What are three advantages of using fiber?
A. Security
B. Eliminate RFI and EMI
C. Low cost
D. High speed
Answer / guest
Answer: A, B, and D
Security, elimination of RFI and EMI, and high speed are
three advantages of using fiber.
Is This Answer Correct ? | 2 Yes | 0 No |
How many networks will be advertised using route summarization within an OSPF network if you are given the following networks? 192.108.168.0 192.108.169.0 192.108.170.0 192.108.171.0 192.108.172.0 192.108.173.0 192.108.174.0 192.108.175.0 A. 1 B. 2 C. 3 D. 4 E. 5
What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network
What are three ASN.1 (Abstract Syntax Notation One) data types? A. data feeds B. name C. syntax D. encoding
Diagramming application information flow is important because: A. it helps identify heavy traffic paths B. it helps figure out why email gets from one place to another C. it can tell you when to purchase a new router D. it can tell you when to purchase a new switch
Our company order a cisco ws-c3750x-48t-s(here i bought from http://www.3anetwork.com/cisco-ws-c3750x-48t-s-price_p104.html), As for the switch, in addition to the port module and optical module can be extended, what else module can also be extended?
When would you suggest static routes to your customers? A. When scalability is important B. When bandwidth is limited C. When the network will be changing frequently D. Always suggest static routes
Which condition does not create LAN media problems? A. Protocol doesn?t scale well B. Long wait for the token C. Excessive collisions D. Too many devices
What is the second step when creating a prototype? A. Develop a test plan B. Review the customer requirements C. Investigate what the competition will be proposing D. Define how big the prototype will be
SNMP agents are: A. Management devices B. NMS (Network Management Stations) C. network devices such as routers, switches, or hubs D. PDUs
What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network address C. Protocol type, MAC, and network address D. MAC address
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
What happens to performance if the maximum MTU (Maximum Transmission Unit) size is used? A. Performance increases B. Performance decreases C. Performance stays the same D. Performance has nothing to do with the MTU