Which two LAN switching features apply to store-and-forward
switches?
A. CRC
B. Frame length
C. Source address
D. Collision Windows
Answer / guest
Answer: A and B
Store-and-forward switches copy the entire frame into its
onboard buffers and compute the CRC (cyclic redundancy
check). Since this type of switching copies the entire frame
and runs a CRC, latency time can vary depending on the frame
length.
| Is This Answer Correct ? | 3 Yes | 0 No |
What set of Frame Relay enhancements offer extensions for managing complex internetworks? A. CMT B. SNMP C. LMI D. RMON
What are metrics used with IGRP? A. Ticks B. Load C. Hops D. Delay
Which of the following is not true in regards to route summarization? A. It increases the size of the routing table B. It increases the complexity of the network C. IP networks must be contiguous to be safely summarized D. Routing tables must have the capacity to support classless routing
Which Of the Statements best describes VPLS ?
What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link
When characterizing a network, how many buffer misses should not be exceeded on a Cisco router per hour? A. 10 B. 25 C. 50 D. 100
Which condition does not create LAN media problems? A. Protocol doesn?t scale well B. Long wait for the token C. Excessive collisions D. Too many devices
Which two of the following describe ASN.1 (Abstract Syntax Notation One)? A. It is an abstract routing protocol that is not used very often. B. It is an OSI language for describing data types independent of particular computer structures and representation techniques. C. Consists of only one basic routing algorithm. D. Uses BER (Basic Encoding Rules).
Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks
What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the manufacturer.
What AppleTalk protocol permits AppleTalk workstations to share files across a network?
Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0