A device has 2 synchronous ports, 16 asynchronous ports, and
one ethernet port. What is this device most likely to be?
A. CSU/DSU
B. Access Server
C. Multiplexer
D. ISDN Terminal Adapter
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B
A device that has 16 asynchronous ports, 2 synchronous
ports, and one ethernet port is most likely to be an access
server.
| Is This Answer Correct ? | 0 Yes | 0 No |
What are three LAPB features supported by SDLC? A. Frame types B. Frame format C. Field functions D. ABM
What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing
What should be looked at first to determine if a customer should switch from a hub environment to a switched environment? A. Investigate the number of broadcasts B. Investigate the number of collisions C. Determine what routing loops are present D. Determine which switching type is being used by the hubs
EIGRP was developed to improve what two protocols? A. OSPF B. RIP C. BGP D. IGRP
How can change k-value in EIGRP configuration.
When doing an RFP (Request for Purchase) for a customer, at what step do you reiterate your solution and the customer requirements? A. Design Requirements B. Design Solution C. Summary D. Appendices
Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0
Diagramming application information flow is important because: A. it helps identify heavy traffic paths B. it helps figure out why email gets from one place to another C. it can tell you when to purchase a new router D. it can tell you when to purchase a new switch
What AppleTalk protocol permits AppleTalk workstations to share files across a network?
What is the technique used by a router that can automatically initiate and close a circuit-switched session? A. PLP B. LAPP C. ASN.1 D. DDR
What task do you complete to identify organizational objectives that will reflect your design? A. Business Objectives B. Scheduling requirements C. Vacation time D. Meetings
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS