What is the second step when creating a prototype?
A. Develop a test plan
B. Review the customer requirements
C. Investigate what the competition will be proposing
D. Define how big the prototype will be
Answer / guest
Answer: D
The second step when creating a prototype is to define the
scale of the prototype or define how big it will be.
| Is This Answer Correct ? | 0 Yes | 0 No |
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS
It is not necessary to build an entire network to prove your network design. A. True B. False
Which two LAN switching features apply to store-and-forward switches? A. CRC B. Frame length C. Source address D. Collision Windows
When characterizing a network, how many buffer misses should not be exceeded on a Cisco router per hour? A. 10 B. 25 C. 50 D. 100
What are two services that DUAL (Diffusing Update Algorithm) performs for EIGRP? A. Provides loop-free operation throughout an entire route?s computation B. Simultaneous synchronization of routers involved in a topology change C. Updates the autonomous system number D. Allows advertised distances to use feasible distances
A remote user needs a static IP address to support a specific application.Which remote access VPN addressing technique supports this ?
Which Of the Statements best describes VPLS ?
Match the following services with the correct descriptions: A. BRI 1. Provides two 64 Kbps B channels B. PRI 2. Provides 23 or 30 B channels 3. Provides one 16 Kbps D channel 4. Provides one 64 Kbps D channel 5. Provides a total bit rate of 2.048 Mbps in Europe and Australia 6. Provides a total bit rate of 144 Kbps 7. Provides a total bit rate of 1.544 Kbps in North America and Japan
What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network address C. Protocol type, MAC, and network address D. MAC address
Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks
Which address is updated at each hop in the path in path switching?
What AppleTalk protocol permits AppleTalk workstations to share files across a network?