A device has 2 synchronous ports, 16 asynchronous ports, and
one ethernet port. What is this device most likely to be?
A. CSU/DSU
B. Access Server
C. Multiplexer
D. ISDN Terminal Adapter
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B
A device that has 16 asynchronous ports, 2 synchronous
ports, and one ethernet port is most likely to be an access
server.
| Is This Answer Correct ? | 0 Yes | 0 No |
how many switches can be cascaded
How can change k-value in EIGRP configuration.
EIGRP was developed to improve what two protocols? A. OSPF B. RIP C. BGP D. IGRP
What is the first step in diagramming packet flow for the terminals within a network? A. Identify the end user nodes of all the terminals B. Figure out the speed of all the servers C. Find out where all the routers are located D. Find out where all the switched are located
What are two ways to connect a PC to a LAN when using ATM (Asynchronous Transfer Mode)? A. ATM endpoint B. ATM LAPB C. ATM router D. ATM switch
Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200
What should be looked at first to determine if a customer should switch from a hub environment to a switched environment? A. Investigate the number of broadcasts B. Investigate the number of collisions C. Determine what routing loops are present D. Determine which switching type is being used by the hubs
Which two LAN switching features apply to store-and-forward switches? A. CRC B. Frame length C. Source address D. Collision Windows
Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
A device has 2 synchronous ports, 16 asynchronous ports, and one ethernet port. What is this device most likely to be? A. CSU/DSU B. Access Server C. Multiplexer D. ISDN Terminal Adapter