What is the default switching method for the Cisco 5000 series?
A.) Cut-through
B.) Store-and-splice
C.) Latency
D.) Store-and-forward
When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes
When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.
Cisco's implementation of ISDN BRI has multi protocol support, SNMP MIB support, and what other features? A.) Call waiting B.) Compression C.) ADSL D.) 1.544 Mbps E.) Call screening F.) Negative 'G' support
Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to identify a host device E.) Contains a network portion and a host portion
Can you explain encapsulating, carrier and passenger protocol?
What are the three sources of signal degradation on a data link?
What 2 commands verify end to end communications? A.) Trace B.) debug ip session C.) Ping D.) Route
What does the Frame Relay switch use to distinguish between each PVC connection? A. data-link connection identifiers (DLCIs) B. BECNs C. FECNs D. the Local Management Interface (LMI)
Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI
How broadcast is created in switch
Which of the following are valid WAN terms? A.) DTE B.) DCE C.) Demarc D.) CPE
Which of the following protocols are used for logical network addressing? A.) IP B.) TCP C.) ARP D.) ICMP E.) RARP F.) BootP