What are three advantages of using fiber?
A. Security
B. Eliminate RFI and EMI
C. Low cost
D. High speed
Answer / guest
Answer: A, B, and D
Security, elimination of RFI and EMI, and high speed are
three advantages of using fiber.
| Is This Answer Correct ? | 2 Yes | 0 No |
What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link
With Centralized Routing, each node must determine and maintain its routing information independently? A. True B. False
When is the route to a node determined in an SRB (Source Route Bridging) Token Ring network? A. Before any data is transmitted B. After the data is transmitted C. During the transmission of data D. After the first frame is transmitted
What set of Frame Relay enhancements offer extensions for managing complex internetworks? A. CMT B. SNMP C. LMI D. RMON
When are SNMP traps sent? A. When the SNMP manager wants to perform remote configuration on a networking device B. When an SNMP agent wants to inform the SNMP manager about a change of state on the networking device C. When the SNMP manager wants to access large chunks of data D. When the NMS wants to share trap information
What are the five areas of the ISO Network Management Model? A. Performance management B. Accounting management C. Flow management D. Configuration management E. Operating management F. Fault management G. Routing management H. Security management
What are three advantages of using fiber? A. Security B. Eliminate RFI and EMI C. Low cost D. High speed
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
A device has 2 synchronous ports, 16 asynchronous ports, and one ethernet port. What is this device most likely to be? A. CSU/DSU B. Access Server C. Multiplexer D. ISDN Terminal Adapter
What should be looked at first to determine if a customer should switch from a hub environment to a switched environment? A. Investigate the number of broadcasts B. Investigate the number of collisions C. Determine what routing loops are present D. Determine which switching type is being used by the hubs
5. Which Two Settings must be configured in order to use the GUI to configure Call Admission Control with voice Applications
It is not necessary to build an entire network to prove your network design. A. True B. False