On a network design project you determine that a new testing
application requires multiple hosts. These hosts must be
capable of sharing data between each host and an enterprise
server at 10 Mobs bandwidth. Other divisions in the company
use applications that require less than 2 Mobs bandwidth of
the enterprise server. What is your most economical
recommendation?
A. That existing 10BaseT hubs be replaced with 1 00BaseT
hubs to improve overall performance
B. That a router can separate the testing application from
the rest of the network, thus allowing the testing
application more bandwidth.
C. That a switch be installed, so that the enterprise server
can be provided a 100 Mobs pod and each of the testing
application hosts can be given dedicated 10 Mobs pods]
D. That a bridge be placed between the enterprise server and
all other users with the exception of the testing application
Identify the command that displays traffic statistics on serial0/1? A.) display interface serial0/1 B.) show interface serial0/1 C.) show seria0/1 stats D.) show interface serial0/1 stats
What is the default size of frame?
What is the difference between DTE & DCE???
Which OSI layer handles physical addresses and network topology? A.) Presentation B.) Physical C.) Transport D.) Application E.) Data-Link F.) Network
The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules D.) Frames E.) Segments
What is the advantage of vlan?
The CSMA/CD Ethernet IEEE committee is defined as which of the following? A.) 802.2 B.) 802.3 C.) 802.4 D.) 802.5
Your company has been assigned the IP address of 201.222.5.0 and require having 20 subnets. As the company’s network administrator, find the following: a) the subnet mask (2 marks) b) the number of useable subnets (2 marks) c) the subnetwork address for the 4th subnet (2 marks) d) the first usable IP address for the 4th subnet (2 marks) e) the last usable IP address for the 4th subnet (2 marks) f) the broadcast address for the 4th subnet. (2 marks)
Explain the difference between tftp and ftp application layer protocols?
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list
What are the different types of passwords used in securing a CISCO router?
Sequence and acknowledgement numbers are used for? A.) Layer transitioning B.) Flow control C.) Port number addressing D.) Reliability