Which of the following does not specify an application
requirement that affects your network design?

A. The number of users

B. The peak hours that the applications are used

C. The types of applications used

D. Security risks



Which of the following does not specify an application requirement that affects your network design..

Answer / guest

Answer: D

Using the Application Job Aid, when characterizing the
customer?s applications, you would need the following
information: Name of Application, Type of Application,
Number of Users, and Number of Hosts and Servers. Even
though the peak hours that the applications are used isn?t a
category of the Job Aid, we feel that it is something you
would want to know when characterizing customer?s
applications. This leaves Security Risks which would fall
within another category of the design.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCDA Interview Questions

When should you apply SAP filters to Netware service advertisement messages? A. When services are not required for a particular area or network B. Only after service advertisement messages have flooded the network C. Before any type of router convergence takes place D. When no change in network services has taken place for 40 minutes

1 Answers  


You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling

1 Answers  


What AppleTalk protocol permits AppleTalk workstations to share files across a network?

1 Answers  


What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link

2 Answers  


Diagramming application information flow is important because: A. it helps identify heavy traffic paths B. it helps figure out why email gets from one place to another C. it can tell you when to purchase a new router D. it can tell you when to purchase a new switch

2 Answers  






With Centralized Routing, each node must determine and maintain its routing information independently? A. True B. False

1 Answers  


When characterizing a network, how many buffer misses should not be exceeded on a Cisco router per hour? A. 10 B. 25 C. 50 D. 100

1 Answers  


What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the manufacturer.

2 Answers  


What are three advantages of using fiber? A. Security B. Eliminate RFI and EMI C. Low cost D. High speed

1 Answers  


When designing a flat switched network you can have: A. the same number of IP and IPX nodes without performance degradation B. more IP than IPX nodes on the same segment C. more IPX than IP nodes on the same segment D. more AppleTalk than IP nodes on the same segment

1 Answers  


Which IP address is not a private address? A. 142.18.0.0 B. 10.0.0.0 C. 172.16.0.0 D. 192.168.0.0

1 Answers   NetMax,


Which condition does not create LAN media problems? A. Protocol doesn?t scale well B. Long wait for the token C. Excessive collisions D. Too many devices

1 Answers  


Categories