic of a network segment on a switch?
A. The segment has its own collision domain
B. The segment can translate from one media to a different media
C. All devices in the segment are part of the same broadcast
domain
D. One device per segment can concurrently send frames to
the switch.
Answers were Sorted based on User's Feedback
Answer / jim
Hi Guys,
This is a tricky question. It says "of a network segment
on a switch". A switch can not translate from one media
type to another on the same segment. Thus the correct
answer is D, one device per segment can concurrently send
frames to the switch.
| Is This Answer Correct ? | 5 Yes | 1 No |
what are the different asymmetric algorithms?
Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments
Which command we use for ping in ipv6?
EIGRP send query reply & Acknowledgment on which address ?
What is the default size of a standard ping on a Cisco router? * A: 100 bytes * B: 32 bytes * C: 10 bytes * D: 16 bytes
When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised
What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
When you cords an IP address on a place router which command stale the IP processing on the interface? A. ip enable B. network ip-address C. ip address ip-address subnet mask D. the exit command from the enabled configuration E. copy running-configuration to startup-configuration
Which statement is true regarding Administrative distance? A.) It is a metric B.) Number of hops between two routers C.) Trustworthiness of the routing information D.) RIP Administrative distance is 100
Which layer of the 7 layer model provides services to the Application layer over the Session layer connection? A.) Transport B.) Application C.) Session D.) Network E.) Datalink F.) Presentation
comparative networking features windows linux