What are two ways to connect a PC to a LAN when using ATM
(Asynchronous Transfer Mode)?
A. ATM endpoint
B. ATM LAPB
C. ATM router
D. ATM switch
Answer / guest
Answer: A and D
Two ways to connect a PC to a LAN when using ATM
(Asynchronous Transfer Mode) is through an ATM endpoint or
an ATM switch.
| Is This Answer Correct ? | 1 Yes | 1 No |
What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing
When is the route to a node determined in an SRB (Source Route Bridging) Token Ring network? A. Before any data is transmitted B. After the data is transmitted C. During the transmission of data D. After the first frame is transmitted
Distance Vector and Link-State protocols converge more quickly if: A. there is router redundancy B. there is router redistribution C. the update interval is set to its maximum D. the whole routing table is sent to announce changes
What are two ways to connect a PC to a LAN when using ATM (Asynchronous Transfer Mode)? A. ATM endpoint B. ATM LAPB C. ATM router D. ATM switch
What task do you complete to identify organizational objectives that will reflect your design? A. Business Objectives B. Scheduling requirements C. Vacation time D. Meetings
Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200
What is the technique used by a router that can automatically initiate and close a circuit-switched session? A. PLP B. LAPP C. ASN.1 D. DDR
Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0
You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling
5. Which Two Settings must be configured in order to use the GUI to configure Call Admission Control with voice Applications
What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network address C. Protocol type, MAC, and network address D. MAC address
What is not a function of the distribution layer? A. Routing between VLANs B. Implement tools such as access lists, packet filtering, and queuing C. Implement security and network policies D. Provide workgroup/user access to the network