Identify 2 features of X.25?
A.) Supports only IP
B.) Utilizes switched and permanent virtual circuits
C.) Contains minimal flow control and error recovery
D.) Utilizes LAPB as it's data-link protocol
Answers were Sorted based on User's Feedback
Answer / roop&
no error & no flowcontrol-------(C)
and since its connection-oriented (B)
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / roop&
B.) & D.)
& since no flow control and recovery
Sorry for the above...
Is This Answer Correct ? | 0 Yes | 0 No |
Define bandwidth?
Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II
Which port numbers are used by TCP and UDP to set up sessions with other hosts? A.) 1024 and above B.) 6 and 17 respectively C.) 1-25 D.) 6-17
which defined peer ip address an local subnet belong to crete? (Choose two)
Using the TCP/IP protocol suite, a message is sent from host A to a destination IP address on the same LAN. How does host A determine the destination of a MAC address? A. It uses a proxy APP B. It uses APP requests C. It uses PARP requests D. It uses a router lookup table
Identify 3 characteristics of IP RIP? A.) Distance vector B.) Administrative distance is 120 C.) Periodic updates every 60 seconds D.) Uses a composite metric E.) Can load balance
A ISDN PRI circuit can be described as which of the following? A.) 24 B channels and 1-64Kbps D channel B.) 23 B channels and 1-64Kbps D channel C.) 2-D channels and 1-C channel D.) 2-64Kbps B channels and 1-16Kbps D channel
What is refresher?
What do the following commands accomplish? access-list 1 permit 172.16.0.0 0.0.255.255 interface ethernet 0 IP access-group 1 out interface ethernet 1 IP access-group 1 out A. Only traffic from the source network 172.16.0.0 will be blocked. B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. C. Non-172.16.0.0 traffic will be forwarded. D. All traffic will be forwarded.
What does the command show access-lists 101 list? A. all defended access lists B. all access lists within the router C. the contents of standard access list 101 D. the contents of defended access list 101
You need to come up with a TCP/IP addressing scheme for your company. How many network IDs must you allow for when you define the subnet mask for the network? A.) One for each WAN link B.) One for each router interface C.) One for each NIC installed in each client D.) One for each subnet with hosts E.) One for each host ID
What is an advantage of UDP? Low Overhead High Overhead Reliable Not reliable