What is the technique used by a router that can
automatically initiate and close a circuit-switched session?
A. PLP
B. LAPP
C. ASN.1
D. DDR
Answer / guest
Answer: D
DDR (Dial-on-demand routing) is the technique used by a
router that can automatically initiate and close a
circuit-switched session. PLP (packet-layer protocol) is the
network layer protocol in the X.25 stack. LAPP doesn?t
exist. ASN.1 (Abstract Syntax Notation One) is an OSI
language for describing data types independent of particular
computer structures and representation techniques.
| Is This Answer Correct ? | 0 Yes | 0 No |
Our company order a cisco ws-c3750x-48t-s(here i bought from http://www.3anetwork.com/cisco-ws-c3750x-48t-s-price_p104.html), As for the switch, in addition to the port module and optical module can be extended, what else module can also be extended?
It is not necessary to build an entire network to prove your network design. A. True B. False
With Centralized Routing, each node must determine and maintain its routing information independently? A. True B. False
What happens to performance if the maximum MTU (Maximum Transmission Unit) size is used? A. Performance increases B. Performance decreases C. Performance stays the same D. Performance has nothing to do with the MTU
What PPP frame initiates the network layer protocols to be used during a connection?
Client traffic is being bridged trough LAN interfaces on two WLCs.Which roaming option will Keep them on the same IP Subnet ?
The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct order. A. The PSE (Packet Switch Exchange) passes the packet to the next remote DCE B. The local DCE packet binder sends packet to the closest PSE (Packet Switch Exchange) C. The source DTE sends packet to the local DCE D. The remote DCE examines the packet header of destination DTE
What is an advantage of CHAP over PAP? A. Passwords are stored on separate servers in encrypted form B. CHAP sends passwords unencrypted to save connection time C. CHAP does not attempt to verify whether the user is authorized to access the requested resource D. ID?s and passwords are automatically stored in cache
When is the route to a node determined in an SRB (Source Route Bridging) Token Ring network? A. Before any data is transmitted B. After the data is transmitted C. During the transmission of data D. After the first frame is transmitted
You want to assign IP addresses to a large number of workstations. What is the best way to do this? A. Cisco Network Registrar B. Cisco IOS NAT Feature C. Assign them static IP addresses D. Let the workstation assign its own IP address
how many default route can be configure on a router
What are three advantages of using fiber? A. Security B. Eliminate RFI and EMI C. Low cost D. High speed