What is not a function of the distribution layer?
A. Routing between VLANs
B. Implement tools such as access lists, packet filtering,
and queuing
C. Implement security and network policies
D. Provide workgroup/user access to the network
Answer / guest
Answer: D
Providing workgroup/user access to the network is done at
the access layer.
Is This Answer Correct ? | 0 Yes | 0 No |
When would you suggest static routes to your customers? A. When scalability is important B. When bandwidth is limited C. When the network will be changing frequently D. Always suggest static routes
Which of the following is not true in regards to route summarization? A. It increases the size of the routing table B. It increases the complexity of the network C. IP networks must be contiguous to be safely summarized D. Routing tables must have the capacity to support classless routing
You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling
What happens when the hold-down timer expires? A. Routes are flushed from the routing table after the flush timer expires B. Routes are flushed from the routing table immediately C. Routes are never flushed D. A triggered update will reset the hold-down timer
Distance Vector and Link-State protocols converge more quickly if: A. there is router redundancy B. there is router redistribution C. the update interval is set to its maximum D. the whole routing table is sent to announce changes
What are three ASN.1 (Abstract Syntax Notation One) data types? A. data feeds B. name C. syntax D. encoding
What are the four basic components of an AppleTalk network? A. Sockets B. Nodes C. Networks D. Areas E. Zones
The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct order. A. The PSE (Packet Switch Exchange) passes the packet to the next remote DCE B. The local DCE packet binder sends packet to the closest PSE (Packet Switch Exchange) C. The source DTE sends packet to the local DCE D. The remote DCE examines the packet header of destination DTE
What are two true statements regarding DDR (Dial-on-Demand Routing)? A. Allows a router to automatically initiate and end a circuit-switched session B. DDR cannot be configured because it is set with a default configuration C. Can configure it to be used during non-peak hours D. Can only be used with Cisco PIX
ISDN is referenced by a suite of ITU-T (International Telecommunication Union Telecommunication Standardization Sector) standards encompassing what three layers of the OSI reference model? A. Physical B. Data Link (LAPD) C. Data Link (RMON) D. Network (Q.930 and Q.931)
What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link
The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems