When is the route to a node determined in an SRB (Source
Route Bridging) Token Ring network?
A. Before any data is transmitted
B. After the data is transmitted
C. During the transmission of data
D. After the first frame is transmitted
Answer / guest
Answer: A
The route to a node is determined before any data is
transmitted in an SRB (Source Route Bridging) Token Ring
network.
| Is This Answer Correct ? | 0 Yes | 0 No |
6. Which of these statements best describes VPLS ?
When designing a flat switched network you can have: A. the same number of IP and IPX nodes without performance degradation B. more IP than IPX nodes on the same segment C. more IPX than IP nodes on the same segment D. more AppleTalk than IP nodes on the same segment
What are the five areas of the ISO Network Management Model? A. Performance management B. Accounting management C. Flow management D. Configuration management E. Operating management F. Fault management G. Routing management H. Security management
The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct order. A. The PSE (Packet Switch Exchange) passes the packet to the next remote DCE B. The local DCE packet binder sends packet to the closest PSE (Packet Switch Exchange) C. The source DTE sends packet to the local DCE D. The remote DCE examines the packet header of destination DTE
What layer of the OSI reference model does TCP reside in? A. Session B. Transport C. Network D. Data-Link
What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link
Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks
What are the four basic components of an AppleTalk network? A. Sockets B. Nodes C. Networks D. Areas E. Zones
What is the technique used by a router that can automatically initiate and close a circuit-switched session? A. PLP B. LAPP C. ASN.1 D. DDR
What are three ASN.1 (Abstract Syntax Notation One) data types? A. data feeds B. name C. syntax D. encoding
When doing an RFP (Request for Purchase) for a customer, at what step do you reiterate your solution and the customer requirements? A. Design Requirements B. Design Solution C. Summary D. Appendices
how many default route can be configure on a router