You may receive a case study including Token Ring and
Ethernet, so you may want to look at any constraints with
cabling between Token Ring and Ethernet networks.
Which statement describes the constraints imposed by the
existing network?
A. Replace all cabling
B. Test all cabling
C. Do not replace cabling
D. Use microwave instead of cabling
How can I release the restriction of CISCO2811C/K9? 10M optical fiber, Speed limit of 125kb / s, made by last network administrator, how can I release the restriction? Please tell me the detail, thanks! Cisco configuration: CISCO2811C/K9 ! ! ! ! ! ! ! interface FastEthernet0/0 description WANpork ip address x.x.x.x 255.255.255.248 ip access-group 110 in no ip proxy-arp ip verify unicast reverse-path ip nat outside ip virtual-reassembly duplex auto speed auto ! interface FastEthernet0/1 description LANpork ip address 192.168.x.x 255.255.255.0 ip access-group 101 in no ip proxy-arp ip verify unicast reverse-path ip nat inside ip virtual-reassembly rate-limit output 1000000 1000000 1000000 conform-action transmit exceed-action drop duplex auto speed auto !
What are three advantages of using fiber? A. Security B. Eliminate RFI and EMI C. Low cost D. High speed
What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network
What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing
When is the route to a node determined in an SRB (Source Route Bridging) Token Ring network? A. Before any data is transmitted B. After the data is transmitted C. During the transmission of data D. After the first frame is transmitted
EIGRP was developed to improve what two protocols? A. OSPF B. RIP C. BGP D. IGRP
What is the second step when creating a prototype? A. Develop a test plan B. Review the customer requirements C. Investigate what the competition will be proposing D. Define how big the prototype will be
What are metrics used with IGRP? A. Ticks B. Load C. Hops D. Delay
How can change k-value in EIGRP configuration.
The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems
What are three ASN.1 (Abstract Syntax Notation One) data types? A. data feeds B. name C. syntax D. encoding
What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network address C. Protocol type, MAC, and network address D. MAC address