You want to segment a network. The network is running SNA and

Netbios. Which device should NOT be used to segment the network?

A.) A store and forward switch.

B.) A router.

C.) A Catalyst 5000.

D.) A cut-through switch.

E.) A bridge.



You want to segment a network. The network is running SNA and Netbios. Which device should NOT be..

Answer / guest

Answer: B

SNA and Netbios are non-routable, you should bridge them.

The most correct answer for this question is 'A Router.'

The purpose here is to recognize that Layer 2 protocols can
not be routed.

However, there are ways to turn a non-routable protocol into
a routable

protocol via a protocol gateway, DLSW+, RSRB and other
technologies.

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which of the following is true regarding standard ISDN BRI service? A.) ISDN BRI B channels are typically 64K. B.) ISDN BRI can handle only voice. C.) ISDN BRI can handle only data. D.) ISDN BRI has 2B and 1D channels. E.) ISDN BRI D channels are 16K. F.) ISDN BRI can handle voice and data.

2 Answers  


What is the extended IPX access list range? A.) 901-1000 B.) 100-199 C.) 900-999 D.) 1000-1000

2 Answers  


What does the User Datagram Protocol (UDP) provide? A.) Connectionless datagram service. B.) FECN & BECN C.) Flow control and error checking. D.) Name resolution. E.) Path discovery.

1 Answers  


What does 'P' mean when running a Trace? A.) Good route B.) Protocol unreachable C.) Source Quench D.) Destination unreachable

1 Answers  


Hi, I have packet tracer 5.0. I want to test intervlan routing routing. Can someone plz tell me about intervlan routing?

1 Answers  






What is the command to manually enter a static route? A.) IP route network B.) IP route C.) IP route < destination network> D.) IP route

4 Answers  


Identify the 2 commands that copies the configuration in NVRAM to RAM? A.) copy backup-config running-config B.) configure nvram C.) copy startup-config running-config D.) configure memory

3 Answers  


Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default

1 Answers  


Why Authentication Header (AH) is not compatible with the network that using NAT?????? Jitu, looking for u specially...!!!! U knw why i m looking for u..!!!

1 Answers  


Which OSI layer provides best effort end to end packet delivery? A.) Data-Link B.) Presentation C.) Network D.) Transport E.) Physical F.) Application

2 Answers  


Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z

1 Answers  


X.25 is characterized by layer 2 identifiers, and what else? A.) Virtual Lan's B.) Session Layer C.) Transport Layer D.) Routing Updates E.) PVC's

1 Answers  


Categories