Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


When characterizing a network, how many buffer misses should
not be exceeded on a Cisco router per hour?

A. 10

B. 25

C. 50

D. 100



When characterizing a network, how many buffer misses should not be exceeded on a Cisco router per ..

Answer / guest

Answer: B

Buffer misses should not exceed more than 25 in an hour on
any Cisco router.

Is This Answer Correct ?    2 Yes 2 No

Post New Answer

More CCDA Interview Questions

With Centralized Routing, each node must determine and maintain its routing information independently? A. True B. False

1 Answers  


What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing

1 Answers   Cisco,


How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data

1 Answers  


What device initiates a session in an X.25 network? A. DTE B. DCE C. PSE D. PAD

1 Answers  


Which Of the Statements best describes VPLS ?

1 Answers   Pari Networks,


Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0

1 Answers  


What set of Frame Relay enhancements offer extensions for managing complex internetworks? A. CMT B. SNMP C. LMI D. RMON

1 Answers  


What are the five areas of the ISO Network Management Model? A. Performance management B. Accounting management C. Flow management D. Configuration management E. Operating management F. Fault management G. Routing management H. Security management

2 Answers  


Match the following routing techniques with the correct descriptions: A. Static Routing 1. Mandatory configuration B. Dynamic Routing 2. No route updates 3. Can better tolerate failures 4. Sends update when topology changes 5. Path is determined by the router 7. Traffic is reduced

1 Answers  


When would you suggest static routes to your customers? A. When scalability is important B. When bandwidth is limited C. When the network will be changing frequently D. Always suggest static routes

1 Answers  


What is an advantage of CHAP over PAP? A. Passwords are stored on separate servers in encrypted form B. CHAP sends passwords unencrypted to save connection time C. CHAP does not attempt to verify whether the user is authorized to access the requested resource D. ID?s and passwords are automatically stored in cache

1 Answers  


Diagramming application information flow is important because: A. it helps identify heavy traffic paths B. it helps figure out why email gets from one place to another C. it can tell you when to purchase a new router D. it can tell you when to purchase a new switch

2 Answers  


Categories