What are two true statements regarding DDR (Dial-on-Demand
Routing)?
A. Allows a router to automatically initiate and end a
circuit-switched session
B. DDR cannot be configured because it is set with a default
configuration
C. Can configure it to be used during non-peak hours
D. Can only be used with Cisco PIX
Answer / guest
Answer: A and C
We believe the answer to be A and C. DDR allows a router to
automatically initiate and end a circuit-switched session
and it also can be configured with many different
configurations.
| Is This Answer Correct ? | 0 Yes | 0 No |
What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the manufacturer.
Diagramming application information flow is important because: A. it helps identify heavy traffic paths B. it helps figure out why email gets from one place to another C. it can tell you when to purchase a new router D. it can tell you when to purchase a new switch
What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network
When are SNMP traps sent? A. When the SNMP manager wants to perform remote configuration on a networking device B. When an SNMP agent wants to inform the SNMP manager about a change of state on the networking device C. When the SNMP manager wants to access large chunks of data D. When the NMS wants to share trap information
OSPF supports priority routing for which TCP/IP feature? A. PA B. TCP C. IP D. SNA
What category or categories does Client/Server fit into the following Job Aid? Name of Protocol Type of Protocol # of Users # of Hosts or Servers Comments
What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network address C. Protocol type, MAC, and network address D. MAC address
What are three advantages of using fiber? A. Security B. Eliminate RFI and EMI C. Low cost D. High speed
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
In an ATM network, which type of device is in a LAN per ELAN (Emulated LAN)? A. LAN Emulation Workstation B. LAN Emulation Router C. LAN Emulation Server D. LAN Emulation Bridge
A remote user needs a static IP address to support a specific application.Which remote access VPN addressing technique supports this ?
How can change k-value in EIGRP configuration.