Identify 2 features of X.25?
A.) Supports only IP
B.) Utilizes switched and permanent virtual circuits
C.) Contains minimal flow control and error recovery
D.) Utilizes LAPB as it's data-link protocol
Answer / guest
Answer: B D
X.25 utilizes LAPB and uses switched and permanent VC's. It
supports
multiple layer protocols and is heavy laden with error
detection and
correction mechanisms.
Is This Answer Correct ? | 3 Yes | 0 No |
can we configure multiple as on single router using eigrp
Which layer are called upper layer?
What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.
What does 'P' mean when running a Trace? A.) Good route B.) Protocol unreachable C.) Source Quench D.) Destination unreachable
what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs?
Identify the command to display the IP host table? A.) show ip hostnames B.) show ip names C.) show hosts D.) show ip hosts
Identify the 3 pieces of hardware you would not install to prevent broadcasts? A.) Switch B.) Repeater C.) Bridge D.) Router
Identify the 2 characteristics regarding MAC addresses? A.) Contains a network portion and host portion B.) Always assigned by System Administrator C.) 48 bits long D.) Contains a vendor code and serial number
Identify the 2 rules used when configuring a Distance Vector routing protocol? A.) Physically connected network(s) B.) Configure the classfull address, no subnets C.) Enable CDP so neighbors can be detected D.) Same autonomous network
Given the command 'cl?', what will it display? A.) Syntax of the 'clock' command B.) Syntax of the 'clear' command C.) All commands that begin with 'cl' D.) All commands that begin with 'c'
How does a web page works though each layers ?
Whith the hierarchical numbering of IP addressing what determines the spoon of the address that will identify the network number? A. subnet mask B. dots between octets C. class of the first octet D. assignments of DHCP E. address resolution process