Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Match the following devices with the correct description.

A. Switch 1. Operates at the physical layer and

extends the cable as if it is a single

cable.

B. Router 2. Operates at the physical layer and

connects all connections into one

device or concentrator.

C. Repeater 3. Operates at the network layer and

can filter both hardware and network

addresses.

D. Hub 4. Works at the Data-Link layer and

transmits a digital signal only to the

specific port where the destination

MAC address is located.



Match the following devices with the correct description. A. Switch 1. Operates at the physical..

Answer / guest

Answer: A-4, B-3, C-1, D-2

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCDA Interview Questions

How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data

1 Answers  


What AppleTalk protocol permits AppleTalk workstations to share files across a network?

1 Answers  


What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network

1 Answers  


Which address is updated at each hop in the path in path switching?

1 Answers  


The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct order. A. The PSE (Packet Switch Exchange) passes the packet to the next remote DCE B. The local DCE packet binder sends packet to the closest PSE (Packet Switch Exchange) C. The source DTE sends packet to the local DCE D. The remote DCE examines the packet header of destination DTE

1 Answers  


Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200

1 Answers  


You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling

1 Answers  


What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link

2 Answers  


difference between layer 3 switch and router

0 Answers   Aptron, Tech Mahindra,


What happens when the hold-down timer expires? A. Routes are flushed from the routing table after the flush timer expires B. Routes are flushed from the routing table immediately C. Routes are never flushed D. A triggered update will reset the hold-down timer

1 Answers  


Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks

1 Answers  


When should you apply SAP filters to Netware service advertisement messages? A. When services are not required for a particular area or network B. Only after service advertisement messages have flooded the network C. Before any type of router convergence takes place D. When no change in network services has taken place for 40 minutes

1 Answers  


Categories