Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the four basic components of an AppleTalk network?

A. Sockets

B. Nodes

C. Networks

D. Areas

E. Zones



What are the four basic components of an AppleTalk network? A. Sockets B. Nodes C. Networks..

Answer / guest

Answer: A, B, C, and E

The four basic components of an AppleTalk network are
sockets, nodes, networks, and zones. A socket is a unique,
addressable location in an AppleTalk node. A node is a
device that is connected to an AppleTalk network. A network
consists of a single logical cable and multiple attached
nodes. A zone is a logical group of nodes or networks that
is defined when the administrator configures the network.
For example, if you had the AppleTalk address 10.6.40, the
network is 10, the node is 6, and the socket is 40. So, the
socket attaches to the node which attaches to the network.
Sometimes you?ll see the network specified as 10.6 and the
socket as 40. So, in this case, you could say the socket
attaches to the network.

Is This Answer Correct ?    3 Yes 2 No

Post New Answer

More CCDA Interview Questions

SNMP agents are: A. Management devices B. NMS (Network Management Stations) C. network devices such as routers, switches, or hubs D. PDUs

1 Answers  


What is the standard ethernet cabling specification? (not IEEE 802.3) A. STP B. Coax (thin) C. Coax (thick) D. UTP

1 Answers  


Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks

1 Answers  


How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data

1 Answers  


How can I release the restriction of CISCO2811C/K9? 10M optical fiber, Speed limit of 125kb / s, made by last network administrator, how can I release the restriction? Please tell me the detail, thanks! Cisco configuration: CISCO2811C/K9 ! ! ! ! ! ! ! interface FastEthernet0/0 description WANpork ip address x.x.x.x 255.255.255.248 ip access-group 110 in no ip proxy-arp ip verify unicast reverse-path ip nat outside ip virtual-reassembly duplex auto speed auto ! interface FastEthernet0/1 description LANpork ip address 192.168.x.x 255.255.255.0 ip access-group 101 in no ip proxy-arp ip verify unicast reverse-path ip nat inside ip virtual-reassembly rate-limit output 1000000 1000000 1000000 conform-action transmit exceed-action drop duplex auto speed auto !

1 Answers  


What are two services that the OSPF Hello protocol provides? A. It discovers neighbor routers B. It gets routes from neighbors during startup C. It helps elect a designated router D. It allows administrator to test for connectivity between two devices

1 Answers  


It is not necessary to build an entire network to prove your network design. A. True B. False

1 Answers  


What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link

2 Answers  


Which tools help to characterize a network? A. Sniffer B. CiscoWorks 2000 C. Netsys D. All of the above

1 Answers  


When characterizing a network, how many buffer misses should not be exceeded on a Cisco router per hour? A. 10 B. 25 C. 50 D. 100

1 Answers  


Which IP address is not a private address? A. 142.18.0.0 B. 10.0.0.0 C. 172.16.0.0 D. 192.168.0.0

1 Answers   NetMax,


What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network address C. Protocol type, MAC, and network address D. MAC address

2 Answers  


Categories