Which of the following does not specify an application
requirement that affects your network design?
A. The number of users
B. The peak hours that the applications are used
C. The types of applications used
D. Security risks
Answer / guest
Answer: D
Using the Application Job Aid, when characterizing the
customer?s applications, you would need the following
information: Name of Application, Type of Application,
Number of Users, and Number of Hosts and Servers. Even
though the peak hours that the applications are used isn?t a
category of the Job Aid, we feel that it is something you
would want to know when characterizing customer?s
applications. This leaves Security Risks which would fall
within another category of the design.
| Is This Answer Correct ? | 0 Yes | 0 No |
Which address is updated at each hop in the path in path switching?
Match the following services with the correct descriptions: A. BRI 1. Provides two 64 Kbps B channels B. PRI 2. Provides 23 or 30 B channels 3. Provides one 16 Kbps D channel 4. Provides one 64 Kbps D channel 5. Provides a total bit rate of 2.048 Mbps in Europe and Australia 6. Provides a total bit rate of 144 Kbps 7. Provides a total bit rate of 1.544 Kbps in North America and Japan
What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link
Match the following routing protocols with their routing algorithm. A. OSPF 1. Distance Vector B. IGRP 2. Link-State C. RIP D. IS-IS E. NLSP F. RTMP G. AURP H. BGP
How can change k-value in EIGRP configuration.
how many default route can be configure on a router
how many switches can be cascaded
You want to assign IP addresses to a large number of workstations. What is the best way to do this? A. Cisco Network Registrar B. Cisco IOS NAT Feature C. Assign them static IP addresses D. Let the workstation assign its own IP address
difference between layer 3 switch and router
0 Answers Aptron, Tech Mahindra,
A device has 2 synchronous ports, 16 asynchronous ports, and one ethernet port. What is this device most likely to be? A. CSU/DSU B. Access Server C. Multiplexer D. ISDN Terminal Adapter
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
When is the route to a node determined in an SRB (Source Route Bridging) Token Ring network? A. Before any data is transmitted B. After the data is transmitted C. During the transmission of data D. After the first frame is transmitted