Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the standard ISDN term for a native ISDN telephone?

A.) ET

B.) TE1

C.) TE2

D.) LE

E.) TA



What is the standard ISDN term for a native ISDN telephone? A.) ET B.) TE1 C.) TE2 D.) L..

Answer / guest

Answer: B

Terminal Equipment 1 (TE1) understands what native digital
ISDN is, and

has built-in analog to digital converters.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

When discussing static routes, what is the gateway parameter used for? A.) Determining the dynamic route B.) Defining the subnet C.) Defining the Administrative Distance D.) Determining the next hop

1 Answers  


What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

1 Answers  


Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed

1 Answers  


How many types of ends in wan?

0 Answers  


What is ospf? Describe it.

0 Answers  


What is overlaod?

0 Answers  


What are four benefits that can result from applying ISDN networking? (Choose four) A. Full time connectivity across the ISDN is spoofed by Cisco IOS routers using dial on demand routing (DDR) B. Small Once and Home Once sites can be economically supported with ISDN Basic Rate Interface (BRI) servkps C. ISDN replaces Signaling System 7 (SS7) in the Public Switched Telephone Network (PSTIC) backbone D. ISDN can be used as a backup service for a leased line connection between the remote and central chaps E. Modem racking and cabling can be eliminated by integration of digital modem cards on Cisco IOS Network Acess Servers (NAS)

2 Answers  


On which mode we give debug command?

0 Answers  


What is refresher?

0 Answers  


Hi, I am littl bit confused about ip Addressing scheme? can someone tell me how can we assign ip addresses to pc

2 Answers  


The following selections show the command prompt and the configuration of the IP network mask. Which two are correct? A. Router#term IP netmask-format { bitcount | decimal | hexadecimal } B. Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal } C. Router(config-if)#netmask-format { bitcount | decimal | hexadecimal } D. Router#ip netmask-format { bitcount | decimal | hexadecimal }

2 Answers  


what is meant by wild card mask and why can't we use in eigrp ?

2 Answers  


Categories