You want to segment a network. The network is running SNA and
Netbios. Which device should NOT be used to segment the network?
A.) A store and forward switch.
B.) A router.
C.) A Catalyst 5000.
D.) A cut-through switch.
E.) A bridge.
Answer / guest
Answer: B
SNA and Netbios are non-routable, you should bridge them.
The most correct answer for this question is 'A Router.'
The purpose here is to recognize that Layer 2 protocols can
not be routed.
However, there are ways to turn a non-routable protocol into
a routable
protocol via a protocol gateway, DLSW+, RSRB and other
technologies.
Is This Answer Correct ? | 1 Yes | 0 No |
Which of the following is true regarding standard ISDN BRI service? A.) ISDN BRI B channels are typically 64K. B.) ISDN BRI can handle only voice. C.) ISDN BRI can handle only data. D.) ISDN BRI has 2B and 1D channels. E.) ISDN BRI D channels are 16K. F.) ISDN BRI can handle voice and data.
What is the extended IPX access list range? A.) 901-1000 B.) 100-199 C.) 900-999 D.) 1000-1000
What does the User Datagram Protocol (UDP) provide? A.) Connectionless datagram service. B.) FECN & BECN C.) Flow control and error checking. D.) Name resolution. E.) Path discovery.
What does 'P' mean when running a Trace? A.) Good route B.) Protocol unreachable C.) Source Quench D.) Destination unreachable
Hi, I have packet tracer 5.0. I want to test intervlan routing routing. Can someone plz tell me about intervlan routing?
What is the command to manually enter a static route? A.) IP route network B.) IP route C.) IP route < destination network> D.) IP route
Identify the 2 commands that copies the configuration in NVRAM to RAM? A.) copy backup-config running-config B.) configure nvram C.) copy startup-config running-config D.) configure memory
Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default
Why Authentication Header (AH) is not compatible with the network that using NAT?????? Jitu, looking for u specially...!!!! U knw why i m looking for u..!!!
Which OSI layer provides best effort end to end packet delivery? A.) Data-Link B.) Presentation C.) Network D.) Transport E.) Physical F.) Application
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
X.25 is characterized by layer 2 identifiers, and what else? A.) Virtual Lan's B.) Session Layer C.) Transport Layer D.) Routing Updates E.) PVC's